Research Article
Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain
Algorithm 1
Search algorithm of T-Merkle hash tree.
Input: | Output: | (1) | for eachin BC | (2) | ifin index range of then | (3) | Access T-Merkle hash tree root of current , set . | (4) | ifthen | (5) | get in node by comparing index key. | (6) | else ifthen | (7) | set . | (8) | else// | (9) | set . | (10) | else | (11) | go through the previous block. | (12) | end |
|