Research Article

Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain

Algorithm 1

Search algorithm of T-Merkle hash tree.
Input:
Output:
(1)for eachin BC
(2)ifin index range of then
(3)  Access T-Merkle hash tree root of current , set .
(4)  ifthen
(5)   get in node by comparing index key.
(6)  else ifthen
(7)   set .
(8)  else//
(9)   set .
(10)else
(11)  go through the previous block.
(12)end