Research Article

Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain

Algorithm 2

.
 Input:
 Output:
(1)CS calculates the batch data proof as
(2)BC calculates the batch tag proof as
(3)CS and BC send aggregated proofs to Client.
(4)After receiving the proofs, Client checks the correctness of the proofs by calculating and checking
(5)If equation in Algorithm 2 (4) holds, it means all the tasks are intact.