Research Article

A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments

Algorithm 2

Precomputation process for integrity auditing.
: a ciphertext , a file tag value ,
a secret key , the highest challenge
: an expected response array
(1) for in
(2)
(3) for in
(4)
(5)
(6)
(7)
(8)
(9)
(10) return