Research Article
A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments
Algorithm 5
Integrity auditing protocol.
: , | : “accept” or “reject” | (1): for in | (2) | (3) | (4) | (5) | (6) send , , to as a challenge | (7) : compute | (8) | (9) send , to as a response | (10) : compute | (11) if is not valid | (12) return “reject” | (13) if | (14) return “accept” | (15) otherwise | (16) return “reject” |
|