Research Article

A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments

Algorithm 5

Integrity auditing protocol.
: ,
: “accept” or “reject
(1): for in
(2)
(3)
(4)
(5)
(6) send , , to as a challenge
(7) : compute
(8)
(9) send , to as a response
(10) : compute
(11) if is not valid
(12) return “reject
(13) if
(14) return “accept
(15) otherwise
(16) return “reject