Research Article

ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification

Algorithm 2

The challenge and prove phase.
AU CS
Choose a set    and a number 
Generate
Checks
Produces set
Computes ,
Compute , .
Check