Research Article
ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification
Table 1
Comparison of features.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
F1: file tag verification, F2: block tag verification, F3: accept storage verification, F4: application agent verification, F5: accept auditing verification, F6: unforgeability, F7: privacy-preserving. |