Research Article

ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification

Table 1

Comparison of features.

 F1F2F3F4F5F6 F7

Wang et al. [16]NoNoNoNoNoYes No

Zhang et al. [17]No -YesNoNoNoNo Yes

OursYesYesYesYesYesYes Yes

F1: file tag verification, F2: block tag verification, F3: accept storage verification, F4: application agent verification, F5: accept auditing verification, F6: unforgeability, F7: privacy-preserving.