Research Article

ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification

Table 2

Required communication number.

  P1 P2 P3

Wang et al. [16] 1 1 2

Zhang et al. [17] 1 1 2

Ours 1 4 2

P1: key extraction phase, P2: tag generation phase, P3: challenge and prove phase.