Research Article

ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification

Table 3

Comparison of computation costs.

  P1 P2 P3 P4

Zhang et al. [17]2H+2S4nH+6nS+3nB+ nE|I|H+2|I|S+|I|E|I|H+2|I|S+3B

Ours H+S(4n+7)H+(5n+12)S+11B|I|H +|I|S+|I|E|I|S+3B

P1: key extraction phase, P2: block tag generation phase, P3: prove phase, P4: verify phase; E: exponential operation and its time cost, S: scalar multiplication and its time cost, H: hash computation and its time cost, B: bilinear pairing and its time cost.