Research Article
A Decentralized Public Auditing Scheme for Secure Cloud Storage Based on Blockchain
1: DU verify whether the received data is correct by checking the equation | 2: if This equation holds then | 3: accepts the data . | 4: else | 5: divides DU before into two groups: . Then checks if . | 6: if The above equation holds then | 7: The malicious DU exists in . computes , then verifies if . | 8: if The equation is satisfied then | 9: The malicious DU belongs to , continues to search through binary search until it finds the malicious DU . | 10: end if | 11: else | 12: The malicious DU exists in . continues to search through binary search until it finds the malicious DU . | 13: end if | 14: end if |
|