Research Article

A Decentralized Public Auditing Scheme for Secure Cloud Storage Based on Blockchain

Algorithm 4

Malicious DU detecting
1: DU verify whether the received data is correct by checking the equation
2: if This equation holds then
3:  accepts the data .
4: else
5:  divides DU before into two groups: . Then checks if .
6: if The above equation holds then
7:  The malicious DU exists in . computes , then verifies if .
8:  if The equation is satisfied then
9:   The malicious DU belongs to , continues to search through binary search until it finds the malicious DU .
10:  end if
11: else
12:  The malicious DU exists in . continues to search through binary search until it finds the malicious DU .
13:  end if
14: end if