Research Article

Genuine and Secure Identity-Based Public Audit for the Stored Data in Healthcare Cloud

Table 3

Comparison of communication overhead and security among three schemes.

SchemeChallenge information (bits)Proof information (bits)Total (bits)Security

Zhang et al.’s schemeNo
Our schemeYes
Yu et al.’s schemeYes