Research Article
An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature
Table 1
Schemes attribute comparison.
| ā | Ateniese-[3] | Juels-[4] | [5] | Wang-[6] | Wang-[8] | Worku-[9] | Our scheme |
| Data integrity protection | Yes | Yes | Yes | No | Yes | No | Yes | Public auditability | Yes | No | Yes | No | Yes | Yes | Yes | Privacy protection | No | No | No | No | Yes | Yes | Yes | Blockless verification | Yes | No | Yes | Yes | Yes | Yes | Yes | Batch auditing | No | No | No | No | Yes | Yes | Yes | Retrievability | No | Yes | No | No | No | No | Yes | Audit times | Unlimit | limit | limit | Unlimit | Unlimit | Unlimit | Unlimit | Communication | | | | | | | |
|
|