Research Article
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing
Table 2
Comparison of security properties.
| Scheme | Collusion-resistant | Anonymous storage | Having verification property | Identifiable cheater |
| [2] | YES | NO | YES | NO | [4] | YES | NO | NO | NO | Ours | YES | YES | YES | YES |
|
|