Research Article

Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience

Figure 7

The proof verification time of the proposed scheme in batch auditing for c = (300 ⋅ no_of_clients) blocks.