Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2020
/
Article
/
Tab 3
/
Research Article
Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience
Table 3
Comparison of size of audit response and computation time in terms of number of operations in batch auditing.
Proposed scheme
Audit response (bytes)
.
no_of_clients
Proof generation
no_of_clients [(
c
+ 1)
T
e
+ (
c
+ 2)
T
m
]
Proof verification
no_of_clients (2
T
H
+ 2
T
e
) + 4
T
p