Research Article

Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience

Table 3

Comparison of size of audit response and computation time in terms of number of operations in batch auditing.

Proposed scheme

Audit response (bytes). no_of_clients
Proof generationno_of_clients [(c + 1)Te+ (c + 2)Tm]
Proof verificationno_of_clients (2TH + 2Te) + 4Tp