Research Article

An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users

Figure 3

Auditing challenge, proof generation, and verification processes.