Research Article
An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users
Table 3
Comparison of the security features.
| Protocol | Integrity verification | Dynamic data operations | User authentication during integrity verification |
| Yu et al. [15] | Yes | No | No | Wang et al. [20] | Yes | No | No | Zhu et al. [22] | Yes | Yes | No | Yang et al. [23] | Yes | Yes | No | Proposed protocol | Yes | Yes | Yes |
|
|