Research Article

An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users

Table 3

Comparison of the security features.

ProtocolIntegrity verificationDynamic data operationsUser authentication during integrity verification

Yu et al. [15]YesNoNo
Wang et al. [20]YesNoNo
Zhu et al. [22]YesYesNo
Yang et al. [23]YesYesNo
Proposed protocolYesYesYes