Research Article

An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users

Table 4

Comparison of computational cost.

Sl. no.ProtocolTag generation (ms)Proof generation (ms)Proof verification (ms)

1.Yu et al. [15]
2.Wang et al. [20]
3.Zhu et al. [22]
4.Yang et al. [23]
5.Proposed protocol