Research Article

An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users

Table 5

Comparison of communication overhead.

ProtocolChallenge message (bits)Response message (bits)

Yu et al. [15]
Wang et al. [20]
Zhu et al. [22]
Yang and Jia [23]
Proposed protocol