Research Article
An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users
Table 5
Comparison of communication overhead.
| Protocol | Challenge message (bits) | Response message (bits) |
| Yu et al. [15] | | | Wang et al. [20] | | | Zhu et al. [22] | | | Yang and Jia [23] | | | Proposed protocol | | |
|
|