Research Article

Improved Outsourced Provable Data Possession for Secure Cloud Storage

Table 1

Notations.

NotationsDescriptions

A multiplicative cyclic group
A secure hash function such that
A prime field
The generator of group
The user’s data file
The user’s data file with blocks and slices
The secret random values of user
A random value that makes up the public key
The secret key of user
The public key of user
The authentication label for the i-th data block
The collection of authentication labels
The processed data of user which include and Σ
The challenge set sent by the auditor to CSP
A rank-based Merkle tree built from user’s data
The local log file of the auditor
A record of an auditor’s auditing work
The proof generated by the CSP or auditor
A multi-proof based on multiple challenged leaf nodes