Research Article
Improved Outsourced Provable Data Possession for Secure Cloud Storage
| Notations | Descriptions |
| | A multiplicative cyclic group | | A secure hash function such that | | A prime field | | The generator of group | | The user’s data file | | The user’s data file with blocks and slices | | The secret random values of user | | A random value that makes up the public key | | The secret key of user | | The public key of user | | The authentication label for the i-th data block | | The collection of authentication labels | | The processed data of user which include and Σ | | The challenge set sent by the auditor to CSP | | A rank-based Merkle tree built from user’s data | | The local log file of the auditor | | A record of an auditor’s auditing work | | The proof generated by the CSP or auditor | | A multi-proof based on multiple challenged leaf nodes |
|
|