Research Article

Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage

Figure 1

Entities and steps involved in an auditing system: three entities, i.e., CSP, TPA, and a user, are always included in this model, where TPA is fully responsible for the remote audit of the user data stored in CSP using a challenge-response authentication protocol.