Research Article

Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage

Table 2

Online computation time comparison of three typical audit schemes.

Scheme

NC-Audit5.55 ms2.13 ms6.44 ms2.77 ms
Ref. [10]11.09 ms3.14 ms13.73 ms3.14 ms
RNC-Audit5.54 ms2.13 ms6.40 ms2.72 ms