Research Article
Audit Outsourced Data in Internet of Things
Table 1
Notations and definitions.
| Notation | Definition |
| | Safety strength parameters | | q-order finite field | | q-order multiplicative cyclic group | | Generator of | | User’s private key | | User’s public key | | Data outsourced to the cloud | | User’s i-th data block | | Homomorphic tag of | | Auxiliary calculation information generated by CSP | | Homomorphic tag collection | | Bilinear mapping | | Number of data blocks | | Number of data blocks challenged | | Random number of the challenge block pairing | | Index of data block | | Auxiliary authentication information of nodes | | Challenge-response proof generated by CSP | | Collision-resistant one-way hash function | | Root hash |
|
|