Research Article

Audit Outsourced Data in Internet of Things

Table 1

Notations and definitions.

NotationDefinition

Safety strength parameters
q-order finite field
q-order multiplicative cyclic group
Generator of
User’s private key
User’s public key
Data outsourced to the cloud
User’s i-th data block
Homomorphic tag of
Auxiliary calculation information generated by CSP
Homomorphic tag collection
Bilinear mapping
Number of data blocks
Number of data blocks challenged
Random number of the challenge block pairing
Index of data block
Auxiliary authentication information of nodes
Challenge-response proof generated by CSP
Collision-resistant one-way hash function
Root hash