Research Article
Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency
Table 1
Characteristics analysis of different cloud data integrity verification schemes.
| Scheme | Dynamic operation | Privacy protection | Resistant to quantum attack | Trusted third party |
| [20] | No | Yes | No | No | [21] | Yes | Yes | No | No | [24] | Yes | No | No | No | [40] | No | Yes | No | Yes | Our scheme | Yes | Yes | Yes | Yes |
|
|