Research Article

Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing

Table 2

Communication costs comparison.

ProtocolsVerification phaseUpdating phase

DPDP(skip list)[6]
DPDP(MHT)[7]
IHT-PA[10]O(c)
DHT-PA[13]O(c)
DLIT-PA[14]O(c)
AHT-PAO(c)