Research Article
Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security
Algorithm 1
Algorithm for generating proof table
.Proof_Table. With the bv23Tree of levels, and the ordered indices set that appoint | ordered leaves , this algorithm generates the corresponding proof table . | (1)initialize node array by ; | (2) tracks the parent of the current node as | (3); tracks the column of the proof table | (4)whiledo | (5)fordo | (6)ifthen | (7); | (8)else | (9) denote the current tree node stored in | (10)if node only has one sibling node, which is denoted by then | (11)if exists in , in this casethen | (12); ; | (13)else does not exist in current array | (14); | (15)end if | (16)else has two sibling nodes, which are denoted by | (17) that the sequence of must follow the left-to-right principle as in Figure 2, e.g., two siblings of | node must be denoted by | (18)if only (or ) exists in then | (19) (or ); | (20); | (21)else if both and exist in and , respectively, then | (22); ; ; | (23)else both and do not exist in current array | (24); | (25) end if | (26)end if | (27) the parent node of the current node ; | (28)end if | (29)end for | (30); | (31)end while | (32)return the proof table ; |
|