Research Article
A Blockchain-Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors
Table 1
The security comparison of our scheme with CLPA and IDBA.
| Properties | Key escrow | Replacement attack | Replay attack | Forgery attack | Malicious auditor |
| CLPA [23] | √ | | | | | IDBA [25] | | √ | √ | √ | | Our scheme | √ | √ | √ | √ | √ |
|
|