What is it about?

In order to audit data integrity instead of retrieving the entire outsourced data from the cloud. We use the chameleon authentication tree structure to improve audit efficiency.

Featured Image

Why is it important?

We designed a new type of audit protocol using chameleon hash, which effectively reduces the recalculation of node hashes caused by dynamic data updates and supports virtual node settings.


It is my pleasure to write this article.Hope to provide a new idea for cloud audit.

Gaopan Hou

Read the Original

This page is a summary of: Efficient audit protocol supporting virtual nodes in cloud storage, Transactions on Emerging Telecommunications Technologies, March 2020, Wiley, DOI: 10.1002/ett.3911.
You can read the full text:




The following have contributed to this page