Skip to main content

Advances, Systems and Applications

Table 6 Comparison of Computational Overhead between DO, CSP, and TPA During Auditing Phase

From: Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability

Ref.

Data Owner

Cloud Service Provider

Third Party Auditor

[88]

\(jHash+(j*k)Exp + jAdd+ jExp\)

\(Hash+kMulExp + kAdd+ Exp+(k+1)Mul\)

\(Hash+kHash+kMulExp + 3Exp+Mul+ 2Pair+Mul\)

[89]

\(2jHash+4jExp+2jAdd+2jMul+ 2jMul\)

\(Hash+ Mul+Exp+Mul+Add+Exp\)

\(KHash+2Exp+(k+1)Mul+Mul+Exp\)

[90]

\(jHash+jExp+jMul+Add\)

\(Exp+(k-1)Mul+(k-1)Add+kExp\)

\(4Pair+2(k-1)Add+2Mul+2Exp+ (k+1)Mul+KHash+(k+1)Exp\)

[133]

\(jHash+2jExp+jAdd+jMul+ jMul\)

\(j+2Exp+ (j+1)Mul+(k+1)Exp+kMul\)

\(4Pair+(k+2)Exp+(j+2)Exp\)

[78]

Add

\(n(2Exp +Mul + Hash\)

\(KHash + 2Hash+2(k+1) Mul+(2k+3)Exp+2Pair+ (k-1)Add +k Mul\)

[87]

\(10*j (Add+Shift+Sub+MixC)+ j*Hash\)

j|k|

\(j*Hash+Com\)

[105]

\(j(Hash+Mul+Enc)+Exp\)

\((j-1)Mul+2Exp\)

Not Applicable

[91]

\(4Encrypt+4Add\)

2Decrypt

\(2Decrypt+Encrypt+Add+Comp\)

[97]

\(jHash+ jMul+ jAdd + jInv\)

\(Hash+ 2Add+Mul+Inv+4Mul\)

\(Mul+ 2Pair+Add\)

[135]

\(jHash+2jExp+jAdd+jMul+ jMul\)

\(j*k(Add+Mul+ jExp_{G1}+Mul\)

\((j+k+1)Mul+ 2Pair+ (j+k)Exp\)

[94]

\(4jMul+ jHash+ Exp\)

\(4Mul+ Exp\)

kAdd