Table 1 Comparison of proposed and existing methods interms of accuracy and time.
From: An efficient and secure protocol for checking remote data integrity in multi-cloud environment
S. No | Techniques | Accuracy (%) | Time (ms) |
|---|---|---|---|
1 | Proposed | 96.78 | 2.01 |
2 | Rank-based authentication skip list | 89.00 | 2.50 |