Table 1 The comparison of different program functions.

From: Identity-based controlled delegated outsourcing data integrity auditing scheme

Schemes

Controlled outsourcing

Certificate management

Source data auditing

Dynamic update

Ref5

N

Y

N

Y

Ref6

N

N

N

N

Ref7

N

N

N

N

Ref9

N

N

N

N

Ref13

N

N

N

N

Ref17

N

Y

N

Y

Ref19

N

N

N

Y

Ref21

N

N

N

Y

Ref24

N

N

N

Y

Our scheme

Y

N

Y

Y