Table 3 Comparison of communication overhead.

From: Identity-based controlled delegated outsourcing data integrity auditing scheme

Schemes

ChalGen

ProofGen

Jalil et al.17

\(c(|p| + |q|)\)

\(2|p|\)

Guo et al.19

\(c(2|p| + |q|)\)

\(|p| + 2|q|\)

Rao et al.21

\(c(2|p| + |q|)\)

\(3|p| + |q|\)

Ours scheme

\(2|p|\)

\(|p| + |q|\)