“…While the user trusts and assumes the confidentiality of data files at the cloud server, there is still concern about remote data file integrity. Numerous schemes in the literature [2], [3], [4], [5], [7], [9], [10], [11], [12], [14], [15], [16], [17], [18], [19], [23], [24], [25], [26], [28], [29], [30], [31], [32], [40], [41], [42] provide remote data integrity checking (RDIC) mechanisms that allow the user to verify the integrity of the remote data file. An RDIC scheme contains two main components: The first is called the preprocessing component, and the second is called the auditing component.…”