1 Introduction
Along with the rapid development of network and communication techniques, massive data are produced. These massive data need to be real-time processed with much more strong computation capability and greater storage space. With cloud storage services, cloud users can remotely outsource their massive data to the cloud server and access them via the Internet flexibly [1]. These services relieve cloud users from complicated local storage management and maintenance. Although cloud users enjoy great benefits from these services, some security concerns may impede cloud users to employ cloud storage [2], [3]. One of the most important security concerns is the data integrity [4]. Once these data are outsourced to the cloud server which is maintained by a cloud service provider (CSP), cloud users will lose physical control over their data. Thus, they will always worry about whether the outsourced data are kept intact, especially for those of important ones.