Verifiable computing techniques and integrity preserving modifications for data managed by secure storage solutions

Summary
Proposals how the storage solutions from T5.1 can be combined with the integrity preserving modification and verifiable computation solutions from T5.3.