International Journal of Engineering Research and Applications (IJERA)
In this paper, the authors described for the use of provable data possession which allow the client to access the stored data at an untrusted server that the server possesses the original data without retrieving it. This paper executes the probabilistic proof of possession by random set of blocks which is derived from the server that dramatically reduces the cost of I/O. Sometimes, the client maintenance the constant amount of data which is used to verify the proof. The response protocol can transmit a small amount of data, which can minimize network communication.