International Journal Of Engineering And Computer Science
Cloud computing opens a new stream in IT as it can provide various elastic and scalable IT services in a pay-as-you-go way, where its users can reduce the cost in their own IT infrastructure. In this way, users of cloud storage services do not physically maintain direct control over their data, which makes data security one of the major advantage of using cloud. Previous paper already allows data integrity to be verified without presence of the actual data file. When this verification is done by a trusted third party, the verification process is called as data auditing and this third party is called an auditor. However, such schemes in existence suffer from several drawbacks.