Regil V Raju, M.Vasanth, Udaykumar P
Data integrity is an important phase in cloud computing. Since the previous couple of years the protocols that was evoked during this field has reached greater heights.[1] Existing protocols with the assistance of a third-party auditor in an exceedingly previous work, Sebe´et al propose a data integrity verifying protocol that supports information dynamics[2]. During this paper, we adapt Sebe´et al.â??s protocol to support information authentication. The outlined protocol supports information verification while not facilitate of a third-party auditor [3]. In addition, the projected protocol doesn't leak any personal data to third-party verifiers. Through a correct diagnosing we are going to be measurement however sensible will the system works. After that, through thorough analysis, we will show that the protocol encompasses a sensible performance.