IV. CONCLUSION
This paper surveys in the cloud data storage, users store
their data and no longer possess the data locally. In the
distributed cloud servers, the correctness and availability of
the data files are being kept. One of the key issues is to
efficiently detect any unauthorized data modification and
exploitation. The Third Party Auditing permits to protect the
time and computation resources with reduced online burden
of users.
Our work is to propose new algorithm to tackle all the
difficulties of above mentioned algorithms. In the proposed
method the raptor code is used instead of erasure code.
Encode the input symbols using a traditional erasure
correcting code, and then apply an proper LT-code to the
new set of symbols in a way that the traditional code is
capable of recovering all the input symbols even in face of a
fixed fraction of erasures.