%0 Journal Article %T A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage %A Neethu Mariam Joseph %A Esther Daniel %A Vasanthi N A %J International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) %D 2013 %I Shri Pannalal Research Institute of Technolgy %X Cloud computing prevails over the whole world which makes the mankind to rely more on a number of online storage systems to back up data or for using it in real time which gives an anywhere, anytime access. Thus lot of sensitive data will be stored into the cloud. As the userĄ¯s data are stored and maintained out of userĄ¯s premises, these services bring with it, concerns of security vulnerabilities for all the services provided by them. There is a lot of research being done to point out the issues with the service providers and cloud security in general. This paper provides a privacy-preserving data integrity protection by enabling public auditability for cloud storage and implements a scalable framework that addresses the construction of an interactive audit protocol to prevent the fraudulence of prover and the leakage of verified data in cloud storage by reducing the overhead in computation, communication and storage. Thus it provides a lightweight, efficient and privacy ¨Cpreserving auditing scheme which will also identifies the corrupted data. The framework is based on an interactive PDP protocol that uses the challenge ¨C response algorithms and a verification protocol. The protocol supports dynamic operation that allows the granted users to perform insertion, deletion and updation. The protocol allows a Third party Auditor who works on behalf of the Data owner who has a large amount of data to be stored in the cloud, to manage or monitor outsourced data. The experimental results show that the protocol is efficient, lightweight and privacy-preserving. %K Auditing %K Cloud Computing %K Cloud Storage %K Privacy %U http://ijarcet.org/index.php/ijarcet/article/view/810/PDF