Through detailed security and performance analysis, they show
that their scheme is highly efficient and resilient to Byzantine
failure, malicious data modification attack, and even server colluding attacks. The computing power in a Cloud computing environment is supplied by a collection of data centers, which are typically installed with hundreds to thousands of servers (Buyya R. & Murshed, M, 2002). The authors-built architecture of a typical Cloud-based data center consisting of four layers. At the lowest layers, there exist massive physical resources (storage servers and application servers) that power the data centers. These servers are transparently managed by the higher-level virtualization services and toolkits that allow sharing of their capacity among virtual instances of servers. These virtual instances are isolated from each other, which aid in achieving fault tolerant behavior and isolated security context (Smith J. E, & Nair. R., 2005) (Juels et al., 2007) described a formal “proof of retrievability” (POR) model for ensuring the remote data integrity. Their scheme combines spot-checking and error-correcting code to ensure both possession and retrievability of files on archive service systems.