The document discusses privacy and security issues related to cloud storage. It proposes a new privacy-preserving auditing scheme for cloud storage that uses an interactive challenge-response protocol and verification protocol. This allows a third party auditor to verify the integrity and identify corrupted data for a cloud storage user, while preserving data privacy. The scheme aims to be efficient, lightweight and privacy-preserving. Experimental results show the protocol is efficient and achieves its goals.