The document presents a public auditing scheme for regenerating-code-based cloud storage to ensure data integrity and efficiency without requiring data owners to be online continuously. A proxy is introduced to handle the regeneration of failed data blocks and authenticators on behalf of the data owner, while a novel public verifiable authenticator is created to maintain data privacy and security. The proposed scheme demonstrates provable security and effective performance, addressing challenges related to data corruption and resource constraints in cloud storage systems.