The cutting-edge technology that is growing in popularity worldwide is cloud computing. Keeping the data in the cloud via cloud storage because it can be accessed from anywhere at any time. There exist many different privacy-preserving data auditing methods, each of which has benefits and drawbacks of its own. As a result it's essential to create an auditing approach that does away with all of the drawbacks of existing strategies. The cloud, the TPA, and the data owner server comprise its three key components. The owner of the data performs static data operations like introducing, altering, and deleting data as well as dynamic data operations like dividing a file, encoding it in chunks, establishing a each block's hash value, combining them, and signing it. Data validation can either be carried out automatically or at the user's request. The setting up of an audit service with elements like privacy protection, open auditing, data integrity, and privacy is the main objective.