The document presents an enhanced cloud storage auditing protocol designed to address key exposure vulnerabilities that compromise data security. It introduces a mechanism that utilizes a binary tree structure and pre-order traversal technique to efficiently update secret keys, ensuring robust data integrity without exposing sensitive client information. The proposed model significantly improves auditing efficiency while offering key-exposure resilience, making it a noteworthy advancement in cloud data security.