The paper presents a public auditing technique for regenerating codes in cloud storage, addressing challenges related to data integrity and corruption. This method employs a proxy agent to regenerate failed authenticators without requiring data owners to be online, thus improving efficiency in verifying data integrity. The proposed system enhances data security by allowing third-party auditors to assess and repair data while utilizing a semi-trusted architecture.