This document proposes a public auditing scheme for cloud storage using regenerating codes to provide fault tolerance. It introduces a proxy that is authorized to regenerate authenticators in the absence of data owners, solving the regeneration problem. The scheme uses a novel public verifiable authenticator generated by keys that allows regeneration using partial keys, removing the need for data owners to stay online. It also randomizes encoding coefficients with a pseudorandom function to preserve data privacy.