In recent time, cloud is one of the most useful resources for storing data without any hassle. Integrity, originality and security of data are the main concerns in cloud computing. Through the data auditing, this problem can be solved in some amount. This proposed work follows the data auditing scheme but with different methodology for making the scheme better and secure. This procedure is divided into three phases: (i) user, (ii) data auditor and (iii) cloud server. Cloud server is used for keeping data file, and data auditor is used to check the integrity of the data which is kept by the user. The user has the permission to perform various types of action like create a block for data and generate encryption for data. The third party auditor mainly generates the encryption method and checks the integrity for data security. For encryption, data encryption standard (DES) algorithm is used as the algorithm which generates the longer ciphertext, conveying better security for data. And for data integrity, secure hash algorithm (SHA-512) is used as it checks for 64-bit words. Also, Rivest–Shamir–Adleman (RSA) is used for measuring digital signature. In this method, user can get the deleted item from cloud bin by accessing into the bin with the digital signature, and all the deleted items are stored into the bin as encrypted mode. In this method, attackers are not feasible to take access into the cloud as RSA is used for digital signature.