A New Technique of Data Integrity for Analysis of the Cloud Computing Security