A New Technique of Data Integrity for Analysis of the Cloud Computing Security A New Technique of Data Integrity for Analysis of the Cloud Computing Security