Cloud storage moves user data to remote data centers that users do not control, posing new security challenges. The document proposes a scheme using hash-based message authentication codes and RSA signatures to allow users to verify the integrity of their cloud data, addressing problems of data integrity and security. It aims to reduce costs for clients with limited resources to check data integrity in the cloud.