This document proposes a secure auditing scheme for data verification in cloud computing. It presents an approach using AES and SHA-1 algorithms to encrypt data uploaded to the cloud for storage. A third party auditor authenticates users and verifies the integrity of stored data. The scheme aims to maximize security while minimizing storage space required. An evaluation shows the proposed scheme ensures data integrity and security in cloud computing compared to an existing ORUTA algorithm.