This document discusses data security approaches in cloud computing using the SHA algorithm. It aims to provide integrity to cloud storage areas. The SHA algorithm is used to provide important security services like key generation, encryption, and decryption in cloud computing systems. A trusted third party (TPA) ensures cloud storage security on behalf of data owners upon request. The main goal is to securely store and manage data so that only authorized users can access it. The document outlines challenges to cloud computing like security, privacy, service delivery and billing issues, and proposes developing schemes to ensure integrity, authentication, and confidentiality of information exchanged between cloud systems.