Above paper discusses the different vulnerability issues related to cloud computing. Despite of the different security
constrains imposed by the service provider of the cloud, the author wants to put some basic suggestions here: always
store the data in encrypted form only. Also you can put some your own integrity constraints to your data.