Background In recent years, cloud computing and cloud storage technologies have developed rapidly, and effectively verifying the integrity of cloud storage data has become the focus of researchers’ attention. Objective To propose an improved scheme for overcoming the security problems in the scheme proposed by Imad El Ghoubach et al. in 2021. To discuss the application of the improved scheme in unmanned aerial vehicles (UAVs). Methods Through the cryptographic analysis of the original scheme and the improved scheme, it is pointed out that the original scheme has security problems, and the improved scheme is safe and correct. Through experimental simulation, the calculation cost of the original scheme and the improved scheme is compared. Results We point out that the original scheme cannot resist the collusion attack between the third-party auditor (TPA) and the cloud server provider (CSP), and TPA can forge the data block tags through the information provided by CSP. At the same time, the TPA can recover the user's data blocks using the evidence provided by the CSP. Conclusions The scheme proposed by Imad El Ghoubach et al. in 2021 is not safe. The improved scheme can overcome the security problems and can be applied to UAVs.