This document summarizes and reviews various data partitioning techniques used in cloud computing for privacy and security of data using third party auditors. It discusses techniques like Merkle Hash Tree, distributed storage integrity auditing, image-based authentication, proxy provable data possession, file distribution with token pre-computation, and horizontal and vertical data partitioning. The techniques aim to provide benefits like dynamic data authentication, efficient storage, and integrity testing while addressing limitations such as single points of failure, public validation risks, lack of support for data updates, and additional computation costs. The review analyzes the techniques to compare their limitations and benefits for achieving secure and trustworthy cloud data storage.