D. Zissis, and D. Lekkas, "Addressing cloud computing security issues", Future Gener. Comput. Syst., vol. 28, pp. 583-592, 2012.
The notorious nine: cloud computing top threats in 2013, Top
Threats Working Group Cloud Security Alliance, 2013.
N. Gonzalez, C. Miers, F. Redigolo, M. Simplicio, T. Carvalho, M. Näslund, and M. Pourzandi, "A quantitative analysis of current security concerns and solutions for cloud computing", J. Cloud Comput. Adv. Syst. Appl., vol. 1, p. 11, 2012.
D. Sun, G. Chang, L. Sun, and X. Wang, "Surveying and analyzing security, privacy and trust issues in cloud computing environments", Proc. Eng., vol. 15, pp. 2852-2856, 2011.
M. Rak, M. Ficco, E. Battista, V. Casola, and N. Mazzocca, "Developing secure cloud applications", Scal. Comput. Pract. Exp., vol. 15, pp. 49-62, 2014.
M. Irfan, M. Usman, Y. Zhuang, and S. Fong, "A critical review of security threats in cloud computing", In: 3rd International Symposium on Computational and Business Intelligence (ISCBI) IEEE, Bali, Indonesia,, 2015pp. 105-111
N.A. Puri, A.R. Karare, and R.C. Dharmik, "Deployment of application on cloud and enhanced data security in cloud computing using ECC algorithm", In IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT) Ramanathapuram, India 2014, pp. 1667-1671.
A. Azougaghe, Z. Kartit, M. Hedabou, M. Belkasmi, and M. El-Marraki, "An efficient algorithm for data security in Cloud storage", In IEEE 15th International Conference on Intelligent Systems
Design and Applications (ISDA), Marrakech, Morocco, 2015, pp.
S.A. Pitchay, W.A.A. Alhiagem, F. Ridzuan, and M.M. Saudi, "A proposed system concept on enhancing the encryption and decryption method for cloud computing", In IEEE 17th UKSim-AMSS International
Conference on Modelling and Simulation (UKSim),
Cambridge, UK, 2015, pp. 201-205.
K.V. Raipurkar, and A.V. Deorankar, "Improve data security in cloud environment by using LDAP and two-way encryption algorithm", In IEEE Symposium on Colossal Data Analysis and Networking (CDAN) Indore, India 2016, pp. 1-4.
D. Harnik, E.K. Kolodner, S. Ronen, J. Satran, A. Shulman-Peleg, and S. Tal, "Secure access mechanism for cloud storage", Scal. Comput. Pract. Exp., vol. 12, pp. 317-336, 2011.
S. Garcia-Gomez, M. Jimenez-Ganan, Y. Taher, C. Momm, F. Junker, J. Biro, and S. Strauch, "Challenges for the comprehensive management of Cloud Services in a PaaS framework", Scal. Comput. Pract. Exp., vol. 13, pp. 201-214, 2012.
F.Z. Filali, and B. Yagoubi, "Classifying and filtering users by similarity measures for trust management in cloud environment", Scal. Comput. Pract. Exp., vol. 16, pp. 289-302, 2015.
A. Gawanmeh, and A. Alomari, "Challenges in formal methods for testing and verification of cloud computing systems", Scal. Comput. Pract. Exp., vol. 16, pp. 321-332, 2015.
V. Casola, A. De Benedictis, M. Rak, and U. Villano, "SLA-based secure cloud application development", Scal. Comput. Pract. Exp., vol. 17, pp. 271-284, 2016.
M. Arapinis, S. Bursuc, and M. Ryan, "Privacy-supporting cloud computing by in-browser key translation", J. Comput. Secur., vol. 21, pp. 847-880, 2013.
M. Bellare, S. Keelveedhi, and T. Ristenpart, "Message-locked encryption and secure deduplication", In: Annual International Conference on the Theory and Applications of Cryptographic Techniques Springer, Berlin, Heidelberg, 2013pp. 296-312
B.R. Kandukuri, and A. Rakshit, "Cloud security issues", In IEEE International Conference on Services Computing Bangalore, India pp. 517-520, 2009.
J. Puttonen, S.O. Afolaranmi, and L.G. Moctezuma, A Lobov and
J.L.M. Lastra, “Security in cloud-based cyber-physical systems”, In
IEEE 10th International Conference on P2P, Parallel, Grid, Cloud
and Internet Computing (3PGCIC), 2015, pp. 671-676.
P. Zhang, J. Xu, H. Muazu, and W. Mao, "Access control research on data security in Cloud computing", In IEEE 16th International
Conference on Communication Technology (ICCT), Hangzhou,
China, 2015. pp. 873-877.
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing", In IEEE
proceedings on Infocom, San Diego, CA, USA, 2010, pp. 1-9.
S.L. Albuquerque, and P.R. Gondim, "Security in cloud-computing-based mobile health", IT Prof., vol. 18, pp. 37-44, 2016.
K. Dhingra, and S. K. Yadav, Spam analysis of big reviews dataset using fuzzy ranking evaluation algorithm and Hadoop. Int. J. Machine
Learn. Cybernet., pp. 1-20, 2017.
A. Arora, S.K. Yadav, and K. Sharma, Denial-of-Service (DoS) Attack and Botnet: Network Analysis, Research Tactics, and Mitigation.In: Handbook of Research on Network Forensics and Analysis Techniques., IGI Global, 2018.
B.B. Gupta, R.C. Joshi, M. Misra, D.L. Meena, G. Shrivastava, and K. Sharma, "Detecting a wide range of flooding DDoS attacks using linear prediction model", In IEEE 2nd International Conference
on Information and Multimedia Technology, Hong Kong,
China, 2010, pp. 535-539.
G. Shrivastava, P. Kumar, B. B. Gupta, S. Bala and N. Dey, Handbook
of Research on Network Forensics and Analysis Techniques.
IGI Global, 2018.
A. Saxena, G. Shrivastava, and K. Sharma, "Forensic investigation in cloud computing environment", Int. J. Forensic Comput. Sci., vol. 2, pp. 64-74, 2012.
A. Miglani, T. Bhatia, G. Sharma, and G. Shrivastava, "An energy efficient and trust aware framework for secure routing in LEACH for Wireless Sensor Networks", Scal. Comp. Pract. Exp., vol. 18, pp. 207-218, 2017.
M.D. Ryan, "Cloud computing security: The scientific challenge, and a survey of solutions", J. Syst. Softw., vol. 86, pp. 2263-2268, 2013.
B. Gellman, and L. Poitras, "US, British intelligence mining data from nine US Internet companies in broad secret program", The
Washington Post, Vol. 6, 2013.
F.S. Al-Anzi, S.K. Yadav, and J. Soni, "Cloud computing: Security model comprising governance, risk management and compliance", In IEEE International Conference on Data Mining and Intelligent Computing (ICDMIC) New Delhi, India 2014, pp. 1-6.
S.K. Yadav, K. Sharma, and A. Arora, "Security integration in DDoS attack mitigation using access control lists", Int. J. Inf. Syst. Model. Des., vol. 9, pp. 56-76, 2018.
M. Khari, G. Shrivastava, S. Gupta, and R. Gupta, Role of cyber security in today’s scenario.In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications., IGI Global, 2018, pp. 1-15.
G. Shrivastava, "Approaches of network forensic model for investigation", Int. J. Forensic Eng., vol. 3, pp. 195-215, 2017.