1.
Alashhab, Ziyad R., et al. "Impact of coronavirus pandemic crisis on technologies and cloud computing applications." Journal of Electronic Science and Technology 19.1 (2021): 100059.
2.
Zahoor, Saman, et al. "Cloud–fog–based smart grid model for efficient resource management." Sustainability 10.6 (2018): 2079.
3.
Sunyaev, Ali. "Cloud computing." Internet computing. Springer, Cham, 2020. 195-236.
4.
Tabrizchi, Hamed, and Marjan Kuchaki Rafsanjani. "A survey on security challenges in cloud computing: issues, threats, and solutions." The journal of supercomputing 76.12 (2020): 9493-9532.
5.
Abdulsalam, Yunusa Simpa, and Mustapha Hedabou. "Security and Privacy in Cloud Computing: Technical Review." Future Internet 14.1 (2021): 11.
6.
Samanta, Debabrata, et al. "Cipher block chaining support vector machine for secured decentralized cloud enabled intelligent IoT architecture." IEEE Access 9 (2021): 98013-98025.
7.
Al-Issa, Yazan, Mohammad Ashraf Ottom, and Ahmed Tamrawi. "eHealth cloud security challenges: a survey." Journal of healthcare engineering 2019 (2019).
8.
Yang, Tengfei, et al. "PLCOM: Privacy-preserving outsourcing computation of Legendre circularly orthogonal moment over encrypted image data." Information Sciences 505 (2019): 198-214.
9.
Athanere, Smita, and Ramesh Thakur. "Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing." Journal of King Saud University-Computer and Information Sciences (2022).
10.
Adee, Rose, and Haralambos Mouratidis. "A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography." Sensors 22.3 (2022): 1109.
11.
Anwar, Md Navid Bin, et al. "Comparative Study of Cryptography Algorithms and Its' Applications." International Journal of Computer Networks and Communications Security 7.5 (2019): 96-103.
12.
Kumar, Randhir, and Rakesh Tripathi. "Secure healthcare framework using blockchain and public key cryptography." Blockchain Cybersecurity, Trust and Privacy. Springer, Cham, 2020. 185-202.
13.
Subramanian, Nalini, and Andrews Jeyaraj. "Recent security challenges in cloud computing." Computers & Electrical Engineering 71 (2018): 28-42.
14.
Abiodun, Esther Omolara, et al. "Reinforcing the security of instant messaging systems using an enhanced honey encryption scheme: the case of WhatsApp." Wireless Personal Communications 112.4 (2020): 2533-2556.
15.
Hwang, Yong-Woon, et al. "Current Status and Security Trend of OSINT." Wireless Communications and Mobile Computing 2022 (2022).
16.
Singh, Saurabh, et al. "SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology." International Journal of Distributed Sensor Networks 15.4 (2019): 1550147719844159.
17.
Kaur, Harleen, et al. "A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment." Journal of medical systems 42.8 (2018): 1-11.
18.
Mansouri, Najme, and Mohammad Masoud Javidi. "Cost-based job scheduling strategy in cloud computing environments." Distributed and Parallel Databases 38.2 (2020): 365-400.
19.
Ma, Chuan, et al. "On safeguarding privacy and security in the framework of federated learning." IEEE network 34.4 (2020): 242-248.
20.
Bordonaba-Juste, Mª, Laura Lucia-Palacios, and Raúl Pérez-López. "Generational differences in valuing usefulness, privacy and security negative experiences for paying for cloud services." Information Systems and e-Business Management 18.1 (2020): 35-60.
21.
Geetha, N., and K. Mahesh. "An Efficient Enhanced Full Homomorphic Encryption for Securing Video in Cloud Environment." Wireless Personal Communications 123.2 (2022): 1553-1571.
22.
Pang, Hongping, and Baocang Wang. "Privacy-preserving association rule mining using homomorphic encryption in a multikey environment." IEEE Systems Journal 15.2 (2020): 3131-3141.
23.
Jin, Byung-Wook, Jung-Oh Park, and Hyung-Jin Mun. "A design of secure communication protocol using RLWE-based homomorphic encryption in IoT convergence cloud environment." Wireless Personal Communications 105.2 (2019): 599-618.
24.
Algaradi, Thoyazan Sultan, and Boddireddy Rama. "An authenticated key management scheme for securing big data environment." International Journal of Electrical & Computer Engineering (2088-8708) 12.3 (2022).
25.
Drucker, Nir, and Shay Gueron. "Achieving trustworthy Homomorphic Encryption by combining it with a Trusted Execution Environment." J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9.1 (2018): 86-99.
26.
Zhao, Feng, Chao Li, and Chun Feng Liu. "A cloud computing security solution based on fully homomorphic encryption." 16th international conference on advanced communication technology. IEEE, 2014.
27.
Mercy Joseph, Gobi Mohan, “A Novel Algorithm for Secured Data Sharing in Cloud using GWOA-DNA Cryptography”, International Journal of Computer Networks and Applications (IJCNA), 9(1), PP: 114-124, 2022, DOI: 10.22247/ijcna/2022/211630.