[1] Wang, Z., Wang, N., Su, X., & Ge, S. (2020). An empirical study on business analytics affordances enhancing the management of cloud computing data security. International Journal of Information Management, 50, 387-394.
[2] Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.
[3] Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access, 4, 1375-1384.
[4] Gartner F. (2011) “A survey on security issues in service delivery models of cloud computing “Journal of Network and Computer Application. Vol. 34, Issue 1, Pp. 1-11
[5] Odun-Ayo, I., Ajayi, O., & Misra, S. (2018). Cloud computing security: Issues and developments.
[6] Tariq, M. I. (2019). Agent-Based Information Security Framework for Hybrid Cloud Computing. KSII Transactions on Internet & Information Systems, 13(1).
[7] Butt, S. A., Tariq, M. I., Jamal, T., Ali, A., Martinez, J. L. D., & De-La-Hoz-Franco, E. (2019). Predictive variables for agile development merging cloud computing services. IEEE Access, 7, 99273-99282.
[8] Yang, C., Chen, Q., & Liu, Y. (2019). Fine-grained outsourced data deletion scheme in cloud computing. International Journal of Electronics and Information Engineering, 11(2), 81-98.
[9] Rachna Arora & Anshu Parashar (2013) “International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul- Aug 2013, pp.1922-192619.
[10] Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the cloud. International Journal of Network Security & Its Applications, 6(1), 25.
[11] Vikas M. et al (2014), “Network Security: Security in Cloud Computing”, International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 1, Jan 2014 Page No. 3643-3651.
[12] Lokhande, U., & Gulve, A. (2014). Steganography using Cryptography and Pseudo random numbers. International Journal of Computer Applications, 96(19).
[13] Milind Mathur, et al., (2013) “Comparison between DES, 3DES, RC2, RC6, BLOWFISH and AES” Proceedings of National Conference on New Horizons in IT - NCNHIT 2013
[14] Kester, Q.-A., Nana, L., Pascu, A. C., Gire, S., Eghan, J. M., & Quaynor, N. N. (2014). A Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images based on a Generated Symmetric Key. International Journal of Computer Applications, 94(19), p19-27.
[15] Abha Sachdev & Mohit Bhansali (2013), “Enhancing Cloud Computing Security using AES Algorithm”, International Journal of Computer Applications (0975 – 8887) Volume 67– No.9, April 201.
[16] Kaur M. &Kaur S. (2014) “Survey of Various Encryption Techniques for Audio Data” International Journal of Advanced Research in Computer Science and Software Engineering.Volume 4, Issue 5, May 2014. Pp. 1314-1317
[17] Kamara, S., & Lauter, K. (2010). Cryptographic cloud storage. Paper presented at the International Conference on Financial Cryptography and Data Security. pp 1 – 8
[18] Prasad et al., (2013) Software reliability measuring using modified maximum likelihood estimation and SPC “International Journal of Computer Applications” (0975 – 8887)Volume 21– No.7, May 201.
[19] Mircea, M. (2012). Addressing Data Security in the Cloud. World Academy of Science, Engineering and Technology, 66, 539-546.
[20] Sathana, V., & Shanthini, J. (2013). Three Level Security System for Dynamic Group in Cloud. International Journal of Computer Science Trends and Technology, 1(2).
[21] Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, 204-209.
[22] Rao, B. T. (2016). A study on data storage security issues in cloud computing. Procedia Computer Science, 92, 128-135.