References
[1]. Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident handling in the cloud. Computers & Security, 49, 45-69.
[2]. Ahmed, E., Gani, A., Sookhak, M., Ab Hamid, S. H., & Xia, F. (2015). Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges. Journal of Network and Computer Applications, 52, 52-68.
[3]. Akherfi, K., Gerndt, M., & Harroud, H. (2018). Mobile cloud computing for computation offloading: Issues and challenges. Applied Computing and Informatics, 14(1), 1-16.
[4]. Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S., & Sakurai, K. (2016). Authentication in mobile cloud computing: A survey. Journal of Network and Computer Applications, 61, 59-80.
[5]. Aljoumah, E., Al-Mousawi, F., Ahmad, I., Al-Shammri, M., & Al-Jady, Z. (2015). SLA in cloud computing architectures: A comprehensive study. International Journal of Grid and Distributed Computing, 8(5), 7-32.
[6]. Arunarani, A. R., Manjula, D., & Sugumaran, V. (2019). Task scheduling techniques in cloud computing: A literature survey. Future Generation Computer Systems, 91, 407-415.
[7]. Chiregi, M., & Navimipour, N. J. (2017). Cloud computing and trust evaluation: A systematic literature review of the state-of-the-art mechanisms. Journal of Electrical Systems and Information Technology, 5(3), 608- 622.
[8]. Derbeko, P., Dolev, S., Gudes, E., & Sharma, S. (2016). Security and privacy aspects in MapReduce on clouds: A survey. Computer Science Review, 20, 1-28.
[9]. Díaz, M., Martín, C., & Rubio, B. (2016). State-of-the-art, challenges, and open issues in the integration of Internet of Things and cloud computing. Journal of Network and Computer Applications, 67, 99-117.
[10]. Ghazouani, S., & Slimani, Y. (2017). A survey on cloud service description. Journal of Network and Computer Applications, 91(c), 61 - 74.
[11]. Ghomi, E. J., Rahmani, A. M., & Qader, N. N. (2017). Load-balancing algorithms in cloud computing: A survey. Journal of Network and Computer Applications, 88, 50- 71.
[12]. Gumaei, A., Sammouda, R., Al-Salman, A. M. S., & Alsanad, A. (2019). Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation. Journal of Parallel and Distributed Computing, 124, 27-40.
[13]. Hasan, M., & Goraya, M. S. (2018). Fault tolerance in cloud computing environment: A systematic survey. Computers in Industry, 99, 156-172.
[14]. Hussain, S. A., Fatima, M., Saeed, A., Raza, I., & Shahzad, R. K. (2017). Multilevel classification of security concerns in cloud computing. Applied Computing and Informatics, 13(1), 57-65.
[15]. Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Choo, K. K. R. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98-120.
[16]. Kaaniche, N., & Laurent, M. (2017). Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 111, 120-141.
[17]. Kandel, C, S. (2017). Cloud-based services users and trust issues: a comparative study of gender and national culture perspectives (Master's Thesis, University of Tampere).
[18]. Kandukuri, B. R., & Rakshit, A. (2009, September). Cloud Security Issues. In Services Computing, 2009. SCC'09. IEEE International Conference on (pp. 517-520). IEEE.
[19]. Khan, M. A. (2016). A survey of security issues for cloud computing. Journal of Network and Computer Applications, 71, 11-29.
[20]. Kumari, P., & Kaur, P. (2018). A survey of fault tolerance in cloud computing. Journal of King Saud University - Computer and Information Sciences.
[21]. Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, 38-54.
[22]. Moura, J., & Hutchison, D. (2016). Review and analysis of networking challenges in cloud computing. Journal of Network and Computer Applications, 60, 113- 129.
[23]. Nacer, A. A., Godart, C., Rosinosky, G., Tari, A., & Youcef, S. (2019). Business process outsourcing to the cloud: Balancing costs with security risks. Computers in Industry, 104, 59-74.
[24]. Ramachandra, G., Iftikhar, M., & Khan, F. A. (2017). A comprehensive survey on security in cloud computing. Procedia Computer Science, 110, 465-472.
[25]. Sajjan, R. S., Ghorpade, V., & Dalimbkar, V. (2016). A survey paper on data security in cloud computing. International Journal of Computer Sciences and Engineering (IJCSE), 4(4), 9-13.
[26]. Sharma, S., Gupta, G., & Laxmi, P. R. (2014). A survey on cloud security issues and techniques. arXiv preprint arXiv:1403.5627.
[27]. Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115.
[28]. Singh, S., Jeong, Y. S., & Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200- 222.
[29]. Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Buyya, R. (2017). DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer Communications, 107, 30-48.
[30]. Subramanian, N., & Jeyaraj, A. (2018). Recent security challenges in cloud computing. Computers & Electrical Engineering, 71, 28-42.
[31]. Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Surveying and analyzing security, privacy and trust issues incloud computing environments. Procedia Engineering, 15, 2852-2856.
[32]. Vaezpour, S. Y., Zhang, R., Wu, K., Wang, J., & Shoja, G. C. (2016). A new approach to mitigating security risks of phone clone co-location over mobile clouds. Journal of Network and Computer Applications, 62, 171-184.
[33]. Wadhwa, A. V., & Gupta, S. (2015). Study of Security Issues in Cloud Computing. International Journal of Computer Science and Mobile Computing IJCSMC, 4(6), 230-234.
[34]. Zhou, L., Fu, A., Yu, S., Su, M., & Kuang, B. (2018). Data integrity verification of the outsourced big data in the cloud environment: A survey. Journal of Network and Computer Applications.