References
[1]. Bhise, A. S., & Phursule, R. N. (2017). Developing
secure cloud storage system by integrating trust and
cryptographic algorithms with role based access control.
International Journal of Computer Applications, 168(10),
18-23. https://doi.org/10.5120/ijca2017914510
[2]. Cloud Security Alliance (2011). Security guidance for
critical areas of focus in cloud computing v3. 0. Cloud
Security Alliance, 15.
[3]. Cloud Security Alliance (2013). Cloud security
alliance warns providers of 'The Notorious Nine', The
Notorious Nine Cloud Computing Top Threats in 2013.
[4]. Elbaz, L., & Bar-El, H. (2000). Strength assessment of
encryption algorithms. White paper.
[5]. European Network and Information Security Agency.
(2015). Cloud security guide for SMEs, European Union
Agency for Cybersecurity.
[6]. Fang, Z., Sun, Y., Sun, Y., & Yang, J. (2013, July). The
Reseach of AES algorithm and application in cloud
storage system. In 2nd International Conference on
Science and Social Research (ICSSR 2013). Atlantis Press.
https://doi.org/10.2991/icssr-13.2013.158
[7]. Gehlot, P., Biradar, S. R., & Singh, B. P. (2013).
Implementation of modified Twofish algorithm using 128
and 192-bit keys on VHDL. International Journal of
Computer Applications, 70(13), 37-42.
[8]. Kaur, S. (2012). Cryptography and encryption in cloud
computing. VSRD International Journal of Computer
Science And Information Technology, 2(3), 242-249.
[9]. Kouchay, S. A. (2016). Security risks and impact of
data protection techniques in cloud computing,
International Journal of Innovative Research in Computer
and Communication(IJCTT), 34, 179-185.
[10]. Kouchay, S. A. (2017). Robust cryptographic
technique for improving data security in cloud
computing. International Journal of Innovative Research
in Science, Engineering and Technology, 6(5), 10048-
10053. https://doi.org/10.15680/IJIRSET.2017.0605356
[11]. Kumar, P., Sehgal, V. K., Chauhan, D. S., Gupta, P. K.,
& Diwakar, M. (2011). Effective ways of secure, private
and trusted cloud computing. arXiv Preprint.
[12]. Li, Y., Liu, Q., & Li, T. (2010, April). Design and
implementation of an improved RSA algorithm. In 2010,
International Conference on E-Health Networking Digital
Ecosystems and Technologies (EDT) (Vol. 1, pp. 390-393).
IEEE. https://doi.org/10.1109/EDT.2010.5496553
[13]. Liang, C., Ye, N., Malekian, R., & Wang, R. (2016,
August). The hybrid encryption algorithm of lightweight
data in cloud storage. In 2016, 2nd International
Symposium on Agent, Multi-Agent Systems and Robotics
(ISAMSR) (pp. 160-166). IEEE. https://doi.org/10.1109/
ISAMSR.2016.7810021
[14]. Malik, A., & Om, H. (2018). Cloud computing and
internet of things integration: Architecture, applications,
issues, and challenges. In Sustainable cloud and energy
services (pp. 1-24). Springer, Cham. https://doi.org/10.
1007/978-3-319-62238-5_1
[15]. Minni, R., Sultania, K., Mishra, S., & Vincent, D. R.
(2013, July). An algorithm to enhance security in RSA. In
2013, Fourth International Conference on Computing,
Communications and Networking Technologies
(ICCCNT) (pp. 1-4). IEEE. https://doi.org/10.1109/ICCCNT.
2013.6726517
[16]. Nigoti, R., Jhuria, M., & Singh, S. (2013). A survey of
cr yptographic algorithms for cloud computing,
International Journal of Emerging Technologies in
Computational and Applied Sciences, 4, 141-146.
[17]. Open Security Architecture (2015). SP-011: Cloud
C omp u t i n g Pa t t e r n . h t t p s : / / w w w. o p e n s e c u r i t y
architecture.org/cms/librar y/patternlandscape/251-
pattern-cloudcomputing
[18]. Ramesh, A., & Suruliandi, A. (2013, March).
Performance analysis of encryption algorithms for
Information Security. In 2013, International Conference
on Circuits, Power and Computing Technologies (ICCPCT) (pp. 840-844). IEEE. https://doi.org/10.1109/
ICCPCT.2013.6528957
[19]. Rane, D. D. (2016). Superiority of Twofish over
Blowfish. International Journal of Science and Research
Management, 4(11), 4744-4746.
[20]. Schneier, B. (1993, December). Description of a new
variable-length key, 64-bit block cipher (Blowfish). In
International Workshop on Fast Software Encryption (pp.
191-204). Springer, Berlin, Heidelberg. https://doi.org/
10.1007/3-540-58108-1_24
[21]. Wayne, J., & Timothy, G. (2011). National Institute of
Standards and Technology (NIST) guidelines on security
and privacy in public cloud computing. Draft Special
Publication, 800-144.
[22]. Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey
of attacks and countermeasures in mobile ad hoc
networks. In Wireless network security (pp. 103-135).
Springer, Boston, MA. https://doi.org/10.1007/978-0-387-
33112-6_5