References
[1]. Birje, M. N., Challagidad, P. S., Tapale, M. T., & Goudar, R. H. (2015). Security issues and countermeasures in cloud computing. International Journal of Applied Engineering Research, 10(86), 71-5.
[2]. Devi, B. T., Shitharth, S., & Jabbar, M. A. (2020, March). An appraisal over intrusion detection systems in cloud computing security attacks. In 2020, 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) (pp. 722-727). IEEE. https://doi.org/ 10.1109/ICIMIA48430.2020.9074924
[3]. Garg, N., Bawa, S., & Kumar, N. (2020). An efficient data integrity auditing protocol for cloud computing. Future Generation Computer Systems, 109, 306-316. https://doi.org/10.1016/j.future.2020.03.032
[4]. Haeberlen, A. (2010). A case for the accountable cloud. ACM SIGOPS Operating Systems Review, 44(2), 52- 57.
[5]. Kaur, R., & Ghumman, N. S. (2017). A review on resource allocation mechanism in cloud enviornment. International Journal of Computers & Technology, 16(1), 7562- 7566.
[6]. Kumar, I. P., Sambangi, S., Somukoa, R., Nalluri, S., & Govinda, K. (2020). Server security in cloud computing using block-chaining technique. In Data Engineering and Communication Technology (pp. 913-920). Springer, Singapore. https://doi.org/10.1007/978-981-15-1097-7_77
[7]. Li, F., Cui, C., Wang, D., Liu, Z., Elmrabit, N., Wang, Y., & Zhou, H. (2020). Privacy-aware secure anonymous communication protocol in CPSS cloud computing. IEEE Access, 8, 62660-62669. https://doi.org/10.1109/ACCESS. 2020.2982961
[8]. Litchfield, A., & Shahzad, A. (2015, December). Virtualization Technology: Cross-VM Side Channel Attacks Make it Vulnerable. In 2015, Australasian Conference on Information Systems (ACIS).
[9]. Maheswari, K. U., Bhanu, S. M. S., & Nickolas, S. (2020, March). A survey on data integrity checking and enhancing security for cloud to fog computing. In 2020, 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) (pp. 121-127). IEEE. https:// doi.org/10.1109/ICIMIA48430.2020.9074890
[10]. Mohiuddin, I., & Almogren, A. (2020, April). Security challenges and strategies for the IoT in cloud computing. In 2020, 11th International Conference on Information and Communication Systems (ICICS) (pp. 367-372). IEEE. https://doi.org/10.1109/ICICS49469.2020.239563
[11]. Mondal, A., & Goswami, R. T. (2021). Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security. Microprocessors and Microsystems, 81, 103719. https://doi.org/10.1016/j. micpro.2020.103719
[12]. Mouratidis, H., Shei, S., & Delaney, A. (2020). A security requirements modelling language for cloud computing environments. Software and Systems Modeling, 19(2), 271-295. https://doi.org/10.1007/s10270- 019-00747-8
[13]. Srivastava, P., & Khan, R. (2018). A review paper on cloud computing. International Journal of Advanced Research in Computer Science and Software Engineering, 8(6), 17-20. https://doi.org/10.23956/ijarcsse. v8i6.711
[14]. Sun, P. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications, 160, 102642. https:// doi.org/10.1016/j.jnca.2020.102642
[15]. Tabrizchi, H., & Rafsanjani, M. K. (2020). A survey on security challenges in cloud computing: Issues, threats, and solutions. The Journal of Supercomputing, 76(12), 9493-9532. https://doi.org/10.1007/s11227-020-03213-1
[16]. Xiao, Z., & Xiao, Y. (2012). Security and privacy in cloud computing. IEEE communications surveys & tutorials, 15(2), 843-859. https://doi.org/10.1109/SURV.20 12.060912.00182