References
[1]. Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in
cloud computing: Opportunities and challenges.
Information Sciences, 305, 357-383. https://doi.org/10.
1016/j.ins.2015.01.025
[2]. CSA. (2011). Security guidelines for critical areas of
focus in cloud computing v3.0. Retrieved from
https://downloads.cloudsecurityalliance.org/assets/resear
ch/security-guidance/csaguide.v3.0.pdf
[3]. Erl, T., Puttini, R., & Mahmood, Z. (2013). Cloud
Computing: Concepts, Technology, & Architecture. Prentice Hall.
[4]. Fu, Y., & Lin, Z. (2013). Exterior: Using a dual-vm based
external shell for guest-os introspection, configuration, and
recovery. ACM Sigplan Notices, 48(7), 97-110. https://doi.
org/10.1145/2517326.2451534
[5]. Islam, S., Ouedraogo, M., Kalloniatis, C., Mouratidis,
H., & Gritzalis, S. (2015). Assurance of security and privacy
requirements for cloud deployment models. IEEE
Transactions on Cloud Computing, 6(2), 387-400.
https://doi.org/10.1109/TCC.2015.2511719
[6]. Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017).
Security and privacy challenges in mobile cloud
computing: Survey and way ahead. Journal of Network
and Computer Applications, 84, 38-54. https://doi.org/10.
1016/j.jnca.2017.02.001
[7]. Pearce, M., Zeadally, S., & Hunt, R. (2013).
Virtualization: Issues, security threats, and solutions. ACM
Computing Surveys (CSUR), 45(2), 1-39. https://doi.org/10.
1145/2431211.2431216
[8]. Rong, C., Nguyen, S. T., & Jaatun, M. G. (2013). Beyond
lightning: A survey on security challenges in cloud
computing. Computers & Electrical Engineering, 39(1), 47-
54. https://doi.org/10.1016/j.compeleceng.2012.04.015
[9]. Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and
privacy challenges in cloud computing environments. IEEE
Security & Privacy, 8(6), 24-31. https://doi.org/10.1109/MSP.
2010.186
[10]. Tang, Y., Lee, P. P., Lui, J. C., & Perlman, R. (2012).
Secure overlay cloud storage with access control and
assured deletion. IEEE Transactions on Dependable and
Secure Computing, 9(6), 903-916.
[11]. Vaquero, L. M., Rodero-Merino, L., & MorĂ¡n, D.
(2011). Locking the sky: a survey on IaaS cloud security.
Computing, 91(1), 93-118. https://doi.org/10.1007/
s00607-010-0140-x
[12]. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., &
Vasilakos, A. V. (2014). Security and privacy for storage and
computation in cloud computing. Information sciences,
258, 371-386. https://doi.org/10.1016/j.ins.2013.04.028
[13]. Xiao, Z., & Xiao, Y. (2012). Security and privacy in cloud computing. IEEE Communications Surveys &
Tutorials, 15(2), 843-859. https://doi.org/10.1109/SURV.
2012.060912.00182
[14]. Zhou, M., Zhang, R., Xie, W., Qian, W., & Zhou, A. (2010, November). Security and privacy in cloud
computing: A survey. In 2010, 6th International Conference
on Semantics, Knowledge and Grids (pp. 105-112). IEEE.
https://doi.org/10.1109/SKG.2010.19