168
M. Bakro et al.
References
1. Banafa A (2018) IoT and blockchain convergence: benefits and challenges. IoT and blockchain
convergence: benefits and challenges. IEEE Internet of Things
2. Esposito C, Castiglione A, Martini B, Choo KKR (2016) Cloud manufacturing: security,
privacy, and forensic concerns. IEEE Cloud Comput 3(4). https://doi.org/10.1109/MCC.201
6.79
3. Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and
solutions at different layers of Cloud computing. J Supercomput 63(2). https://doi.org/10.1007/
s11227-012-0831-5
4. Wang C, Liu X, Li v (2012) Implementing a personal health record cloud platform using
CIPHERTEXT-policy attribute-based encryption. In Proceedings of the 2012 4th international
conference on intelligent networking and collaborative systems, INCoS 2012, pp 8–14. https://
doi.org/10.1109/iNCoS.2012.65
5. Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research
challenges. J Internet Serv Appl 1(1). https://doi.org/10.1007/s13174-010-0007-6
6. Qian L, Luo Z, Du Y, Guo L (2009) Cloud computing: an overview. In Lecture Notes in
Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture
Notes in Bioinformatics), vol 5931. LNCS, pp 626–631. https://doi.org/10.1007/978-3-642-
10665-1_63
7. Arutyunov VV (2012) Cloud computing: its history of development, modern state, and future
considerations. Sci Tech Inf Process 39(3). https://doi.org/10.3103/S0147688212030082
8. Ramey J, Rao PG (2011) The systematic literature review as a research genre. https://doi.org/
10.1109/IPCC.2011.6087229
9. Krishnan R (2017) ScholarWorks at WMU security and privacy in cloud computing. https://
scholarworks.wmich.edu/masters_theses/919
10. Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput
Appl 79. https://doi.org/10.1016/j.jnca.2016.11.027
11. Basu S et al (2018) Cloud computing security challenges & solutions-a survey. In 2018 IEEE
8th annual computing and communication workshop and conference, CCWC 2018, vol 2018.
https://doi.org/10.1109/CCWC.2018.8301700
12. Sharma R, Trivedi RK (2014) Literature review: cloud computing –security issues, solution
and technologies. Int J Eng Res 3(4). https://doi.org/10.17950/ijer/v3s4/408
13. Zhang R, Liu L (2010) Security models and requirements for healthcare application clouds.
https://doi.org/10.1109/CLOUD.2010.62
14. Santos N, Gummadi KP, Rodrigues R (2009) Towards trusted cloud computing
15. Jansen W, Grance T (2012) Guidelines on security and privacy in public cloud computing?. In
Public cloud computing: security and privacy guidelines, pp 1–95
16. Piliouras T et al (2011) Trust in a cloud-based healthcare environment. https://doi.org/10.1109/
CEWIT.2011.6135890
17. Nyrönen et al TH (2012) Delivering ICT infrastructure for biomedical research. In ACM
international conference proceeding series, pp 37–44. https://doi.org/10.1145/2361999.236
2006
18. Bokhari MU, Shallal QM, Tamandani YK (2016) Security and privacy issues in cloud
computing. In Proceedings of the 10th INDIACom; 2016 3rd international conference on
computing for sustainable global development, INDIACom 2016, pp 896–900. https://doi.org/
10.5120/cae2017652617
19. Bauer E, Adams R (2012) Reliability and availability of cloud computing
20. Hamdi M (2012) Security of cloud computing, storage, and networking. In Proceedings of the
2012 international conference on collaboration technologies and systems, CTS 2012, pp 1–5.
https://doi.org/10.1109/CTS.2012.6261019
21. Iankoulova I, Daneva M (2012) Cloud computing security requirements: a systematic review.
https://doi.org/10.1109/RCIS.2012.6240421