168

M. Bakro et al.

References

1. Banafa A (2018) IoT and blockchain convergence: benefits and challenges. IoT and blockchain

convergence: benefits and challenges. IEEE Internet of Things

2. Esposito C, Castiglione A, Martini B, Choo KKR (2016) Cloud manufacturing: security,

privacy, and forensic concerns. IEEE Cloud Comput 3(4). https://doi.org/10.1109/MCC.201

6.79

3. Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and

solutions at different layers of Cloud computing. J Supercomput 63(2). https://doi.org/10.1007/

s11227-012-0831-5

4. Wang C, Liu X, Li v (2012) Implementing a personal health record cloud platform using

CIPHERTEXT-policy attribute-based encryption. In Proceedings of the 2012 4th international

conference on intelligent networking and collaborative systems, INCoS 2012, pp 8–14. https://

doi.org/10.1109/iNCoS.2012.65

5. Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research

challenges. J Internet Serv Appl 1(1). https://doi.org/10.1007/s13174-010-0007-6

6. Qian L, Luo Z, Du Y, Guo L (2009) Cloud computing: an overview. In Lecture Notes in

Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture

Notes in Bioinformatics), vol 5931. LNCS, pp 626–631. https://doi.org/10.1007/978-3-642-

10665-1_63

7. Arutyunov VV (2012) Cloud computing: its history of development, modern state, and future

considerations. Sci Tech Inf Process 39(3). https://doi.org/10.3103/S0147688212030082

8. Ramey J, Rao PG (2011) The systematic literature review as a research genre. https://doi.org/

10.1109/IPCC.2011.6087229

9. Krishnan R (2017) ScholarWorks at WMU security and privacy in cloud computing. https://

scholarworks.wmich.edu/masters_theses/919

10. Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput

Appl 79. https://doi.org/10.1016/j.jnca.2016.11.027

11. Basu S et al (2018) Cloud computing security challenges & solutions-a survey. In 2018 IEEE

8th annual computing and communication workshop and conference, CCWC 2018, vol 2018.

https://doi.org/10.1109/CCWC.2018.8301700

12. Sharma R, Trivedi RK (2014) Literature review: cloud computing –security issues, solution

and technologies. Int J Eng Res 3(4). https://doi.org/10.17950/ijer/v3s4/408

13. Zhang R, Liu L (2010) Security models and requirements for healthcare application clouds.

https://doi.org/10.1109/CLOUD.2010.62

14. Santos N, Gummadi KP, Rodrigues R (2009) Towards trusted cloud computing

15. Jansen W, Grance T (2012) Guidelines on security and privacy in public cloud computing?. In

Public cloud computing: security and privacy guidelines, pp 1–95

16. Piliouras T et al (2011) Trust in a cloud-based healthcare environment. https://doi.org/10.1109/

CEWIT.2011.6135890

17. Nyrönen et al TH (2012) Delivering ICT infrastructure for biomedical research. In ACM

international conference proceeding series, pp 37–44. https://doi.org/10.1145/2361999.236

2006

18. Bokhari MU, Shallal QM, Tamandani YK (2016) Security and privacy issues in cloud

computing. In Proceedings of the 10th INDIACom; 2016 3rd international conference on

computing for sustainable global development, INDIACom 2016, pp 896–900. https://doi.org/

10.5120/cae2017652617

19. Bauer E, Adams R (2012) Reliability and availability of cloud computing

20. Hamdi M (2012) Security of cloud computing, storage, and networking. In Proceedings of the

2012 international conference on collaboration technologies and systems, CTS 2012, pp 1–5.

https://doi.org/10.1109/CTS.2012.6261019

21. Iankoulova I, Daneva M (2012) Cloud computing security requirements: a systematic review.

https://doi.org/10.1109/RCIS.2012.6240421