Cloud Computing and Security Issues that can affect users

[1]  Karuna Pande Joshi,et al.  A Semantic Approach to Cloud Security and Compliance , 2015, 2015 IEEE 8th International Conference on Cloud Computing.

[2]  Sarfraz Nawaz Brohi Seven Deadly Threats and Vulnerabilities in Cloud Computing , 2011 .

[3]  Sajjad Haider,et al.  Security threats in cloud computing , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[4]  Carla Merkle Westphall,et al.  Customer Security Concerns in Cloud Computing , 2011, ICON 2011.

[5]  Madjid Merabti,et al.  Secure Cloud Computing for Critical Infrastructure: A Survey , 2012 .

[6]  Tuncay Ercan,et al.  Effective use of cloud computing in educational institutions , 2010 .

[7]  RattenVanessa Cloud Computing Services , 2012 .

[8]  Arokia Paul Rajan,et al.  Evolution of Cloud Storage as Cloud Computing Infrastructure Service , 2013, ArXiv.

[9]  Prashant Pandey,et al.  Cloud computing , 2010, ICWET.

[10]  A. A. Elusoji,et al.  An Effective Measurement of Data Security in a Cloud Computing Environment , 2013 .

[11]  Mohammed Ibrahim,et al.  THEMATIC ANALYSIS: A CRITICAL REVIEW OF ITS PROCESS AND EVALUATION , 2012 .

[12]  S. Srinivasan Cloud Computing Basics , 2014 .

[13]  William R. Claycomb,et al.  Insider Threats to Cloud Computing: Directions for New Research Challenges , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.

[14]  Dean Whitehead,et al.  Analysing Data in Qualitative Research , 2007 .

[15]  R. K. Bunkar,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2014 .

[16]  Garima Tiwari,et al.  Cloud Computing: A New Era of IT Opportunity and Challenges , 2013 .

[17]  Ahmed Shawish,et al.  Cloud Computing: Paradigms and Technologies , 2014 .

[18]  Amy Blackstone,et al.  Principles of Sociological Inquiry – Qualitative and Quantitative Methods , 2014 .

[19]  Sonia Bassi,et al.  Cloud Computing Data Security-Background & Benefits , 2015 .

[20]  C. R. Kothari,et al.  Research Methodology: Methods and Techniques , 2009 .

[21]  Barrie Sosinsky,et al.  Cloud Computing Bible , 2010 .

[22]  Te-Shun Chou,et al.  SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES , 2013 .

[23]  Jaydip Sen,et al.  Security and Privacy Issues in Cloud Computing , 2013, ArXiv.

[24]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[25]  Anmin Fu,et al.  Privacy-preserving public auditing for non-manager group , 2017, 2017 IEEE International Conference on Communications (ICC).

[26]  Imran Ashraf An Overview of Service Models of Cloud Computing , 2014 .

[27]  R. Sridaran,et al.  An Analysis of Security Challenges in Cloud Computing , 2013 .

[28]  Shao Ying Zhu,et al.  A survey on top security threats in cloud computing , 2015 .

[29]  John C. Grundy,et al.  An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.

[30]  Mohammed Farik,et al.  Cloud Computing Security Latest Issues amp Countermeasures , 2015 .

[31]  Muthu Dayalan Security Issues and Challenges in Cloud Computing , 2017 .