[1] N. Leavitt, “Is cloud computing really ready for prime time?”
Computer, vol. 42, no. 1, pp. 15–25, 2009.
[2] P.Mell and T. Grance, “The nist definition of cloud computing,”
National Institute of Standards and Technology, vol. 53, no. 6,
article 50, 2009.
[3] F. Berman,G.Fox, andA. J. G. Hey, Grid Computing:Making the
Global Infrastructure a Reality, Volume 2, JohnWiley and sons,
2003.
[4] M. A. Shah, R. Swaminathan, and M. Baker, “Privacy-preserving
audit and extraction of digital contents,” IACR Cryptology
EPrint Archive, vol. 186, 2008.
[5] Z. Xiao andY.Xiao, “Security and privacy in cloud computing,”
IEEE Communications Surveys & Tutorials, vol. 15, no. 2, pp.
843–859, 2013.
[6] N. Kshetri, “Privacy and security issues in cloud computing: the
role of institutions and institutional evolution,” Telecommunications
Policy, vol. 37, no. 4-5, pp. 372–386, 2013.
[7] R. Latif, H. Abbas, S. Assar, and Q. Ali, “Cloud computing risk
assessment: a systematic literature review,” in Future Information
Technology, pp. 285–295, Springer, Berlin, Germany, 2014.
[8] A. Aviˇzienis, J. Laprie, B. Randell, and C. Landwehr, “Basic
concepts and taxonomy of dependable and secure computing,”
IEEE Transactions on Dependable and Secure Computing, vol. 1,
no. 1, pp. 11–33, 2004.
[9] Z. Mahmood, “Data location and security issues in cloud
computing,” in Proceedings of the 2nd International Conference
on Emerging Intelligent Data andWeb Technologies (EIDWT ’11),
pp. 49–54, IEEE, September 2011.
[10] D. Sun, G. Chang, L. Sun, and X. Wang, “Surveying and analyzing
security, privacy and trust issues in cloud computing
environments,” in Proceedings of the International Conference on
Advanced in Control Engineering and Information Science (CEIS