1. Kumar NG, Rao KK (2014) Hash-based approach for providing privacy and integrity in cloud data storage using digital signatures. Int J Comput Sci Inf Technol 5(6):8074–8078
2. Harfoushi O, Obiedat R (2018) Security in cloud computing using hash algorithm: a neural cloud data security model. Modern Appl Sci 12(6):143. https://doi.org/10.5539/mas.v12n6p143
3. Kulkarni G, Solanke V, Shyam G, Pawan K (2014) Mobile cloud computing: security threats. https://doi.org/10.1109/ECS.2014.6892511
4. Power Research Center. Accessed 18 Apr 2020. https://www.pewresearch.org/global/2019/02/05/smartphone-ownership-is-growing-rapidly-around-the-world-but-not-always-equally/
5. Cloud Security Alliance (2013) Big data analytics for security intelligence. Cloud security alliance. Retrieved from https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Big_Data_Analytics_for_Security_Intelligence.pdf