1. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
2. Zhu, C., Leung, V., Hu, X., Shu, L., Yang, L.T.: A review of key issues that concern the feasibility of mobile cloud computing. In: Proceedings of IEEE International Conference on IEEE Cyber Physical and Social Computing, and Green Computing and Communications, and IEEE Internet of Things, pp. 769–776 (2013)
3. Ritz, Vulnerable icloud may be the reason to celebrity photo leak (2014).
http://marcritz.com/icloud-flaw-leak/
4. Hore, B., Chang, E.C., Diallo, M.H., Mehrotra, S.: Indexing encrypted documents for supporting efficient keyword search. In: Proceedings of Secure Data Manage, Istanbul, Turkey, August 2012, pp. 93–110 (2012)
5. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) Advances in Cryptology - EUROCRYPT 2004, pp. 506–522. Springer, Heidelberg (2004)