1. Congdong, L., Gang, Q., Tao, C.: A cloud computing security model based on noninterference. Wuhan Univ. J. Nat. Sci. 03, 1–7 (2019)
2. Hafiz Gulfam, A., Zeeshan, A.: Current cloud computing security concerns from consumer perspective. Mach. Tools Hydraul. 41(24), 1–5 (2013)
3. Chunming, W., Qianjun, L., Yuwei, L., Qiumei, C., Haifeng, Z.: A survey on cloud security. ZTE Commun. 15(02), 42–47 (2017)
4. Shengli, Z., Lifa, W., Canghong, J.: A privacy-based SLA violation detection model for the security of cloud computing. Chin. Commun. 14(09), 155–165 (2017)
5. Xiaoming, Y., et al.: An anomalous behavior detection model in cloud computing. Tsinghua Sci. Technol. 21(03), 322–332 (2016)