1. Ren K, Wang C and Wang Q 2012 Security challenges for the public cloud. IEEE Internet Comput. 16(1): 69–73
2. Kamara S and Lauter K 2010 Cryptographic cloud storage. In: Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, pp. 136–149
3. Motahari-Nezhad H R, Stephenson B and Singhal S 2009 Outsourcing business to cloud computing services: opportunities and challenges. IEEE Internet Comput. (special issue)
4. Armbrust M, Fox A, Griffith R, Joseph A D, Katz R H, Konwinski A, Lee G, Patterson D A, Rabkin A, Stoica I and Zaharia M 2009 Above the clouds: a Berkeley view of cloud computing. Rep. UCB/EECS 28(13), Department of Electrical Engineering and Computer Sciences, University of California, Berkeley
5. Schulze H 2016 Cloud security survey, https://pages.cloudpassage.com/cloud-security-survey-report-2016.html (accessed May 2016)