1. Rightscale 2016 state of the cloud report. https://www.rightscale.com/lp/state-of-the-cloud . Last Accessed 3 July 2016
2. Asghar, M.R., Russello, G., Crispo, B., Ion, M.: Supporting complex queries and access policies for multi-user encrypted databases. In: Juels, A., Parno, B. (eds.) CCSW 2013, pp. 77–88. ACM (2013)
3. Lecture Notes in Computer Science;F Bao,2008
4. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: S&P 2007, pp. 321–334. IEEE Computer Society (2007)
5. Bost, R.: $$\sum $$ o $$\varphi $$ o $$\varsigma $$ : Forward secure searchable encryption. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds.) SIGSAC 2016, pp. 1143–1154. ACM (2016)