1. Okuhara, M., Shiozaki, S.T.: Security architectures for cloud computing. Fujitsu Sci. Tech. J. 46, 397–402 (2010)
2. Kuyoro, S.O., Ibikunle, F., Awodele, O.: Cloud computing security issues and challenges. Int. J. Comput. Netw. 3, 247–255 (2011)
3. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: European Conference on Research in Computer Security, pp. 355–370 (2009)
4. Brender, N., Markov, I.: Risk perception and risk management in cloud computing: results from a case study of Swiss companies. Int. J. Inf. Manag. 33, 726–733 (2013)
5. Fujitsu Research Institute, Personal data in the cloud: A global survey of consumer attitudes. http://www.fujitsu.com/downloads/SOL/fai/reports/fujitsu_personal-data-in-the-cloud.pdf