1. Stephen, O. (2014). The study of the application of data encryption techniques in cloud storage to ensure stored data integrity and availability. International Journal of Scientific and Research Publications, 4(10), 1–7.
2. Sharma, P., Sood, S. K., & Kaur, S. (2011). Security issues in cloud computing. Springer-Verlag, Berlin Heidelberg HPAGC CCIS, 169, 36–45.
3. Yarlagadda, V. K., & Ramanujam, S. (2011). Data security in cloud computing. Journal of Computer and Mathematical Sciences, 2(1), 15–23.
4. Ahmad, A. (2017). Type of security threats and its prevention. Computer Technology & Applications., 3(2), 750–752.
5. Padmavathi, G. & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. (IJCSIS) International Journal of Computer Science and Information Security, 4(1&2).