1. Sanka, S., Hota, C., Rajarajan, M.: Secure data access in cloud computing. In: 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application, 978-1-4244-7932-0/10 ©, pp. 1–6. IEEE (2010)
2. Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy- aware data storage and processing in cloud computing architecture. In: 2009 Eighth IEEE International Conference on Dependable Autonomic and Secure Computing, 978-0-7695-3929-4/09 ©, pp. 711–717. IEEE (2009)
3. Panda, S.N., Kumar, G.: IDATA – An Effective Intercept Detection Algorithm for Packet Transmission in Trust Architecture (POT-2010-0006). Selected for publication in IEEE Potentials ISSN: 0278-6648
4. Gleeson, E.: Computing industry set for a shocking change (April 2009), MoneyWeek,
http://www.moneyweek.com/investmentadvice/computing-industryset-for-a-shocking-change
5. Jangra, A., Bala, R.: A Survey on various possible vulnerabilities and attacks in cloud computing environment. IJCBR 3(1) (January 2012) ISSN (Online): 2229-6166