1. Adams I, Long DDE, Miller EL, Pasupathy S, Storer MW (2009) Maximizing efficiency by trading storage for computation. In: Proc. of workshop on hot topics in cloud computing, pp 1–5
2. Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58
3. Bellare M, Boldyreva A (2000) Public-key encryption in a multi-user setting: security proofs and improvements. Springer, Berlin
4. Cloud Security Alliance (2017) Security guidance for critical areas of focusin cloud computing. http://www.cloudsecurityalliance.org. http://archive.opengroup.org/public/member/proceedings/q309/q309a/Pre
5. Haghighat M, Zonouz S, Abdel-Mottaleb M (2015) cloudID: trustworthy cloud-based and cross-enterprise biometric identification. Expert Syst Appl 42(21):7905–7916