1. Yang M, Bourbakis N, Li S (2004) Data-image-video encryption. IEEE potentials 23:28–34
2. Pathak AR, Padmavathi B (2014) Analysis of security techniques applied in database outsourcing. (IJCSIT) Int J Comput Sci Inf Technol 5:665–670
3. Pathak AR, Padmavathi BA (2014) Secure threshold secret sharing framework for database outsourcing. In: IEEE International Conference ICACCCT, pp 1642–1649
4. Pathak AR, Padmavathi B. (2013) Survey of confidentiality and integrity on outsourced database. Int J Sci Eng Technol
5. Pathak AR, Pandey M, Rautaray S (2018) Assessment of integrity auditing protocols for outsourced big data. In: Bhateja V, Coello Coello C, Satapathy S, Pattnaik P (eds) Intelligent engineering informatics. Advances in intelligent systems and computing, vol 695. Springer, Singapore