1. Poorghanad A, Sadr A, Kashanipour A (2008) Generating high quality pseudo random number using evolutionary methods. In: International conference on computational intelligence and security, pp 331–335.
https://doi.org/10.1109/cis.2008.220
2. Singh D, Rani P, Kumar R (2013) To design a genetic algorithm for cryptography to enhance the security. Int J Innov Eng Technol (IJIET) 2(2):380–385
3. Atiewi S, Yussof S (2015) Comparison between CloudSim and green-cloud in measuring energy consumption in a cloud environment. In: 3rd international conference on advanced computer science applications and technologies, 2014, pp 9–14.
https://doi.org/10.1109/acsat.2014.9
4. Pushpalatha V, Sudeepa KB, Mahendra HN (2018) A survey on security issues in cloud computing. Int J Eng Technol 7:758–761
5. Calheiros RN, Ranjan R, Beloglazov A, De Rose CA, Buyya R (2010) CloudSim: a toolkit for modeling and simulation of cloud-computing environments and evaluation of resource provisioning algorithms. Wiley Online Libr 41(1):23–50.
https://doi.org/10.1002/spe.995