1. P. Selvigrija, D. Sumithra, Security as a challenge in cloud computing: a survey. Int. J. Comput. Appl. 6(3) (2013)
2. A. Kudale, Dr. B. Kumar, Review -a study on authentication and access control for cloud computing. Int. J. Res. Comput. Sci. Manage. (2014). (Research Scholar, Karpagam Academy of Higher Education)
3. A. Dmitrienko, C. Liebchen, C. Rossow, A. Sadeghl, Security analysis of mobile two-factor authentication schemes. Intel@ Technol. J. 18(4) (2014)
4. S.Y. Lim, M.M. Kiah, T.F. Ang, Security issues and future challenges of cloud service authentication. Acta Polytechnica Hungarica 14(2) (2017)
5. A. Kudale, Dr. B. Kumar, Protected authentication by login credential and OTP for cloud based application. Int. J. Comp. Appl. 5(3), 2250–1797 (2015). (Research Scholar, Karpagam Academy of Higher Education)