1. Charanya R, Aramudhan M (2016) Survey on access control issues in cloud computing. In: Proceedings of international conference on emerging trends in engineering, technology and science (ICETETS), Pudukkottai, pp 1–4
2. Kanna GP, Vasudevan V (2016) Enhancing the security of user data using the keyword encryption and hybrid cryptographic algorithm in cloud. In: Proceedings of international conference on electrical, electronics, and optimization techniques (ICEEOT), Chennai, pp 3688–3693
3. Rehman F, Akram S, Shah AM ()2016 The framework for efficient passphrase based multifactor authentication in cloud computing. In: Proceedings of 22nd international conference on automation and computing (ICAC), Colchester, pp 37–41
4. Richard D (2009) An overview of different authentication methods and protocols. SANS Institute—Network, Security, Computer, Audit Information & Training, SANS Institute, pp 1–9
5. Pooja R, Urs NPB, Apoorva P (2019) Access control with anonymous authentication of data stored in clouds using abe algorithm. In: Proceedings of international conference on communication and signal processing (ICCSP), Chennai, pp 0909–0912