1. From hype to future: KPMG’s 2010 cloud computing survey.;I. T.Advesory;IT ADVESORY.
2. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted stores. In Proc. Of CCS’07, Alexandria, VA (pp. 598–609).
3. Cloudbus. (n.d.). Cloudsim: A framework for modeling and simulation of cloud computing infrastructures and services. Retrieved from http://www.Cloudbus.org/Cloudsim/
4. Dai, H. L. Y., & Yang, B. (n.d.). Identity-based cryptography for cloud security.
5. Federal Information Processing Standards Publication 197. (2011). Announcing the Advanced Encryption Standard (AES).