1. Wang Q, Wang C, Li J, Ren K, Lou W (2009) : Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the European symposium on research in computer security, Springer, pp 355–370
2. Research on cloud computing security threats using data transmission;Kumar R;Int J Adv Res Comput Sci Softw Eng India,2015
3. Meng D (2013) : Data security in cloud computing. In: Proceedings of the 8th International Conference on Computer Science & Education (ICCSE 2013)
4. Shawish A, Salama M (2014) : Cloud computing: paradigms and technologies. In: Proceedings of the Inter-cooperative collective intelligence: techniques and applications, Springer, pp 39–67
5. An efficent security framework design for cloud computing using artificial neural networks;Negi A;Int J Comput Appl,2015