1. D. Sheng, D. Kondo, and F. Cappello, October 2013, Characterizing cloud applications on a Google data center, IEEE 42nd International Conference on Parallel Processing. Lyon, pp. 468--473,
2. J. Kincaid, September 2010, Google confirms that it fired engineer for breaking internal privacy policies, Available:http://techcrunch.com/2010/09/14/google-engineer-spying-fired/Chu (last access June 21, 2016)
3. Google, Google terms of service, April 2014, https://www.google.com/intl/en/policies/terms
4. Bicakci, K., Yavuz, D. D., & Gurkan, S. (2016). TwinCloud: Secure Cloud Sharing Without Explicit Key Management. arXiv preprint arXiv:1606.04705.DOI= https://arxiv.org/abs/1606.04705
5. Bamrah,G. S., & Pandey, 2014 A. Analyzing the Security Schemes of Various Cloud Storage Services. http://ece.gmu.edu/coursewebpages/ECE/ECE646/F15/project/F15_Project_Resources/F14_Cloud_Storage_report.pdf