Author:
Alsaadi Elham Mohammed Thabit A.,Fayadh Sabah Mohammed,Alabaichi Ashwak
Reference50 articles.
1. N. H. Hussein and A. Khalid, “A survey of Cloud Computing Security challenges and solutions”, Int. J. Comput. Sci. Inf. Secur., vol. 14, No. 1, p. 52, 2016.
2. F. Liu et al., “NIST cloud computing reference architecture: Recommendations of the National Institute of Standards and Technology (Special Publication 500-292)”, 2012.
3. D. P. Timothy and A. K. Santra, “A hybrid cryptography algorithm for cloud computing security”, in 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), 2017, pp. 1–5.
4. R. V. Rao and K. Selvamani, “Data security challenges and its solutions in cloud computing”, Procedia Comput. Sci., vol. 48, pp. 204–209, 2015.
5. L. Tong, Y. Li, and W. Gao, “A hierarchical edge cloud architecture for mobile computing”, in IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, 2016, pp. 1–9.