References
[1]. Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, Athanasios V. Vasilakos, “Security and privacy for storage and computation in cloud computing”, Information Sciences 258, Page No( 371–386) ,Jan 2014.
[2]. The NIST Definition of Cloud computing version15,by peter Mell and Grance, october 7 , 2009 ,National Istitute of standards and Technology (NIST) , Information Technology Laboratory (www.csrc.nist.gov)
[3]. I .Sriram ana A.khajeh-hosseini,"Reserch Agenda in Cloud Technologies", Methodology, 2008.
[4]. L.Wang, G.V.Laszewski, A.Younge, X.He, "Cloud Computing: a Perspective Study," Provider, volume -28,Page No(137-146),Feb 2010.
[5]. A. Lenk, M. Klems, J. Nimis, S. Tai, and T. Sandholm, “What’s inside the Cloud? An architectural map of the Cloud landscape,” 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, Page No(23-31), May. 2009.
[6]. Pradeep Kumar Tiwari, Dr. Bharat Mishra," Cloud Computing Security Issues, Challenges and Solution", International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 8, August 2012.
[7]. Pankaj Sareen," Cloud Computing: Types, Architecture, Applications, Concerns, Virtualization and Role of IT Governance in Cloud", International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, March 2013.
[8]. Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-of-the-art and research challenges,” Journal of Internet Services and Applications, Volume-01, Page No(7-18), Apr. 2010.
[9]. Ashutosh Kumar Singh, Dr. Ramapati Mishra, Fuzail Ahmad, Raj Kumar Sagar, Anil Kumar Chaudhary ,"A Review of Cloud Computing Open Architecture and Its Security Issues", International Journal of Scientific & Technology Research Volume-01, Issue-06, ISSN 2277-8616 July 2012
[10]. Kuyoro S.O, Ibikunle F ,Awodele o ,"Cloud Computing Security Issues and Challenges",International Journal Of Computer Network,May 2011
[11]. Flavio Lombardi, Roberto Di Pietro. "Transparent Security for Cloud" SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing, Page No( 414-415), March 2010.
[12]. Chang-Lung Tsai, 2Uei-Chin Lin,Information Security of Cloud Computing for Enterprises , Advances on Information Sciences and Service Sciences. Volume-03, Number-01, February 2011.
[13]. Waseen Iqbal,Shahid yousaf,"Formal Modeling Of Agent Based Cloud Computing Services Using Petri Nets",VFAST Transactions on Software Engineering,August 2013.
[14]. Sadeghzadeh Payam , Bahrehpoor Davood, Sadeghzadeh Peyman. " Analysis of security challenges in cloud computing”, Eighth Symposium advances in science and technology,December 2014.
[15]. Sadralsadati Seyed Mohsen , Karegar Mohammad Javad ,” Security challenges in cloud computing and solution to improve security in the development of e-government services” Eighth Symposium advances in science and technology, December 2014.
[16]. Talebi Samira, Khotanloo Hasan ,” Check cloud security attacks and strategies to deal with them” The first national workshop on Cloud Computing, Iran, Amirkabir University of Technology, November2012.
[17]. Soltanbaghshahi Somayeh, Soltanbaghshahi Leyla,Khademzadeh Ahmad,Jobehdari Sam.” Analysis of security challenges and their effect on cloud computing” The first national workshop on Cloud Computing,Iran, Amirkabir University of Technology, November2012.
[18]. Adaptive, scalable and reliable monitoring of big data on clouds, Mauro Andreolini, Michele Colajanni, Marcello Pietri, Stefania Tosi, Journal of Parallel and Distributed Computing, Available online 26 August 2014.
[19]. Narzu Tarannum and Nova Ahmed, ”EFFICIENT AND RELIABLE HYBRID CLOUD ARCHITECTURE FOR BIG DATABASE”, International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Volume-03, No-06, December 2013.
[20]. Tilmann Rabl, Mohammad Sadoghi, Hans-Arno Jacobsen, Sergio G ´ omez-Villamor, Victor Munt ´ es-Mulero, Serge Mankovskii, “Solving Big Data Challenges for Enterprise Application Performance Management”, Proceedings of the VLDB Endowment, Volume-05, No-12,March 2012.
[21]. Halil Ibrahim Karaca, Migration of an On-Premise Single-Tenant Enterprise Application to the Azure Cloud: The Multi-Tenancy Case Study, Master Thesis, TARTU, 2013.
[22]. Carlo Curino, Evan P. C. Jones, Raluca Ada Popa, Nirmesh Malviya, Eugene Wu, Sam Madden, Hari Balakrishnan, and Nickolai Zeldovich, Relational Cloud: A Database-as-a-Service for the Cloud, In Proceedings of the 5th Biennial Conference on Innovative Data Systems Research (CIDR), Pacific Grove, CA, January 2011.
[23]. Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, and Hui (Wendy) Wang,” Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases”, IEEE Systems Journal, Volume-07, No-03,Page No(385-395), September 2013.
[24]. Chao-Lung Yang , R.J. Kuo, Chia-Hsuan Chien, Nguyen Thi Phuong Quyen , “Non-dominated sorting genetic algorithm using fuzzy membership chromosome for categorical data clustering”, Applied Soft Computing 30 Page No(113–122),January 2015.
[25]. http://commons.wikimedia.org/wiki/File:Mobile_Cloud_Architecture.pdf
[26]. Pawan Lingrasa, Ahmed Elagamya, Asma Ammarb, Zied Elouedib”, Iterative meta-clustering through granular hierarchy of supermarket customers and products”, Information Sciences, Volume 257, Pages No (14–31),February 2014.