TY - BOOK AU - Mell, P. AU - Grance, T. PY - 2011 DA - 2011// TI - The NIST definition of cloud computing PB - National Institute of Standards and Technology, Special Publication CY - Gaithersburg ID - Mell2011 ER - TY - STD TI - Jignesh S (2017) The 6 multi cloud architecture designer for an effective cloud. https://simform.com/multi-cloud-architecture. Accessed 15 Apr 2018. UR - https://simform.com/multi-cloud-architecture ID - ref2 ER - TY - STD TI - Cloudenables C (2017) Managing multi-cloud security. https://www.corestack.io/blog/managing-multi-cloud-security. Accessed 22 Feb 2018 UR - https://www.corestack.io/blog/managing-multi-cloud-security ID - ref3 ER - TY - STD TI - Robert P, Johnston E (2016) Worldwide cloud 2017 predictions. https://www.idc.com/getdoc.jsp? containerId = US41863916. Accessed 21 Oct 2018 UR - https://www.idc.com/getdoc.jsp ID - ref4 ER - TY - STD TI - Nicole H (2017) Security threats can come from anywhere: the multi-cloud world. http://itprotoday.com/hybrid-cloud/what-it-pros-need-know-about-multi-cloud-security. Accessed 10 Nov 2018 UR - http://itprotoday.com/hybrid-cloud/what-it-pros-need-know-about-multi-cloud-security ID - ref5 ER - TY - STD TI - Travis W (2017) Five principles for running securely in a multi-cloud environment. https://threatstack.com/blog/5-principles-for-running-securely-in-a-multi-cloud-environment. Accessed 12 Nov 2018 UR - https://threatstack.com/blog/5-principles-for-running-securely-in-a-multi-cloud-environment ID - ref6 ER - TY - STD TI - Tweaks C (2013) Importance of cloud computing interoperabilitiy. https://cloudtweaks.com/2013/10/importance-of-interoperability-providerlockin. Accessed 15 Nov 2018 UR - https://cloudtweaks.com/2013/10/importance-of-interoperability-providerlockin ID - ref7 ER - TY - JOUR AU - Bastiao Silva, L. A. AU - Costa, C. AU - Oliveira, J. L. PY - 2013 DA - 2013// TI - A common API for delivering services over multi-vendor cloud resources JO - J Syst Softw VL - 86 UR - https://doi.org/10.1016/j.jss.2013.04.037 DO - 10.1016/j.jss.2013.04.037 ID - Bastiao Silva2013 ER - TY - STD TI - Data integrity service in multi-cloud and distributed cloud storage environment. In: The 5th international conference on advanced computing and communication technologies. IEEE, India, p 490–494 ID - ref9 ER - TY - STD TI - Brauer K (2011) Authentication and security aspects in: an international multi-cloud, https://theseus.fi/bitstream/handle/…/Karsten_Brauer.pdf. Accessed 12 Dec 2018 UR - https://theseus.fi/bitstream/handle/%e2%80%a6/Karsten_Brauer.pdf ID - ref10 ER - TY - JOUR AU - Abusitta, A. AU - Bellaiche, M. AU - Dagenais, M. AU - Halabi, T. PY - 2019 DA - 2019// TI - A deep learning approach for proactive multi cloud cooperative intrusion detection system JO - Future Gen Comput Syst VL - 98 UR - https://doi.org/10.1016/j.future.2019.03.043 DO - 10.1016/j.future.2019.03.043 ID - Abusitta2019 ER - TY - JOUR AU - Belbergui, C. AU - Elkamoun, N. AU - Rachid, H. PY - 2017 DA - 2017// TI - Authentication mechanisms in cloud computing environments JO - Int J Inform Technol Secur VL - 9 ID - Belbergui2017 ER - TY - JOUR AU - Zkik, O. r. n. a. h. o. u. AU - Elhajji, S. PY - 2017 DA - 2017// TI - Secure mobile multi cloud architecture for authentication and data storage JO - Int J Cloud Appl Comput VL - 7 ID - Zkik2017 ER - TY - JOUR AU - Indu, I. AU - Rubesh, A. P. M. AU - Vidhyacharan, B. PY - 2017 DA - 2017// TI - Encrypted token based authentication with adapted SAML technology for cloud web services JO - J Netw Comput Appl VL - 99 ID - Indu2017 ER - TY - JOUR AU - Munivel, E. AU - Kannammal, A. PY - 2019 DA - 2019// TI - New authentication scheme to secure against the phishing attack in the mobile cloud computing JO - Secur Commun Netw VL - 45 ID - Munivel2019 ER - TY - STD TI - Obinna E, Faraz FM, Philipp W, Ramin Y (2017) A JSON token-based authentication and access management schema for cloud SaaS applications. In: The 5th IEEE international conference on future internet of things and cloud (FiCloud) ID - ref16 ER - TY - JOUR AU - Lee, Y. AU - Rathore, S. AU - Park, J. H. PY - 2020 DA - 2020// TI - A blockchain-based smart home gateway architecture for preventing data forgery JO - Hum. Cent Comput Inf Sci. VL - 10 UR - https://doi.org/10.1186/s13673-020-0214-5 DO - 10.1186/s13673-020-0214-5 ID - Lee2020 ER - TY - JOUR AU - Ramotsoela, D. T. AU - Hancke, G. P. PY - 2019 DA - 2019// TI - Abu-Mahfouz AM (2019) Attack detection in water distribution systems using machine learning JO - Hum Cent Comput Inf. Sci VL - 9 UR - https://doi.org/10.1186/s13673-019-0175-8 DO - 10.1186/s13673-019-0175-8 ID - Ramotsoela2019 ER - TY - JOUR AU - Shailendra, R. AU - Vincenzo, L. AU - Park, J. H. PY - 2017 DA - 2017// TI - SpamSpotter: an efficient spammer detection framework based on intelligent decision support system on facebook JO - J Appl Soft Comput VL - 67 ID - Shailendra2017 ER - TY - JOUR AU - Shailendra, R. AU - Sharma, P. K. AU - Park, J. H. PY - 2017 DA - 2017// TI - XSSClassifier: an efficient XSS attack detection approach based on machine learning classifier on SNSs JO - J Inform Process Syst VL - 13 ID - Shailendra2017 ER - TY - JOUR AU - Shailendra, R. AU - Park, J. H. PY - 2017 DA - 2017// TI - Semi-supervised learning based distributed attack detection framework for IoT JO - J Appl Soft Comput VL - 72 ID - Shailendra2017 ER - TY - JOUR AU - Siddeeq, Y. AU - Shayma, W. PY - 2014 DA - 2014// TI - Firewall and VPN investigation on cloud computing performance JO - Int J Comput Sci Eng Survey VL - 5 UR - https://doi.org/10.5121/ijcses.2014.5201 DO - 10.5121/ijcses.2014.5201 ID - Siddeeq2014 ER - TY - JOUR AU - Ljubomir, M. V. AU - Milan, D. S. AU - Aleksandar, S. AU - Zoran, D. P. PY - 2019 DA - 2019// TI - Influence of encryption algorithms on power consumption in energy harvesting systems JO - J Sens VL - 10 ID - Ljubomir2019 ER - TY - JOUR AU - Arki, O. AU - Zitouni, A. AU - Dib, A. T. PY - 2018 DA - 2018// TI - A multi-agent security framework for cloud data storage JO - J Multiagent Grid Syst VL - 14 UR - https://doi.org/10.3233/MGS-180296 DO - 10.3233/MGS-180296 ID - Arki2018 ER - TY - CHAP AU - Megouache, L. AU - Zitouni, A. AU - Djoudi, M. ED - Silhavy, R. ED - Silhavy, P. ED - Prokopova, Z. PY - 2018 DA - 2018// TI - A new framework of authentication over cloud computing BT - Cybernetics approaches in intelligent systems. CoMeSySo 2017. Advances in intelligent systems and computing PB - Springer CY - Cham ID - Megouache2018 ER - TY - STD TI - Yu H, Powell N, Stembridge D, Yuan X (2012) Cloud computing and security challenges. In: proceeding ACM-SE of the 50th annual southeast regional conference, India, pp 298–300 ID - ref26 ER - TY - STD TI - Qamar N, Ana S, Eran E (2018) Securing DICOM images based on adaptive pixel thresholding approach, computer-based medical systems (CBMS). In: IEEE 31st international symposium pp 280–285 ID - ref27 ER - TY - STD TI - Ricardo M, Tiago O, Vinicius C, Nuno N, Alysson B (2019) CHARON: a secure cloud-of-clouds system for storing and sharing big data, In: IEEE transactions on cloud computing p 19–39 ID - ref28 ER - TY - JOUR AU - Thandeeswaran, R. AU - Subhashini, S. AU - Jeyanthi, N. AU - Saleem Durai, M. A. PY - 2012 DA - 2012// TI - Secured multi-cloud virtual infrastructure with improved performance JO - J Cybern Inf Technol VL - 12 ID - Thandeeswaran2012 ER - TY - STD TI - Gawannavar M, Mandulkar P, Thandeeswaran R, Jeyanthi N (2015) Office in cloud: approach to authentication and authorization. In: recent advances in communications and networking technology, Bentham sciences 4(1): 49–55 ID - ref30 ER - TY - JOUR AU - Venkat, R. K. AU - Avala, A. R. PY - 2013 DA - 2013// TI - Data integrity in multi-cloud storage international JO - J Sci Eng Adv Technol VL - 1 ID - Venkat2013 ER - TY - JOUR AU - Gu, K. AU - Yang, L. AU - Yin, B. PY - 2018 DA - 2018// TI - Location data record privacy protection based on differential privacy mechanism JO - Inf Technol Control VL - 47 ID - Gu2018 ER - TY - JOUR AU - Xie, K. AU - Ning, X. AU - Wang, X. AU - He, S. AU - Ning, Z. AU - Liu, X. AU - Qin, Z. PY - 2017 DA - 2017// TI - An efficient privacy-preserving compressive data gathering scheme in WSNs JO - Inf Sci VL - 390 UR - https://doi.org/10.1016/j.ins.2016.12.050 DO - 10.1016/j.ins.2016.12.050 ID - Xie2017 ER - TY - JOUR AU - Long, M. AU - Peng, F. AU - Li, H. Y. PY - 2018 DA - 2018// TI - Separable reversible data hiding and encryption for HEVC video JO - J Real-Time Image Process VL - 14 UR - https://doi.org/10.1007/s11554-017-0727-y DO - 10.1007/s11554-017-0727-y ID - Long2018 ER - TY - JOUR AU - Subhash, C. P. AU - Sumit, J. AU - Ravi, S. AU - Jyoti, C. PY - 2018 DA - 2018// TI - Access control framework using multi-factor authentication in cloud computing JO - Int J Green Comput VL - 121 ID - Subhash2018 ER - TY - STD TI - Vengie B (2018) Privacy, security and Encryption. https://www.webopedia.com/TERM/V/VPN.html. Accessed 22 Sep 2018 UR - https://www.webopedia.com/TERM/V/VPN.html ID - ref36 ER - TY - STD TI - Radford CJ (2017) Security in the multi cloud Era. In: Conference of the ComputerWeekly’s coverage. https://linkedin.com/pulse/security-multi-cloud-era-cj-radford-laura-fernandez-dela-torre. Accessed 31 Oct 2018 UR - https://linkedin.com/pulse/security-multi-cloud-era-cj-radford-laura-fernandez-dela-torre ID - ref37 ER - TY - STD TI - Avi K (2018) Public key cryptography and the Rsa algorithm, lecture note on computer and network security. http://engineerining.purdue.edu/kak/compsec/NewLectures/Lecture12.pdf. Accessed 22 Oct 2018 UR - http://engineerining.purdue.edu/kak/compsec/NewLectures/Lecture12.pdf ID - ref38 ER - TY - JOUR AU - Dave, K. PY - 2019 DA - 2019// TI - Micro- segmentation: securing complex cloud environments JO - Netw Secur VL - 3 ID - Dave2019 ER - TY - JOUR AU - Latha, K. PY - 2019 DA - 2019// TI - Sheela T (2019) Block based data security and data distribution on multi cloud environment JO - J Ambient Intell Hum Comput UR - https://doi.org/10.1007/s12652-019-01395-y DO - 10.1007/s12652-019-01395-y ID - Latha2019 ER - TY - STD TI - Chris C (2006) Introduction to the RSA and to authentication, MAT/CSC. https://nku.edu/christensen/section%2026%20RSA.pdf UR - https://nku.edu/christensen/section%2026%20RSA.pdf ID - ref41 ER - TY - JOUR AU - Basappa, B. AU - Kodada, B. B. AU - Prasad, G. AU - Pais, A. R. PY - 2012 DA - 2012// TI - Protection against DDoS and data modification attack in computational grid cluster environment JO - Int J Comput Netw Inf Secur VL - 2074 ID - Basappa2012 ER - TY - JOUR AU - Max, A. AU - Eric, V. AU - Nuno, N. AU - Fernando, M. V. PY - 2019 DA - 2019// TI - Secure multi-cloud network virtualization JO - Comput Netw VL - 661 ID - Max2019 ER - TY - JOUR AU - Jon, C. C. AU - Jennifer, M. S. PY - 2006 DA - 2006// TI - Prior family business exposure as inter-generational influence and entrepreneurial intent: a Theory of Planned Behavior approach JO - J Business Res Elsevier VL - 60 ID - Jon2006 ER - TY - STD TI - Pritee P, Mayuri S, Prakash K, Sakshi S (2014) Public auditing: cloud data storage. In: The 5th international conference-confluence, the next generation information technology summit. IEEE Explore, pp 169–173 ID - ref45 ER - TY - STD TI - Fernandez L, Serrano A, Lastra MG (2014) Nuevas fronteras en la investigación en emprendimiento y en la docencia del emprendimiento. In:Workshop de la Sección de Función Empresarial y Creación de Empresas de ACEDE pp 223–241 ID - ref46 ER - TY - JOUR AU - Schaarschmid, M. PY - 2012 DA - 2012// TI - Firms in open source software development: managing innovation beyond firm boundaries JO - Springer Books VL - 1007 ID - Schaarschmid2012 ER - TY - JOUR AU - Shailendra, R. AU - Arun, K. S. AU - Park, J. H. PY - 2018 DA - 2018// TI - A novel framework for internet of knowledge protection in social networking services JO - J Comput Sci VL - 26 UR - https://doi.org/10.1016/j.jocs.2017.12.010 DO - 10.1016/j.jocs.2017.12.010 ID - Shailendra2018 ER -