[1. Hudic, A., S. Islam, P. Kieseberg, S. Rennert, E. R. Weippl. Data Confidentiality Using Fragmentation in Cloud Computing. – International Journal of Pervasive Computing and Communications, Vol. 9, March 2013, Issue 1, pp. 37-5110.1108/17427371311315743]Search in Google Scholar
[2. Talib, A. M. Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment. – Journal of Information Security, 2015, Issue 6, pp. 118-130.10.4236/jis.2015.62013]Search in Google Scholar
[3. Liu, C., R. Ranjan, C. Yang, X. Zhang, L. Wang, J. Chen. MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. – IEEE Transactions on Computers, Vol. 64, 2015, Issue 9, pp. 2609-2622.10.1109/TC.2014.2375190]Search in Google Scholar
[4. Wang, C., S. S. M. Chow, Q. Wang, K. Ren, W. Lou. Privacy-Preserving Public Auditing for Secure Cloud Storage. – IEEE Transactions on Computers, Vol. 62, 2013, Issue 2, pp. 362-375.10.1109/TC.2011.245]Search in Google Scholar
[5. Yuan, D., X. Song, Q. Xu, M. Zhao, X. Wei, H. Wang, H. Jiang. An ORAM-Based Privacy Preserving Data Sharing Scheme for Cloud Storage. – Journal of Information Security and Applications, Elsevier, Vol. 39, 2018, pp. 1-9.10.1016/j.jisa.2018.01.002]Search in Google Scholar
[6. Liu, H., P. Zhang, J. Liu. Public Data Integrity Verification for Secure Cloud Storage. – Journal of Networks, Vol. 8, February 2013, Issue 2, pp. 373-380.10.4304/jnw.8.2.373-380]Search in Google Scholar
[7. Tian, H., Y. Chen, C.-C. Chang, H. Jiang, Y. F. Huang, Y. Chen, J. Liu. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage. – IEEE Transactions on Services Computing, Vol. PP, 2016, Issue 99, pp. 1-14.]Search in Google Scholar
[8. Liu, J. K., K. Liang, W. Susilo, J. Liu, Y. Xiang. Two-Factor Data Security Protection Mechanism for Cloud Storage System. – IEEE Transactions on Computers, Vol. 65, 2016, Issue 6, pp. 1992-2004.10.1109/TC.2015.2462840]Search in Google Scholar
[9. Hur, J., D. Koo, Y. Shin, K. Kang. Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage. – IEEE Transactions on Knowledge and Data Engineering, Vol. 28, 2016, Issue 11, pp. 3113-3125.10.1109/TKDE.2016.2580139]Search in Google Scholar
[10. Batra, K., C. Sunitha, S. Kumar. An Effective Data Storage Security Scheme for Cloud Computing. – International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, June 2013, Issue 4, pp. 808-815.]Search in Google Scholar
[11. Han, K., Q. Li, Z. Deng. Security and Efficiency Data Sharing Scheme for Cloud Storage. – Chaos, Solitons and Fractals, Vol. 86, May 2016, pp. 107-116.10.1016/j.chaos.2016.02.010]Search in Google Scholar
[12. Zhou, L., V. Varadharajan, M. Hitchens. Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage. – IEEE Transactions on Information Forensics and Security, Vol. 10, 2015, Issue 11, pp. 2381-2395.10.1109/TIFS.2015.2455952]Search in Google Scholar
[13. Guo, L., W.-C. Yau. Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs In Cloud Storage. – Journal of Medical Systems, Springer, Vol. 39, February 2015, Issue 11, pp. 1-11.10.1007/s10916-014-0178-y25634700]Search in Google Scholar
[14. Sookhak, M., A. Gania, M. K. Khan, R. Buyya. Dynamic Remote Data Auditing for Securing Big Data Storage In Cloud Computing. – Information Sciences, Elsevier, Vol. 380, 2017, pp. 101-116.10.1016/j.ins.2015.09.004]Search in Google Scholar
[15. Usman, M., M. A. Jan, X. He. Cryptography-Based Secure Data Storage and Sharing Using HEVC and Public Clouds. – Information Sciences, Elsevier, 2016.10.1016/j.ins.2016.08.059]Search in Google Scholar
[16. Chen, R., Y. Mu, G. Yang, F. Guo, X. Wang. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage. – IEEE Transactions on Information Forensics and Security, Vol. 11, 2016, Issue 4, pp. 789-798.10.1109/TIFS.2016.2599293]Search in Google Scholar
[17. Yoo, S. M., J. Kim, J. H. Park, J. Nam, J. C. Ryou. Ownership-Guaranteed Security Framework for the Private Data in the Entrusted Management Environment. – Cluster Computing, Springer, Vol. 18, September 2015, Issue 3, pp. 1251-1261.10.1007/s10586-015-0474-4]Search in Google Scholar
[18. Sahana, S., R. Bose, D. Sarddar. Harnessing RAID Mechanism for Enhancement of Data Storage and Security on Cloud. – Brazilian Journal of Science and Technology, Springer, December 2016.10.1186/s40552-016-0024-5]Search in Google Scholar
[19. Khedkar, S. V., A. D. Gawande. Data Partitioning Technique to Improve Cloud Data Storage Security. – International Journal of Computer Science and Information Technologies, Vol. 5, 2014, Issue 3, pp. 3347-3350.]Search in Google Scholar
[20. Jiang, T., X. Chena, J. Li, D. S. Wongc, J. Maa, J. K. Liu. Towards Secure and Reliable Cloud Storage against Data Re-Outsourcing. – Future Generation Computer Systems, Elsevier, Vol. 52, November 2015, pp. 86-94.10.1016/j.future.2014.11.002]Search in Google Scholar
[21. Wang, W., P. Li, L. Han, S. Huang, K. Xu, C. Yu, J. Lei1. An Enhanced Erasure Code-Based Security Mechanism for Cloud Storage. – Mathematical Problems in Engineering, Hindawi Publishing Corporation, Vol. 2014, 2014, Article ID 293214, pp. 1-8.10.1155/2014/293214]Search in Google Scholar
[22. Wang, X. A., F. Xhafa, W. Cai, J. Ma, F. Wei. Efficient Privacy Preserving Predicate Encryption with Fine-Grained Searchable Capability for Cloud Storage. – Computers & Electrical Engineering, Elsevier, Vol. 56, November 2016, pp. 871-883.10.1016/j.compeleceng.2016.05.012]Search in Google Scholar
[23. Zhang, Y., C. Xu, H. Li, X. Liang. Cryptographic Public Verification of Data Integrity for Cloud Storage Systems. – IEEE Cloud Computing, Vol. 3, 2016, Issue 5, pp. 44-52.10.1109/MCC.2016.94]Search in Google Scholar
[24. Chen, Y.-J., L.-C. Wang, C.-H. Liao. Eavesdropping Prevention for Network Coding Encrypted Cloud Storage Systems. – IEEE Transactions on Parallel and Distributed Systems, Vol. 27, 2016, Issue 8, pp. 2261-2273.10.1109/TPDS.2015.2486772]Search in Google Scholar
[25. Munoz, C., P. Leone. Fragmented-Iterated Bloom Filters for Routing in Distributed Event-Based Sensor Networks. – In: International Conference on Internet and Distributed Computing Systems, Springer, Cham, 2015, pp. 248-261.10.1007/978-3-319-23237-9_22]Search in Google Scholar
[26. Alosaimi, W., M. Zak, K. Al-Begain, R. Alroobaea, M. Masud. Mitigation of Distributed Denial of Service Attacks in the Cloud. – Cybernetics and Information Technologies, Vol. 17, 2017, Issue 4, pp. 32-51.10.1515/cait-2017-0040]Search in Google Scholar
[27. Govinda, K., E. Sathiyamoorthy. Privacy Preservation of a Group and Secure Data Storage in Cloud Environment. – Cybernetics and Information Technologies, Vol. 15, 2015, Issue 1, pp. 46-54.10.1515/cait-2015-0005]Search in Google Scholar
[28. Brindha, K., N. Jeyanthi. Secured Document Sharing Using Visual Cryptography in Cloud Data Storage. – Cybernetics and Information Technologies, Vol. 15, 2015, Issue 4, pp. 111-123.10.1515/cait-2015-0058]Search in Google Scholar
[29. Li, Y., B. Dong. The Algebraic Operations and Their Implementation Based on a Two-Layer Cloud Data Model. – Cybernetics and Information Technologies, Vol. 16, 2016, Issue 6, pp. 5-26.10.1515/cait-2016-0074]Search in Google Scholar
[30. Tu, S.-S., S.-Z. Niu, M.-J. Li. An Efficient Access Control Scheme for Cloud Environment. – Cybernetics and Information Technologies, Vol. 13, 2013, Issue 3, pp. 77-90.10.2478/cait-2013-0027]Search in Google Scholar