1 J. E. Smith, "The architecture of virtual machines" 38 (38): 32-38, 2005
2 M. Chase, "Structured encryption and controlled disclosure" Springer Berlin Heidelberg 577-594, 2010
3 H. Takabi, "Securecloud: Towards a comprehensive security framework for cloud computing environments" IEEE 393-398, 2010
4 A. Majumder, "Secure data communication and cryptography based on DNA based message encoding" IEEE 360-363, 2014
5 N. Cao, "Privacy-preserving multi-keyword ranked search over encrypted cloud data" 25 (25): 222-233, 2014
6 Gartner, "Newsroom: Consumers Will Store More Than a Third of Their Digital Content in the Cloud by 2016"
7 T. L. Saaty, "Multiple criteria decision analysis: state of the art surveys, vol. 78" Springer 345-405, 2005
8 S. Venkatesan, "Multi-agent based dynamic data integrity protection in cloud computing" Springer Berlin Heidelberg 76-82, 2011
9 A. Khalifa, "High-capacity DNA-based steganography" IEEE BIO-76-BIO-80, 2012
10 R. Buyya, "Gridsim : A toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing" 14 (14): 1175-1220, 2002
1 J. E. Smith, "The architecture of virtual machines" 38 (38): 32-38, 2005
2 M. Chase, "Structured encryption and controlled disclosure" Springer Berlin Heidelberg 577-594, 2010
3 H. Takabi, "Securecloud: Towards a comprehensive security framework for cloud computing environments" IEEE 393-398, 2010
4 A. Majumder, "Secure data communication and cryptography based on DNA based message encoding" IEEE 360-363, 2014
5 N. Cao, "Privacy-preserving multi-keyword ranked search over encrypted cloud data" 25 (25): 222-233, 2014
6 Gartner, "Newsroom: Consumers Will Store More Than a Third of Their Digital Content in the Cloud by 2016"
7 T. L. Saaty, "Multiple criteria decision analysis: state of the art surveys, vol. 78" Springer 345-405, 2005
8 S. Venkatesan, "Multi-agent based dynamic data integrity protection in cloud computing" Springer Berlin Heidelberg 76-82, 2011
9 A. Khalifa, "High-capacity DNA-based steganography" IEEE BIO-76-BIO-80, 2012
10 R. Buyya, "Gridsim : A toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing" 14 (14): 1175-1220, 2002
11 C. Wang, "Ensuring data storage security in cloud computing" 1-9, 2009
12 Q. Wang, "Enabling public auditability and data dynamics for storage security in cloud computing" 22 (22): 847-859, 2011
13 M. R. Abbasy, "Enabling data hiding for resource sharing in cloud computing environments based on dna sequences" 385-390, 2011
14 R. Chen, "Dual-server public-key encryption with keyword search for secure cloud storage" 11 (11): 789-798, 2016
15 L. Pray, "Discovery of DNA structure and function : Watson and Crick" 1 (1): 100-, 2008
16 N. Kar, "Data security and cryptography based on DNA sequencing" 10 (10): 2013
17 A. Atito, "DNA-based data encryption and hiding using playfair and insertion techniques" 2 (2): 44-, 2012
18 S. Marwan, "DNA-based cryptographic methods for data hiding in DNA media" 150 : 110-118, 2016
19 A. Majumdar, "DNA-based cryptographic approach toward information security" Springer India 209-219, 2014
20 A. Gehani, "DNA-based Cryptography" 167-188, 1999
21 S. Pramanik, "DNA cryptography" IEEE 551-554, 2012
22 X. Wang, "DNA computing-based cryptography" 1-3, 2009
23 S. Kamara, "Cryptographic cloud storage" Springer Berlin Heidelberg 136-149, 2010
24 J. Spillner, "Creating optimal cloud storage systems" 29 (29): 1062-1072, 2013
25 C. Balding, "Cloud Security" 2008
26 A. T. Velte, "Cloud Computing : A Practical Approach" McGraw-Hill 44-, 2010
27 H. Cui, "Attribute-based cloud storage with secure provenance over encrypted data" 79 : 461-472, 2018
28 B. Dong, "An optimized approach for storing and accessing small files on cloud storage" 35 (35): 184-1862, 2012
29 S. Sadeg, "An encryption algorithm inspired from DNA" IEEE 344-349, 2010
30 M. Toorani, "A secure variant of the Hill cipher" 313-316, 2009
31 S. K. Sood, "A secure dynamic identity based authentication protocol for multi-server architecture" 34 (34): 609-618, 2011
32 Z. Xia, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data" 27 (27): 340-352, 2016
33 S. K. Sood, "A combined approach to ensure data security in cloud computing" 35 (35): 1831-1838, 2012
34 P. Prasad, "3 dimensional security in cloud computing" 198-201, 2011