[1]Mandeep Kaur, and Manish Mahajan, “Implementing Various Encryption Algorithms to -Enhance The Data Security of Cloud in Cloud Computing”, International Journal of Computer Science &Information Technology Volume: 2, pp. 831-835, 2012.
[2]Wood K, Pereira E. (Nov.2010) 'An Investigation into CLoud Configuration and Security', 2010 International Conference for Internet Technology and Secured Transactions, 1-6.
[3]Expert Group Report, K. Jeffery [ERCIM], B. Neidecker-Lutz [SAP Research]: “The Future of Cloud Computing: Opportunities for European Cloud Computing Beyond “2010 (2010)Elsevier.
[4]Syed rizvi, Katie cover, Christopher gates, “A trusted third party(TTP) based encryption scheme for ensuring data confidentiality in cloud environment”, Procedia Computer Science 36 ( 2014 ) 381 – 386, Elsevier.
[5]Robert P. McEvoy, Francis M. Crowe Colin, CMurphyWilliam Marnane Optimisation of the SHA-2 Family of Hash Functions on FPGAs” March 2, 2006. ISBN: 0-7695-2533-4 pp: 317-322 Elsevair.
[6]Musa, M., Schaefer, E. F., and Wedig, S. 2003. ”A Simplified AES Algorithm and its Linear and Differential Cryptanalysis,” Cryptologia 27(2), 148 - 177.
[7]Krešimir Popović, Željko Hocenski” Cloud computing security issues and challenges” MIPRO 2010, May 24-28, 2010, Opatija, Croatia.
[8]Ranjit Kaur, Raminder Pal Singh ”Enhanced Cloud Computing Security andIntegrity Verification via Novel Encryption Techniques” 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[9]Stallings, W. 2002. ”The Advanced Encryption Standard,” Cryptologia 26(3), 165 - 188. University of Texas.
[10]Anthony T.Velte, Toby J.Velte, Robert Elsenpeter” Cloud Computing A Practical Approach”, TATA McGRAW-HILL Edition 2010.
[11]Mr. Bhavesh Rahulkar#1, Mr. Praveen Shende#2” Data Encryption by Blowfish Encryption Algorithm to Protect Data in Public Cloud" International Journal of Research in Advent Technology, Vol.2, No.7, July 2014 E-ISSN: 2321-9637.
[12]Bruce Schneier, Dr. Dobb's” The Blowfish Encryption Algorithm” Journal, v.19, n. 4, April 1994, pp. 38-40.
[13]G. Manikandanet al., “A Hybrid Approach for Security Enhancement by Modified Crypto-Stegno Scheme”, European Journal of Scientific Research, Vol. 2, pp: 206-212, 2011.
[14]Manpreet kaur, Hardeep Singh “A Review of Cloud Computing Security Issues” I.J. Education and Management Engineering, 2015, 5, 32-41.
[15]Published Online October 2015 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2015.05.04.
[16]Sumit Goyal “Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review” International Journal of Computer Network and Information Security(IJCNIS) ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online) DOI: 10.5815/ijcnis Published By: MECS Publisher.
[17]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem” Innovative Method for Enhancing Key Generation and Management in the AES-Algorithm” International Journal of Computer Network and Information Security(IJCNIS) ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online) DOI: 10.5815/ijcnisPublished By: MECS Publisher.
[18]Seyyed Yasser hashemi, Parisa Sheykhi Hesarlo” Security, Privacy and Trust Challenges in Cloud Computing and Solutions” I.J. Computer Network and Information Security, 2014, 8, 34-40.
[19]Published Online July 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2014.08.05.