References
- Asaad, R. R., & Abdulnabi, N. L. (2018). Using local searches algorithms with Ant colony optimization for the solution of TSP problems. Academic Journal of Nawroz University, 7(3), 1–6. https://doi.org/10.25007/ajnu.v7n3a193
- Barolli, L., Xhafa, F., & Conesa, J. (2017). Advances on broad-band wireless computing, Communication and applications. Springer.
- Chibani, S. S., & Tari, A. (2017). Elephant herding optimization for service selection in qos-aware web service composition. Int. J. Comput. Electr. Autom. Control Inf. Eng, 11(10), 1063–1067.https://doi.org/10.5281/zenodo.1132309
- Joshi, M., Joshi, K., & Finin, T. (2018, July 2–7). Attribute based encryption for secure access to cloud based EHR systems. 2018 IEEE 11th International Conference on cloud computing (CLOUD) (pp. 932–935). IEEE.
- Mahendiran, N. S., & Sairam, N. (2012). A review on leaders in cloud computing service providers and cloud SQL a case study. Res. J. Appl. Sci. Eng. Technol, 4(17), 2926–2933.
- Pavani, V., Krishna, P. S., Gopi, A. P., & Narayana, V. L. (2020). Secure data storage and accessing in cloud computing using enhanced group-based cryptography mechanism. Materials Today: Proceedings.
- Prabha, K. M., & Saraswathi, P. V. (2020). Suppressed K-anonymity multi-factor authentication based schmidt-Samoa cryptography for privacy preserved data access in cloud computing. Computer Communications, 158, 85–94. https://doi.org/10.1016/j.comcom.2020.04.057
- Rajathi, A., & Saravanan, N. (2013). A survey on secure storage in cloud computing Indian. Journal of Science and Technology, 6(4), 4396–4401. https://doi.org/10.17485/ijst/2013/v6i4.24
- Sandra Durcevic. (2020). “Cloud Computing Risks, Challenges & Problems Businesses Are Facing,” Business Intelligence, 2019. [Online]. Available: https://www.datapine.com/blog/cloud-computing-risks-and-challenges/. [Accessed: 22-Feb2020].
- Sanka, S., Hota, C., & Rajarajan, M. (2010a, December 15–17). Secure data access in cloud computing. 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and application.
- Sanka, S., Hota, C., & Rajarajan, M. (2010b, December 15–17). Secure data access in cloud computing. 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application.
- Saravanan, N., & Umamakeswari, D. A. (2020). Lattice based access control for protecting user data in cloud environments with hybrid security. Computers & Security, 100, 102074. https://doi.org/10.1016/j.cose.2020.102074
- Shah, M. A., Swaminathan, R., & Baker, M. (2008). Privacy-Preserving audit and extraction of digital contents. IACR Cryptol, 1–21. https://eprint.iacr.org/2008/186/20080429:152215
- Suganthan, P., Hansen, N., Liang, J., Deb, K., Chen, Y., Auger, A., & Tiwari, S. (2005). Problem definitions and evaluation criteria for the CEC 2005 special session on real-parameter optimization. Nanyang Technological University.
- Suresha, K., Vijayakarthick, P., Dhanasekaran, S., & Murugan, B. S. (2021). Threshold secret sharing and multi-authority-based data access control in cloud computing. Materials Today: Proceedings.
- Wang, G., Deb, S., & Coelho, L. (2015, December 7–9). Elephant herding optimization. 3rd International Symposium on computational and Business Intelligence (ISCBI), Bali, Indonesia.
- Wang, G., Deb, S., Zhao, X., & Cui, Z. (2016). A new monarch butterfly optimization with an improved crossover operator. Operational Research, 18(3), 731–755. https://doi.org/10.1007/s12351-016-0251-z
- Wang, G. G., Coelho, L. D. S., Gao, X. Z., & Deb, S. (2017). A new metaheuristic optimisation algorithm motivated by elephant herding behaviour. International Journal of Bio-Inspired Computation, 8(6), 394–409. https://doi.org/10.1504/IJBIC.2016.081335
- Wang, Q., Wang, C., Li, J., Ren, K., & Lou, W. (2009). Enabling public verifiability and data dynamics for storage security in cloud computing. In European symposium on research in computer security (Vol. 5789, pp. 355–370). Springer. https://doi.org/10.1007/978-3-642-04444-1_22
- Wobst, R. (2001). “The Advanced Encryption Standard (AES): The Successor of DES,” 2001.
- Xue, J., & Zhang, J. J. (2010). “A brief survey on the security model of cloud computing,” in Proceedings - 9th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, DCABES 2010, 2010,.