[1] M. T. Khorshed, A. B. M. S. Ali, and S. A. Wasimi, “A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing,” Futur. Gener. Comput. Syst., vol. 28, no. 6, pp. 833–851, 2012.
[2] M. Pathan, C. Vecchiola, and R. Buyya, “Load and proximity aware request-redirection for dynamic load distribution in peering CDNs,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 5331 LNCS, no. PART 1, pp. 62–81, 2008.
[3] T. Halabi and M. Bellaiche, “A broker-based framework for standardization and management of Cloud Security-SLAs,” Comput. Secur., vol. 75, pp. 59–71, 2018.
[4] E. Deepak Chowdary and D. Yakobu, “Cloud of Things (CoT) integration challenges,” 2016 IEEE Int. Conf. Comput. Intell. Comput. Res. ICCIC 2016, 2017.
[5] S. S. Chauhan, E. S. Pilli, R. C. Joshi, G. Singh, and M. C. Govil, “Brokering in interconnected cloud computing environments: A survey,” J. Parallel Distrib. Comput., 2018.
[6] A. J. Ferrer, “Inter-cloud Research: Vision for 2020,” Procedia Comput. Sci., vol. 97, pp. 140–143, 2016.
[7] S. Asad, M. Fatima, A. Saeed, and I. Raza, “Multilevel classification of security concerns in cloud computing,” Appl. Comput. Informatics, vol. 13, no. 1, pp. 57–65, 2017.
[8] Y. Sun, J. Zhang, Y. Xiong, and G. Zhu, “Data Security and Privacy in Cloud Computing,” vol. 2014, 2014.
[9] B. T. Rao, “A Study on Data Storage Security Issues in Cloud Computing,” Procedia - Procedia Comput. Sci., vol. 92, pp. 128–135, 2016.
[10] R. Wang, “Research on data security technology based on cloud storage,” Procedia Eng., vol. 174, pp. 1340–1355, 2017.
[11] N. Hidayah, A. Rahman, and K. R. Choo, “ScienceDirect A survey of information security incident handling in the cloud,” Comput. Secur., vol. 49, pp. 45–69, 2014.
[12] S. Singh, Y. Jeong, and J. Hyuk, “Author ’ s Accepted Manuscript A Survey on Cloud Computing Security : Issues , Threats , and Solutions,” J. Netw. Comput. Appl., 2016.
[13] R. Bhadauria, “Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques.”
[14] M. Usman, M. Ahmad, and X. He, “Cryptography-based secure data storage and sharing using HEVC and public clouds,” Inf. Sci. (Ny)., vol. 387, no. 2017, pp. 90–102, 2019.
[15] M. Vijayalakshmi, D. Yakobu, D. Veeraiah, and N. G. Rao, “Automatic healing of services in cloud computing environment,” Proc. 2016 Int. Conf. Adv. Commun. Control Comput. Technol. ICACCCT 2016, no. 978, pp. 740–745, 2017.
[16] Gowthami Garikapati, Yakobu D, "An Analysis of Cloud Data Security Issues Mechanisms" “ijpam.eu,” vol. 116, no. 6, pp. 141–147, 2017.
[17] C. Systems, “A Hybrid Secure Mechanism for Effective Storage Confidentiality to Ensure Data Integrity and Privacy in Public Cloud,” vol. 11, pp. 330–339, 2019.
[18] B. Hashemzade and A. Maroosi, “Hybrid Obfuscation Using Signals and Encryption,” J. Comput. Networks Commun., vol. 2018, pp. 1–6, 2018.
[19] N. Jorstad and T. Landgrave, “Cryptographic algorithm metrics,” … 20th Natl. Inf. Syst. …, 1997.
[20] A. Ghosh and A. Saha, “A N UMERICAL M ETHOD B ASED E NCRYPTION,” pp. 149–157, 2013.
[21] M. Horvath and L. Butty, “The Birth of Cryptographic Obfuscation – A Survey –,” vol. 116675, no. 116675, pp. 1–59, 2018.
[22] T. S. Murthy, N. P. Gopalan, and D. Yakobu, “An Efficient un-realization algorithm for privacy preserving decision tree learning using McDiarmid ’ s bound,” no. 4, pp. 499–502.
[23] P. Examiner and A. W. Johns, “(12) United States Patent,” vol. 2, no. 12, 2010.
[24] L. H. I. B, F. Giunchiglia, L. A. Martucci, and R. Chenu-abente, “Privacy and Identity Management. Time for a Revolution?,” vol. 476, no. 600854, pp. 343–358, 2016.
[25] S. Arul Oli and Dr. L. Arockiam, “Confidentiality Technique for Data Stored in Public Cloud Storage,” Int. J. Eng. Res., vol. V5, no. 02, pp. 169–174, 2016.
[26] K. Bock and S. M. Garnsey, “Language Processing,” A Companion to Cogn. Sci., pp. 226–234, 2008.
[27] N. A. Lewinski and B. T. McInnes, “Using natural language processing techniques to inform research on nanotechnology,” Beilstein J. Nanotechnol., vol. 6, no. 1, pp. 1439–1449, 2015.
[28] S. Hohenberger, G. N. Rothblum, A. Shelat, and V. Vaikuntanathan, “Securely obfuscating re-encryption,” J. Cryptol., vol. 24, no. 4, pp. 694–719, 2011.
[29] G. Ravikumar, “Design of data masking architecture and analysis of data masking techniques for testing,” Int. J. Eng. Sci. Technol., vol. 3, no. 6, pp. 5150–5159, 2011.
[30] S. Sun, C. Luo, and J. Chen, “A review of natural language processing techniques for opinion mining systems,” Inf. Fusion, vol. 36, pp. 10–25, 2017.
[31] M. Sevenster, J. Buurman, P. Liu, J. F. Peters, and P. J. Chang, “Natural language processing techniques for extracting and categorizing finding measurements in narrative radiology reports,” Appl. Clin. Inform., vol. 6, no. 3, pp. 600–610, 2015.
[32] Vijaya Lakshmi Paruchuri. Data Confidentiality in Cloud using Encryption Algorithms. International Journal of Cloud-Computing and Super-Computing. Vol. 3. No. 2. Dec. 2016.GVPress. pp:7-18.http://dx.doi.org/10.21742/IJCS.2016.3.2.02.
[33] S. Suresh Babu and Chimili Ankapanaidu. New Proof Methods for Improving Privacy and Security by using Abe. International Journal of Cloud-Computing and Super-Computing. Vol. 3. No. 1. Jun. 2016.GVPress. pp:1-6.http://dx.doi.org/10.21742/IJCS.2016.3.1.01.
[34] Durga Bhavani Dasari.Cloud-Based Venue Recommendation Framework. International Journal of Cloud-Computing and Super-Computing. Vol. 4. No. 1. Jun. 2017.GVPress. pp:21-26.http://dx.doi.org/10.21742/IJCS.2017.4.1.04.
[35] P. Harika, N.T hirupathi Rao.A Survey on Cloud Computing – Investigative Points, Confronts, Design and Applications. International Journal of Cloud-Computing and Super-Computing. Vol. 5. No. 1. Jun. 2018.GVPress. pp:9-16.http://dx.doi.org/10.21742/IJCS.2018.5.1.02.
[36] Anil Bamwal and Asit Dwivedi. Effective Management of Security of Risk in Cloud Computing Environment. International Journal of Private Cloud Computing Environment and Management. Vol. 3. No. 1. Apr. 2016.GVPress. pp:1-10.http://dx.doi.org/10.21742/IJPCCEM.2016.3.1.01.
[37] S Rithika. Issues on Developing Interoperable Cloud Applications. International Journal of Private Cloud Computing Environment and Management. Vol. 4. No. 1. Apr. 2017.GVPress. pp:9-14.http://dx.doi.org/10.21742/IJPCCEM.2017.4.1.02.
[38] K Praveen Kumar. Performing Initiative Data Prefetching in File Systems for Cloud Computing. International Journal of Private Cloud Computing Environment and Management. Vol. 4. No. 1. Apr. 2017.GVPress. pp:15-20.http://dx.doi.org/10.21742/IJPCCEM.2017.4.1.03.
[39] T. Ravi Kumar. Advanced Approach and Management in Cloud Trust. International Journal of Urban Design for Ubiquitous Computing. Vol. 4. No. 2. Sep. 2016.GVPress. pp:7-12.http://dx.doi.org/10.21742/IJUDUC.2016.4.2.02.
[40] Deduplicating Data in Cloud. International Journal of Advanced Research in Big Data Management System. Vol. 1. No. 1. Jun. 2017.GVPress. pp:31-38.http://dx.doi.org/10.21742/IJARBMS.2017.1.1.04.
[41] N.S.P. Bhargavi. Service Scheme for Data Cloud Services. International Journal of Advanced Research in Big Data Management System. Vol. 1. No. 1. Jun. 2017.GVPress. pp:45-50.http://dx.doi.org/10.21742/IJARBMS.2017.1.1.06.
[42] D. Yakobu, Hemanth Kumar Kalluri, Venkatesulu Dondeti, "An Enhanced Secure, Robust and Efficient CryptoScheme for Ensuring Data Privacy in Public Cloud using Obfuscation & Encryption ", Nov. 2019, https://doi.org/10.18280/isi.