ISECT, 2014b. ISO / IEC 27018 : 2014 — Information
technology — Security techniques — Code of practice
for protection of Personally Identifiable Information (
PII ) in public clouds acting as PII processors, 27001–
27003.
ISO/IEC, 2016. ISO/IEC 27000:2016(en), Information
technology — Security techniques — Information
security management systems — Overview and
vocabulary [online]. Available from:
https://www.iso.org/obp/ui/#iso:std:iso-iec:27000:ed-
4:v1:en [Accessed 1 Jan 2019].
Mapp, G., Aiash, M., Ondiege, B., and Clarke, M., 2014.
Exploring a New Security Framework for Cloud
Storage Using Capabilities. In Proceedings - IEEE 8th
International Symposium on Service Oriented System
Engineering (SOSE), 484–489.
Marlinspike, M., 2009. More Tricks For Defeating SSL In
Practice. Black Hat USA.
Mell, P. and Grance, T., 2009. The NIST Definition of
Cloud Computing. National Institute of Standards and
Technology, 53 (6).
Merkle, R. C., 1988. A Digital Signature Based on a
Conventional Encryption Function. Crypto, 10.
Mertens, D. M., 2010. Publishing Mixed Methods
Research. Journal of Mixed Methods Research, 5, 3–6.
Miller, R., 2013. How Dropbox Stores Stuff for 200 Million
Users. Data Center Knowledge, 2013–2016.
Myagmar, S., Lee, A. J., and Yurcik, W., 2005. Threat
Modeling as a Basis for Security Requirements. In
Proceedings of the 2005 ACM Workshop on Storage
Security and Survivability (StorageSS ’05), 94–102.
NIST, 2013a. Security and Privacy Controls for Federal
Information Systems and Organizations. National
Institute of Standards and Technology (NIST) Special
Publication 800-53 Revision 4.
Popa, R. A., Lorch, J. R., Molnar, D., Wang, H. J., &
Zhuang, L. 2011, June. Enabling Security in Cloud
Storage SLAs with CloudProof. In USENIX Annual
Technical Conference (Vol. 242, pp. 355-368).
Ryan, M. D., 2013. Cloud Computing Security: The
Scientific Challenge, and a Survey of Solutions. Journal
of Systems and Software, 86 (9), 2263–2268.
Satran, J., Meth, K., Sapuntzakis, C., and Chadalapaka, M.,
2004. Internet Small Computer Systems Interface
(iSCSI) [online]. Available from:
http://www.ietf.org/rfc/rfc3720.txt [Accessed 5 Jan
2019].
Shaikh, F. B. and Haider, S., 2011. Security Threats in
Cloud Computing. 6th International Conference on
Internet Technology and Secured Transactions, Abu
Dhabi, UAE, (December), 11–14
Stefanov, E., van Dijik, M., Juels, A., & Oprea, A., 2012,
December. Iris: A scalable cloud file system with
efficient integrity checks. In Proceedings of the 28th
Annual Computer Security Applications Conference
(pp. 229-238). ACM.
Swiderski, F. and Snyder, W., 2004. Threat Modeling.
Microsoft Press.
Tabachnick, B. G. and Fidell, L. S., 2007. Multivariate
Analysis of Variance and Covariance. Using
Multivariate Statistics, 3, 402–407.
Tawalbeh, O., Darwazeh, N. S., Al-Qassas, R. S., &
AlDosari, F. (2015). A secure cloud computing model
based on data classification. Procedia Computer
Science, 52, 1153-1158.
Vaquero, L. M., Rodero-Merino, L., Caceras, J., and
Lindner, M., 2009. A Break in the Clouds: Towards a
Cloud Definition. ACM SIGCOMM Computer
Communication Review, 39 (1), 50–55.
Vrable, M., Savage, S., and Voelker, G. M. G., 2012.
Bluesky: A Cloud-Backed File System for
the Enterprise. Fast ’12 [online], 19. Available from:
http://cseweb.ucsd.edu/~voelker/pubs/blueskyfast12.pdf%
5Cnhttp://static.usenix.org/event/fast12/tech/full_pape
rs/Vrable.pdf%5Cnhttp://
dl.acm.org/citation.cfm?id=2208461.2208480.
Vu, Q. H., Colombo, M., Asal, R., Sajjad, A., El-Moussa,
F. A., and Dimitrakos, T., 2015. Secure Cloud Storage:
A Framework for Data Protection as a Service in the
Multi-Cloud Environment. 2015 IEEE Conference on
Communications and NetworkSecurity, CNS 2015,
638–642.
Weiss, A., 2007. Computing in the Clouds. netWorker
Magazine - Cloud computing: PC functions move onto
the web, (Volume II, Issue 4), 16–25.
Wu, J., Ping, L., Ge, X., Ya, W., and Fu, J., 2010. Cloud
storage as the Infrastructure of Cloud Computing. In:
Proceedings - 2010 International Conference on
Intelligent Computing and Cognitive Informatics,
ICICCI 2010. 380–383.
Yao, C., Xu, L., and Huang, X., 2013. A Secure Cloud
Storage System from Threshold Encryption.
Proceedings - 5th International Conference on
Intelligent Networking and Collaborative Systems,
INCoS 2013, 541–545.
Zhao, R. and Yue, C., 2014. Toward a Secure and Usable
Cloud-Based Password Manager for Web Browsers.
Computers & Security, 46, 32–47.
Zhou, L., Varadharajan, V., and Hitchens, M., 2013.
Achieving Secure Role-Based Access Control on
Encrypted Data in Cloud Storage. Information
Forensics and Security, IEEE Transactions on, 8 (12),
1947–1960.
Zikmund, W., Babin, B., Carr, J., and Griffin, M., 2012.
Business Research Methods. 9th ed. Cengage Learning.
Zissis, D. and Lekkas, D., 2012. Addressing Cloud
Computing Security Issues. Future Generation
Computer Systems, 28 (3), 583–592.
IoTBDS 2019 - 4th International Conference on Internet of Things, Big Data and Security
314