Identifying and Analyzing the Transient and Permanent Barriers for Big Data Journal of Engineering Science and Technology, 2016. 11(12):1793 – 1807 identifying_and_analyzing_security_threats_to.pdf
Design and Implementation of a Privacy Preserved Off-Premises Cloud Storage Journal of Computer Science, 2014. 10(2):210-223. DOI: 10.3844/jcssp.2014.210.223 design_and_implementation_of_a_privacy.pdf
A Study on Significance of Adopting Cloud Computing Paradigm in Healthcare Sector Cloud Computing Technologies, Applications and Management (ICCCTAM), 2012 International Conference on, 65–68. DOI:10.1109/ICCCTAM.2012.6488073. a_study_on_significance_of_adopting_cloud.pdf
Cloud Implementation Security Challenges Cloud Computing Technologies, Applications and Management (ICCCTAM), 2012 International Conference on, 174–178. DOI:10.1109/ICCCTAM.2012.648809 cloud_implementation_security_challenges.pdf
Identifying and Analyzing Security Threats to Virtualized Cloud Computing Infrastructures Cloud Computing Technologies, Applications and Management (ICCCTAM), 2012 International Conference on, 151–155. DOI:10.1109/ICCCTAM.2012.6488089 identifying_and_analyzing_security_threats_to.pdf
Towards an Efficient and Secure Educational Platform on Cloud Infrastructure Cloud Computing Technologies, Applications and Management (ICCCTAM), 2012 International Conference on, 145–150. DOI:10.1109/ICCCTAM.2012.6488088 towards_an_efficient_and_secure_educational.pdf