@incollection{, 4E408ACB4449EE0CB5FAE401FBC5E005 , author={{AmanpreetKaur} and {GauravRaj} and {Lovely Professional University, India}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}13316 } @incollection{b0, , title={{Cloud computing Benefits, risks, recommendations for information security cloud computing}} , author={{ B } and { R }} , journal={{ENISA}} , year={2009} } @book{b1, , author={{ RPBalachandra Reddy Kandukuri }} , title={{Cloud Security Issues. International Conference on Services Computing}} , publisher={IEEE} , year={2009} } @book{b2, , title={{}} , author={{ CGentry }} , year={2009} } @incollection{b3, , title={{Analysis and research about cloud computing security protect policy}} , author={{ YHHaoyong Lv }} , booktitle={{International Conference on Intelligence Science and Information Engineering}} , publisher={IEEE} , year={2011} } @incollection{b4, , title={{Cloud computing and security challenges}} , author={{ HuimingYu } and { NP }} , booktitle={{50th Annual Southeast Regional Conference}} , publisher={ACM} , year={2012} } @incollection{b5, , title={{On Technical security Issues in Cloud Computing}} , author={{ JSJensen }} , booktitle={{IEEE page(s) 109-116. International Conference on Cloud Computing}} , publisher={IEEE} , year={2009} } @incollection{b6, , title={{A survey of risks, threats and vulnerabilities in cloud computing}} , author={{ BMKamal Dahbur }} , booktitle={{Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications}} the 2011 International Conference on Intelligent Semantic Web-Services and Applications , publisher={ACM} , year={2011} } @incollection{b7, , title={{Implementing DES Algorithm in Cloud for Data Security}} , author={{ NJKaur }} , journal={{VSRD International Journal of Computer Science & Information Technology}} , year={2012} } @book{b8, , author={{ LCLi-Qin Tian }} , title={{Evaluation of user behavior trust in cloud computing. International Conference}} , publisher={IEEE} , year={2010} } @book{b9, , title={{A Comprehensive Approach to Ensure Secure Data Communication Communication Software and Networks}} , author={{ MSudha } and { DR }} , year={2010} , publisher={IEEE} } @book{b10, , title={{cloud computing security management. Engineering systems management and its application}} , author={{ CYSameera Abdulrahman Almulla }} , year={2011} } @book{b11, , title={{Computing, Modern Encryption Techniques for Cloud}} , author={{ SherifEl-Etriby } and { EM }} , year={2012} } @incollection{b12, , title={{Cloud computing: security risk}} , author={{ LSumter }} , booktitle={{Proceedings of the 48th Annual Southeast Regional Conference}} the 48th Annual Southeast Regional Conference , publisher={ACM} , year={2010} } @incollection{b13, , title={{Managing a security program in a cloud computing environment}} , author={{ MTownsend }} , booktitle={{Information Security Curriculum Development Conference}} , publisher={ACM} , year={2009} } @incollection{b14, , title={{}} , journal={{Cloud Environment. International Journal of Computer Applications}} } @incollection{b15, , title={{Implementing Various Encryption Algorithms to Enhance the Data Security of Cloud in Cloud Computing}} , author={{ MKMahajan }} , journal={{VSRD International Journal of Computer Science and Information Technology}} , year={2012} } @incollection{b16, , title={{A Layered Security Approach for Cloud Computing Infrastructure}} , author={{ JHMehmet Yildiz }} , booktitle={{10th International Symposium on Pervasive Systems, Algorithms and Networks}} , publisher={IEEE} , year={2009} } @incollection{b17, , title={{On Technical security Issues in Cloud Computing}} , author={{ JSMeiko Jensen }} , booktitle={{International Conference on Cloud Computing}} , publisher={IEEE} , year={2009} } @incollection{b18, , title={{Using Multi Shares for Ensuring Privacy in Database-as-a-Service}} , author={{ EPMohammed Abdullatif Alzain }} , booktitle={{44th Hawaii International Conference on System Sciences}} , publisher={ACM} , year={2011} } @incollection{b19, , title={{Security on BCCP through AES Encryption Technique}} , author={{ NSRaj }} , journal={{International Journal of Engineering Science & Advanced Technology}} , year={2012} } @book{b20, , author={{ FSabahi }} , title={{cloud computing security threats and responses. 3rd International Conference on}} , year={2011} }