@incollection{, 603175C988FD09783D53886A883B13CE , author={{KoushikAkkinapalli} and {R. RajeswaraRao} and {SITAM}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}14214 } @book{b0, , title={{computing security requirements and solutions: systematic literature review by Patrick Honer}} , publisher={University of Twente} } @book{b1, , title={{Revisiting cloud security issues and challenges by vaishali singh and s.k.pandey on}} , year={July2013} } @book{b2, , title={{Cloud computing security issues and challenges by kuyoro s.o.ibikunle f,awodele o}} } @book{b3, , title={{Improving security and efficiency for multi-authority access control system in cloud storage by}} , editor={Qi Li JianfengMa Rui Li Ximeng Liu Jinbo Xiong} , year={November 18, 2013} } @book{b4, , title={{Secure role based data access control in cloud computing by v.satya preiya, r.pavitra and dr}} , year={june 2011} } @book{b5, , title={{Towards securing apis in cloud computing by kumar gunjan, r.k.tiwari and g.sahoo}} } @book{b6, , title={{Enhancing security for secure cloud computing environment by divya chaudary on}} , year={august 2013} } @book{b7, , title={{Secure virtualization for cloud environment using hypervisor based technology by farzad sabahi, member IEEE on}} , year={February 2012} } @book{b8, , title={{Improving Virtualization security by splitting Hypervisor into smaller components by wuqiong pan, yulong zhang}} , note={meng yu and jiwu jing} }