1. Bala, B., Kamboj, L., Luthra, P., 2018. Secure file storage in cloud computing using hybrid cryptography algorithm. International Journal of Advanced Research in Computer Science 9 (2). 
  2. Dorri, A., Kanhere, S. S., Jurdak, R., 2016. Blockchain in internet of things: challenges and solutions. arXiv preprint arXiv:1608.05187.
  3. Dorri, A., Kanhere, S. S., Jurdak, R., Gauravaram, P., 2017. Blockchain for iot security and privacy: The case study of a smart home. In: Pervasive Computing and Com-munications Workshops (PerCom Workshops), 2017 IEEE International Conference on. IEEE, pp. 618–623.
  4. Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., Sassone, V., 2017. Blockchain-based database to ensure data integrity in cloud computing environments.
  5. Garay, J., Kiayias, A., Leonardos, N., 2015. The bitcoin backbone protocol:  Analysis and applications. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp. 281–310.
  6. Gervais, A., Karame, G. O., Capkun, V., Capkun, S., 2014. Is bitcoin a decentralized currency? IEEE security & privacy 12 (3), 54–60.
  7. Ghanbari, S., Othman, M., 2012. A priority based job scheduling algorithm in cloud computing. Procedia Engineering 50 (1), 778–785.
  8. Goyal, V., Kant, C., 2018. An effective hybrid encryption algorithm for ensuring cloud data security. In: Big Data Analytics. Springer, pp. 195–210.
  9. Jain, P., Pandey, U. K., 2018. Trending security mechanism in cloud computing. Tech-nology 9 (3), 250–258.
  10. Khaleel, M., Zhu, M., 2018. Efficient and fair bandwidth scheduling in cloud environments. ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY 6 (2), 20–26.
  11. Khaleel, M., Zhu, M. M., Sep. 2015. Energy-aware job management approaches for workflow in cloud. In: 2015 IEEE International Conference on Cluster Computing. pp. 506–507.
  12. Khanezaei, N., Hanapi, Z. M., 2014. A framework based on rsa and aes encryption algorithms for cloud computing services. In: Systems, Process and Control (ICSPC), 2014 IEEE Conference on. IEEE, pp. 58–62.
  13. Lopez-Falcon, E., Tchernykh, A., Chervyakov, N., Babenko, M., Nepretimova, E., Miranda-L´opez, V., Drozdov, A. Y., Radchenko, G., Avetisyan, A., 2018. Adaptive encrypted cloud storage model. In: Young Researchers in Electrical and Electronic Engineering (EIConRus), 2018 IEEE Conference of Russian. IEEE, pp. 329–334.
  14. Mahajan, P., Sachdeva, A., 2013. A study of encryption algorithms aes, des and rsa for security. Global Journal of Computer Science and Technology.
  15. Modi, K. J., Kapadia, N., 2019. Securing healthcare information over cloud using hybrid approach. In: Progress in Advanced Computing and Intelligent Engineering. Springer, pp.    63–74.
  16. Moghaddam, F. F., Karimi, O., Alrashdan, M. T., 2013. A comparative study of applying real-time encryption in cloud computing environments. In: Cloud Networking (CloudNet), 2013 IEEE 2nd International Conference on. IEEE, pp. 185–189.
  17. Moghaddam, F. F., Khanezaei, N., Manavi, S., Eslami, M., Samar, A., 2014. Uaa: user authentication agent for managing user identities in cloud computing environments. In: Control and System Graduate Research Colloquium (ICSGRC), 2014 IEEE 5th. IEEE, pp 208–212.
  18. O’Dwyer, K. J., Malone, D., 2014. Bitcoin mining and its energy footprint.
  19. Park, J. H., Park, J. H., 2017. Blockchain security in cloud computing: Use cases, challenges, and solutions. Symmetry 9 (8), 164.
  20. Roy, D., Das, P., 2018. A modified rsa cryptography algorithm for security enhance-ment in vehicular ad hoc networks. In: Proceedings of the International Conference on Computing and Communication Systems. Springer, pp. 641–653.
  21. Selvanayagam, J., Singh, A., Michael, J., Jeswani, J., Secure file storage on cloud using cryptography. International Research Journal of Engineering and Technology.
  22. Singh, S., Maakar, S. K., Kumar, D. S., 2013. A performance analysis of des and RSA cryptography. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 2 (3).
  23. Sood, S. K., 2012. A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications 35 (6), 1831–1838.
  24. Stergiou, C., Psannis, K. E., Kim, B.-G., Gupta, B., 2018. Secure integration of IoT and cloud computing. Future Generation Computer Systems 78, 964–975.
  25. Tosh, D. K., Shetty, S., Liang, X., Kamhoua, C. A., Kwiat, K. A., Njilla, L., 2017. Security implications of blockchain cloud with analysis of block withholding attack. In: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE Press, pp. 458–467.
  26. Venkatesh, M., Sumalatha, M., SelvaKumar, C., 2012. Improving public auditability, data possession in data storage security for cloud computing. In: Recent Trends In Information Technology (ICRTIT), 2012 International Conference on. IEEE, pp. 463– 467.
  27. Wang, C., Wang, Q., Ren, K., Lou, W., 2009. Ensuring data storage security in cloud computing. In: Quality of Service, 2009. IWQoS. 17th International Workshop on. Ieee, pp. 1–9.
  28. Xu, J., Chang, E.-C., Zhou, J., 2013. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM, pp. 195–206.