Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations

Cloud computing is becoming increasingly important in Information Technology (IT) as an enabler for improved productivity, efficiency and cost reduction. It is expected to offer benefits for public sector organisations and government agencies. Cloud computing has the potential to improve the reliabi...

Full description

Saved in:
Bibliographic Details
Main Author: Al-Zaidi., Qusay Kanaan Kadhim
Format: Thesis
Language:English
English
Published: 2019
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/24855/1/Security%20Risk%20Issues%20And%20Controls%20For%20Cloud%20Computing%20In%20Iraqi%20Government%20Organisations.pdf
http://eprints.utem.edu.my/id/eprint/24855/2/Security%20Risk%20Issues%20And%20Controls%20For%20Cloud%20Computing%20In%20Iraqi%20Government%20Organisations.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utem-ep.24855
record_format uketd_dc
institution Universiti Teknikal Malaysia Melaka
collection UTeM Repository
language English
English
advisor Yusof, Robiah

topic T Technology (General)
T Technology (General)
spellingShingle T Technology (General)
T Technology (General)
Al-Zaidi., Qusay Kanaan Kadhim
Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations
description Cloud computing is becoming increasingly important in Information Technology (IT) as an enabler for improved productivity, efficiency and cost reduction. It is expected to offer benefits for public sector organisations and government agencies. Cloud computing has the potential to improve the reliability and scalability of IT systems, which in tum allows organisations such as Iraqi governments to focus on their core business and strategy development and implementation. However, governments are still hesitant to adopt cloud computing because of fear for the confidentiality of their data. There are risks and barriers in adopting cloud computing in the Iraqi government whereby the top risk is security. Security issues, classified as the biggest concern, affect the growth of cloud computing technology of Iraqi government organisations. Therefore, this thesis aimed to investigate the Security Risk Issues (SRIs) that affect cloud computing adoption by the Iraqi government organizations. It also intends to investigate the Security Risk Controls (SRCs) that enhance the cloud computing adoption through mitigating the effect of SRIs. Mixed-methods were used to carry out the objectives of this thesis involving two steps; using qualitative and quantitative methods for the initial experiment and the quantitative and intelligent approach methods for the experimental stage. Based on the qualitative and quantitative method, 26 SRIs under 5 domains and 26 SRCs to mitigate the 5 domains were determined that affected the adoption of cloud computing in the Iraq government organisations. The quantitative and intelligent approach methods used in the experimental stage were to develop a conceptual framework security risk management process for identifying the best quality and most accurate SRCs for the 5 domains. In short, the results showed that 26 SRCs mitigate the 5 domains using three intelligent approaches namely SVMR, ANNPSO, ANFIS for easing the cloud computing adoption in the Iraq government organisations. This thesis produced a validated and an effective conceptual of security risks and controls for cloud computing.
format Thesis
qualification_name Doctor of Philosophy (PhD.)
qualification_level Doctorate
author Al-Zaidi., Qusay Kanaan Kadhim
author_facet Al-Zaidi., Qusay Kanaan Kadhim
author_sort Al-Zaidi., Qusay Kanaan Kadhim
title Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations
title_short Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations
title_full Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations
title_fullStr Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations
title_full_unstemmed Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations
title_sort security risk issues and controls for cloud computing in iraqi government organisations
granting_institution Universiti Teknikal Malaysia Melaka
granting_department Faculty of Information and Communication Technology
publishDate 2019
url http://eprints.utem.edu.my/id/eprint/24855/1/Security%20Risk%20Issues%20And%20Controls%20For%20Cloud%20Computing%20In%20Iraqi%20Government%20Organisations.pdf
http://eprints.utem.edu.my/id/eprint/24855/2/Security%20Risk%20Issues%20And%20Controls%20For%20Cloud%20Computing%20In%20Iraqi%20Government%20Organisations.pdf
_version_ 1747834097401593856
spelling my-utem-ep.248552022-03-16T15:19:37Z Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations 2019 Al-Zaidi., Qusay Kanaan Kadhim T Technology (General) TK Electrical engineering. Electronics Nuclear engineering Cloud computing is becoming increasingly important in Information Technology (IT) as an enabler for improved productivity, efficiency and cost reduction. It is expected to offer benefits for public sector organisations and government agencies. Cloud computing has the potential to improve the reliability and scalability of IT systems, which in tum allows organisations such as Iraqi governments to focus on their core business and strategy development and implementation. However, governments are still hesitant to adopt cloud computing because of fear for the confidentiality of their data. There are risks and barriers in adopting cloud computing in the Iraqi government whereby the top risk is security. Security issues, classified as the biggest concern, affect the growth of cloud computing technology of Iraqi government organisations. Therefore, this thesis aimed to investigate the Security Risk Issues (SRIs) that affect cloud computing adoption by the Iraqi government organizations. It also intends to investigate the Security Risk Controls (SRCs) that enhance the cloud computing adoption through mitigating the effect of SRIs. Mixed-methods were used to carry out the objectives of this thesis involving two steps; using qualitative and quantitative methods for the initial experiment and the quantitative and intelligent approach methods for the experimental stage. Based on the qualitative and quantitative method, 26 SRIs under 5 domains and 26 SRCs to mitigate the 5 domains were determined that affected the adoption of cloud computing in the Iraq government organisations. The quantitative and intelligent approach methods used in the experimental stage were to develop a conceptual framework security risk management process for identifying the best quality and most accurate SRCs for the 5 domains. In short, the results showed that 26 SRCs mitigate the 5 domains using three intelligent approaches namely SVMR, ANNPSO, ANFIS for easing the cloud computing adoption in the Iraq government organisations. This thesis produced a validated and an effective conceptual of security risks and controls for cloud computing. 2019 Thesis http://eprints.utem.edu.my/id/eprint/24855/ http://eprints.utem.edu.my/id/eprint/24855/1/Security%20Risk%20Issues%20And%20Controls%20For%20Cloud%20Computing%20In%20Iraqi%20Government%20Organisations.pdf text en public http://eprints.utem.edu.my/id/eprint/24855/2/Security%20Risk%20Issues%20And%20Controls%20For%20Cloud%20Computing%20In%20Iraqi%20Government%20Organisations.pdf text en validuser https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=117107 phd doctoral Universiti Teknikal Malaysia Melaka Faculty of Information and Communication Technology Yusof, Robiah 1. Abd Elmonem, M.A., Nasr, E.S. and Geith, M.H., 2016. Benefits and challenges of cloud ERP systems - A systematic literature review. Future Computing and Informatics journal, l(1-2), pp.1-9. 2. Abdo, Kaouk, Flaus and Masse., 2018. A safety security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis. Computers and Security, 72, pp.175-195. 3. Adil Dheyab, Ibrahim Turki, A. and B. Rahmatullah, B.R., 2018. Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq. Journal ofSocial Sciences Research, (SPI6), pp.599-606. 4. Adjei, J., 2014. Explaining The Role of Trust in Cloud Service Acquisition. In 2014 IEEE International Conference on Mobile Cloud Computing, Services, and Engineering. pp. 283-288. 5. Aharned, J. and Iyengar, N., 2016. A Review on Distributed Denial of Service (DDoS) Mitigation Techniques in Cloud Computing Environment. International Journal of Security and Its Applications, 10(8), pp.277-294. 6. Ahmadalinejad, M. and Hashemi, S., 2015. A National Model to Supervise on Virtual Banking Systems through the Bank . Approach. ACSIJ Advances in Computer Science: an International Journal, 4(1), pp.83-93. 7. Ahmadi ,Reza Soleimani , Moonyong Lee , Tomoaki and Alireza Bahador., 2015. Determination of oil well production performance using artificial neural network (ANN) linked to the particle swarm optimization (PSO) tool. Petroleum, 1(2), pp.118-132. 8. Ahmed, Hussam Alddin Ali, Mohammed Hasan Kadhum, Laith Fadli, Mohamad Zolkipli, Bin Alsariera and Yazan., 2016. A Review of Challenges and Security Risks of Cloud Computing. Journal of Telecommunication, Electronic and Comptiter Engineering, 9(1), pp.87-91. 9. Ahmed, N. and Abraham, A,, 2013. Modeling Security Risk Factors in a Cloud Computing Environment. Journal of Information Assurance and Security, 8 (13), pp.279-289. 10. Ait El Mrabti, A1 Mokhtar,Ammari and Mina Montfort., 2016. New mechanism for Cloud Computing Storage Security Fragmentation-redundancy-scattering as security mechanism for Data Cloud Computing. International Journal of Advanced Computer Science and Applications, 7(7), pp.526-539. 11. Akinrolabu, O., New, S. and Martin, A., 2018. Cyber Supply Chain Risks in Cloud Computing - Bridging the Risk Assessment Gap. Open Journal of Cloud Computing, 5(l), pp.1-19. 12. Akshaya, V. and Purusothaman, T., 2016. Business Intelligent as a Service in Analysis of Academic Courses. International Journal of Applied Engineering Research, 11(4), pp.2458-2467. 13. Al-anzi, F., Yadav, S. and Soni, J., 2014. Cloud Computing: Security Model Comprising Governance, Risk Management and Compliance. In 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC),. pp. 1-6. 14. Al-anzi, F.S., Salman, A.A. and Jacob, N.K., 2014. New Proposed Robust, Scalable and Secure Network Cloud Computing Storage Architecture. Journal of Sofh~are Engineering and Applications, 7(May), pp.347-353. 15. Al-Attab, B.S. and Fadewar, H.S., 2014. Security Issues and Challenges in Cloud Computing. International Journal of Emerging Science and Engineering (IJESE), 2(7), pp.22-26. 16. Al-Dunainawi, Y., Abbod, M.F. and Jizany, A,, 2017. A new mimo antis-pso based narma-12 controller for nonlinear dynamic systems. Engineering Applications of Artificial Intelligent, 62(March), pp.265-275. 17. Al-ghanim, W.I., 2017. Relationship and Cloud Factors Affecting Government Confidence in The Public Cloud. International Journal of Research in Science and Technology, 7(May), pp.1-8. 18. Al-hakkak, N.M. and Ban, B.S., 2018. E-Government Public Cloud Model ( EGPCM ). Ibn Al-Haitham J. for Pure and Appl. Sci., 31(1), pp.244-259. 19. Al-Musawi, F., Al-Badi, A.H. and Ali, S., 2015. A Road Map to Risk Management Framework for Successful Implementation of Cloud Computing in Oman. In 2015 International Conference on Intelligent Networking and Collaborative Systems. pp. 417-422. 20. Al-Rashedi, A.A., 2014. E-Government Based on Cloud Computing and Service- Oriented Architecture. International Jozrrnal of Computer and Electrical Engineering, 6(3), pp.201-206. 21. Al-Ruithe, M. and Benkhelifa, E., 2017. Analysis and Classification of Barriers and Critical Success Factors for Implementing a Cloud Data Governance Strategy. Procedia Compzrter Science, 113, pp.223-232. 22. Al-Ruithe, M., Benkhelifa, E. and Hameed, K., 2016. A Conceptual Framework for Designing Data Governance for Cloud Computing. In Procedia Computer Science. pp. 160-167. 23. Al-Ruithe, M., Benkhelifa, E. and Hameed, K., 2018. Data governance taxonomy: Cloud versus non-cloud. Sustainability (Switzerland), 10(1), pp.1-26. 24. Al-Samarraie, H. and Saeed, N., 2018. A systematic review of cloud computing tools for collaborative learning: Opportunities and challenges to the blended-learning environment. Computers and Education, 124(March), pp.77-91. 25. Al-shargabi, B. and Sabri, O., 2016. A study of Adopting Cloud Computing from Enterprise Perspective using Delone and Mclean IS Success Model. International Journal ofcomputer Science andinformation Security, 14 Sl(February), pp. 28-32. 26. Alassafi, Madini O.Alharthi, Abdulrahman Walters and Robert J.Wills, Gary B., 2017. A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies. Telematics and Informatics, 33,(3), pp.996-1010. 27. Alassafi, Madini 0 . Alharthi, Abdulrahman Wills and Gary B., 2017. Security risk factors that influence cloud computing adoption in Saudi Arabia government agencies. (IJACSA) International Journal of Advanced Computer Science and Applications, 9(4), pp.121-129. 28. Alazzam, Malik Bader Basari, Abd Samad Hasan Sibghatullah, Abdul Samad Ramli, Mohamad Raziff Jaber and Mustafa Musa Naim, Mohd Hariz., 2016. Pilot study of EHRs acceptance in Jordan hospitals by UTAUT2. Journal of Theoretical and Applied Information Technology, 85(3), pp.378-393. 29. Alharthi, Abdulrahman Alassafi Madini. Walters and Robert J.Wills, Gary B., 2017. An exploratory study for investigating the critical success factors for cloud migration in the Saudi Arabian higher education context. Telernatics andInformatics, 34(2), pp.664678. 30. Alhomidi, M. and Reed, M., 2013. Security Risk Analysis as a Service. In 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013. pp. 156-161. 31. Ali Shrestha, Anup Soar, Jeffrey Wamba and Samuel Fosso., 2018. Cloud computingenabled healthcare opportunities, issues, and applications: A systematic review. International Journal of Information Management, 43(7), pp. 146-1 58. 32. Ali, A., Warren, D. and Mathiassen, L., 2017. Cloud-based business services innovation: A risk management model. International Journal of Information Management, 37(6), pp.639-649. 33. Ali, K.E., Mazen, S.A. and Hassanein, E.E., 2018. A proposed hybrid model for adopting cloud computing in e-government. Future Computing and Informatics Journal, 3(2), pp.286-295. 34. Ali, O., Soar, J. and Yong, J., 2016. An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments. Journal of Information Security andApplications, 27-28, pp.19-34. 35. Ali, W Hussin, B Othman, MFB Elzamly and Doheir, M., 2018. Identifying and Evaluating Critical Risks and Controls in The Implementation Of ERP Systems (Case Study In UAE). Jour of Adv Research in Dynamical and Control Systems, 10(4), 36. Alkhashai, H. and Omara, F., 2016. An Enhanced Task Scheduling Algorithm on Cloud Computing Environment. International Journal of Grid and Distributed Computing, 9(7), pp.91-100. 37. Alkhater, N., Walters, R. and Wills, G., 2018. An empirical study of factors influencing cloud adoption among private sector organisations. Telematics and Informatics, 35(1), pp.38-54. 38. Almarabeh, T., Majdalawi, Y.K. and Mohammad, H., 2016. Cloud Computing of EGovernment. Government. Commt~nicationsa ndNehvork, 08(01), pp.1-8. 39. Almunawar, M.N., 2015. Benefits and Issues of Cloud Computing for E-Government. Review ofPtrblic Administration and Management, 3(1), pp.1-9. 40. ALMutairi, N. and Fahad, S., 2015. Cloud Computing Uses for E-Government in the Middle East Region Opportunities and Challenges. International Jotrrnal of Bzlsiness and Management, 10(4), pp.60-69. 41. Alosaimi, R. and Alnuem, M., 2016. Risk Management Framework for Cloud Computing: A Critical Review. International Journal of Comptrter Science and Information Technology, 8(4), pp. 1-1 1. 42. Alsanea, M. and Barth, J., 2014. Factors Affecting the Adoption of Cloud Computing in the Government Sector: A Case Study of Saudi Arabia. International Journal of Clotrd Comptrting and Services Science (IJ-CLOSER), 7(1 O), pp. 1-1 6. 43. Alsanea, M. and Wainwright, D., 2014. Identifying the determinants of cloud computing adoption in a government sector - a case study of Saudi organisation. International jotrrnal of business and management studies, 6(2), pp.2943. 44. Alsheikh, Mohammad Abu Lin, Shaowei Niyato and Dusit Tan, Hwee-pink., 2015. Machine Learning in Wireless Sensor Networks: Algorithms , Strategies , and Applications.IEEE Communications, 16(4), pp. 1-23. 45. Alshomrani, S. and Qamar, S., 2013. Cloud Based E-Government: Benefits and Challenges. International Journal of Multidisciplinary Sciences and Engineering, 4(6), 46. Alsmadi, D. and Prybutok, V., 2018. Sharing and storage behavior via cloud computing: Security and privacy in research and practice. Computers in Hzrman Behavior, 85, pp.218-226. 47. Alzahrani, A., Alalwan, N. and Sarrab, M., 2014. Mobile Cloud Computing: Advantage, Disadvantage and Open Challenge. In Proceedings of the 7th Etrro American Conference on Telematics and Information Systems. pp. 4-7. 48. Amini, A. and Jamil, N., 2018. A Comprehensive Review of Existing Risk Assessment Models in Cloud Computing. Journal ofphysics. pp. 1-9. 49. Anand, A. and Suganthi, L., 2018. Hybrid GA-PSO optimization of Artificial Neural Network for forecasting electricity demand. Energies, 11(4), pp.1-15. 50. Anon, 2012. Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), pp.583-592. 51. Arianyan, E., Ahmadi, M. and Maleki, D., 2016. A Novel Taxonomy and Comparison Method for Ranking Cloud Computing Software Products. International Journal of Grid and Distributed Computing, 9(3), pp. 173-190. 52. Armbrust, Michael, Armando Griffith, ReanJoseph, Anthony Katz, Randy Konwinski, Andy Lee and Gunho Patterson David., 2010. A veiw of cloud computing. Communications of the ACM, 53(4), pp.50-58. 53. Arpaci, I. and Arpaci, I., 2017. Antecedents and consequences of cloud computing adoption in education to achieve knowledge management Computers in Human Behavior education to achieve knowledge management. Computers in Human Behavior, 70(February), pp.382-390. 54. Aruna, E., Shri, A. and Lakkshrnanan, A,, 2013. Security Concerns and Risk at Different Levels in Cloud Computing. In 2013 International Conference on Green Computing, Communication and conservation of Energy (ICGCE). pp. 743-746. 55. Arunkumar, G. and Venkataraman., N., 2015. A Novel Approach to Address Interoperability Concern in Cloud Computing. In Procedia Computer Science. Elsevier Masson, pp. 554-559. 56. Ata, R., 2016. Adaptive Neuro-Fuzzy Analysis of the Energy Obtained Depending on Wind Speed and Hub Height Ra~it.J ournal of Bartin University Engineering and Technological Science, 4(June), pp.8-13. 57. Atashi, Alireza Nazeri and Najmeh Abbasi, Ebrahim Dorr Sara., 2017. Breast Cancer Risk Assessment Using Adaptive Neuro-Fuzzy Inference System ( ANFIS ) and Subtractive Clustering Algorithm. Mzrltidisciplinary Cancer Investigation, 1(2), pp. 1-7. 58. Al Azzawy, D.S., 2017. Review on Challenges in Building Knowledge based Societies through E-Governance Framework: Technology and Management Issues from Global Perspective. Indian Journal of Science and Technologv, 10 (28), pp.1-7. 59. Baghban, A. and Adelizadeh, M., 2018. On the determination of cetane number of hydrocarbons and oxygenates using Adaptive Neuro Fuzzy Inference System optimized with evolutionary algorithms. Fuel, 230(May), pp.344-354. 60. Bajpai, R. and Bajpai, S., 2014. Goodness of Measurement: Reliability and Validity. International Journal of Medical Science and Public Health, 3(2), p.112. 61. Bamiah, &IB.ro,h i, S. and Chuprat, S., 2012. Cloud Implementation Security Challenges. In Proceedings of 2012lntemational of Cloud Computing, Technologies, Applications and Management. pp. 174-178. 62. Barafort, B., Mesquida, A.L. and Mas, A., 2018. Integrated risk management process assessment model for IT organisations based on IS0 31000 in an IS0 multi-standards context. Computer Standards and interfaces, 60 (April), pp.57-66. 63. Barros-Justo, J.L., Olivieri, D.N. and Pinciroli, F., 2018. An exploratory study of the standard reuse practice in a medium sized software development firm. Computer Standards and Interfaces, 6 (June 201 8), pp. 137-146. 64. Beckers, Kristian Kuster, Jan-Christoph Schmidt and Holger Fabender Stephan., 201 1. Pattern-Based Support for Context Establishment and Asset Identification of the IS0 27000 in the Field of Cloud Computing. In 2011 Sixth International Conference on Availability, Reliability and Security Pattern-Based. pp. 327-333. 65. Bemardo, D., 2013. Utilizing Security Risk Approach in Managing Cloud Computing Services. In 2013 16th International Conference on Network-Based Information Systems. pp. 119-125. 66. Bhattasali, Tapalina Saeed and Khalid Chaki, Nabendu Chaki, Ritupama., 2016. A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud. Publications, software Springer-Verlag Berlin Heidelberg, 11(1), pp.112-121. 67. Bitar, N., Gringeri, S. and Tiejun, J.X., 2013. Technologies and protocols for data center and cloud networking. IEEE Communications Magazine, 51 (9), pp.24-3 1. 68. Bleikertz, Toni Pieters and Wolter Pape, Sebastian Dimkov, Trajce., 2013. Defining the cloud battlefield: Supporting security assessments by cloud customers. In Proceedings of the IEEE International Conference on Cloud Engineering, IC2E 2013. pp. 78-87. 69. Bobade, A., 2015. Survey on Different Security Issues and Challenges in Cloud Computing for Multifarious Technology. International Journal ofEmerging Research in Management and Technolo~9,3 59(10), pp. 1 17-123. 70. Bodkhe, P.A.P., 2015. Cloud Computing Security : An Issue of Concern. International Journal of Advanced Research in Computer Science and Sofiware Engineering, 5(4), pp.1337-1342. 71. Bolarinwa, O., 2015. Principles and methods of validity and reliability testing of questionnaires used in social and health science researches. Nigerian Postgraduate Medical Journal, 22(4), pp.195-201. 72. Bouchenak, Sara Gheorghe, Gabriela Chockler, Gregory Chockler, and Hana Shraer, Alexander., 2013. Verifying Cloud Services: Present and Future. ACM SIGOPS Operating Systems Review, 27(2), pp.6-19. 73. Bounagui, , Mezrioui, and Hafiddi, H., 2019. Toward a unified framework for Cloud Computing governance: An approach for evaluating and integrating IT management and governance models. Computer Standards and Interfaces, 62(7), pp.98-I 18. 74. Brandis, Knud Dzombeta, Srdan and Ricardo Stantchev Vladimir., 2019. Governance, Risk, and Compliance in Cloud Scenarios. Applied Sciences, 9(2), pp. 1-21, 75. Brinkman, W.-P., 2009. Design of a Questionnaire Instrument. Handbook of Mobile Technology Research Methods, (December), pp.3 1-57. 76. Burnpus, W., 2013. NIST Cloud Computing Standards Roadmap. NIST Cloud Computing Standards, 2 (July), pp. 1-3. 77. Butterfield, R. and Markus Tauber., 2016. Towards Modelling a Cloud Application ' s Life Cycle Development Life Cycles. In CLOSER 2016 - 6th International Conference on Cloud Computing and Services Science. pp. 3 10-3 19. 78. Calmus, C.S., 2016. Account or Service Hijacking in Cloud Computing. In Sea-Conf 2016, At Constanta, Bucharest, Volume: "Mircea cel Batran" Naval Academy Scientific Bulletin. pp. 1-7. 79. Carroll, M., Merwe, A. and KotzC, P., 2011. Secure Cloud Computing: Benefits, Risks and Controls. In Information Security for South Africa, 9 (7), pp. 1-9. 80. Cayirci, E., 2013. Modeling and Simulation as A Cloud Service: A Survey. In Proceedings of the 2013 Winter Simulation Conference. pp. 389400. 81. Chandran, S. and Angepat, M., 2010. Cloud Computing: Analyzing the risks involved in cloud computing environments. Proceedings of Natural Sciences and Engineering, 8 (lo), pp.1-6. 82. Chang, V., Kuo, Y.H. and Ramachandran,. M., 2016. Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, pp.24-41. 83. Channe, Hemlata Kothari, Sukhesh Kadam and Dipali Professors, Assistant., 2015. Multidisciplinary Model for Smart Agriculture using Internet - of - Things ( IoT ), Sensors , Cloud - Computing , Mobile - Computing and Big -, Int.J.Compzrter Technology and Applications, 6(June), pp.374-382. 84. Charmian Schaller, 2004. Concepts of Model Verification and Validation. National Nuclear Securiiy (NNS))U, S, lO(October), pp.l-43. 85. Chen, Wei Di, Qinfeng Ye and Feng Zhang and Jingnan Wang, Wenchang., 2017. Flowing bottomhole pressure prediction for gas wells based on support vector machine and random samples selection. International Journal of Hydrogen Energy, 42(29), pp.18333-18342. 86. Chen, X., 2016. Research on Optimization of Bat Algorithm Based on Gauss Differential Mutation in the Cloud Computing Resources. International Journal of Grid and Distributed Computing, 9(4), pp.277-286. 87. Chen, X. and Huang, W., 2016. Research of Improved Shuffled Frog Leaping Algorithm in Cloud Computing Resources. International Journal of Grid and Distributed Computing, 9(3), pp.71-82. 88. Chen, X., Song, W. and Li, Z., 2016. Research of Resource Scheduling based on ACAGA in the Cloud Computing. International Journal of Grid and Distributed Computing, 9(6), pp.1-12. 89. Choi, M. and Lee, C., 2015. Information Security Management as a Bridge in Cloud Systems from Private to Public Organisations. Sustainability, 7(9), pp.12032-12051. 90. Churchill, A.G.J., 1999. Marketing Research: Methodological Foundation (7th Ed.). Hinsdale, IL: The Dryden Press. Cloud Security Alliance, 2013. The Notorious Nine. Cloud Computing Top Threats in 2013. Securify, The Notori(February), pp.1-14. 91. Coelho, S., 2018. Wind speed forecasting approach based on Singular Spectrum 92. Analysi and Adaptive Neuro Fuzzy Inference System. Renewable Energy, 126, pp.736-754. 93. Cusack, B. and Ghazizadeh, E., 2016. Evaluating single sign-on security failure in cloud services. Business Horizons, 59(6), pp.605414. 94. Dash, S. and Pani, S.K., 2016. E-Governance Paradigm Using Cloud Infrastructure: Benefits and Challenges. Procedia Computer Science, 5(7), pp.843-855. 95. Degen, R.J. and Mafla, 2017. Wisdom, Uncertainty, and Ambiguity in Management Decisions Based on Experiences and the Trustworthiness of Research Methods to Substantiate Them. Revista Ibero-Americana de Estrate'gia, 16(04), pp.06-22. 96. Dekker, D.M.A.C. and Dimitra, L. (ENISA), 2015. Cloud computing security risks and opportunities for SMEs, European Union Agency for Network and Information Sectrrily, 7(4), pp.1-50. 97. Deng, J. and Bian, Y., 2008. Constructing a Risk Management Mechanism Model of ERP Project Implementation. In Internatio~alC onference on Information Management, Innovation Management and Industrial Engineering. pp. 72-77. 98. Deshmukh, A., Janda, H.K. and Bhusari, S., 2015. Security on Cloud Using Cryptography. International Journal of Advanced Research in Computer Science and Sofhoare Engineering, 5(3), pp.558-561. 99. Dev, Himel Sen, Tanmoy Basak and Madhusudan Ali, Mohammed Eunus., 2012. An approach to protect the privacy of cloud data from data mining based attacks. In Proceedings - 2012 SC Companion: High Performance Computing, Networking Storage and Analysis, pp. 1106-1 115. 100. Devi, T. and Ganesan, R., 2015. Platform-as-a-Service (PaaS): Model and Security Issues. International Journal ofAdvances in Applied Sciences, 4(1), pp. 13-23. 101. Dhawan, G., 2017. Conceptualization of Cloud Computing and its Security Threats , Challenges , International Journal for Research in Applied Science and Engineering Technology (IJRASET), ~(Iv)p,p .629-635. 102. Diaz, Jos6 Acosta and Jesk GonzBlez, Rafael Cota, , Emesto., 2018. Modeling the control of the central nervous system over the cardiovascular system using support vector machines. Compzrters in Biology and Medicine, 93(March), pp.75-83. 103. Dinh, Hoang T Lee, Chonho Niyato and Dusit Wang, Ping., 2013. A Survey of Mobile Cloud Computing: Architecture , Applications , and Approaches. Wireless Communications and Mobile Computing, 4(5), pp.1-38. 104. Dongmei, Z. and Jinxing, L., 2018. Computers and Industrial Engineering Study on network security situation awareness based on particle swarm optimization algorithm. journal Computers and Industrial Engineering, 12(February), pp.764-775. 105. Drissi S. Houmani H., M.H., 2013. Survey: Risk Assessment for Cloud Computing. Intemational Jou of Advanced Computer Science and Applications, 4(12), pp.143-148. 106. El-sofany, H.F. and El-seoud, S.A., 2017. Studying Security of Data in Cloud Computing Through Cryptographic Approach. Springer International Publishing Interactive Collaborative Learning, Advances in Intelligent Systems and Computing, 544(August), pp.434444. 107. Elena, G. and Johnson, C.W., 2015. Actors Influencing Risk Acceptance Of C Loud Computing Services in The UK. International Journal on Cloud Computing: Services anddrchitecture, 5(2), pp.1-16. 108. Elzamly, A and Hussin, B., Naser, S.A., 2016. A new conceptual framework modelling for cloud computing risk management in banking organisations. International Journal of Grid and Distributed Computing, 9(9), pp. 137-1 54. 109. Elzamly, Abdelrafe Hussin, Burairah Naser, Samy Abu Khanfar, Khalid Doheir and Mohamed Selamat Ali ., 2016. A new conceptual framework modelling for cloud computing risk management in banking organisations. International Journal of Grid and Distributed Computing, 9(9), pp.137-154. 110. Elzamly, Abdelrafe Hussin, Burairah Naser, Samy Shibutani and Tadahiro Doheir, Mohamed., 2017. Predicting Critical Cloud Computing Security Issues using Artificial Neural Network (ANNs) Algorithms in Banking Organisations. International Journal of Information Technology and Electrical Engineering, 6(2), pp.4045. 111. Elzamly, A. and Hussin, B., 2015. Classification and Identification of Risk Management for Mitigating Risks with Factor Analysis Technique in Software Risk Management. Review of Computer Engineering Research, 2(1), pp.22-38. 112. Elzamly, A. and Hussin, B., 2015. Modelling and evaluating software project risks with quantitative analysis techniques in planning software development. Journal of Computing and Information Technology, 2, pp. 123-1 39. 113. Elzamly, A. and Hussin, B., 2016. Quantitative and intelligent risk models in risk management for constructing software development projects: A review. International Journal of Software Engineering and its Applications, 10(2), pp.9-20. 114. Elzamly, A., Hussin, B. and Salleh, N.M., 2016. Top Fifty Software Risk Factors and the Best Thirty Risk Management Techniques in Software Development Lifecycle for Successful Software Projects. International Journal of Hybrid Information Technology, 9(6), pp.11-32. 115. Emam, F.M.A. and A.Z., 2014. A Review of Security Risk Assessment Methods in Cloud Computing. Springer International Publishing Switzerland, pp.443453. 116. Faraj, A.F., Ghassan, P. and Abdulmajeed, H., 2015. Design and Implementation of Ehealth over Private Cloud Computing. International Journal of Enhanced Research in Science Technology and Engineering, 4(1), pp.119-129. 117. Fazio, Maria Celesti and Antonio Villari, Massimo Puliafito, Antonio l., 2015. How to enhance cloud architectures to enable cross-federation: Towards interoperable storage providers. In Proceedings - 2015 IEEE International Conference on Cloud Engineering, IC2E 2015. pp. 480486. 118. Fermeiro, J. B.L.Pombo, J. A.N.Calado and M. R.A. Mariano, S. J.P.S.., 2017. A new controller for DC-DC converters based on particle swarm optimization. Applied So$ Computing Journal, 52, pp.418434. 119. Fesl, Jan Cehtik, Jifi Doleialovi and Marie JaneEek, Jan., 2016. CloudEVBench - Virtualization Technology Efficiency Testing Tool for the Distributed Infrastructures. International Journal of Grid and Distributed Computing, 9(8), pp.249-260. 120. Forsythe, Laura P. Frank, Lori B. Hemphill and Rachel Tafari, A. Tsahai Szydlowski, Victoria Lauer, Michael., 2018. Researchers, Patients, and Stakeholders Evaluating Comparative-Effectiveness Research: A Mixed-Methods Study of the PCORI Reviewer Experience. Value in Health, 21 (1 O), pp. 1 161-1 167. 121. Gan, Q. and Zheng, J., 2016. A New Algorithm to Improve Efficiency of Resource Scheduling in Clouding Computing Based on Extended Support Vector Machine. International Journal of Grid and Distributed Computing, 9(3), pp. 125-1 34. 122. Garg, D., Sidhu, J. and Rani, S., 2019. A multi-criteria decision making for research productivity in cloud security. Computer Standards and Interfaces, 5(1 I), pp.1-18. 123. Garro, B.A. and Vazquez, R.A., 2015. Designing Artificial Neural Networks Using Particle Swarm Optimization Algorithms. Hindawi Publishing Corporation Computational Intelligent and Neuroscience, 201 5, pp.1-20. 124. Gavrilov, G. and Trajkovik, V., 2012. Security and Privacy Issues and Requirements for Healthcare Cloud Computing. ICT Innovations 2012 Web Proceedings, pp. 143-152. 125. Ghazaryan, V. and TarnoSitinaite, R., 2014. Cloud Computing Development in Armenia. Social Technologies, 4(1), pp. 11 8-1 38. 126. Gholami, A. and Laure, E., 2015. Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recent Developments. Computer Science and Information Technology, 3(5), pp.131-150. 127. Ghosh, M.M.A., Atallah, R.R. and Naser, S.S.A., 2016. Secure Mobile Cloud Computing for Sensitive Data: Teacher Services for Palestinian Higher Education Institutions. International Journal of Grid and Distributed Computing, 9(2), pp. 17-22. 128. Goettelmann, E., Mayer, N. and Godart, C., 2014. Integrating Security Risk Management into Business Process Management for the Cloud. 2014 IEEE 16th Conference on Business Informatics, pp.86-93. 129. Gonzales, Daniel Kaplan, Jeremy Saltzman, Evan Winkelman and Zev Woods, Dulani., 2017. Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds. IEEE Transactions on Cloud Computing, 5(3), pp.523-536. 130. Goyal, S., 2014. Public vs Private vs Hybrid vs Community-Cloud Computing: A Critical Review. International Journal of Computer Network and Information Security, 6(3), pp.20-29. 131. Grance, P.M.T., 2011. The NIST Definition of Cloud Computing. NIST National Institute of Standards and Technology Gaithersburg, (NIST Special Publication 800- 145), pp.1-7. 132. Grant, J.S., and Davis, L.T., 1997. SeIection and use of content experts for instrument development. Res. Nurs. Health, 20(3), pp.269-274. 133. Griffiths, M.D. and Szabo, A., 2014. Is excessive online usage a function of medium or activity. Journal of Behavioral Addictions, 3(1), pp.74-77. 134. Grozev, N. and Buyya, R., 2014. Multi-Cloud Provisioning and Load Distribution for Three-Tier. ACM Transactions on Autonomous and Adaptive Systems, 9(3), pp. 13-2 1. 135. Gurd, B. and Helliar, C., 2017. Looking for leaders: Balancing innovation, risk and management control systems. British Accounting Review, 49(1), pp.91-102. 136. HA, Aziz and Guled., 2016. Cloud Computing and Healthcare Services. Journal of Biosensors and' Bioelectronics, 7(3), pp. 133-1 39. 137. Habib, A., 2013. The Relational Analysis and Effect Of Risk Management Techniques On Project Outcomes In Development Sector: A Case Of NGOs and INGOs In Pakistan. journal of business economics andpolitical science, 2(4), pp.91-105. 138. Haghiabi, A.H., Parsaie, A. and Ememgholizadeh, S., 2018. Prediction of discharge coefficient of triangular labyrinth weirs using Adaptive Neuro Fuzzy Inference System. Alexandria Engineering Journal, 57(3), pp.1773-1782. 139. Halabi, T. and Bellaiche, M., 2018. A broker-based framework for standardization and management of Cloud Security-SLAs. Computers and Security, 75, pp.59-71. 140. Hamada, M. and Hassan, M., 2018. Artificial Neural Networks and Particle Swarm Optimization Algorithms for Preference Prediction in Multi-Criteria Recommender Systems. Journal Informatics, 5(2), pp.1-16. 141. Harfoushi, Osarna Alfawwaz, Bader Ghatasheh and Obiedat, Ruba Abu-Faraj, Mua'ad M. Faris, Hossarn ., 2014. Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review. Communications and Network, 06(01), pp.15-21. 142. Hashemi, S., 2013. Cloud Computing Technology for Egovernment Architecture. Ciencias de la Information, 3(6), pp. 15-23. 143. Hashim, H.S., Hassan, Z. Bin and Hashim, AS., 2015. The Benefits and Challenges of Cloud Computing Adoption on Iraqi Universities: Results from an Empirical Study. JASR Journal ofApplied Sciences Research, 1 1(13), pp. 14-21. 144. Hazarika, P., Baliga, V. and Tolety, S., 2014. The Mobile-Cloud Computing (MCC) Roadblocks. In 2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN). pp. 1-5. 145. Hemanth Chakravarthy, M. and Kannan, E., 2014. A review on secured cloud computing environment. American Journal ofApplied Sciences, 11 (8), pp.1224-1228. 146. Henshel, D. Cains, M. Hoffman and. Kelley, T., 2015. Trust as a Human Factor in Holistic Cyber Security Risk Assessment. Procedia Manufacturing, 3(1), pp.1117-1124. 147. Hewlett, D. and Brown, L., 2018. Planning for tranquil spaces in rural destinations through mixed methods research. Tourism Management, 67, pp.237-247. 148. Hon, W.K. and Millard, C., 2018. Banking in the cloud: Part 2 -regulation of cloud as 'outsourcing.' Computer Law and Security Review, 34(2), pp.337-357. 149. Hong, Zhang Xin and Li Yan-ju, I U Cheng, Li., 2016. Research on Cloud Resource Section Method for the Multi-layer Ontology. International Journal of Grid and Distributed Computing, 9(1), pp.193-200. 150. Hongxia, W., 2016. Application of VCG in Replica Placement Strategy of Cloud Storage. International Journal of Grid and Distributed Computing, 9(4), pp.27-40. 151. Hu, Y., Peng, C. and Bai, G., 2015. Sharing health data through hybrid cloud for selfmanagement. In 2015 IEEE International Conference on Multimedia and Expo Workshops, ICMEW2015, pp. 9-14. 152. Huth, Michael Bumap and David Stacy Radanliev, Petar., 2018. Future developments in cyber risk assessment for the internet of things. Computers in Industry, 102, pp.14-22. IBM Institute, 2017. Redefining Connections: Insights from the Global C-suite Study - The CIO perspective. Global Risk Community, 5 May(l8), pp.1-20. 153. Ibrahim, A.A., Cheruiyot, D.W. and Kimwele, D.M.W., 2017. Data Security in Cloud Computing with Elliptic Curve Cryptography. International Journal of Computer (IJC), 26(l), pp.1-14. 154. Imam, F.T., 2016. Application of Ontologies in Cloud Computing: The State-Of-The-Art. arxiv journal, 6(10), pp. 1-13. 155. Inuwa, U.N., 2015. The Risk and Challenges of Cloud Computing Usman. Journal of Engineering Research and Applications, 5(12), pp.5-10. 156. Irfan, Mahroosh Usman, Muhammad Zhuang and Yan Fong, Simon., 2015. A Critical Review of Security Threats in Cloud Computing. In 2015 3rd International Symposium on Compzttational and Business Intelligent (ISCBI). pp. 105-1 1 1. 157. Islam, Shareeful Fenz, Stefan Weippl, Edgar Mouratidis and Haralambos., 2017. A Risk Management Framework for Cloud Migration Decision Support. Journal of Risk and Financial Management, 10(10), pp.1-24. 158. Islam, Shareeful Fenz, Stefan Weippl and Edgar Kalloniatis, Christos., 2016. Migration Goals and Risk Management in Cloud Computing: A Review of State of the Art and Survey Results on Practitioners. International Journal of Secure Soffware Engineering (IJSSE), 7(3), pp.44-73. 159. Jahan, A. and Edwards, K.L., 2015. A state-of-the-art survey on the influence of normalization techniques in ranking: Improving the materials selection process in engineering design. journal Materials and Design, 65, pp.335-342. 160. Jai Venkat, V. and Kunnumal, D., 2014. Cloud-Enabled Enterprise Transformation : Driving Agility , Innovation and Growth. Keep Challenging, (March), pp.1-14. 161. Jakimoski, K., 2016. Security techniques for data protection in cloud computing. International Journal of Grid and Distributed Computing, 9(1), pp.49-56. 162. Jamali, Behnam Rasekh, Mohamad Jamadi, Farnaz Gandomkar and Ramin Makiabadi, Faezeh., 2018. Using PSO-GA algorithm for training artificial neural network to forecast solar space heating system parameters. Journal Applied Thermal Engineering, 147(10), pp.647-660. 163. Jana, D.K. and Ghosh, R., 2018. Novel interval type-2 fuzzy logic controller for improving risk assessment model of cyber security. Journal of Information SecuriQ and Applications, 40, pp.173-182. 164. Jansen, W. and Grance, T., 2011. Guidelines on Security and Privacy in Public Cloud Computing. NIST specialpublication, (Special Publication 800-144), pp.1-70. 165. Jassas, M., Qasem, A. and Mahmoud, Q., 2015. A Smart System Connecting e-Health Sensors and the Cloud. Proceeding of the IEEE 28th Canadian Conference on Electrical and Computer Engineering Halij%x, Canada, pp.712-716. 166. Jathanna, R. and Jagli, D., 2017. Cloud Computing and Security Issues,Jathanna, Rohan Jagli, Dhanamma. International Journal of Engineering Research and Applications, 07(06), pp.31-38. 167. Jawad;, Z., Kadhim, A.I. and Abdulameer, Z.D., 2017. Cloud computing adoption in Higher Education Institutions of Malawi: An exploratory study. Journal of College of Education / Wasit, 9(28), pp.37-54. 168. Jin, J., 2016. Research of Data-Aiming Mining Algorithm in Cloud Environment. International Journal of Grid and Distributed Computing, 9(4), pp.87-94. 169. Jones, J.F.J., 2014. Measuring and Managing Information Risk 1st Editio., Elsevier Inc. ISBN: 978-0-12-420231-3. 170. Joshi, C. and Singh, U.K., 2017. Information security risks management framework - A step towards mitigating security risks in university network. Journal of Information Securify and Applications, 35, pp. 128-137. 171. Joshi, P., Islam, S. and Islam, S., 2017. A Framework for Cloud Based E-Government from the Perspective of Developing Countries. Futzrre Internet, 9(4), pp.1-24. 172. Jouini, M., Ben, L. and Rabai, A,, 2017. A Security Risk Management Model for Cloud Computing Systems : Jotrrnals in Information Systems and Applications - Springer, l(January), pp.594-608. 173. Jouini, M. and Rabai, L.B., 2015. Mean Failure Cost Extension Model towards Security Threats Assessment: A Cloud Computing Case Study. Journal of Computers, 10(3), pp.184-194. 174. Kapinski, James Deshmukh, Jyotirmoy V and Jin, Xiaoqing Ito, Hisahiro Butts, Ken ., 2016. Simulation-Based Approaches for Verification of Embedded Control Systems: An Overview of Traditional and Advanced Modeling, Testing, and Verification Techniques. IEEE Control Systems, 36(6), pp.45-64. 175. Kartheeswaran, D., 2017. A data-parallelism approach for PSO-ANN based medical image reconstruction on a multi-core system. Informatics in Medicine Unlocked, 8(January), pp.21-31. 176. Kashyap Rajesh and Sarika Sharma, 2015. Security Challenges and Issues in Cloud Computing - The Way Ahead. International Journal of Innovative Research in Advanced Engineering (IJIRAE), 2(9), pp.32-35. 177. Kaur, G. and Kaur, S., 2016. Improved Hyper-Heuristic Scheduling with Load- Balancing and RASA for Cloud Computing Systems. International Journal of Grid and Distributed Computing, 9(1), pp.13-24. 178. Kaur, K. and Zandu, V., 2016. Secure Data Classification Model in Cloud Computing Using Machine Learning Approach. International Journal of Grid and Distributed Computing, 9(8), pp. 13-22. 179. Kaur, M. and Singh Sivia, J., 2018. Minkowski, Giuseppe Peano and Koch Curves based Design of Compact Hybrid Fractal Antenna for Biomedical Applications using ANN and PSO. AEU - International Journal of Electronics and Communications, 99, pp.14-24. 180. Kaveh, Mohamrnad Rasooli Sharabiani, and Ebrahim Abbaspour-Gilandeh, Yousef Golpour, Iman., 2018. ANFIS and ANNs model for prediction of moisture diffusivity and specific energy consumption potato, garlic and cantaloupe drying under convective hot air dryer. Information Processing in Agriculture, 5(3), pp.372-387. 181. Khan, Ayub Fayaz, Muhammad Shah and Abdul Salarn Wahid, Fazli., 2016. Critical Analysis of Cloud Computing Software Development Process Models. International Journal of Sofware Engineering and Its Applications, 10(1 I), pp.451466. 182. Khan, Afnan Oriol, Manuel Kiran, Mariam Jiang and Ming Djemame, Karim., 2012. Security Risks and their Management in Cloud Computing. In 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings. pp. 121-128. 183. Khan, Abdul Nasir Kiah, and Madani, Sajjad A.., 2013. Towards secure mobile cloud computing: A survey. Future Generation Computer Systems, 29(5), pp.1278-1299. 184. Khatavakhotan, A.S. and Siew, H.O., 2015. Development of a Software Risk Management Model Using Uniques Features of a Proposed Audit Component. Malaysian Journal of Computer Science, 28(2), pp. 11 0-1 3 1. 185. Khosravani, A,, Nicholson, B. and Wood-Harper, T., 2013. A case study analysis of risk, trust and control in cloud computing. In Science and Information Conference 2013. pp. 879-887. 186. Khrisna, A. and Harlili, 2014. Risk Management Framework with COBIT 5 and Risk Management Framework for Cloud Computing Integration. In 2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) Risk. pp. 103-108. 187. Khurshid, J Kashifa Thenmozhi, P Arts, Kongu Nadu, Tamil Arts, Kongu Nadu and Tamil ., 2016. an Analysis of Deployment Models in Cloud Computing. International Journal of Management, Information Technology and Engineering, 4(3), pp.89-98. 188. Kim, M. and KO, I.Y., 2015. An Efficient Resource Allocation Approach Based on a Genetic Algorithm for Composite Services in IoT Environments. Proceedings - 2015 IEEE International Conference on Web Services, ICWS 2015, pp.543-550. 189. Kim, S.-M., 2016. Exploratory Research on Social Media and Digital Writing: Qualitative Interview of JCS. Journal of Socio-Informatics, 8(1), pp.13-27. 190. Kiran, Mariarn, and Django, Karim., 2011. Towards Service Lifecycle based Methodology for Risk Assessment in Cloud Computing. In 2011 IEEE International Conference on Dependable, Autonomic and Secure Computing. pp. 450-457. 191. Kiryakova, G., 2017. Application of cloud services in education. Trakia Journal of Science, 15(4), pp.277-284. 192. Koch, A. and Brakel, P. Van, 2013. Enhancing trust in cloud computing. International Journal of Advanced Research in Computer Engineering and Technology, 2(4), pp.1541-1548. 193. Kolb, S., Lenhard, J. and Wirtz, G., 2015. Application Migration Effort in the Cloudthe case of cloud platforms. In 2015 IEEE 8th International Conference on Cloud Computing. pp. 4148. 194. Kong, Xiaobing Liu, Xiangjie Shi, Ruifeng Lee and Kwang Y., 2015. Wind speed prediction using reduced support vector machines with feature selection. journal Neurocomputing, 169, pp.449-456. 195. Kouatli, I., 2016. Managing Cloud Computing Environment: Gaining Customer Trust with Security and Ethical Management. Procedia Computer Science, 91(7), pp.412-421. 196. Kshetri, N., 2013. Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Journal Telecommunications Policy, 37(5), pp.372-386. 197. Kumar, G.K., 2016. An Optimized Particle Swarm Optimization based ANN Model for Clinical Disease Prediction. Indian Journal of Science and Technology, 9(June), pp. 1-7. 198. Kumar, P.R., Raj, P.H. and Jelciana, P., 2017. Exploring Data Security Issues and Solutions in Cloud Computing. Journal Procedia Computer Science, 125(4), pp.691- 697. 199. Kurnar, R. and Rajalakshmi, S., 2013. Mobile Cloud Computing: Standard Approach to Protecting and Securing of Mobile Cloud Ecosystems. In Proceedings - 2013 International Conference on Computer Sciences and Applications, CSA 2013. pp. 663- 669. 200. Kumar, S. and Buyya, R., 2012. Green Cloud Computing and Environmental Sustainability. Harnessing Green It: Principles and Practices, 3(1), pp.1-11. 201. Kumar, S.A. and Sundersingh, A,, 2017. Handling DDOS attacks in Cloud Computing based on SDM System. International Journal of ScientiJic Research in Computer Science, 2(2), pp.62-68. 202. Kumar, S.N. and Vajpayee, A., 2016. A Survey on Secure Cloud: Security and Privacy in Cloud Computing. American Journal of Systems and Software, 4(1), pp.14-26. 203. Kumari, Saru Li, Xiong Wu, Fan Das, Ashok K ~ aCrho and Kim Kwang Raymond Shen, Jim., 2017. Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Generation Comptltev Systems, 68, pp.320-330. 204. Kure, H., Islam, S. and Razzaque, M., 2018. An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System. Applied Sciences, 8(6), pp. 1-29. KV, S., Pillai, G.N. and Peethambaran, B., 2017. Prediction of landslide displacement with controlling factors using extreme learning adaptive neuro-fuzzy inference system (ELANFIS). Applied Soft Computing Journal, 61, pp.892-904. 205. Lai, S.-T. and Leu, F.-Y., 2015. A Security Threats Measurement Model for Reducing Cloud Computing Security Risk. In 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. pp. 414-41 9. 206. Layton, Raymond Smith, Joe Macdonald and Phil Letchumanan, Rarnatha Kees., 2015. Building Better Environmental Risk Assessments. Frontiers in Bioengineering and Biotechnology, 3(8), pp.l-6. 207. Lee, K.E., Aziz, A. and Jaafar., 2017. Adaptive Multilayered Particle Swarm Optimized Neural Network ( AMPSONN ) for Pipeline Corrosion Prediction. International Journal of Advanced Computer Science and Applications,8(1 l), pp.499-508. 208. Leema, N. and Nehemiah, 2018. Quantum-Behaved Particle Swarm Optimization Based Radial Basis Function Network for Classification of Clinical Datasets. International Journal of Operations Research and Information Systems, 9(2), pp.32-66. 209. Li, J. and Cui, C., 2016. Mobile Cloud-based Big Data Library Management System. International Journal of Grid and Distributed Computing, 9(8), pp.335-344. 210. Li, Z., 2016. Design of Cloud Computing Platform for Education Laboratory. International Journal of Grid and Distributed Computing, 9(5), pp.217-228. 211. Lim, S., Kiah, M. and Ang, T., 2017. Security Issues and Future Challenges of Cloud Service Authentication. Acta Polytechnica Hungarica, 14(2), pp.69-89. 212. Liu, Yang Yang, Jie Huang, Yuan Xu, Lixiong L and Siguang Man., 2015. MapReduce Based Parallel Neural Networks in Enabling Large Scale Machine Learning. Corporation Computational Intelligent and Neuroscience, 201 5, pp. 1-1 3. 213. Liu, Zhi Wang, Liyang Zhang and Yun Chen, C. L.Philip., 2016. A SVM controller for the stable walking of biped robots based on small sample sizes. Applied Soft Computing Journal, 38, pp.738-753. 214. Lnenicka, M. and Komarkova, J., 2019. Developing a government enterprise architecture framework to support the requirements of big and open linked data with the use of cloud computing. International Jotrrnal of Information Management, 46(December), pp. 124-141. 215. Lu, K., 2016. Study on Data Privacy Monitoring of Cloud Computing and Access Control Strategy. International Jotrrnal of Grid and Distribtrted Comptrting, 9(7), pp.237-242. 216. Maghrabi, L., 2014. The Threats of Data Security over the Cloud as Perceived by Experts and University Students. In 2014 World Symposizrm on Comptrter Applications and Research (WSCAR). pp. 1-6. 217. Mark S. Litwin, 1995. How to Measure Survey Reliability and Validity, Available at: http://methods.sagepub.com/booWhow-to-measzrre-survey-reliabili@-and-validi@. Market directions', 2011. Discussion Paper on Scales for Measuring Customer Satisfaction. Market Directions, 1(3), pp.1-5. 218. Masala, G.L., Ruiu, P. and Grosso, E., 2017. Biometric authentication and data securityin cloud computing. Security andManagemen, 11(9), pp.9-15. 219. Masky, M., Young, S.S. and Choe, T.-Y., 2016. Identifying Cloud Computing Security Risks. Information Science and Security, 7(7), pp. 13-1 9. 220. Masuwai Azwani, Norain Mohd Tajudin, and Noor Shah Saad, 2016. Evaluating the face and content validity of a Teaching and Learning Guiding Principles Instrument ( TLGPI ): A perspective study of Malaysian teacher educators. GEOGRAFIA Online: Malaysian Journal of Society and Space, 12(3), pp.11-21. 221. Matt, R., 2013. Cybersecurity and Cloud Computing in the Health Care and Energy Sectors. Perception and Reality of Risk Management, 4(September), pp.1-18. 222. Mazur, S Blasch, E Chen and Yu Skormin, V ., 2011. Mitigating Cloud Computing security risks using a self-monitoring defensive scheme. Aerospace and Electronics Conference (NAECON), Proceedings of the 2011 IEEE National, pp.39-45. 223. Mehrni, Sandeep Sangal, Amrit Verma and Harsh Parmar, Kulwinder ., 2016. Economic Viability of Smart Grid Cloud in India. International Journal of Grid and Distributed Computing, 9(2), pp.61-72. 224. Mehmood, Majid Sattar, Kinza Khan and Asif Hussain Afzal, Mujahid., 2015. Load Balancing Approach in Cloud Computing. Information Technology and Sofmare Engineering, 5(3), pp.1-5. 225. Mendling, J., 2016. From Scientific Process Management to Process Science: Towards an empirical research agenda for Business Process Management. Process Management to Process Science, 3(7), pp.14. 226. Mezgfir, I. and Rauschecker, U., 2014. The challenge of networked enterprises for cloud computing interoperability. Computers in Industry, 65(4), pp.657-674. 227. Michalas, A,, Paladi, N. and Gehrmann, C., 2014. Security Aspects of e-Health Systems Migration to the Cloud. In 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom) Security. pp. 212-218. 228. Microsoft, 2014. Embracing Cloud in Health: a European Risk Assessment Framework. A guide to privacy and security considerations for the adoption of cloud, 1(9), pp.1-34. 229. Mital, Monika Pani, Ashis K. Damodaran and SumaRamesh, Ram ., 2015. Cloud based management and control system for smart communities: A practical case study. Computers in Industry, 74(2015), pp. 162-172. 230. Mohamed, A.H. and Marzouk, K.H., 2016. Optimizing Neuro-Fuzzy Fault Diagnostic Algorithm for Photovoltaic Systems. IOSR Journal of Computer Engineering, 18(4), pp.64-71. 231. Mohamed, S., 2015. A GA-Based Adaptive Neuro-Fuzzy Controller for Greenhouse Climate Control System. Alexandria Engineering Journal, 57(2), pp.773-779. 232. Moharnmadi, Kasra Shamshirband, Shahaboddin PetkoviC, Dalibor Yee, Por Lip Manso and Zulkefli., 2016. Using ANFIS for selection of more relevant parameters to predict dew point temperature. Applied Thermal Engineering, 96, pp.3 11-3 19. 233. Mohammed and Amer, A., 2017. Governmental Engineering in the Iraqi e-Government. International Advanced Research Journal in Science, Engineering and Technology, 4(3), pp.103-105. 234. Mohammed, Mohammed Abdulameer Aboobaider, Burhanuddin Mohd Ibrahim, Huda Abdullah and Harith Azam., 2016. E-government and its Challenges in Developing Countries: Case Study Iraqi e-Government. The Social Sciences, 11(17), pp.4310-43 19. 235. Mollah, M.B., Azad, M.A.K. and Vasilakos, A,, 2017. Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, pp.38-54. 236. Moreno, S.R. and dos Santos Coelho, L., 2018. Wind speed forecasting approach based on Singular Spectrum Analysis and Adaptive Neuro Fuzzy Inference System. Renewable Energy, 126, pp.736-754. 237. MORSE, J.M., 1991. Approaches to Qualitative-Quantitative Methodological Triangulation. Nursing Research, 40(2),pp.120-123. 238. Moura, J. and Hutchison, D., 2015. Review and analysis of networking challenges in cloud computing. Journal of Network and Computer Applications, 60, pp. 113-129. 239. Muflikhah, Lailil Haryanto, Dimas Joko Soebroto and Arief Andy Santoso, Edy., 2018. High Performance of Polynomial Kernel at SVM Algorithm for Sentiment Analysis. Journal of Information Technology and Computer Science ,3(2), pp. 194-201. 240. Mukherjee, K. and Sahoo, G., 2010. Cloud Computing: Future Framework for e- Governance. International Journal of Computer Applications, 7(7), pp.975-8887. 241. Mushtaq, M Omer Shahzad, Furrakh Tariq, M Owais Riaz and Mahina Majeed, Bushra., 2016. An Efficient Framework for Information Security in Cloud Computing Using Auditing Algorithm Shell ( U S ). International Journal of Computer Science and Information Security, 14(1 I), pp.3 17-331. 242. Muthee, J.W., 2016. A Data Security Implementation Model For Cloud Computing In Government. Univesity of Nairobi Journal, 2(August), pp.1-13. 243. Mxoli, A,, Gerber, M. and Mostert-phipps, N., 2014. Information Security Risk Measures for Cloud-based Personal Health Records. In International Conference on Infirmation Society (?-Society 2014). pp. 187-193. 244. Myers, B.A. and Stylos, J., 2016. Improving API usability. Communications of the ACM 59(6), pp.62-69. 245. Naji, H., Wu, C. and Gao, S., 2016. A Semantic-Aware Approach for Automatic Cloud Services Composition. International Journal of Grid and Distributed Computing, 9(8), pp.181-196. 246. Naveed, G., Batool, R. and Batool, A., 2015. Biometric Authentication in Cloud Computing. Journal of Biometries and Biostatistics, pp. 11-17. 247. Nayak, S.C., Misra, B.B. and Behera, H.S., 2014. Impact of Data Normalization on Stock Index Forecasting. International Journal of Comptrter information Systems and Indtrstrial Management Applications, 6(December), pp.2 150-7988. 248. Nguyen, Minh Tuan Shahzad, Ahsan Nguyen and Binh Van Kim, Kiseon., 2018. Diagnosis of shockable rhythms for automated external defibrillators using a reliable support vector machine classifier. Biomedical Signal Processing and Control, 44, pp.258-269. 249. Nikanfar, Ali-Reza Alavi-Majd, Hamid Zamanzadeh, Vahid Abbaszadeh, Abbas Ghahramanian and Akram Rassouli, Maryam., 2015. Design and Implementation Content Validity Study: Development of an instrument for measuring Patient-Centered Communication. Jozrrnal of Caring Sciences, 4(2), pp. 165-1 78. 250. Njenga, Kenndy Garg, Lalit Bhardwaj, Amit Kumar Prakash and Vijay Bawa, Seema ., 2019. The cloud computing adoption in higher learning institutions in Kenya: Hindering factors and recommendations for the way forward. Telematics and informatics, 38(September 2018), pp.225-246. 251. Nzanywayingoma, F. and Yang, Y., 2017. Efficient Resource Management techniques in Cloud Computing Environment: Review and discussion. Telkomnika, 15(4). pp. 8-16. 252. Oktadini, N. and Surendro, K., 2014. SLA in Cloud Computing: Improving SLA's Life Cycle Applying Six Sigma. In international Conference on Information Technology Systems and Innovation (ICITSI) 2014. pp. 24-27. 253. Okwuashi, 0. and Ndehedehe, C., 2015. Digital terrain model height estimation using support machine regression. South African Jotrrnal of Science, 11 l(9-lo), pp.1-5. 254. Onuwa Okwuashi and Ndehedehe, C., 2015. terrain model height estimation using support vector machine regression. Sot~thA fiican Journal of Science, 11(9), pp.11-19. 255. Opara-Martins, J., Sahandi, R. and Tian, F., 2016. Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective. Journal of Cloud Comptrting, 5(1), pp.1-18. 256. Oyegoke, F.A., 2014. Security challenges of cloud computing for enterprise usage and adoption. IOSR Journal of Computer Engineering, 15(5), pp.November 16th-57-61. 257. Pachipala, Y., 2017. Compression and Encryption based on Data Security for Cloud Computing. International Journal of Computer Trends and Technology (IJCTT), 4(Special), pp.54-57. 258. PalsonKennedy, R. and Gopal, T., 2010. Assessing the risks and opportunities of Cloud Computing - Defining identity management systems and maturity models. In Trendz in Information Sciences and Computing(TISC2010). pp. 138-1 42. 259. Pandey, Anish Kumar, Saroj Kant, Krishna Parh and Dayal R ., 2016. Mobile robot navigation in unknown static environments using ANFIS controller. journal Perspectives in Science, 8, pp.421-423. 260. Paquette, S., Jaeger, P.T. and Wilson, S.C., 2010. Identifying the security risks associated with governmental use of cloud computing. Government Information Ouarterly, -O uarterly, 27(3), pp.245-253. 261. Parode, V., Ghadage, S. and Ghorpade, N., 2014. Cloud Based Data Center in Implementing Wireless. International Journal of Advances In Computer Science and Cloud Computing, 2(2), pp.136-138. 262. Patel, S. and Makwana, R.M., 2016. Energy Efficiency in Cloud Data Centers. International Journal of Computer Science and Information Sectrrity, 14(1 I), pp.1137- 1145. 263. Paudel, Subodh Elmitri, Mohamed Couturier, Stkphane Nguyen and Phuong H. Karnphuis, Ren6 ., 2017. A relevant data selection method for energy consumption prediction of low energy building based on support vector machine. Energy and Buildings, 138, pp.240-256. 264. Paul Rajan, A.R. and Shanmugapriyaa, S., 2012. Evolution of Cloud Storage as Cloud Computing Infrastructure Service. IOSR Journal of Computer Engineering (IOSRJCE), 1(1), pp.3845. 265. Pazowski, P., 2015. Green Computing: Latest practices and technologies for ICT sustainability. Managing Intellectual Capital and Innovation for Sustainable and Inclusive Society; Management, Knowledge and Learning; Joint International Conference 2015, pp.1853-1860. 266. Petcu, Dana Macariu, Georgiana Panica and Silviu Cratiun, Ciprian ., 2013. Portable cloud applications - From theory to practice. Future Generation Comptlter Systems, 29(6), pp.1417-1430. 267. Phumcharoen, J., 2017. Cloud Computing: The challenges of software business. International Journal of Applied Computer Technology and Information Systems, 6(2), pp.6-10. 268. Pichan, A., Lazarescu, M. and Soh, S.T., 2015. Cloud forensics: Technical challenges, solutions and comparative analysis. Digital Investigation, 13, pp.38-57. 269. Pinheiro, Alexandre Canedo and Rafael Timoteo Albuquerque, Robson ., 2018. Security architecture and protocol for trust verifications regarding the integrity of files stored in cloud services. Sensors (Switzerland), 18(3), pp.1-27. 270. Power, P. and Case, P.P.-A,, 2016. A Hybrid Artificial Neural Network And Particle Swarm Optimization ( ANN-PSO ) Algorithm to Predict. In Proceedings of Academics World 26th International Conference, Toronto, Canada, 5. pp. 8-15. 271. PrasadDas, S. and Padhy, S., 2012. Support Vector Machines for Prediction of Futures Prices in Indian Stock Market. International Journal of Computer Applications, 41(3), pp.22-26. 272. Pujari, M.A.A. and Shinde, M.S.S., 2016a. Data Security using Cryptography and Steganography. IOSR Journal of Computer Engineering, 18(04), pp.130-139. 273. Puttonen, Juha Afolaranmi, Samuel Olaiya Moctezuma, Luis Gonzalez Lobov and Andrei Lastra, Jose L Martinez ., 2016. Security in Cloud-Based Cyber-Physical Systems. Jotrrnal of Cloud Comptrting Research, 2(1), pp.18-33. 274. Qian, Huiling Han, Jinguang Li, Jiguo Yao and Wei Zhang, Yichen ., 2016. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing. IEEE Transactions on Services Computing, 10(5), pp.785-796. 275. R.S. Ross, 2014. Assessing Security and Privacy Controls in Federal Information Systems and Organisations: Building Effective Assessment Plans. NIST Special Publication, 12(4), pp.l-487. 276. Rahman, Mohammad Obaidur Hossen, Muhammad Kamal Morsad and Golam Chandra, Animesh ., 2018. An Approach for Enhancing Security of Cloud Data using Cryptography and Steganography with E-LSB Encoding Technique. IJCSNS International Journal of Compt~terS cience and Network Security, 18(9), pp.85-93. 277. Rajaei, H. and Wappelhorst, J., 201 1. Clouds and Grids: A Network and Simulation Perspective. In Conference: 2011 Spring Simulation Multi-conference, SpringSim '11, Boston, MA, USA. pp. 143-150. 278. Ramya, P Saraswathy and S Sharmila, S ., 2016. T-Broker- A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services. International Journal of ScientiJic Research in Science and Technology IJSRST, 2(2), pp.66-70. 279. Ranjan, S., Jha, V.K. and Pal, P., 2016. A strategic and sustainable multi-criteria decision making framework for ERP selection in OEM. International Journal ofApplied Engineering Research, 1 1(3), pp. 1916-1926. 280. Rastogi, A., 2010. A Model based Approach to Implement Cloud Computing in EGovernance. International journal ofcomputer applications, 9(7), pp. 15-1 8. 281. Ricardo, D., Westphall, C. and Westphall, C., 2014. A Dynamic Risk-based Access Control Architecture for Cloud Computing. In 2014 IEEE Network Operations and Management Symposium (NOMS). pp. 9-1 5. 282. Roberts, Margaret E. Stewart, Brandon M and Tigley, Dustin Lucas, Christopher Leder-Luis, Jetson ., 2014. Structural topic models for open-ended survey responses. American Journal of Political Science, 58(4), pp.10641082. 283. Rohmeyer, P. and Ben-zvi, T., 2015. Managing Cloud Computing Risks in Financial Services Institutions. In PICMET : Management of the Technology 3(5). pp. 519-526. 284. Rosado, David G. Mellado and Daniel Femhdez-Medina, Eduardo ., 2012. Security Analysis in the Migration to Cloud Environments. Future Internet, 4(4), pp.469487. 285. Rot, A,, 2017. Selected Issues of IT Risk Management in the Cloud Computing Model . Journal for Clinicians Informatics and Cybernetics, (Imcic), pp.89-94. 286. Roussev, V., Barreto, A. and Ahmed, I., 2016. API-based forensic acquisition of cloud drives. In IFlP Advances in Information and Communication Technology. pp. 21 3-235. 287. Roy, S., Bose, R. and Sarddar, D., 2017. SSeS: A self-configuring selective single-path routing protocol for cloud-based mobile wireless sensor network. In Advances in Intelligent Systems and Computing. pp. 655-667. 288. Rubinstein, S., Goor, A. and Rotshtein, A., 2015. Time Series Forecasting of Crude Oil Consumption Using Neuro-Fuzzy Inference. Journal of Industrial and Intelligent Information, 3(2), pp.84-90. 289. Rupali, Kanthe and R Rinkle, Pate1 ., 2015. Data Security and Privacy Protection Issues in Cloud Computing. International Journal of Computer Science and Information Technology Research, 3(2), pp.1196-1207. 290. Shilpashree. S, Renuka R and Patil, Parvathi C.,2018. "Cloud computing an overview." International Journal of Engineering and Technology, 7(4), pp.2743-2746. 291. Sahin, M., 2017. A Comparative Study of Neural Networks and ANFIS for Forecasting Attendance Rate of Soccer Games. Mathematical and Computational Applications, lO(l), pp.1-12. 292. Saleh, S., Qadir, J. and Ilyas, M.U., 2018. Shedding Light on the Dark Comers of the Internet: A Survey of Tor Research. Journal of Network and Computer ~pplications, 293. Santos, Daniel Ricardo Marinho, Roberto Schmitt, Gustavo Roecker Westphall and Carla Merkle Westphall, Carlos Becker ., 2016. A framework and risk assessment approaches for risk-based access control in the cloud. Journal of Network and Comptlter Applications, 74, pp.8697. 294. Saranya, C. and Manikandan, G., 2013. A Study on Normalization Techniques for Privacy Preserving Data Mining. International Journal of Engineering and Technology (IJET), 5(3), pp.2701-2704. 295. Saranya, Rarnya, Kumar and Nalini ., 2016. Efficient and Parallel Data Processing and Resource Allocation in the Cloud by u sing Nephele ' s Data Processing Framework. International Journal of Grid and Distributed Computing, 9(3), pp.3340. 296. Sarddar, D., Sen, P. and Sanyal, M.K., 2016. Central Controller Framework for Mobile Cloud Computing. International Journal of Grid and Distribtfted Computing, 9(4), pp.233-240. 297. Sasikaladevi, N., 2016. Trust Based Cloud Service Composition Framework. International Journal of Grid and Distributed Computing, 9(1), pp.99-104. 298. Satapathy, Suresh ChandraBhateja and Vikrant Joshi ., 2017. Performance Analysis of Adaptive Approach for Congestion Control In Wireless Sensor Networks. Journal of Computer Engineering, 19(3), pp.71-78. 299. Saunders, Benjamin Sim, Julius Kingstone, Tom Baker and Shula Waterfield, Jackie ., 2018. Saturation in qualitative research: exploring its conceptualization and operationalization. Quality and Quantity, 52(4), pp. 1893-1 907. Schlesinger, S., 1979. Terminology for Model Credibility. Simulation, 32(3), pp.1-17, 300. Sen, A.K. and Tiwari, P.K., 2017. Security Issues and Solutions in Cloud Computing. IOSR Journal of Computer Engineering, 19(2), pp.67-72. 301. Sen, J., 2013. Security and Privacy Issues in Cloud Computing. Architectures and Protocols for Secure Information Technologv, (iv), pp.42-49. 302. Sen, N.K. and Saluja, N.K., 2017. Cloud Security Using Homomorphic Encryption. International Journal of Engineering, Management and Medical Research (IJEMMR), 3(4) , pp.33-39. 303. Sengar, J.S., 2015. SURVEY: Reputation and Trust Management in VANETs. International Journal of Grid and Distributed Computing, 8(4), pp.301-306. 304. Sengar, J.S. and Sharma, R., 2016. Cloud Architecture and Modem Cryptography. International Journal of Grid and Distributed Computing, 9(6), pp.45-50. 305. Senthil, P., Boopal, N. and Vanathi, R., 2012. Improving the Security of Cloud Computing using Trusted Computing Technology. International ~ournal of Modern Engineering Research (IJMER), 2(1), pp.320-325. 306. Shahzad, F., 2014. State-of-the-art survey on cloud computing security challenges, approaches and solutions. Procedia Computer Science, 37, pp.357-362. 307. Shakil, Kashish A. Zareen, Farhana and Alam, Mansaf Jabin, Suraiya ., 2017. BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud. Journal of King Saud University - Computer and Information Sciences, pp.1-7. 308. Shanmugam, U. and Tamilselvan, L., 2016. Dynamic Resource Monitoring of SaaS with Attestation for a Trusted Cloud Environment. International Journal of Security and Its Applications, 10(4), pp.41-50. 309. Shanthi, G., 2018. Key Optimization Technique in Mobile Networks. International Journal of Advanced Research in Computer Science, 9(2), pp.44W5 1. 310. Shanthini, B. and Swamynathan, S., 2012. Genetic-based biometric security system for wireless sensor-based health care systems. International Conference on Recent Advances in Computing and Software Systems, RACSS 2012. pp. 180-184. 311. Sharma, S., 2016. Expanded cloud plumes hiding Big Data ecosystem. Future Generation Computer Systems, 59, pp.63-92. 312. Sharma, Sujeet Kumar Al-Badi, Ali H and Govindaluri, Srikrishna Madhumohan ., 2016. Predicting motivators of cloud computing adoption: A developing country perspective. Computers in Human Behavior, 62, pp.61-69. 313. Sharma, S.K. and Wang, X., 2017. Live Data Analytics with Collaborative Edge and Cloud Processing in Wireless IoT Networks. IEEE Access, 5, pp.4621-4635. 314. Shen, Yazhen Du, Changwen Zhou and Jianmin Ma, Fei ., 2018. Release profile predictions of controlled release fertilisers: Least Squares Support Vector Machines. Biosystems Engineering, 172, pp.67-74. 315. Shrestha, R., 2017. High Availability and Performance of Database in the Cloud Traditional Master-slave Replication versus Modem Cluster-based Solutions. International Conference e (CLOSER 201 7),, (Closer), pp.385-392. 316. Shukur, Ban Salman Khanapi, Mohd Ghani and Abd Burhanuddin ., 2018. An Analysis of Cloud Computing Adoption Framework for Iraqi e-Government International Journal ofAdvanced Computer Science andApplications, 9(September), pp.104-112. 317. Simmon, E., 2018. Evaluation of Cloud Computing Services Based on NIST 800-145. National Institute of Standards and Technology Special Publication NIST, NIST Speci (February), pp.1-24. 318. Singer, E. and Couper, M.P., 2017. Some Methodological Uses of Responses to Open Questions and Other Verbatim Comments in Quantitative Surveys. : journal for quantitative methods and survey methodology (mda), 11(2), pp.115-134. 319. Singh, A.