[1] Denis Reilly, Chris Wren, Tom Berry, “Cloud
Computing_Pros and Cons for Computer Forensic
Investigations” International Journal Multimedia and
Image Processing (IJMIP), Volume 1, Issue 1, March
2011
[2] Information Commissioner’s office, “Anonymization:
managing data protection risk, code of practice”, 2012
[3] Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,
Thomas Anderson: “Privacy-preserving P2P data
sharing with OneSwarm”.
[4] A. Shamir, “How to share a secret,” Commun. ACM,
vol. 22, no. 11, pp. 612–613, 1979.5. A. Friedman, R.
Wolff, and A. Schuster, “Providing k-anonymity in
data mining,” VLDB Journal, vol. 17, no. 4, pp. 789–
804, Jul. 2008.
[5] Jayalatchumy, D., Ramkumar, P., & Kadhirvelu, D.
2010, November. Preserving Privacy through Data
Control in a Cloud Computing Architecture Using
Discretion Algorithm. In Emerging Trends in
Engineering and Technology (ICETET), pp. 456-461
[6] Ruj, S., Stojmenovic, M., & Nayak, A. 2012, May.
Privacy Preserving Access Control with
Authentication for Securing Data in Clouds. In
Cluster, Cloud and Grid Computing (CCGrid),12th
IEEE/ACM International Symposium on(pp. 556-563).
IEEE.
[7] Liu, Q., Wang, G., & Wu, J. 2009, August. An
efficient privacy preserving keyword search scheme in
cloud computing. In Computational Science and
Engineering, 2009. CSE'09. International Conference
on (Vol. 2, pp. 715-720). IEEE.
[8] Sayi, T. J. V. R. K., Krishna, R. S., Mukkamala, R.,
& Baruah, P. K. 2012. Data Outsourcing in Cloud
Environments: A Privacy Preserving Approach. In
Information Technology: New Generations (ITNG),
2012 Ninth International Conference on (pp. 361-366).
[9] Shah, M. A., Baker, M., Mogul, J. C., &
Swaminathan, R. 2007, May. Auditing to keep online
storage services honest. In Proceedings of the 11th
USENIX workshop on Hot topics in operating systems
(pp. 1-6). USENIX Association.
[10] Yang, K., & Jia, X. 2012. Data storage auditing
service in cloud computing: challenges, methods and
opportunities. World Wide Web, 15(4), 409-428.
[11] Chen, L., & Guo, G. 2011. An efficient remote data
possession checking in cloud storage. International
Journal of Digital Content Technology and its
Applications, 5(4), 43-50.
[12] Gohel, M., & Gohil, B. 2012. A New Data Integrity
Checking Protocol with Public Verifiability in Cloud
Storage. Trust Management VI, 240-246.
[13] Wang, Q., Wang, C., Ren, K., Lou, W., & Li, J. 2011.
Enabling public auditability and data dynamics for
storage security in cloud computing. Parallel and
Distributed Systems, IEEE Trans. on, 22(5), 847-859.
[14] Ateniese, G., Burns, R., Curtmola, R., Herring, J.,
Khan, O., Kissner, L., ... & Song, D. 2011. Remote
data checking using provable data possession. ACM
Transactions on Information and System Security
(TISSEC), 14(1), 12.
[15] Hao, Z., Zhong, S., & Yu, N. 2011. A privacypreserving
remote data integrity checking protocol
with data dynamics and public verifiability.
Knowledge and Data Engineering, IEEE Transactions
on, 23(9), 1432-1437.