[1] S. Al-Maliki and F. Alfifi, “Using Security Features for Cloud Computing Based on New Symmetric Key Algorithm,” Journal of Cloud Computing, 2016, doi: 10.5171/2016.179794.
[2] R. Maggiani, “Cloud computing is changing how we communicate,” in 2009 IEEE International Professional Communication Conference, Jul. 2009, pp. 1–4. doi: 10.1109/IPCC.2009.5208703.
[3] J. P. Srivastava and V. K. Verma, “Cloud computing in libraries: Its needs, applications, issues and best practices,” in 2015 4th International Symposium on Emerging Trends and Technologies in Libraries and Information Services, Jan. 2015, pp. 33–38. doi: 10.1109/ETTLIS.2015.7048168.
[4] R. Sanchati and G. Kulkarni, “Cloud Computing in Digital and University Libraries,” Global Journal of Computer Science and Technology, vol. 11, no. 12, pp. 36–42, 2011.
[5] D. K. Kumar, “Application of Cloud Technology in Digital Library,” International Journal of Computer Science Issues (IJCSI), vol. 9, no. 3, pp. 374–378, 2012.
[6] F. Sabahi, “Cloud computing security threats and responses,” in 2011 IEEE 3rd International Conference on Communication Software and Networks, May 2011, pp. 245–249. doi: 10.1109/ICCSN.2011.6014715.
[7] S. Aljerewi, “The impact of a proposed technology based on cloud computing in the development of practical knowledge skills among students of the Faculty of Education Princess Nourah Bint Abdul Rahman University,” IUG Journal of Educational and Psychology Sciences, vol. 26, no. 3, pp. 54–84, 2018.
[8] S. Bellasio, “5 Best Practices for a Successful Cloud Migration,” 2018. https://vmblog.com/archive/2018/05/18/5-best-practices-for-a-successful-cloud-migration.aspx#.YgepUurP1PZ (accessed Feb. 12, 2022).
[9] J. Sen, “Security and Privacy Issues in Cloud Computing,” in Architectures and Protocols for Secure Information Technology Infrastructures, vol. 3, A. Ruiz-Martinez, R. Marin-Lopez, and F. Pereniguez-Garcia, Eds. Hershey, PA: IGI Global, 2014, pp. 1–45. doi: 10.4018/978-1-4666-4514-1.ch001.
[10] S. Namasudra, “Cloud computing: A new era,” Journal of Fundamental and Applied Sciences, vol. 10, no. 2, Art. no. 2, May 2018, doi: 10.4314/jfas.v10i2.9.
[11] N. Tyagi, N. Passi, and S. K. Baberwal, “Cloud Computing & it’s Applications in Library Systems,” International Journal of Research in Engineering and Technology, vol. 4, pp. 45–47, 2015.
[12] M. Marayaja, “Cloud computation in library: advantage and disadvantages,” International Research Journal of Management Science & Technology, vol. 7, no. 6, pp. 117–122, 2016.
[13] NIST Cloud Computing Standards and Roadmap, “National Institute of Standards and Technology, 500–291, 2nd ser.” 2013. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.500–291r2.pdf
[14] V. Diaconita, A.-R. Bologa, and R. Bologa, “Hadoop Oriented Smart Cities Architecture,” Sensors, vol. 18, no. 4, Art. no. 4, Apr. 2018, doi: 10.3390/s18041181.
[15] V. Inukollu, S. Arsi, and S. Ravuri, “Security Issues Associated with Big Data in Cloud Computing,” International Journal of Network Security & Its Applications, vol. 6, no. 3, pp. 45–56, May 2014, doi: 10.5121/ijnsa.2014.6304.
[16] R. Arokia, A. Paul Rajan, and S. Shanmugapriyaa, “Evolution of Cloud Storage as Cloud Computing Infrastructure Service,” IOSR, vol. 1, pp. 2278–661, Jun. 2012, doi: 10.9790/0661-0113845.
[17] C. Thota, G. Manogaran, D. Lopez, and R. Sundarasekar, “Architecture for Big Data Storage in Different Cloud Deployment Models,” in Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, IGI Global, 2021, pp. 178–208. doi: 10.4018/978-1-7998-5339-8.ch009.
[18] M. Bengtsson, “How to plan and perform a qualitative study using content analysis,” NursingPlus Open, vol. 2, pp. 8–14, Jan. 2016, doi: 10.1016/j.npls.2016.01.001.
[19] ZNetlive, “What is load balancing in Cloud Computing and what are its advantages?,” ZNetLive Blog - A Guide to Domains, Web Hosting & Cloud Computing, 2017. https://www.znetlive.com/blog/what-is-load-balancing-in-cloud-computing-and-its-advantages/ (accessed Feb. 12, 2022).
[20] H. Yaish, M. Goyal, and G. Feuerlicht, “A novel multi-tenant architecture design for software as a service applications,” CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, pp. 82–88, Jan. 2012.