... Standards) (2009) http://www.oasis-open.org/ [19] Ristenpart T et al (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. Proceeding of ACM conference ... http://msdn.microsoft.com/en-us/library/ee922714.aspx [14] http://msdn.microsoft.com/en-us/library/dd179346.aspx [15] Liang Yan, Chunming Rong, and Gansen Zhao , Strengthen Cloud Computing Security ... Identity-Based Cryptography [16] Nick Antonopoulos (2010), Computer Communications and Networks [17] P. Angin, B. Bhargava, R. Ranchal, N. Singh, L. Ben Othmane, L. Lilien, and M. Linderman, “A...