Removed due to plagiarism.
This work is licensed under a
Creative Commons Attribution 4.0 International License
[1] Bhushan Lal Sahu,Rajesh Tiwari, Journal of Advanced Research in Computer Science and Software Engineering 2(9) (2012) 33-37.
[2] ELC Technologies (2010). Cloud Computing: What You Should Know". Available at http://publicweb2.unimap.edu.my/~ict/v4/images/doc/ELC_Cloud_Computing_Guide.pdf.
[3] Han Qi, Abdullah Gani (2012). Research on Mobile Cloud Computing: Review, Trend and Perspectives. Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP), pp.195-202.
DOI: https://doi.org/10.1109/dictap.2012.6215350[4] Maneesha Sharma, Himani Bansal, Amit Kumar Sharma, International Journal of Soft Computing and Engineering 2(1) (2012) 421-424.
[5] Nariman Mirzaei (2008). Cloud Computing. Available at: http://grids.ucs.indiana.edu/ptliupages/publications/ReportNarimanMirzaeiJan09.pdf.
[6] Peter Mell, Tim Grance (2011). The NIST Definition of Cloud Computing, the National Institute of Standards and Technology Report. (2011).
[7] Sultan Ullah, Zheng Xuefeng (2013). Cloud Computing Research Challenges. IEEE 5th International Conference on Biomedical Engineering and Informatics, pp.1397-1401.
[8] Tripathi A., Mishra A. (2011). Cloud Computing Security Considerations. Signal Processing, Communications and Computing (ICSPCC), IEEE International Conference.
DOI: https://doi.org/10.1109/icspcc.2011.6061557[9] Mohammad Reza Modarres Zadeh, International Letters of Social and Humanistic Sciences 3 (2013) 21-29.
[10] Leah Garner-O'Neale, Jelisa Maughan, Babalola Ogunkola, International Letters of Social and Humanistic Sciences 2 (2014) 41-55. ( Received 30 October 2013; accepted 05 November 2013 ).