Tysowski, P. and Hasan, M.A. Towards secure communication for highly scalable mobile applications in cloud computing systems, Centre for Applied Cryptographic Research, University of Waterloo, Tech. Rep. CACR. 2011; 33; 1-33.
 Yu, S., Wang, C., Ren, K and Lou, W. Achieving secure, scalable and fine-grained data access control in cloud computing,” in IEEE INFOCOM'10. 2010.
 Khan AN, Mat Kiah ML, Khan SU, Madani SA. Towards secure mobile cloud computing: A survey. Future Generation Computer Systems, 2013; 29; 5; 1278-1299.
 Kumar, N.S., Lakshmi, G.V.R., Balamurugan, B. Enhanced Attribute Based Encryption for Cloud Computing. Procedia Computer Science, 2015; 46; 689- 696. doi:10.1016/j.procs.2015.02.127
 Han, J., Kamber, M and Pei, J. Data Mining: Concepts and Techniques, Third Edition, The Morgan Kaufmann Series in Data Management Systems. 2011.
 ISACA. Generating value from big data analytics,White Paper. 2014. Retrieved from (http://www.isaca.org).
 Kshetri, N. Big data's impact on privacy, security and consumer welfare, Telecommunications Policy.
 Assuncao MD, Calheiros RN, Bianchi S, Netto MAS, Buyya R. Big Data computing and Clouds: trends and future directions. Special Issue on Scalable Systems for Big Data Management and Analytics. Journal of Parallel and Distributed Computing. 2015; 79-80:3-15