[1] Oz H., Aris A., Levi A., andUluagac A.S.A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. ACM Computing Surveys (CSUR), vol. 54, no. 11s, pp. 1-37, 2022. [2] Dhahi S. H., Dhahi E. H., Khadhim B. J., andAhmed S. T.Using Support Vector Machine Regression to Reduce Cloud Security Risks in Developing Countries. Indonesian Journal of Electrical Engineering and Computer Science, vol. 30, no. 2, pp. 1159-1166, 2023. [3] Kaja, D.V.S., Fatima, Y., and Mailewa, A.B. Data Integrity Attacks in Cloud Computing: A Review of Identifying and Protecting Techniques. International Journal of Research Publication and Reviews, vol. 2582, pp. 7421, 2022. [4] Wu F., Zhou B., andZhang X.Identity-Based Proxy Signature with Message Recovery Over NTRU Lattice. Entropy, vol. 25, no. 3, pp. 454, 2023. [5] Sharma N.S.N. and Singh, M.S.M. Hybrid Optimization Algorithm for Data Leakage Reduction in Cloud Computing, 2023. [6] Parkoo K.M., Gueye B., Sarr C., andDia I.Data Prediction System in Malaria Control Based on Physio-Chemical Parameters of Anopheles Breeding Sites. EAI Endorsed Transactions on Internet of Things, vol. 8, no. 4, 2022. [7] Adeleke I.A., Muraina I.O., andAdegbuyi K.K.Adoption of Cloud Computing Technology for Effective University Administration in Nigeria. Current Journal of Applied Science and Technology, vol. 39, no. 40, pp. 1-8, 2020. [8] Chang D., Li L., Chang Y., andQiao Z.Cloud Computing Storage Backup and Recovery Strategy Based on Secure IoT and Spark. Mobile Information Systems, vol. 2021, pp. 1-13, 2021. [9] Logeshwaran J., Ramesh G., andAravindarajan V.A Secured Database Monitoring Method to Improve Data Backup and Recovery Operations in Cloud Computing. BOHR International Journal of Computer Science, vol. 2, no. 1, pp. 1-7, 2023. [10] Kumar, R. and Venkatesh, K.Centralized and Decentralized Data Backup Approaches. In Proceedings of International Conference on Deep Learning, Computing and Intelligence: ICDCI 2021, Singapore: Springer Nature Singapore, pp. 687-698, 2022. [11] Iliadis I.Data Loss in RAID-5 and RAID-6 Storage Systems with Latent Errors.International Journal on Advances in Software vol. 12, no. 3, 2019. [12] Khan M. Cloud Disaster Recovery: Planning and Implementing Business Continuity, 2023. [13] Alharthi D.Secure Cloud Migration Strategy (SCMS): A Safe Journey to the Cloud. In International Conference on Cyber Warfare and Security, vol. 18, no. 1, pp. 1-6, 2023. [14] Ke L.Network Information Security Technology Based on Cloud Computing Environment. Journal of Electronics and Information Science, vol. 8, no. 2, pp. 57-62, 2023. [15] Shang X., Huang Y., Liu Z., andYang Y.Reducing the Service Function Chain Backup Cost Over the Edge and Cloud by a Self-Adapting Scheme. IEEE Transactions on Mobile Computing, vol. 21, no. 8, pp. 2994-3008, 2021. |