L. Q. Tian, C. Lin, and Y. Ni, Evaluation of user behavior trust in cloud computing, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), pp.567-572, 2010.
DOI : 10.1109/ICCASM.2010.5620636

S. Kamara and K. Lauter, Cryptographic Cloud Storage, pp.136-149, 2010.
DOI : 10.1007/978-3-642-14992-4_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.159.4794

M. Factor, D. Hadas, A. Hamama, N. Har-'el, E. Kolodner et al., Secure Logical Isolation for Multi-tenancy in cloud storage, 2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST), pp.1-5, 2013.
DOI : 10.1109/MSST.2013.6558424

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.371.7426

Z. Huang, Q. Li, D. Zheng, K. Chen, and X. Li, YI Cloud: Improving user privacy with secret key recovery in cloud storage, Proceedings of 2011 IEEE 6th International Symposium on Service Oriented System (SOSE), pp.268-272, 2011.
DOI : 10.1109/SOSE.2011.6139116

L. Hao and D. Han, The study and design on secure-cloud storage system, 2011 International Conference on Electrical and Control Engineering, pp.5126-5129, 2011.
DOI : 10.1109/ICECENG.2011.6057171

W. Itani, A. Kayssi, and A. Chehab, Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp.711-716, 2009.
DOI : 10.1109/DASC.2009.139

E. Harrin, Cloud Storage Vendors Offering Encryption as a Service, Enterprise Networking Planet, 2012.

S. Amazon and . In, http://docs.aws.amazon.com/AmazonS3/latest/dev/Welcome.html 11. Microsoft Azure, 2014.

S. Yu, C. Wang, K. Ren, and W. Lou, Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, 2010 Proceedings IEEE INFOCOM, pp.1-9, 2010.
DOI : 10.1109/INFCOM.2010.5462174

D. C. Litzenberger and . Pycrypto, In: https://www.dlitz.net/software/pycrypto, 2014.

J. Bresnahan, K. Keahey, D. Labissoniere, and T. Freeman, Cumulus, Proceedings of the 2nd international workshop on Scientific cloud computing, ScienceCloud '11, pp.25-32, 2011.
DOI : 10.1145/1996109.1996115

L. Kang and X. Zhang, Identity-Based Authentication in Cloud Storage Sharing, 2010 International Conference on Multimedia Information Networking and Security, pp.851-855, 2010.
DOI : 10.1109/MINES.2010.180

Y. Gu and R. L. Grossman, Sector and Sphere: the design and implementation of a high-performance data cloud, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.17, issue.1897, pp.2429-2445, 1897.
DOI : 10.1098/rsta.2009.0053

G. Zhao, C. Rong, J. Li, F. Zhang, and Y. Tang, Trusted Data Sharing over Untrusted Cloud Storage Providers, 2010 IEEE Second International Conference on Cloud Computing Technology and Science, pp.97-103, 2010.
DOI : 10.1109/CloudCom.2010.36