[1] M. H. R. Al-Shaikhly, H. M. El-Bakry and A. A. Saleh, Cloud security using Markov chain and genetic algorithm,
Int. J. Elect. Inf. Engin. 8(2) (2018) 96–106.[2] A. Aldweesh, A. Derhab and A. Z. Emam, Deep learning approaches for anomaly-based intrusion detection
systems: A survey, taxonomy, and open issues, Knowledge-Based Syst. 189(105124) (2020).
[3] SH. Aljawarneh, M. B. Yassein and W. A. Talafha, A resource-efficient encryption algorithm for multimedia big
data, Mult. Tools Appl. 76(21) (2017) 22703–22724.
[4] CH. Beyene and P. Kamat, Survey on Prediction and Analysis the Occurrence of Heart Disease Using Data
Mining Techniques, Int. J. Pure Appl. Math. 118(8) (2018) 165–174.
[5] N. Deepa and P. Pandiaraja, E health care data privacy preserving efficient file retrieval from the cloud service
provider using attribute based file encryption, J. Ambient Intel. Human. Comput. 12(5) (2020) 1–11.
[6] R. Devi and J. M. Shyla, Analysis of various data mining techniques to predict diabetes mellitus, Int. J. Appl.
Engin. Res. 11(1) (2016) 727–730.
[7] M. Durairaj and G. Kalaiselvi, Prediction of diabetes using soft computing techniques-A survey, Int. J. Sci. Tech.
Res. 4(3) (2015).
[8] R. Gupta, P. Kanungo and N. Dagdee, HD-MAABE: Hierarchical Distributed Multi-Authority Attribute Based
Encryption for Enabling Open Access to Shared Organizational Data, In: G. S. Tomar, N. S. Chaudhari, J. L. V.
Barbosa and M. K. Aghwariya (eds) International Conference on Intelligent Computing and Smart Communication 2019. Algorithms for Intelligent Systems. Springer, 2020.
[9] V. S. V. Hema and R. Kesavan, ECC based secure sharing of healthcare data in the health cloud environment,
Wireless Personal Commun. 108(2) (2019) 1021–1035.
[10] F. Huang, J. Huang and Y. Shi, New framework for reversible data hiding in encrypted domain, IEEE Trans. Inf.
Forensics Sec. 11(12) (2016) 2777–2789.
[11] P. Kumar and SH. B. Rana, Development of modified AES algorithm for data security, Optik-Int. J. Light Elect.
Opt. 127(4) (2016) 2341–2345.
[12] S. S. Kumar, SH. Prasad, M. Parimala and DR. G. M. Someswar, Scalable and secure sharing of personal health
records in cloud computing using attribute based encryption, Int. J. Adv. Comput. Tech. 5(6) (2016).
[13] S. Kumari, M. Karuppiah, A. K. Das, X. Li, F. Wu and N. Kumar, A secure authentication scheme based on
elliptic curve cryptography for IoT and cloud servers, J. Supercom. 74(12) (2018) 6428–6453.
[14] P. Nagar, H. K. Menaria and M. Tiwari, Novel Approach of Intrusion Detection Classification Deeplearning Using
SVM, In: A. K. Luhach, J. A. Kosa, R. CH. Poonia, X. Gao and D. Singh (eds) First International Conference on
Sustainable Technologies for Computational Intelligence: Proceedings of ICTSCI 2019, Springer Nature, 2020.
[15] P. Preethi and R. Asokan, A high secure medical image storing and sharing in cloud environment using hex code
cryptography method—secure genius, J. Med. Imag. Health Inf. 9(7) (2019) 1337–1345.
[16] A. Priya, Dr. S. Saradha, A detailed survey of the security issues and defensive tactic in cloud background, J.
Adv. Res. Dyn. Cont. Syst. 11(11) (2019) 606–611.
[17] A. Priya, Dr. S. Saradha, An efficient prediction and privacy preservation using enhanced blowfish cryptographic
scheme for cloud security, HTL J. 26(11) (2020) 1–9.
[18] A. Priya, Dr. S. Saradha, An overview on cloud computing frameworks and review on cloud security schemes, J.
Crit. Rev. 7(17) (2020) 3303–3308.
[19] M. Rasori, P. Perazzo and G. Dini, A lightweight and scalable attribute-based encryption system for smart cities,
Comput. Commun. 149(2020) (2020) 78–89.
[20] M. Sakthivanitha and S. Saradha, Survey based on security aware caching scheme for IoT based information
centric networking, EAI Endorsed Trans. Energy Web 8(32) (2020) e2.
[21] F. Sammy and S. M. C. Vigila, An Efficient Multiauthority Attribute-Based Encryption Technique for Storing
Personal Health Record by Compressing the Attributes, In: J. Jayakumari, G. K. Karagiannidis, M. Ma and S.
A. Hossain (eds) Advances in Communication Systems and Networks. Lecture Notes in Electrical Engineering,
Springer, Singapore, 2020.
[22] H. Wang, SH. Wu, M. Chen and W. Wang, Security protection between users and the mobile media cloud, IEEE
Commun. Mag. 52(3) (2014) 73–79.
[23] H. Xiong, H. Zhang and J. Sun, Attribute-based privacy-preserving data sharing for dynamic groups in cloud
computing, IEEE Syst. J. 13(3) (2018) 2739–2750.
[24] F. Zafar, A. Khan, S. U. R. Malik, M. Ahmed, A. Anjum, M. I. Khan, N. Javed, M. Alam and F. Jamil, A
survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends, Comput. Sec.
65(2017) (2017) 29–49.