Cloud security vulnerabilities, Advanced encryption standard, IAAS, SAAS, PAAS, Cloud computing security technique.
 Z. Fu, X. Sun, N. Linge, and L. Zhou, "Achieving effective cloud search services: Multi-keyword ranked search over encrypted cloud data supporting synonym query," IEEE Transactions on Consumer Electronics, vol. 60, pp. 164-172, 2014.Available at: https://doi.org/10.1109/tce.2014.6780939.
 B. M. Salih and H. A. Edreis, "Comparison between virtualization and cloud computing," International Journal of Science and Research, vol. 5, pp. 195-199, 2016.Available at: https://doi.org/10.21275/v5i6.nov164128.
 K. Kumar and P. Kaur, "Road traffic control system in cloud computing: A review," International Journal of Grid and Distributed Computing, vol. 8, pp. 201-206, 2015.Available at: https://doi.org/10.14257/ijgdc.2015.8.3.20.
 M. Loudini, S. Rezig, and Y. Salhi, "Incorporate intelligence into the differentiated services strategies of a Web server: An advanced feedback control approach," Journal of Internet Services and Applications, vol. 1, pp. 1-16, 2013.
 S. Rajasekhar, E. Murali, and G. Nagalakshm, "Efficient architecture cloud computing confidentiality," International Journal of Research Studies in Computer Science and Engineering, vol. 3, pp. 12-16, 2016.
 C. Esposito, A. Castiglione, B. Martini, and K. Choo, "Cloud manufacturing: Security, privacy, and forensic concerns," IEEE Cloud Computing, vol. 3, pp. 16-22, 2016.Available at: https://doi.org/10.1109/mcc.2016.79.
 H. Takabi, J. Joshi, and G. Ahn, "Security and privacy challenges in cloud computing environments," IEEE Security & Privacy Magazine, vol. 8, pp. 24-31, 2010.Available at: https://doi.org/10.1109/msp.2010.186.
 S. Sherin, S., "Security and privacy issues of cloud computing; Solutions and secure framework," IOSR Journal of Computer Engineering, vol. 10, pp. 33-37, 2013.Available at: https://doi.org/10.9790/0661-01043337.
 M. ZekriyapanahGashti, "Scrutiny new framework in integrated distributed reliable systems," International Journal of Distributed and Parallel Systems, vol. 3, pp. 13-20, 2012.Available at: https://doi.org/10.5121/ijdps.2012.3502.
 R. Minni, K. Sultania, S. Mishra, and D. R. Vincent, "An algorithm to enhance security in RSA," presented at the 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT). IEEE, 2013.