[1]
R. Jain, S. Madan, and B. Garg, “Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment”, Int. J. Comp. Sci. Eng., vol. 3, no. 1, pp. 130–136, Jan. 2015.