M. Kunze and A. , Scientific Cloud Computing: Early Definition and Experience High Performance Computing and Communications, 10 th IEEE International Conference, 2008.

P. Grange, White paper: Cloud computing. Syntec computing, page 1 to 19, 2010.

P. Mell and T. Grance, Draft NIST Working Definition of Cloud Computing, 2009.

Q. Zhang, L. Cheng, and R. Boutaba, Cloud computing: state-ofthe-art and research challenges, J Internet Serv Appl, 2010.

M. Okuhara, Security Architecture for Cloud Computing, FUJITSU Sci. Tech. J, vol.46, issue.4, pp.397-402, 2010.

H. Yu, Y. E. Gelogo, and K. J. Kim, Securing Data Storage in Cloud Computing, Journal of Security Engineering, pp.251-260, 2012.

F. Almen´arez, A. Mar´?n, C. Campo, and C. , PTM: A Pervasive Trust Management Model for Dynamic Open Environments, Proceedings of First Workshop on Pervasive Security, Privacy and Trust PSPT'04, 2004.

S. Pal, N. Khatua, and . Chaki, Sugata Sanyal

, A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security", Annals of Faculty Engineering Hunedoara International Journal of Engineering, vol.10, issue.1, pp.1584-2665, 2012.

S. Priyank and . Agents, A Mobile Agent based Trust Model for Cloud Computing, International Journal of Computer Applications, vol.36, issue.12, pp.975-8887, 2011.

A. Mohamed, A. Rodziah, R. Abdullah, and M. Masrah, A framework of multi agent system to facilitate security of cloud data storage, Annual International Conference on Cloud Computing and Virtualization, 2010.

V. Kumar, M. S. Swetha, M. S. Muneshwara, and P. S. Prakash, Cloud Computing: Towards Case Study of Data Security Mechanism, India International Journal of Advanced Technology & Engineering Research

L. M. Kaufman, Can public-cloud security meet its unique challenges?, Security & Privacy, IEEE, vol.8, pp.55-57, 2010.

E. Safiriyu, A. Olatunde, and O. Ayodeji, A User Identity Management Protocol for Cloud Computing Paradigm, Network and System Sciences, vol.4, pp.152-163, 2011.

T. Dillon, C. Wu, and E. Chang, Cloud Computing: Issues and Challenges, 24th IEEE International Conference on Advanced Information Networking and Applications, 2010.

X. Zhang, N. Wuwong, and H. Li, Information Security Risk Management Framework for the Cloud Computing Environments, 10th IEEE Int. Conf. on Computer and Information Technology CTI, 2010.

A. Alwesabi and K. Okba, Security Method: Cloud Computing Approach Based on Mobile Agents, International Journal of New Computer Architectures and their Applications (IJNCAA), vol.4, issue.1, pp.17-29, 2014.