3Armbrust M,Fox A,Griffith R. A view of cloud computing[J].Communications of the ACM,2010,(04):50-58.
4Lenk A,Klems M,Nimis J. What's inside the cloud?An architectural map of the cloud landscape[A].Washington DC:USA:IEEE Computer Society,2009.
5Ryan M D. Cloud computing security:scientific challenge,and a survey of solutions[J].Journal of Systems and Software,2013,(09):2263-2268.
6Subashini S,Kavitha V. A survey on security issues in service delivery models of cloud computing[J].Journal of Network and Computer Applications,2011,(01):1-11.
7Jula A,Sundararajan E,Othman Z. Cloud computing service composition:a systematic literature review[J].Expert Systems with Applications,2014.3809-3824.
8Seid H A,Lespagnol A. Virtual private network[P].USA:.5,768,271.Jun 16.1998,.
9Bellare M,Rogaway P. Optimal asymmetric encryption[A].Perugia,Italy:Springer Berlin,.