[1] P. Mell and T. Grance, “Effectively and Securely Using the Cloud Computing Paradigm,” NIST, Information Technology Laboratory, pp. 304-311, 2009.
[2] G. Rossman, L. McMillan, E. White, Y. Deniz, B. Gourley, “Survey finds database in the cloud taking over in enterprises,” OCTOBER 29, 2015, http://openstackdbaas.ulitzer.com/node/3523973, 2015.
[3] B. Furht and A. Escalante, “Handbook of cloud Computing,” Springer Publishing Company, Incorporated, 2010.
[4] J. Kendrick, “The rapidly accelerating cloud-enabled enterprise,” [Online]. Available:http://www.oracle.com/us/products/database/2015.-ioug-survey-db-manageability-2542988.pdf, 2015.
[5] B. Chor, S. Goldwasser, S. Micali and B. Awerbuch, “Verifiable secret sharing and achieving simultaneity in the presence of faults,” In Proceedings of the 26th IEEE Symposium on the Foundations of Computer Science, pp. 383-395, 1985 .
[6] M.A. Hadavi, M. Noferesti, R. Jalili, and E. Damiani, “Database as a Service: Towards a Unified Solution for Security Requirements,” IEEE 36th International Conference on Computer Software and Applications Workshops (COMPSACW), 2012.
[7] D. Agrawal, A. E. Abbadi, F. Emekci and A. Metwally, “Database Management as a Service: Challenges and Opportunities,” In IEEE 25th International Conference on Data Engineering, pp. 1709–1716, 2009.
[8] H. Hacigumu, B. Iyer, C. Li and S. Mehrotra, “Executing SQL over Encrypted Data in the Database-Service-Provider Model,” SIGMOD '02, USA, pp. 216–227, June, 2002.
[9] M. A. Hadavi and R. Jalili, “Secure Data Outsourcing Based on Threshold Secret Sharing: Towards a More Practical Solution,” in Proc. VLDB PhD Workshop. Singapore, pp. 54-59, 2010.
[10] Y. Yu, L. Jussipekka and P. Benjamin, “A Study on the Security of Privacy Homomorphism,” International Journal of Network Security, In Information Technology: New Generations, Vol.6, No.1, pp. 33–39, IEEE, 2006.
[11] L. Tawalbeh, S. Nour, R. Al-Qassas and F. AlDosari, “A Secure Cloud Computing Model based on Data Classification,” In Procedia Computer Science pp. 1153–1158, 2015.
[12] A. Jayadar and R. Arunachalam, “Secure Cloud DBaaS by Client and Server side Encryption, “ In International Journal of Science and Research, 2319-7064, 2013.
[13] M. Singh and M. Alka, “A Dynamic Approach For Data Base Security,” International Journal of Computer Science and Mobile Computing, Vol. 3, Issue. 5, pp. 1247–1253, 2014.
[14] K. Munir, “Security Model for Cloud Database as a Service (DBaaS),” Cloud Technologies and Applications (CloudTech), International Conference on. IEEE, 7336974, 2015.
[15] A.K. Chattopadhyay, A. Nag and K. Majumder, “Secure Data Outsourcing on Cloud Using Secret Sharing Scheme,” International Journal of Network Security, Vol.19, No.6, PP.912-921,2017.
[16] D. Agrawal, K. S. Candan and W. S. Li, “Information and Software as Services,” LNBIP, Springer, Heidelberg, Vol. 74, pp. 57–80, 2011.
[17] X. Tian, C. Sha, X. Wang and A. Zhou, “Privacy Preserving Query Processing on Secret Share Based Data Storage,” In. DASFAA 2011. Part I. LNCS, Vol. 6587, pp. 108–122, Springer, Heidelberg, 2011.
[18] جمیله شفیعی و اشکان سامی، «بهبود امنیت با استفاده از معیارهای استخراج شده از مخازن نرم افزاری- معیار فعالیت توسعهدهنده»، مجله مهندسی برق دانشگاه تبریز، جلد 45، شماره 3، پاییز 1394.
[19] R. J. McEliece and D. V. Sarwate, “On Sharing Secrets and Reed-SolomonCodes Comm -of ACM,” Yol.24, No.9, pp. 83–84, 1981.
[20] K. Okada and K. Kurosawa, “MDS secret sharing scheme secure against cheaters,” IEEE Trans, on Information Theory, I T-46, pp. l078-1081, 2000.
[21] J. Pieprzyk and X. Zhang, “Ideal ThresholdS chemesfr orn MDS Codes,” pp. 253–2632, 2003.
[22] A. Behnad and T. Euclid, “Sharing the secret fingerprint tolerant of fraud with the help of decoding the list,” Fifteenth of Iran's Electrical Engineering Conference, 2007.
[23] S. Mahajan and G. Singh, “Reed-Solomon Code Performance for M-ary Modulation over AWGN Channel,” International Journal of Engineering Science and Technology (IJEST), Vol. 3, No. 5, May, 2011.
[24] N. Stolanov and M. Bozhilova, “A Study of Lattice-Based Cryptography,” Conference Paper, 5-th international scientific conference on defensive technologies-oteh 2012, at elgrade, Serbia, 2012.
[25] P. Shor, “Algorithms for quantum computation: discrete logarithms and factoring,” In Foundations of Computer Science, 1994 Proceedings, 35th Annual Symposium on IEEE, pp. 124–134, 1994.
[26] R. Bayer and E. M. McCreight, “Organization and maintenance of large ordered indexes,” Vol. 1, Issue. 3, pp. 173–189, 1972.
[27] R. Bansarkhani and M. Meziani, “An Efficient Lattice-Based Secret Sharing Construction,pp. 160–168, 2012.
[28] A. Shamir, “How to share a secret,” In Communications of the ACM, Vol.22, pp. 612–613, 1979
[29] J. L. Dautrich and C. V. Ravishankar, “Security Limitations of Using Secret Sharing for Data Outsourcing,” Vol. 7371, pp. 145–160, 2012.
[30] A. Toshinori, “Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n − 1 Cheaters,” Vol. 4586, pp. 133–142, 2007.
[31] محمدعلی نعمتبخش، سیمین قاسمی فلاورجانی و بهروز شاهقلی قهفرخی، «تخصیص وظایف چندهدفه در واگذاری به ابر سیار»، مجله مهندسی برق دانشگاه تبریز، جلد ۴۶، شماره ۴ ،زمستان 1395.
[32] M. Narasimha and G. Tsudik, “Authentication of outsourced databases using signature aggregation and chaining,” pp. 420–436, 2006