B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, John Wiley and Sons, Second edition, 2007.
 S. Chakravarty, M. V. Barbera, G. Portokalidis, M. Polychronakis and A. D. Keromytis, “On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records”, Proc. Of 15nd International Conference on Passive and Active Measurement, USA, pp. 247-257, 2014.
 A. Johnson, “Design and Analysis of Efficient Anonymous-Communication Protocols”, PhD thesis, Yale University, 2009.
 G. Kambourakis, “Anonymity and Closely Related Terms in the Cyberspace: An analysis by Example”, Journal of Information Security and Applications, Vol. 19, No. 1, pp. 2–17, 2014.
 D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Communications of the ACM, Vol. 24, No. 2, pp 84-88, 1981.
 G. Danezis, "Better Anonymous Communications", PhD Thesis, University of Cambridge, 2004.
 M. Reiter and A. Rubin, “Crowd: Anonymity for Web Transaction”, ACM Transactions on Information and System Security, 1998.
 T. Lu, X. Zhang, X. Du and Y. Li, “Towards a Comprehensive Analysis of Crowds Anonymity System”, International Journal of Security and Its Applications, Vol. 10, No. 7, pp. 25-40, 2016.
 S. Mahmud Khan and K. W. Hamlen, "AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing", Proc. of 11nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), USA, pp. 170-176, 2012.
 R. Laurikainen, “Secure and Anonymous Communication in the Cloud”, Aalto University School of Science and Technology, Department of Computer Science and Engineering, Technical Report, TKK-CSE-B10, 2010.
 M. Alidoost Nia, A. Ghorbani and R. Ebrahimi Atani, “A Novel Anonymous Cloud Architecture Design; Providing Secure Online Services and Electronic Payments”, Proc. of the 1nd international conference on Electronic Commerce and Economy, Iran, 2013.
 M. Hamada Ibrahim, “AATCT: Anonymously Authenticated Transmission on the Cloud with Traceability”, International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 6, No. 9, pp. 251-259, 2015.
 S. Pate, S. H. Gadhari, V. Mane, “Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute Based Encryption”, International Journal for Research in Engineering Application & Management (IJREAM), Special Issue-01, 2016.
 R. Mortier , A, Madhavapeddy , T. Hong , D. Murray and M. Schwarzkopf, “Using Dust Clouds to Enhance Anonymous Communication”, Proc. Of 18nd International Workshop on Security Protocols, United Kingdom, pp. 54-59, 2010.
 N. Giweli, S. Shahrestani and H. Cheung “Enhancing Data Privacy and Access Anonymity in Cloud Computing”, Journal of Communications of the IBIMA, Vol. 2013, No. 462966, pp. 1-10, 2013.
 J.F. Raymond, “Traffic analysis: Protocols, Attacks, Design Issues and Open Problems”, Proc. of international workshop on design issues in anonymity and unobservability, H. Federrath, (ed.), No. 2009 in LNCS, Springer-Verlag, pp. 10-29, 2000.
 T. Lu, P. Yao, L. Zhao, Y. Li and Y. Xia, “Towards Attacks and Defenses of Anonymous Communication Systems”, International Journal of Security and its Applications, Vol. 9, No. 1, pp. 313-328, 2015.
 T. Lu, P. Gao, X. Du and Y. LiAn, “Analysis of Active Attacks on Anonymity Systems”, International Journal of Security and Its Applications, Vol. 10, No. 4, pp. 95-104, 2016.
 CloudSim: A Framework For Modeling And Simulation Of Cloud Computing Infrastructures And Services, http://www.cloudbus.org/cloudsim/, accessed on November 2018.
 Sh. Xu, Ch. Q. Wu, A. Hou, Y. Wang, M. Wang, “Energy-Efficient Dynamic Consolidation of Virtual Machines in Big Data Centers”, International Conference on Green, Pervasive, and Cloud Computing, pp 191-206, 2017.
 Y. Challal and H. Seba, “Group Key Management Protocols: A Novel Taxonomy", International Journal of Information Theory, Vol. 2, No. 2, pp. 105-118, 2005.
 A. Pathan and M. D. Ingle, “Survey Paper on User Anonymous Authentication Scheme for Decentralized Access Control in Clouds”, International Journal of Science and Research (IJSR), Vol. 4, No. 11, pp. 2024-2027, 2015.