Lemoudden, M., Ben Bouazza, N., El Ouahidi, B., & Bourget, D. (2013). A survey of cloud computing security overview of attack vectors and defense mechanisms. Journal of Theoretical and Applied Information Technology, 54(2), 325-330