I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
p
u
t
er
Science
Vo
l.
11
,
No
.
3
,
Sep
tem
b
er
201
8
,
p
p
.
1
1
6
8
~
1
1
7
5
I
SS
N:
2502
-
4752
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ee
cs
.
v
11
.i
3
.
p
p
1
1
6
8
-
1
1
7
5
1168
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
co
r
e.
co
m/jo
u
r
n
a
ls
/in
d
ex
.
p
h
p
/
ijeec
s
The Facto
rs
Af
fec
ting o
n Ma
na
g
ing
Sensitive
Da
ta in
Clo
ud
Co
m
pu
ting
H
a
if
a
a
J
a
s
s
i
m
M
uh
a
s
in
1
,
Ro
dzia
h At
a
n
2
,
M
a
rz
a
na
h A.
J
a
ba
r
3
,
Sa
lf
a
rina
Abdu
lla
h
4
1
,
2,
3,
4
De
p
a
rtm
e
n
t
o
f
S
o
f
t
w
a
re
En
g
i
n
e
e
rin
g
&
In
f
o
rm
a
ti
o
n
S
y
ste
m
,
F
a
c
u
lt
y
o
f
Co
m
p
u
ter S
c
ien
c
e
a
n
d
I
n
f
o
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
y
,
Un
iv
e
rsit
y
P
u
tra M
a
la
y
sia
(UP
M
),
4
3
4
0
0
S
e
lan
g
o
r
,
S
e
r
d
a
n
g
,
M
a
lay
si
a
2
Ha
lal
Re
se
a
r
c
h
P
ro
d
u
c
ts
In
st
it
u
t
e
,
Un
iv
e
rsity
P
u
tra M
a
lay
sia
,
S
e
r
d
a
n
g
,
S
e
lan
g
o
r,
M
a
lay
sia
1
Co
ll
e
g
e
o
f
Ed
u
c
a
ti
o
n
f
o
r
P
u
re
S
c
ien
c
e
Ib
n
-
Al
-
Ha
it
h
a
m
,
De
p
a
rt
m
e
n
t
o
f
Co
m
p
u
ter
S
c
ien
c
e
,
U
n
iv
e
rsity
o
f
Ba
g
h
d
a
d
,
Ba
g
h
d
a
d
,
Ira
q
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
A
p
r
1
2
,
2
0
1
8
R
ev
i
s
ed
J
u
n
1
3
,
2
0
1
8
A
cc
ep
ted
J
u
n
2
7
,
2
0
1
8
Clo
u
d
c
o
m
p
u
ti
n
g
re
p
re
se
n
ts
t
h
e
m
o
st
im
p
o
rtan
t
sh
if
t
in
c
o
m
p
u
ti
n
g
a
n
d
in
f
o
rm
a
ti
o
n
tec
h
n
o
lo
g
y
(I
T
).
Ho
w
e
v
e
r,
s
e
c
u
rit
y
a
n
d
p
riv
a
c
y
r
e
m
a
in
th
e
m
a
in
o
b
sta
c
les
to
it
s
w
id
e
sp
re
a
d
a
d
o
p
ti
o
n
.
I
n
th
is
re
se
a
rc
h
w
e
w
il
l
re
v
ie
w
th
e
se
c
u
rit
y
a
n
d
p
riv
a
c
y
c
h
a
ll
e
n
g
e
s
t
h
a
t
a
ff
e
c
t
c
rit
ica
l
d
a
ta
in
c
lo
u
d
c
o
m
p
u
ti
n
g
a
n
d
id
e
n
ti
f
y
so
lu
ti
o
n
s
th
a
t
a
re
u
se
d
to
a
d
d
re
ss
th
e
se
c
h
a
ll
e
n
g
e
s.
S
o
m
e
q
u
e
stio
n
s
th
a
t
n
e
e
d
a
n
sw
e
rs
a
re
:
(a
)
Us
e
r
a
c
c
e
ss
m
a
n
a
g
e
m
e
n
t,
(b
)
P
ro
tec
t
p
riv
a
c
y
o
f
se
n
siti
v
e
d
a
ta,
(c
)
Id
e
n
ti
ty
a
n
o
n
y
m
it
y
to
p
ro
tec
t
th
e
Id
e
n
ti
ty
o
f
u
se
r
a
n
d
d
a
ta
f
il
e
.
T
o
a
n
s
w
e
r
th
e
se
q
u
e
stio
n
s,
a
sy
ste
m
a
ti
c
li
tera
t
u
re
re
v
ie
w
w
a
s
c
o
n
d
u
c
ted
a
n
d
stru
c
t
u
re
d
in
terv
iew
w
it
h
se
v
e
ra
l
se
c
u
rit
y
e
x
p
e
rts
w
o
rk
in
g
o
n
c
lo
u
d
c
o
m
p
u
ti
n
g
se
c
u
rit
y
to
in
v
e
stig
a
te
th
e
m
a
in
o
b
jec
ti
v
e
s
o
f
p
ro
p
o
se
d
f
ra
m
e
w
o
rk
,
a
p
il
o
t
stu
d
y
b
y
u
sin
g
a
stru
c
tu
re
d
q
u
e
stio
n
n
a
ire
w
a
s
c
o
n
d
u
c
ted
.
F
ra
m
e
w
o
rk
u
sin
g
m
u
l
ti
lev
e
l
to
e
n
h
a
n
c
e
m
a
n
a
g
e
m
e
n
t
in
f
o
r
m
a
ti
o
n
s
y
ste
m
o
n
se
n
siti
v
e
d
a
ta i
n
c
lo
u
d
e
n
v
iro
n
m
e
n
t.
K
ey
w
o
r
d
s
:
C
lo
u
d
C
o
m
p
u
ti
n
g
I
d
en
tit
y
An
o
n
y
m
it
y
P
r
iv
ac
y
Secu
r
it
y
Sen
s
iti
v
e
Data
Co
p
y
rig
h
t
©
201
8
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Haif
aa
J
ass
i
m
M
u
h
a
s
i
n
,
Dep
ar
t
m
en
t o
f
So
f
t
w
ar
e
E
n
g
i
n
ee
r
in
g
&
I
n
f
o
r
m
atio
n
S
y
s
te
m
,
Facu
lt
y
o
f
C
o
m
p
u
ter
Scien
ce
an
d
I
n
f
o
r
m
atio
n
T
ec
h
n
o
lo
g
y
,
Un
i
v
er
s
it
y
P
u
tr
a
Ma
la
y
s
ia
(
U
P
M)
,
4
3
4
0
0
Selan
g
o
r
,
Ser
d
an
g
,
Ma
la
y
s
ia.
E
m
ail:
h
ai
f
aa
j
ass
i
m
@
y
a
h
o
o
.
co
m
1.
I
NT
RO
D
UCT
I
O
N
I
n
cr
ea
s
in
g
i
n
ter
n
et
u
s
er
s
o
n
web
s
ites
,
o
r
s
u
r
f
i
n
g
th
e
i
n
ter
n
e
t
r
eq
u
ir
es
n
e
w
w
a
y
s
to
m
a
n
a
g
e
th
e
s
ize,
d
iv
er
s
it
y
a
n
d
av
ai
lab
ilit
y
o
f
d
ata,
th
er
e
f
o
r
e,
th
e
u
s
er
s
tr
e
n
d
t
o
w
ar
d
s
u
s
i
n
g
clo
u
d
co
m
p
u
t
in
g
.
C
lo
u
d
co
m
p
u
ti
n
g
h
as
d
ef
i
n
ed
b
y
Natio
n
al
I
n
s
ti
tu
te
o
f
Sta
n
d
ar
d
s
an
d
T
ec
h
n
o
lo
g
y
(
NI
ST
)
as
f
o
llo
w
s
:
C
l
o
u
d
co
m
p
u
tin
g
is
a
co
m
p
r
e
h
en
s
iv
e
a
n
d
s
y
s
te
m
-
wid
e
ac
ce
s
s
m
o
d
el,
w
h
ich
i
s
a
s
et
o
f
ch
a
n
g
es
a
n
d
co
n
f
ig
u
r
atio
n
o
f
p
er
m
it
ted
co
m
p
u
ti
n
g
r
eso
u
r
ce
s
,
in
c
lu
d
i
n
g
s
er
v
er
s
,
n
et
w
o
r
k
s
,
ap
p
licatio
n
s
,
s
to
r
ag
e
s
p
ac
e
an
d
s
er
v
ice
s
[
1
]
.
T
h
e
clo
u
d
co
m
p
u
ti
n
g
m
o
d
el
ai
m
s
to
p
r
o
v
id
e
a
g
r
ea
t
d
ea
l
o
f
co
m
p
u
ti
n
g
p
o
w
er
in
a
v
ir
t
u
al
w
a
y
b
y
co
m
b
i
n
i
n
g
all
s
er
v
ices
an
d
r
es
o
u
r
ce
s
in
to
a
o
n
e
s
y
s
te
m
.
T
h
e
p
ap
er
[
2
]
d
ef
in
es
clo
u
d
d
ep
lo
y
m
e
n
t
m
o
d
el
s
th
at
in
cl
u
d
e
p
u
b
lic,
p
r
i
v
at
e,
h
y
b
r
i
d
,
an
d
co
m
m
u
n
it
y
.
I
t
al
s
o
tal
k
s
ab
o
u
t
k
e
y
f
ea
tu
r
e
s
s
u
c
h
a
s
b
r
o
ad
b
an
d
ac
ce
s
s
,
f
ast
f
le
x
ib
ilit
y
,
m
ea
s
u
r
ed
s
er
v
ices,
s
el
f
-
s
er
v
ice
d
e
m
a
n
d
an
d
r
eso
u
r
ce
p
o
o
lin
g
.
I
n
ter
m
s
o
f
s
er
v
ice
m
o
d
els
p
r
o
v
id
ed
b
y
NI
ST
co
n
s
is
t
o
f
So
f
t
w
ar
e
-
as
-
a
-
Ser
v
ice
(
Saa
S),
P
latf
o
rm
-
as
-
a
-
Ser
v
ice
(
P
aa
S),
an
d
I
n
f
r
astr
u
ctu
r
e
-
as
-
a
-
Ser
v
ice.
C
lo
u
d
co
m
p
u
ti
n
g
li
k
e
o
t
h
er
I
T
f
ield
s
,
s
u
f
f
er
s
f
r
o
m
a
lo
t
o
f
s
ec
u
r
it
y
a
n
d
p
r
iv
ac
y
i
s
s
u
es,
w
h
ic
h
m
u
s
t
b
e
ad
d
r
ess
ed
[
3
-
5
]
.
T
h
ese
r
is
k
s
r
elate
d
to
p
o
lic
y
a
n
d
r
eg
u
lato
r
y
r
is
k
s
,
tec
h
n
i
ca
l
r
is
k
s
,
le
g
al
r
i
s
k
s
an
d
o
th
er
s
[
6
]
.
T
h
e
m
ai
n
o
b
j
ec
tiv
e
o
f
th
is
p
ap
er
is
im
p
r
o
v
i
n
g
an
d
m
a
n
a
g
in
g
s
e
n
s
i
tiv
e
d
ata
in
p
u
b
lic
clo
u
d
f
o
r
ef
f
ec
tiv
e
in
f
o
r
m
at
io
n
s
y
s
te
m
s
d
ec
is
io
n
s
m
a
k
in
g
.
T
h
is
p
ap
er
ex
p
lain
s
th
e
f
ac
to
r
s
i
n
f
lu
e
n
c
in
g
th
e
d
ec
i
s
io
n
o
f
m
an
a
g
e
m
e
n
t s
y
s
te
m
s
o
n
s
e
n
s
i
tiv
e
d
ata
an
d
r
elatio
n
s
b
et
w
ee
n
th
e
s
e
f
ac
to
r
s
i
n
clo
u
d
en
v
ir
o
n
m
e
n
t.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
Th
e
F
a
cto
r
s
A
ffectin
g
o
n
Ma
n
a
g
in
g
S
en
s
itive
Da
ta
in
C
lo
u
d
C
o
mp
u
tin
g
(
Ha
ifa
a
Ja
s
s
im
Mu
h
a
s
in
)
1169
T
h
e
r
em
ai
n
d
er
o
f
th
i
s
p
ap
er
is
as
f
o
llo
w
s
:
T
h
e
r
elate
d
w
o
r
k
s
i
s
d
is
cu
s
s
ed
i
n
s
ec
tio
n
2
.
T
h
e
m
et
h
o
d
o
lo
g
y
u
s
ed
f
o
r
co
n
d
u
ct
t
h
e
r
esear
ch
ex
p
lai
n
ed
in
s
ec
tio
n
3
.
I
n
s
ec
tio
n
4
g
i
v
e
s
th
e
r
esu
lts
o
f
t
h
e
r
esea
r
ch
.
Sectio
n
5
g
i
v
es t
h
e
d
is
cu
s
s
io
n
.
Fin
a
ll
y
,
s
ec
tio
n
6
f
o
r
co
n
clu
s
io
n
.
2.
RE
L
AT
E
D
WO
RK
S
P
r
iv
ac
y
an
d
s
ec
u
r
it
y
p
r
o
b
le
m
s
r
es
u
lti
n
g
f
r
o
m
t
h
e
ille
g
al
u
s
e
o
f
i
n
f
o
r
m
atio
n
,
an
d
d
is
c
lo
s
u
r
e
o
f
s
ec
r
et
in
f
o
r
m
atio
n
,
ca
n
h
i
n
d
er
th
e
ac
ce
p
tan
ce
o
f
c
lo
u
d
s
er
v
ic
es
b
y
u
s
er
s
.
R
ec
e
n
t
s
tu
d
ies
s
u
p
p
o
r
t
th
i
s
id
ea
,
th
is
i
n
d
icate
s
to
th
e
f
ac
t
th
at
th
e
p
r
i
m
ar
y
r
ea
s
o
n
s
f
o
r
n
o
n
-
ad
o
p
tio
n
o
f
clo
u
d
co
m
p
u
tin
g
s
er
v
ices
f
o
r
m
an
y
u
s
er
s
i
s
p
r
iv
ac
y
a
n
d
s
ec
u
r
it
y
c
o
n
ce
r
n
s
.
T
h
e
an
al
y
s
is
o
f
m
an
y
r
esear
ch
w
o
r
k
s
i
n
th
e
in
f
o
r
m
a
tio
n
tech
n
o
lo
g
y
u
s
ed
i
n
clo
u
d
c
o
m
p
u
ti
n
g
in
cl
u
d
es
m
a
n
y
f
ac
to
r
s
af
f
ec
ti
n
g
t
h
e
p
r
iv
ac
y
a
n
d
s
ec
u
r
it
y
o
f
d
ata
in
clu
d
i
n
g
a
u
th
o
r
izati
o
n
,
au
th
e
n
ticat
io
n
,
co
n
f
id
e
n
tialit
y
,
i
n
te
g
r
it
y
,
an
d
av
ailab
ilit
y
.
T
h
e
au
th
o
r
i
za
t
io
n
m
ec
h
a
n
i
s
m
r
eq
u
ir
ed
f
r
o
m
u
s
er
s
o
m
e
au
th
o
r
izatio
n
to
r
ea
ch
an
d
u
s
e
th
e
clo
u
d
s
er
v
ice.
T
h
e
p
r
o
v
id
er
p
r
o
b
lem
s
s
o
m
e
a
u
t
h
o
r
it
y
to
th
e
u
s
er
w
h
ic
h
p
o
in
t
o
u
t
w
h
a
t
t
y
p
e
o
f
p
r
o
ce
s
s
es
t
h
at
ca
n
b
e
p
er
f
o
r
m
b
y
u
s
er
[
7
]
.
A
u
th
e
n
ticat
io
n
i
s
id
e
n
ti
f
y
in
g
a
n
a
u
t
h
o
r
ized
u
s
er
b
ef
o
r
e
g
etti
n
g
ac
ce
s
s
to
th
e
s
er
v
ice
o
f
clo
u
d
an
d
th
e
u
s
er
u
s
ed
v
er
i
f
icatio
n
s
tep
s
[
7
]
.
C
o
n
f
id
en
tiali
t
y
w
h
er
e
th
e
u
s
er
o
f
clo
u
d
is
r
e
s
p
o
n
s
ib
le
f
o
r
an
y
p
r
o
ce
s
s
ca
r
r
ied
o
u
t
th
at
m
a
y
ca
u
s
e
d
ata
ch
an
g
es
o
r
lo
s
s
b
y
o
th
er
s
i
n
th
e
clo
u
d
a
n
d
s
p
ec
if
ied
to
li
m
it
th
e
co
n
f
id
en
t
ial
d
ata
ac
ce
s
s
to
i
n
te
n
d
ed
u
s
er
o
n
l
y
[
8
]
.
I
n
te
g
r
it
y
is
s
p
ec
if
ied
to
g
u
ar
an
tee
th
e
ac
cu
r
ac
y
o
f
t
h
e
tr
an
s
m
i
tted
i
n
f
o
r
m
at
io
n
w
i
th
o
u
t
a
n
y
c
h
an
g
e
.
I
n
teg
r
i
t
y
is
o
n
e
o
f
i
m
p
o
r
tan
t
is
s
u
es
r
elate
d
to
clo
u
d
s
ec
u
r
it
y
[
8
]
.
A
v
ailab
il
it
y
s
p
ec
if
ied
to
m
a
k
e
s
u
r
e
th
at
t
h
e
au
t
h
o
r
ized
u
s
er
s
ca
n
ac
ce
s
s
clo
u
d
r
eso
u
r
ce
s
an
y
ti
m
e
an
d
an
y
w
h
er
e
u
p
o
n
r
eq
u
est
[
9
]
.
Ma
n
y
s
tu
d
ie
s
h
a
v
e
ad
d
r
ess
ed
p
r
iv
ac
y
an
d
s
ec
u
r
it
y
v
u
ln
er
ab
i
liti
es
b
y
p
r
o
p
o
s
in
g
m
o
d
els
t
h
a
t
in
cr
ea
s
e
th
e
ef
f
ec
ti
v
e
n
ess
a
n
d
s
tr
en
g
t
h
o
f
s
ec
u
r
it
y
an
d
p
r
iv
ac
y
i
n
clo
u
d
co
m
p
u
ti
n
g
en
v
ir
o
n
m
e
n
t.
P
ap
er
[
10
]
h
av
e
id
en
ti
f
ied
s
e
v
er
al
w
a
y
s
i
n
w
h
ich
u
n
au
t
h
o
r
ized
o
r
i
n
ap
p
r
o
p
r
iate
ac
ce
s
s
to
p
er
s
o
n
al
i
n
f
o
r
m
atio
n
i
n
t
h
e
clo
u
d
p
r
o
v
id
ed
,
s
u
ch
as
th
e
lack
o
f
e
n
f
o
r
ce
m
en
t
f
o
r
ac
ce
s
s
co
n
tr
o
l
o
r
ch
an
g
e
o
f
p
o
licies
b
y
u
n
p
r
o
tecte
d
d
ata
o
r
/an
d
u
n
a
u
t
h
o
r
ized
en
titi
e
s
w
it
h
in
t
h
e
clo
u
d
.
T
h
e
p
ap
er
[
11
]
ex
p
lain
ed
r
ev
i
e
w
ed
i
s
s
u
es
o
f
p
r
iv
ac
y
,
tr
u
s
t
a
n
d
an
al
y
s
is
o
f
t
h
r
ea
ts
r
ela
ted
t
o
p
r
iv
ac
y
,
tr
u
s
t
a
n
d
s
ec
u
r
it
y
.
T
h
e
y
p
r
o
v
i
d
e
a
s
o
lu
tio
n
to
ac
h
ie
v
e
a
r
eli
ab
le
an
d
s
ec
u
r
e
clo
u
d
co
m
p
u
t
in
g
.
T
h
i
s
r
esear
ch
p
r
o
v
id
es
th
e
r
eq
u
ir
e
m
en
t
s
o
f
s
ec
u
r
it
y
f
o
r
p
er
s
o
n
al
r
eq
u
ir
e
m
en
ts
,
e
f
f
ec
ti
v
e
g
o
v
er
n
an
ce
a
n
d
s
o
m
e
e
n
cr
y
p
tio
n
tech
n
iq
u
es a
n
d
a
s
ec
u
r
e
m
o
d
el
f
o
r
v
ir
tu
al
izatio
n
i
n
th
e
clo
u
d
co
m
p
u
ti
n
g
s
y
s
te
m
.
T
h
e
p
ap
er
[
12
]
ex
p
lain
s
t
h
e
f
r
a
m
e
w
o
r
k
t
h
at
d
escr
ib
es
s
ec
u
r
i
t
y
p
r
o
b
le
m
s
o
f
s
er
v
ice
d
eli
v
er
y
m
o
d
el
s
.
T
h
e
r
esear
ch
er
s
f
ir
s
t e
x
p
lai
n
t
h
e
s
ec
u
r
it
y
o
f
ea
ch
d
eliv
er
y
m
o
d
el.
Af
ter
t
h
e
a
n
al
y
s
is
o
f
m
o
d
el,
th
e
a
u
t
h
o
r
s
f
in
d
a
lo
t
o
f
i
s
s
u
es
r
elate
d
to
t
h
e
SaaS
m
o
d
el.
P
ap
er
[
13
]
d
escr
ib
e
d
ep
lo
y
m
e
n
t
a
n
d
s
er
v
ic
e
m
o
d
els
i
n
clo
u
d
co
m
p
u
ti
n
g
.
T
h
e
r
esear
ch
er
s
p
r
esen
ted
an
d
ex
p
lain
ed
clo
u
d
s
to
r
ag
e
ar
ch
itectu
r
e
an
d
p
r
o
v
id
e
s
ec
u
r
it
y
a
n
d
r
eq
u
ir
e
m
en
ts
o
f
s
to
r
ag
e
a
s
a
s
er
v
ice.
T
h
ey
al
s
o
ex
p
lain
t
h
e
s
ec
u
r
it
y
co
n
ce
r
n
s
r
elate
d
to
s
to
r
ag
e
in
th
e
clo
u
d
.
A
tr
u
s
ted
en
v
ir
o
n
m
en
t
f
o
r
cu
s
to
m
er
s
m
u
s
t
b
e
en
s
u
r
ed
th
e
clo
u
d
s
er
v
ice
p
r
o
v
id
er
.
T
h
e
in
s
tr
u
ctio
n
s
an
d
d
ata
s
to
r
ed
in
th
e
clo
u
d
ar
e
ac
ce
s
s
ib
le
o
n
ly
to
tr
u
s
ted
u
s
er
s
.
R
eli
ab
le
ex
ec
u
tio
n
tec
h
n
iq
u
es
ar
e
p
r
o
v
id
ed
a
r
eliab
le
m
et
h
o
d
to
ch
ec
k
t
h
e
in
te
g
r
it
y
o
f
t
h
e
s
y
s
te
m
[
14
]
,
[
15
]
.
A
ls
o
,
th
e
in
te
g
r
it
y
o
f
a
n
y
s
y
s
te
m
e
x
ten
d
s
to
s
o
f
t
w
ar
e
m
an
a
g
e
m
e
n
t,
ap
p
licatio
n
s
,
a
n
d
s
ec
u
r
it
y
p
o
licies.
I
n
p
ap
er
d
i
s
cu
s
s
is
s
u
es r
elate
d
to
s
to
r
ag
e
an
d
d
ata
s
ec
u
r
it
y
in
clo
u
d
co
m
p
u
tin
g
.
A
ls
o
,
d
is
c
u
s
s
ed
m
an
y
is
s
u
es,
d
ev
elo
p
m
en
ts
r
elate
d
to
clo
u
d
c
o
m
p
u
tin
g
d
ata
an
d
th
e
s
ec
u
r
it
y
o
f
t
h
eir
s
to
r
ag
e.
T
h
e
y
also
p
r
o
v
id
ed
an
aly
s
is
o
f
s
o
m
e
is
s
u
e
s
r
elate
d
to
au
th
e
n
tic
atio
n
,
w
eb
s
er
v
ices,
av
ailab
ilit
y
,
au
th
o
r
izatio
n
an
d
ac
co
u
n
tab
ilit
y
,
t
h
e
a
u
th
o
r
s
d
er
iv
ed
s
o
m
e
o
f
m
ec
h
a
n
i
s
m
s
an
d
tech
n
iq
u
e
s
f
o
r
ea
ch
f
ea
t
u
r
e
to
o
b
tain
p
r
iv
ac
y
f
o
r
d
ata
an
d
s
ec
u
r
e
s
to
r
ag
e.
I
n
[
17
]
p
r
esen
t
ch
alle
n
g
e
s
an
d
s
ec
u
r
it
y
is
s
u
e
s
r
elate
d
to
p
r
iv
ate
a
n
d
p
u
b
lic
clo
u
d
s
.
So
m
e
s
ec
u
r
it
y
is
s
u
es
s
u
c
h
as
m
u
ltip
le
te
n
an
t
s
er
v
ice
i
s
s
u
es,
id
en
t
it
y
is
s
u
e
s
,
ac
ce
s
s
co
n
tr
o
l,
av
ailab
il
it
y
o
f
s
er
v
ice
an
d
d
ata
s
to
r
ag
e
i
s
s
u
es
h
a
v
e
b
ee
n
d
is
c
u
s
s
ed
.
A
ll
o
f
t
h
e
s
e
i
s
s
u
es
f
o
c
u
s
o
n
asp
ec
ts
o
f
d
ata
m
an
a
g
e
m
en
t
a
n
d
u
s
e.
I
n
[
18
]
d
is
cu
s
s
ed
t
h
e
s
tep
s
to
d
ea
l
w
it
h
s
ec
u
r
it
y
an
d
clo
u
d
p
r
o
b
le
m
s
b
ef
o
r
e
m
ak
in
g
t
h
e
d
ec
i
s
io
n
to
ad
o
p
t
clo
u
d
co
m
p
u
ti
n
g
,
t
h
e
n
ee
d
to
d
ev
elo
p
a
s
tr
ateg
y
o
f
g
o
v
er
n
a
n
ce
a
n
d
tech
n
o
lo
g
y
,
th
e
s
tr
en
g
t
h
o
f
clo
u
d
co
m
p
u
ti
n
g
,
an
al
y
s
is
o
f
er
r
o
r
s
an
d
p
r
o
f
its
an
d
m
a
n
ag
e
m
e
n
t
o
f
i
n
f
o
r
m
ati
o
n
s
ec
u
r
it
y
i
n
t
h
e
clo
u
d
.
T
h
e
p
ap
er
[
19
]
d
is
cu
s
s
es
th
e
b
asic
f
ea
tu
r
es
o
f
c
lo
u
d
,
s
ec
u
r
it
y
p
r
o
b
lem
s
,
t
h
r
ea
ts
a
n
d
ap
p
r
o
p
r
iate
s
o
lu
tio
n
s
.
T
h
e
p
ap
er
also
d
is
cu
s
s
es
m
an
y
to
p
ics
r
elate
d
to
clo
u
d
,
n
a
m
e
l
y
clo
u
d
ar
ch
i
tectu
r
e,
s
er
v
ice,
d
ep
lo
y
m
e
n
t
m
o
d
el
s
,
t
ec
h
n
o
lo
g
ies
a
n
d
co
n
ce
p
ts
f
o
r
clo
u
d
s
ec
u
r
i
t
y
,
at
tack
s
a
n
d
th
r
ea
ts
.
T
h
e
m
ai
n
o
b
j
ec
tiv
e
o
f
t
h
e
p
ap
er
[
20
]
is
to
o
f
f
er
s
ec
u
r
it
y
f
o
r
th
e
d
ata
s
to
r
ed
in
th
e
clo
u
d
d
atab
ase
f
r
o
m
s
ec
u
r
it
y
t
h
r
ea
ts
r
elate
d
to
clo
u
d
co
m
p
u
t
in
g
.
T
h
e
au
th
o
r
s
p
r
o
p
o
s
e
a
n
e
w
m
et
h
o
d
o
lo
g
y
t
h
at
ca
n
ef
f
ec
tiv
e
l
y
m
a
n
a
g
e
d
ata
s
ec
u
r
it
y
a
n
d
p
r
o
v
id
e
p
r
iv
ac
y
to
u
s
er
s
u
s
in
g
c
lo
u
d
s
er
v
ices.
T
h
is
p
ap
er
p
r
o
v
id
es
ad
d
itio
n
al
co
n
tr
o
l
s
y
s
te
m
th
a
t
ac
ts
as
an
in
ter
f
ac
e
b
et
w
ee
n
th
e
clo
u
d
u
s
er
an
d
t
h
e
o
w
n
er
o
f
th
e
clo
u
d
.
T
h
is
ap
p
r
o
ac
h
g
iv
es
s
ec
u
r
it
y
f
r
o
m
v
ie
w
p
o
in
t
o
f
u
s
er
an
d
o
w
n
er
an
d
g
iv
i
n
g
f
lex
ib
il
it
y
to
th
e
i
n
f
r
as
tr
u
ct
u
r
e
o
f
clo
u
d
an
d
h
as
ad
d
ed
f
ea
tu
r
e
o
f
p
r
ev
en
ti
n
g
a
u
s
er
ac
co
u
n
t
w
h
e
n
d
o
in
g
a
w
r
o
n
g
ac
tiv
it
y
.
I
n
th
e
p
ap
er
[
21
]
a
clo
u
d
s
ec
u
r
it
y
m
a
n
a
g
e
m
e
n
t
m
o
d
el
w
a
s
p
r
o
p
o
s
ed
to
a
d
d
r
e
s
s
leak
a
g
e
o
f
p
er
s
o
n
a
l
in
f
o
r
m
atio
n
to
a
n
et
w
o
r
k
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2502
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
11
,
No
.
3
,
Sep
tem
b
er
201
8
:
1
1
6
8
–
1
1
7
5
1170
s
elli
n
g
s
ec
u
r
it
y
ap
p
licatio
n
s
w
h
er
e
p
er
s
o
n
al
i
n
f
o
r
m
atio
n
i
s
d
iv
id
ed
in
to
t
w
o
t
y
p
es
i
m
p
o
r
tan
t
an
d
g
e
n
er
al
in
f
o
r
m
atio
n
to
en
s
u
r
e
th
at
p
r
iv
ate
d
ata
d
o
es
n
o
t
leak
an
d
s
to
r
e
it
in
a
p
r
iv
ate
clo
u
d
.
T
h
e
clo
u
d
-
b
ased
m
e
m
b
er
s
h
ip
s
er
v
ice
is
p
r
o
v
i
d
ed
an
d
clo
u
d
-
b
ased
s
y
s
te
m
is
also
b
ein
g
ap
p
lied
to
test
th
e
n
e
w
m
o
d
el
o
f
f
r
a
m
e
w
o
r
k
an
d
th
e
r
es
u
lt
s
s
h
o
w
t
h
at
t
h
e
m
o
d
el
is
v
iab
le.
T
h
e
au
th
o
r
s
in
p
ap
er
[
22
]
p
r
o
p
o
s
ed
a
n
ew
m
et
h
o
d
to
p
r
o
tec
t
s
ec
u
r
it
y
,
ac
ce
s
s
co
n
tr
o
l,
co
n
f
id
en
tialit
y
an
d
in
te
g
r
it
y
o
f
s
en
s
iti
v
e
d
ata
f
o
r
clo
u
d
u
s
er
s
t
h
r
o
u
g
h
t
h
e
u
s
i
n
g
o
f
m
u
l
tip
le
clo
u
d
s
er
v
ice
p
r
o
v
id
er
s
.
T
h
e
o
r
g
an
izatio
n
e
n
cr
y
p
t
s
s
e
n
s
it
iv
e
d
ata
r
elate
d
to
i
ts
s
ec
u
r
it
y
p
o
lic
y
a
n
d
p
r
o
ce
d
u
r
es
an
d
s
to
r
in
g
en
cr
y
p
te
d
d
ata
in
r
eliab
le
clo
u
d
.
T
h
e
k
e
y
s
u
s
ed
i
n
e
n
cr
y
p
tio
n
p
r
o
ce
s
s
ar
e
also
en
cr
y
p
ted
a
n
d
s
to
r
e
d
ag
ain
in
a
n
o
t
h
er
ar
ea
o
f
th
e
clo
u
d
an
d
th
e
o
r
g
an
iza
tio
n
h
a
v
e
k
e
y
s
f
o
r
en
cr
y
p
ted
d
ata
k
e
y
s
.
On
l
y
th
e
a
u
th
o
r
ized
en
tit
y
ca
n
ac
ce
s
s
a
n
d
u
s
e
t
h
e
d
ata
a
n
d
ca
n
p
r
ev
en
t in
ter
n
al
attac
k
s
b
y
p
r
o
v
id
in
g
ce
r
tai
n
p
r
iv
ileg
e
s
.
T
h
e
p
ap
er
[
23
]
u
s
ed
a
d
if
f
er
e
n
t
ap
p
r
o
ac
h
to
s
ec
u
r
e
p
er
s
o
n
al
d
ata
an
d
b
u
s
i
n
ess
d
at
a
in
t
h
e
clo
u
d
.
T
h
e
au
t
h
o
r
s
p
r
o
p
o
s
ed
a
s
y
s
te
m
to
p
r
ev
en
t
d
ata
ac
ce
s
s
m
e
th
o
d
s
b
y
cla
s
s
i
f
y
in
g
u
s
er
b
eh
av
io
r
t
o
d
eter
m
i
n
e
if
a
p
er
s
o
n
w
a
n
t
s
to
ac
ce
s
s
s
o
m
eo
n
e
else’
s
f
iles
in
t
h
e
clo
u
d
.
T
h
e
y
al
s
o
u
s
ed
th
e
tech
n
iq
u
e
o
f
u
s
in
g
d
u
m
m
y
in
f
o
r
m
a
tio
n
i
n
t
h
e
s
y
s
te
m
o
f
f
i
les
to
m
is
lead
h
ac
k
er
s
w
h
o
w
a
n
t to
s
teal
d
ata
f
r
o
m
in
s
id
e
th
e
clo
u
d
.
I
n
p
ap
er
[
24
]
th
e
r
esear
ch
er
s
p
r
o
p
o
s
ed
ap
p
r
o
ac
h
to
en
ab
le
t
h
e
p
r
o
tectio
n
o
f
p
r
iv
ate
d
ata
o
n
p
er
s
o
n
al
h
ea
lt
h
r
ec
o
r
d
s
(
P
HR
)
to
co
n
tr
o
l
s
en
s
iti
v
e
d
ata
an
d
to
ad
d
r
ess
p
o
ten
tial
v
u
ln
er
ab
ilit
y
to
p
r
iv
ac
y
.
I
n
ad
d
itio
n
to
s
u
p
p
o
r
tin
g
ac
c
u
r
ate
d
ata
ac
c
ess
b
ased
o
n
o
w
n
er
-
s
p
ec
if
ic
p
r
iv
ac
y
p
o
licies,
it
p
r
o
v
id
es
a
cr
y
p
to
g
r
ap
h
i
c
m
ec
h
a
n
i
s
m
a
n
d
k
e
y
m
an
a
g
e
m
en
t a
p
p
r
o
ac
h
to
en
f
o
r
ce
p
r
iv
ac
y
p
o
licies f
o
r
P
HR
d
ata.
3.
M
E
T
H
O
DO
L
O
G
Y
T
h
is
r
esear
ch
h
a
s
b
ee
n
d
o
n
e
l
iter
atu
r
e
r
ev
ie
w
s
y
s
te
m
atica
ll
y
ac
co
r
d
in
g
to
g
u
id
eli
n
es
t
h
at
p
r
o
p
o
s
ed
b
y
Kitc
h
en
h
a
m
[
25
]
,
[
26
]
.
‘
T
h
e
s
y
s
te
m
at
ic
liter
at
u
r
e
r
ev
ie
w
b
eg
i
n
s
w
it
h
t
h
e
r
ev
ie
w
p
lan
,
th
e
r
esear
ch
id
en
ti
f
ies,
ch
o
o
s
i
n
g
t
h
e
p
ap
er
s
,
th
e
d
ata
ex
tr
ac
tin
g
,
d
ata
s
y
n
t
h
esi
s
’
.
T
h
e
s
y
s
te
m
a
tic
liter
atu
r
e
r
ev
ie
w
w
as
d
o
n
e
to
an
s
w
er
th
e
r
esear
ch
q
u
est
io
n
o
f
w
h
at
th
e
f
ac
to
r
s
ar
e
af
f
ec
tin
g
o
n
m
a
n
a
g
i
n
g
s
e
n
s
i
t
iv
e
d
ata
in
clo
u
d
co
m
p
u
ti
n
g
.
An
d
a
s
tr
u
ct
u
r
ed
in
ter
v
ie
w
a
n
d
s
u
r
v
e
y
w
a
s
co
n
d
u
cted
to
an
s
w
er
th
e
q
u
es
tio
n
o
f
w
h
ic
h
f
a
cto
r
s
w
it
h
s
ig
n
i
f
ica
n
t e
f
f
ec
t o
n
t
h
e
d
ec
is
i
o
n
o
f
m
a
n
a
g
e
m
e
n
t s
y
s
te
m
s
o
n
s
en
s
itiv
e
d
ata
i
n
clo
u
d
en
v
ir
o
n
m
e
n
t.
3
.
1
.
T
he
s
y
s
t
e
m
a
t
ic
L
it
er
a
t
u
re
Rev
iew
s
T
h
e
liter
atu
r
e
r
ev
ie
w
h
as
b
ee
n
d
o
n
e
s
y
s
te
m
a
ticall
y
ac
c
o
r
d
in
g
to
g
u
id
eli
n
es
t
h
at
p
r
o
p
o
s
ed
b
y
Kitch
e
n
h
a
m
[
25
]
,
[
26
]
.
‘
T
h
e
s
y
s
te
m
atic
liter
at
u
r
e
r
ev
ie
w
b
e
g
in
s
w
i
th
t
h
e
r
ev
ie
w
p
la
n
n
i
n
g
,
th
e
id
en
ti
f
y
in
g
o
f
r
esear
ch
,
ch
o
o
s
in
g
t
h
e
p
a
p
er
s
,
th
e
d
ata
ex
tr
ac
ti
n
g
,
a
n
d
d
ata
s
y
n
t
h
e
s
is
’
.
T
h
ese
s
tep
s
s
h
o
w
n
i
n
Fi
g
u
r
e
1
.
Fig
u
r
e
1
.
T
h
e
s
tep
s
o
f
S
y
s
te
m
atic
L
iter
at
u
r
e
R
e
v
ie
w
3
.
1
.
1
.
T
he
Rev
iew
P
la
nn
ing
T
h
e
f
ir
s
t
s
tep
o
f
th
e
s
y
s
te
m
atic
liter
atu
r
e
r
ev
ie
w
is
d
ef
i
n
ed
an
d
d
eter
m
i
n
e
a
s
tr
ateg
i
c
p
lan
f
o
r
r
esear
ch
.
T
h
e
s
tr
ateg
ic
p
lan
t
h
at
w
ill
b
e
u
s
ed
in
o
u
r
r
esear
ch
is
t
h
e
s
ea
r
ch
f
o
r
s
p
ec
if
ic
t
er
m
s
f
r
o
m
s
p
ec
i
f
ic
s
o
u
r
ce
s
s
u
c
h
as j
o
u
r
n
als,
d
ata
b
ases
,
e
-
b
o
o
k
s
,
an
d
co
n
f
er
en
c
es.
3
.
1
.
2
.
I
dentif
y
ing
o
f
Resea
rc
hes
T
h
e
r
esear
ch
b
eg
an
b
y
d
e
f
i
n
in
g
ter
m
s
an
d
k
e
y
w
o
r
d
s
r
elat
ed
to
th
e
s
u
b
j
ec
t o
f
r
esear
ch
.
T
h
e
k
e
y
w
o
r
d
s
ar
e
u
s
ed
to
s
ea
r
ch
f
o
r
m
a
n
y
p
ap
er
s
r
elate
d
to
m
a
n
a
g
in
g
a
n
d
p
r
o
tectin
g
t
h
e
p
r
iv
ac
y
o
f
s
e
n
s
iti
v
e
d
ata
in
clo
u
d
co
m
p
u
ti
n
g
.
T
h
e
s
tr
ate
g
ic
p
l
an
f
o
r
s
ea
r
ch
in
g
w
as
to
f
i
n
d
p
u
b
lis
h
ed
r
esear
ch
i
n
co
n
f
er
en
ce
s
,
j
o
u
r
n
als,
a
n
d
e
-
b
o
o
k
s
s
to
r
ed
in
elec
tr
o
n
ic
d
atab
ases
,
AC
M,
I
E
E
E
E
x
p
lo
r
e,
E
ls
ev
ier
’
s
Sc
ien
ce
Di
r
ec
t,
Sp
r
in
g
er
L
i
n
k
,
an
d
Sco
p
u
s
.
3
.
1
.
3
.
Cho
o
s
ing
t
he
P
a
pers
T
o
id
en
tify
p
ap
er
s
r
elate
d
to
th
e
s
u
b
j
ec
t
o
f
r
esear
ch
.
T
h
e
p
ap
er
s
w
er
e
s
elec
ted
f
r
o
m
t
h
e
p
ap
er
s
p
u
b
lis
h
ed
i
n
s
cie
n
ti
f
ic
co
n
f
e
r
en
ce
s
a
n
d
j
o
u
r
n
als.
A
t
t
h
e
b
eg
in
n
i
n
g
,
a
n
u
m
b
er
o
f
p
ap
er
s
w
er
e
s
elec
ted
,
5
.
D
a
t
a
s
y
n
t
h
e
s
is
4
.
The
d
a
t
a
e
x
t
r
a
c
t
ing
3
.
C
h
o
o
s
ing
t
h
e
papers
2
.
I
d
e
n
t
if
y
ing
o
f
r
e
s
e
a
r
c
h
e
s
1
.
The
r
e
v
iew
p
lan
n
ing
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
Th
e
F
a
cto
r
s
A
ffectin
g
o
n
Ma
n
a
g
in
g
S
en
s
itive
Da
ta
in
C
lo
u
d
C
o
mp
u
tin
g
(
Ha
ifa
a
Ja
s
s
im
Mu
h
a
s
in
)
1171
s
u
m
m
ar
ies
a
n
d
co
n
clu
s
io
n
s
wer
e
r
ea
d
.
T
h
en
,
a
n
u
m
b
er
o
f
r
esear
ch
p
ap
er
s
w
er
e
s
e
lecte
d
.
I
n
th
e
s
ec
o
n
d
s
ta
g
e,
th
e
f
u
ll
s
elec
ted
r
esear
ch
p
ap
er
s
w
er
e
r
ea
d
w
i
th
d
etail
s
.
3
.
1
.
4
.
T
he
Da
t
a
E
x
t
ra
ct
ing
Af
ter
ch
o
o
s
i
n
g
t
h
e
p
ap
er
s
,
all
in
f
o
r
m
atio
n
r
elate
d
to
clo
u
d
d
ata
p
r
iv
ac
y
an
d
s
ec
u
r
it
y
a
n
d
f
ac
to
r
s
af
f
ec
tin
g
o
n
m
a
n
ag
i
n
g
s
e
n
s
it
i
v
e
d
ata
in
clo
u
d
co
m
p
u
ti
n
g
wer
e
ex
tr
ac
ted
.
3
.
1
.
5
.
Da
t
a
Sy
nthesis
Af
ter
t
h
e
r
elev
a
n
t
p
ap
er
s
w
er
e
s
elec
ted
,
r
esear
c
h
er
s
s
tar
t
ed
t
o
u
n
d
er
s
ta
n
d
t
h
e
p
r
iv
ac
y
a
n
d
s
ec
u
r
it
y
o
f
in
f
o
r
m
atio
n
i
n
clo
u
d
co
m
p
u
ti
n
g
an
d
r
elate
d
d
ef
i
n
itio
n
s
.
I
n
ad
d
itio
n
,
r
esear
ch
er
s
d
is
c
u
s
s
e
d
th
e
m
o
s
t
i
m
p
o
r
tan
t
f
ac
to
r
s
a
f
f
ec
t
in
g
t
h
e
d
ec
is
io
n
s
o
f
i
n
f
o
r
m
atio
n
s
y
s
te
m
s
in
th
e
m
an
a
g
e
m
e
n
t
o
f
s
en
s
iti
v
e
d
ata
in
t
h
e
clo
u
d
co
m
p
u
ti
n
g
.
3
.
2
.
T
he
Co
llect
io
n
o
f
Da
t
a
T
h
e
s
tr
u
ctu
r
e
i
n
ter
v
ie
w
w
ith
s
ev
er
al
s
ec
u
r
it
y
e
x
p
er
ts
a
n
d
q
u
esti
o
n
n
a
ir
e
w
a
s
co
n
d
u
cted
.
Stru
ct
u
r
ed
in
ter
v
ie
w
u
s
es
1
2
q
u
esti
o
n
s
,
an
d
a
to
tal
o
f
3
2
co
p
ies
o
f
q
u
esti
o
n
n
air
e
w
er
e
s
e
n
d
i
n
g
b
y
u
s
i
n
g
o
n
li
n
e
s
u
r
v
e
y
(
Go
o
g
le
Dr
i
v
e)
a
n
d
2
9
w
er
e
c
o
m
p
leted
th
e
q
u
e
s
tio
n
n
air
e,
t
h
e
r
esu
l
ts
w
er
e
an
a
l
y
ze
d
b
y
Sta
ticall
y
P
ac
k
ag
e
f
o
r
So
cial
Scien
ce
s
(
SP
SS
)
,
Ver
s
i
o
n
2
0
.
T
h
ese
in
ter
v
ie
w
s
a
n
d
s
u
r
v
e
y
w
ill
a
n
s
w
er
t
h
e
r
esear
c
h
q
u
est
io
n
o
f
w
h
ic
h
f
ac
to
r
s
w
it
h
s
i
g
n
if
ican
t e
f
f
ec
t
o
n
th
e
d
ec
is
io
n
o
f
m
a
n
a
g
e
m
en
t s
y
s
te
m
s
o
n
s
e
n
s
iti
v
e
d
ata
in
clo
u
d
en
v
ir
o
n
m
e
n
t.
4.
T
H
E
R
E
SU
L
T
S O
F
RE
S
E
A
RCH
4
.
1
Sy
s
t
e
m
a
t
ic
L
it
er
a
t
ure
Rev
iew
Resul
t
s
Fro
m
th
e
s
y
s
te
m
atic
li
ter
atu
r
e
r
ev
ie
w
f
i
n
d
in
g
s
,
th
e
f
ir
s
t
q
u
esti
o
n
o
f
r
esear
ch
w
a
s
an
s
w
er
ed
.
T
h
e
f
ac
to
r
s
af
f
ec
ti
n
g
o
n
m
an
ag
in
g
s
e
n
s
it
iv
e
d
ata
in
clo
u
d
co
m
p
u
ti
n
g
ar
e:
th
e
d
ata
co
n
f
i
d
en
tialit
y
,
in
te
g
r
it
y
,
p
r
iv
ac
y
,
av
ai
lab
ilit
y
,
d
ata
au
th
en
ticatio
n
an
d
u
s
er
au
t
h
o
r
izati
o
n
as s
h
o
w
n
i
n
F
i
g
u
r
e
2
.
T
h
e
f
ac
to
r
o
f
Data
C
o
n
f
id
en
t
ialit
y
d
ea
ls
w
it
h
n
o
t
d
is
clo
s
i
n
g
d
ata
to
u
n
au
t
h
o
r
ized
u
s
er
s
,
in
clu
d
i
n
g
cu
s
to
m
er
,
clo
u
d
s
er
v
ice
p
r
o
v
id
er
,
in
ter
n
al
u
s
er
s
,
a
n
d
m
ali
cio
u
s
in
s
id
er
an
d
also
tr
an
s
f
er
o
f
d
ata
b
et
w
ee
n
au
th
o
r
ized
p
ar
ties
to
p
r
ev
en
t
d
ata
leak
a
g
e.
I
n
te
g
r
it
y
r
e
f
er
s
to
t
h
e
tr
u
s
t
m
er
it
o
f
t
h
e
m
i
g
r
ated
r
eso
u
r
ce
s
.
I
n
ad
d
itio
n
,
t
h
e
d
ata
m
ig
r
ated
in
to
t
h
e
clo
u
d
m
u
s
t o
n
l
y
b
e
ad
j
u
s
tab
le
b
y
a
u
t
h
o
r
ized
u
s
er
s
[
8
]
.
P
r
iv
ac
y
r
ef
e
r
s
to
p
r
o
tect
p
er
s
o
n
all
y
id
en
t
if
iab
le
in
f
o
r
m
atio
n
(
P
I
I
)
w
ith
in
t
h
e
clo
u
d
f
r
o
m
a
n
y
attac
k
s
th
at
a
i
m
to
f
i
n
d
o
u
t
t
h
e
id
en
tit
y
o
f
t
h
e
p
er
s
o
n
th
at
P
I
I
r
elate
d
to
.
Av
ailab
ilit
y
r
ef
er
s
to
th
e
m
i
g
r
ated
r
eso
u
r
ce
s
,
s
u
ch
as
d
ata
o
r
a
p
p
licatio
n
s
,
b
ein
g
r
ea
ch
ab
le
w
h
e
n
n
ee
d
ed
an
d
th
e
clo
u
d
s
er
v
ice
b
ein
g
o
b
tain
ab
le
as
p
er
th
e
ag
r
ee
m
e
n
t
[
9
]
.
A
u
t
h
en
ticatio
n
is
a
s
er
v
ice
f
o
r
th
e
class
i
f
icatio
n
o
f
u
s
er
ac
co
u
n
ts
an
d
d
ata
f
ile.
I
t
p
er
f
o
r
m
s
s
et
u
p
an
ac
co
u
n
t,
s
a
v
i
n
g
,
s
to
r
i
n
g
,
d
elete
an
d
m
a
n
ag
e
in
d
iv
id
u
al
u
s
er
ac
co
u
n
t a
n
d
d
ata
f
ile
[
8
]
.
Oth
er
m
ea
s
u
r
es a
r
e
s
u
c
h
as a
u
th
o
r
izatio
n
an
d
ac
ce
s
s
co
n
tr
o
l
[
27
]
.
Fig
u
r
e
2
.
T
h
e
f
ac
to
r
s
af
f
ec
t
in
g
o
n
m
an
a
g
i
n
g
s
e
n
s
iti
v
e
d
ata
in
clo
u
d
co
m
p
u
ti
n
g
T
h
e
s
tu
d
y
p
r
o
p
o
s
ed
m
u
lti
lev
e
l
licen
s
i
n
g
f
r
a
m
e
w
o
r
k
(
M2
L
F
)
ac
co
r
d
in
g
to
th
e
s
y
s
te
m
atic
liter
atu
r
e
r
ev
ie
w
f
in
d
i
n
g
s
.
T
h
e
p
r
o
p
o
s
ed
f
r
a
m
e
w
o
r
k
ap
p
lies
m
et
h
o
d
s
d
ea
ls
w
it
h
t
h
e
c
h
alle
n
g
e
s
o
f
p
r
i
v
ac
y
,
co
n
f
id
e
n
tialit
y
,
i
n
te
g
r
it
y
an
d
a
v
ailab
ilit
y
to
en
h
an
ce
m
a
n
ag
in
g
in
f
o
r
m
at
io
n
s
y
s
te
m
s
d
ec
is
io
n
m
a
k
i
n
g
o
n
s
en
s
iti
v
e
d
ata
in
clo
u
d
en
v
ir
o
n
m
en
t a
s
s
h
o
w
n
i
n
F
i
g
u
r
e
3
.
M
a
nagi
ng
s
e
nsiti
v
e
dat
a
i
n
c
l
oud
c
om
putin
g
1
.
D
a
t
a
c
onfid
e
nt
i
a
l
i
t
y
2
.
D
a
t
a
i
nt
e
gri
t
y
3
.
D
a
t
a
pri
v
a
c
y
4
.
D
a
t
a
a
v
a
i
l
a
bi
l
i
t
y
5
.
D
a
t
a
a
ut
hent
i
c
a
t
i
on
6
.
U
s
e
r
a
ut
hori
z
a
t
i
on
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2502
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
11
,
No
.
3
,
Sep
tem
b
er
201
8
:
1
1
6
8
–
1
1
7
5
1172
Fig
u
r
e
3
.
T
h
e
p
r
o
p
o
s
ed
f
r
am
e
w
o
r
k
4
.
2
Sta
t
is
t
ica
l A
na
ly
s
is
Resu
lt
s
f
o
r
I
nte
rv
iew
s
a
nd
Su
rv
ey
4
.
2
.
1
.
Va
lid
it
y
o
f
P
ro
po
s
ed
F
ra
m
ew
o
rk
Af
ter
t
h
e
s
tr
u
c
tu
r
ed
i
n
ter
v
ie
ws
w
er
e
co
n
d
u
cted
,
t
h
e
r
es
u
lts
o
f
i
n
ter
v
ie
w
s
w
er
e
an
al
y
ze
d
.
T
h
e
r
esu
lt
s
s
h
o
w
th
a
t
th
er
e
is
9
2
.
5
9
%
am
o
n
g
ex
p
er
ts
a
g
r
ee
w
it
h
th
e
f
r
a
m
e
w
o
r
k
v
iab
ilit
y
a
n
d
th
e
f
r
a
m
e
w
o
r
k
e
n
h
a
n
ce
s
t
h
e
p
r
iv
ac
y
a
n
d
s
ec
u
r
it
y
o
f
s
en
s
i
tiv
e
d
ata
i
n
clo
u
d
,
an
d
9
4
.
4
5
%
a
m
o
n
g
ex
p
er
ts
a
g
r
ee
w
i
th
p
r
o
ce
s
s
es
u
s
ed
i
n
p
r
o
p
o
s
ed
f
r
a
m
e
w
o
r
k
an
d
th
e
f
r
a
m
e
w
o
r
k
h
a
v
e
s
u
itab
le
co
n
f
id
en
tialit
y
,
in
te
g
r
it
y
,
an
d
av
ai
lab
ilit
y
p
r
o
ce
d
u
r
es
th
at
s
u
p
p
o
r
t
th
e
p
r
iv
ac
y
o
f
s
e
n
s
it
iv
e
d
ata,
an
d
9
4
.
4
4
%
am
o
n
g
e
x
p
er
ts
ag
r
ee
o
n
t
h
e
ap
p
licab
ilit
y
o
f
p
r
o
p
o
s
ed
f
r
a
m
e
w
o
r
k
an
d
t
h
e
p
r
o
ce
d
u
r
es
f
o
r
th
e
p
ar
ties
o
f
f
r
a
m
e
w
o
r
k
en
h
a
n
ce
t
h
e
p
r
o
tectio
n
o
f
s
en
s
iti
v
e
in
f
o
r
m
a
tio
n
,
also
9
2
.
5
9
%
am
o
n
g
e
x
p
er
ts
a
g
r
ee
o
n
t
h
e
u
n
d
er
s
ta
n
d
ab
ilit
y
f
o
r
p
r
o
p
o
s
ed
f
r
am
e
w
o
r
k
.
As
w
ell
8
3
.
3
3
%
a
m
o
n
g
ex
p
er
ts
ag
r
ee
w
it
h
t
h
e
d
escr
ip
tio
n
o
f
r
esp
o
n
s
ib
le
p
ar
ties
,
an
d
p
o
licies th
at
u
s
ed
in
p
r
o
p
o
s
ed
f
r
a
m
e
w
o
r
k
.
4
.
2
.
2
.
T
he
T
e
s
t
o
f
Relia
bil
it
y
Af
ter
t
h
e
v
alid
atio
n
o
f
th
e
f
r
a
m
e
w
o
r
k
t
h
r
o
u
g
h
t
h
e
i
n
ter
v
ie
w
s
a
n
d
t
h
e
f
r
a
m
e
w
o
r
k
w
a
s
ad
j
u
s
ted
ac
co
r
d
in
g
to
t
h
e
r
e
s
u
l
ts
o
f
in
te
r
v
ie
w
s
w
it
h
e
x
p
er
ts
.
T
h
e
q
u
e
s
tio
n
n
air
e
w
as
d
ev
elo
p
ed
ac
co
r
d
in
g
to
t
h
e
r
e
v
is
ed
f
r
a
m
e
w
o
r
k
.
T
h
is
p
ilo
t
s
tu
d
y
w
as
co
n
d
u
c
ted
w
i
th
p
o
ten
ti
al
p
ar
ticip
an
t
s
f
r
o
m
t
h
e
p
o
p
u
latio
n
o
f
I
T
p
r
o
f
ess
io
n
al
s
w
h
o
w
o
r
k
i
n
th
e
I
T
f
ield
.
A
to
tal
o
f
3
2
co
p
i
es
o
f
q
u
esti
o
n
n
a
ir
e
w
a
s
s
en
d
i
n
g
o
n
lin
e
b
y
u
s
i
n
g
s
u
r
v
e
y
(
Go
o
g
le
Dr
i
v
e)
.
2
9
w
e
r
e
co
m
p
leted
th
e
q
u
esti
o
n
n
air
e,
th
e
r
esu
lt
s
w
er
e
an
al
y
ze
d
b
y
SP
SS
2
0
.
T
h
e
r
eliab
ilit
y
o
f
s
u
r
v
e
y
i
n
s
tr
u
m
en
t a
cc
o
r
d
in
g
th
e
h
y
p
o
t
h
ese
s
f
o
r
(
M2
L
F)
f
r
a
m
e
w
o
r
k
.
T
h
e
r
eliab
ilit
y
o
f
s
u
r
v
e
y
w
as
co
m
p
u
ted
w
it
h
C
r
o
n
b
ac
h
’
s
alp
h
a
(
a)
to
ill
u
s
tr
ate
th
e
m
ea
n
v
er
s
u
s
t
h
e
m
ed
ia
n
a
n
d
r
an
k
f
o
r
t
h
e
r
esear
ch
h
y
p
o
t
h
eses
[
2
8
,
2
9
]
.
T
h
e
p
ilo
t
test
r
e
s
u
l
ts
in
d
icat
e
th
at
t
h
e
C
r
o
n
b
ac
h
’
s
alp
h
a
f
o
r
all
co
e
f
f
icien
ts
r
an
g
ed
f
r
o
m
(
a=
0
.
8
2
5
)
f
o
r
d
a
ta
co
n
f
id
e
n
tiali
t
y
,
(
a=
0
.
8
4
6
)
f
o
r
d
ata
in
teg
r
it
y
,
(
a=
0
.
8
5
9
)
f
o
r
d
ata
av
ailab
ilit
y
,
(
a=
0
.
9
1
2
)
f
o
r
d
ata
p
r
iv
ac
y
.
W
i
th
an
o
v
er
al
l r
eliab
ilit
y
o
f
(
a=
0
.
9
5
9
)
.
T
h
e
r
eliab
ilit
y
m
ea
s
u
r
e
m
en
t
s
o
f
t
h
e
s
ca
les
e
x
a
m
in
ed
u
s
i
n
g
C
r
o
n
b
ac
h
’
s
alp
h
a
(
a)
g
a
v
e
a
s
tr
o
n
g
r
eliab
ilit
y
r
es
u
lt
w
it
h
(
a=
0
.
9
5
9
)
f
o
r
alp
h
a.
T
h
is
f
i
n
d
i
n
g
i
n
d
icate
s
t
h
at
all
t
h
e
i
n
s
tr
u
m
en
ts
ar
e
v
alid
.
A
ll
t
h
e
f
ac
to
r
s
v
al
u
es
ar
e
ab
o
v
e
0
.
7
an
d
s
u
itab
le
to
p
r
o
ce
ed
w
it
h
t
h
e
e
m
p
ir
ical
s
t
u
d
y
later
th
e
r
esu
lt
s
s
h
o
w
n
in
T
ab
le
1
.
T
h
e
s
tatis
tical
r
es
u
lts
o
f
th
e
p
i
lo
t
s
tu
d
y
f
o
r
r
esp
o
n
d
en
ts
’
ch
ar
ac
ter
is
tics
s
h
o
w
ed
th
at
t
h
er
e
w
a
s
5
1
.
7
%
o
f
r
esp
o
n
d
en
ts
w
er
e
f
e
m
a
le
an
d
7
2
.
4
1
%
o
f
r
esp
o
n
d
en
ts
w
er
e
A
s
ia
n
.
A
l
s
o
3
4
.
6
%
w
er
e
ac
ad
em
ic
e
x
p
er
ts
.
An
d
6
9
%
h
av
e
ex
p
er
ie
n
ce
le
s
s
t
h
an
1
0
y
ea
r
s
,
as
w
ell
6
5
.
6
%
w
o
r
k
i
n
g
le
s
s
th
a
n
1
0
y
ea
r
s
i
n
t
h
e
I
T
,
an
d
9
6
.
6
%
h
av
e
w
o
r
k
e
x
p
er
ien
ce
le
s
s
t
h
an
1
0
y
ea
r
s
.
L
a
s
tl
y
,
8
6
.
2
%
w
o
r
k
i
n
g
les
s
th
a
n
1
0
y
ea
r
s
w
it
h
s
ec
u
r
it
y
is
s
u
e
s
.
T
ab
le
2
g
iv
es t
h
e
d
etails o
f
i
n
f
o
r
m
at
io
n
ab
o
u
t r
esp
o
n
d
en
t
s
’
d
e
m
o
g
r
ap
h
ic
d
ata.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
Th
e
F
a
cto
r
s
A
ffectin
g
o
n
Ma
n
a
g
in
g
S
en
s
itive
Da
ta
in
C
lo
u
d
C
o
mp
u
tin
g
(
Ha
ifa
a
Ja
s
s
im
Mu
h
a
s
in
)
1173
T
ab
le
1
.
Statis
tics
o
f
R
eliab
ilit
y
C
o
e
f
f
ic
ien
t
s
No
S
c
a
l
e
N
o
f
I
t
e
ms
C
r
o
n
b
a
c
h
’
s a
l
p
h
a
R
e
su
l
t
s
1
D
a
t
a
C
o
n
f
i
d
e
n
t
i
a
l
i
t
y
a
-
U
ser
A
u
t
h
o
r
i
z
a
t
i
o
n
b
-
D
a
t
a
A
u
t
h
e
n
t
i
c
a
t
i
o
n
c
-
D
a
t
a
A
n
o
n
y
m
i
t
y
13
7
3
3
0
.
8
2
5
0
.
7
0
2
0
.
7
1
3
0
.
7
1
0
G
o
o
d
A
c
c
e
p
t
a
b
l
e
A
c
c
e
p
t
a
b
l
e
A
c
c
e
p
t
a
b
l
e
2
D
a
t
a
I
n
t
e
g
r
i
t
y
a
-
U
ser
A
u
t
h
o
r
i
z
a
t
i
o
n
b
-
D
a
t
a
A
u
t
h
e
n
t
i
c
a
t
i
o
n
c
-
I
d
e
n
t
i
t
y
a
n
o
n
y
m
i
t
y
9
3
3
3
0
.
8
4
6
0
.
7
3
0
0
.
7
0
4
0
.
7
4
8
G
o
o
d
A
c
c
e
p
t
a
b
l
e
A
c
c
e
p
t
a
b
l
e
A
c
c
e
p
t
a
b
l
e
3
D
a
t
a
P
r
i
v
a
c
y
a
-
D
e
f
i
n
i
n
g
t
h
e
res
p
o
n
s
i
b
i
l
i
t
i
e
s
b
-
I
d
e
n
t
i
t
y
M
a
n
a
g
e
m
e
n
t
b1
-
U
s
e
r A
u
t
h
o
ri
z
a
t
i
o
n
b2
-
D
a
t
a
a
u
t
h
e
n
t
i
c
a
t
i
o
n
b3
-
I
d
e
n
t
i
t
y
a
n
o
n
y
m
i
t
y
a
n
d
D
a
t
a
c
l
a
ssi
f
i
c
a
t
i
o
n
c
-
D
a
t
a
a
n
o
n
y
m
i
t
y
28
10
15
5
4
6
3
0
.
9
1
2
0
.
7
7
1
0
.
8
4
8
0
.
7
0
4
0
.
7
1
7
0
.
7
2
4
0
.
7
4
8
G
o
o
d
A
c
c
e
p
t
a
b
l
e
G
o
o
d
A
c
c
e
p
t
a
b
l
e
A
c
c
e
p
t
a
b
l
e
A
c
c
e
p
t
a
b
l
e
A
c
c
e
p
t
a
b
l
e
4
D
a
t
a
A
v
a
i
l
a
b
i
l
i
t
y
a
-
Au
t
h
o
ri
z
a
t
i
o
n
m
e
c
h
a
n
i
sm
b
-
Au
t
h
e
n
t
i
c
a
t
i
o
n
m
e
c
h
a
n
i
sm
c
-
S
t
o
r
a
g
e
m
e
c
h
a
n
i
sm
11
2
3
6
0
.
8
5
9
0
.
7
2
6
0
.
7
3
9
0
.
7
5
0
G
o
o
d
A
c
c
e
p
t
a
b
l
e
A
c
c
e
p
t
a
b
l
e
A
c
c
e
p
t
a
b
l
e
A
l
l
I
t
e
ms
61
0
.
9
5
9
G
o
o
d
N
=
Nu
m
b
er
o
f
ite
m
s
T
ab
le
2
.
R
esp
o
n
d
en
ts
De
m
o
g
r
ap
h
ic
Data
F
r
e
q
u
e
n
c
y
p
e
r
c
e
n
t
1
G
e
n
d
e
r
14
15
4
8
.
3
%
5
1
.
7
%
M
a
l
e
F
e
mal
e
2
N
a
t
i
o
n
a
l
i
t
y
21
5
3
7
2
.
4
1
%
1
7
.
2
4
%
1
0
.
3
5
%
A
si
a
n
M
i
d
d
l
e
Ea
st
A
f
r
i
c
a
n
3
P
r
o
f
e
ssi
o
n
a
l
r
o
l
e
10
9
6
1
1
1
1
3
4
.
6
%
3
1
.
0
%
2
0
.
8
%
3
.
4
%
3
.
4
%
3
.
4
%
3
.
4
%
A
c
a
d
e
mi
c
e
x
p
e
r
t
U
se
r
o
f
c
l
o
u
d
T
e
c
h
n
i
c
a
l
e
x
p
e
r
t
R
e
se
a
r
c
h
e
r
S
e
n
i
o
r
a
n
a
l
y
st
W
e
b
d
e
v
e
l
o
p
e
r
T
e
c
h
n
i
c
a
l
I
T
4
Ex
p
e
r
i
e
n
c
e
20
9
6
9
%
3
1
%
L
e
ss t
h
a
n
1
0
y
e
a
r
s
B
e
t
w
e
e
n
1
0
-
2
0
y
e
a
r
s
5
N
u
mb
e
r
o
f
y
e
a
r
s
w
o
r
k
i
n
g
i
n
t
h
e
I
T
19
9
1
6
5
.
6
%
3
1
.
0
%
3
.
4
%
L
e
ss t
h
a
n
1
0
y
e
a
r
s
B
e
t
w
e
e
n
1
0
-
2
0
y
e
a
r
s
M
o
r
e
t
h
a
n
2
0
6
N
u
mb
e
r
o
f
y
e
a
r
s
w
o
r
k
i
n
g
w
i
t
h
c
l
o
u
d
c
o
mp
u
t
i
n
g
28
1
9
6
.
6
%
3
.
4
%
L
e
ss t
h
a
n
1
0
y
e
a
r
s
B
e
t
w
e
e
n
1
0
-
2
0
y
e
a
r
s
7
N
u
mb
e
r
o
f
y
e
a
r
s
w
o
r
k
i
n
g
w
i
t
h
se
c
u
r
i
t
y
i
ssu
e
s
25
4
8
6
.
2
%
1
3
.
8
%
L
e
ss t
h
a
n
1
0
y
e
a
r
s
B
e
t
w
e
e
n
1
0
-
2
0
y
e
a
r
s
5.
DIS
CU
SS
I
O
N
A
cc
o
r
d
in
g
to
l
iter
atu
r
es
an
d
th
e
r
es
u
lt
s
o
f
s
ta
tis
tica
l
a
n
al
y
s
i
s
a
n
d
th
e
r
eliab
ilit
y
te
s
t,
t
h
e
f
ac
to
r
s
w
h
ic
h
e
n
h
a
n
ci
n
g
t
h
e
m
an
a
g
e
m
en
t
o
f
i
n
f
o
r
m
atio
n
s
y
s
te
m
d
ec
is
io
n
m
a
k
i
n
g
o
n
s
en
s
itiv
e
d
ata
in
clo
u
d
co
m
p
u
ti
n
g
;
Data
C
o
n
f
id
en
t
ial
it
y
(
D
C
)
,
Data
I
n
te
g
r
it
y
(
DI
)
,
Data
P
r
iv
ac
y
(
DP
)
,
an
d
Data
Av
ailab
ili
t
y
(
D
A
)
.
Usi
n
g
f
o
u
r
m
ed
iato
r
s
b
ased
o
n
p
ilo
t
s
tu
d
y
r
es
u
lt
s
as
f
o
ll
o
w
s
:
Au
t
h
o
r
izatio
n
p
o
s
iti
v
el
y
in
f
l
u
e
n
ce
s
(
DC
,
DI
,
DP
,
an
d
DA
)
.
A
u
t
h
e
n
ti
ca
tio
n
p
o
s
iti
v
el
y
i
n
f
l
u
en
ce
s
(
DC
,
DI
,
DP
,
an
d
DA
)
.
An
o
n
y
m
it
y
p
o
s
iti
v
el
y
in
f
lu
e
n
ce
s
(
DC
,
DI
,
an
d
DP
)
.
Def
i
n
i
n
g
t
h
e
r
esp
o
n
s
ib
ilit
ie
s
p
o
s
iti
v
el
y
i
n
f
lu
e
n
ce
s
DP
.
A
ll
o
f
t
h
ese
f
ac
to
r
s
in
f
lu
e
n
ce
o
n
t
h
e
d
ec
is
io
n
o
f
m
an
ag
e
m
e
n
t i
n
f
o
r
m
atio
n
s
y
s
te
m
s
o
n
s
en
s
iti
v
e
d
ata
in
p
u
b
lic
clo
u
d
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2502
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
11
,
No
.
3
,
Sep
tem
b
er
201
8
:
1
1
6
8
–
1
1
7
5
1174
6.
CO
NCLU
SI
O
N
T
h
e
liter
atu
r
es
in
t
h
is
r
esear
c
h
w
as
id
en
t
if
ied
a
n
d
ex
p
lain
e
d
th
e
f
ac
to
r
s
af
f
ec
ti
n
g
o
n
th
e
d
ec
is
io
n
o
f
m
an
a
g
e
m
e
n
t
in
f
o
r
m
atio
n
s
y
s
te
m
s
o
n
s
en
s
iti
v
e
d
ata
in
p
u
b
lic
clo
u
d
s
u
ch
as:
Da
ta
C
o
n
f
id
en
tiali
t
y
,
Data
I
n
te
g
r
it
y
,
Data
P
r
iv
ac
y
,
Data
Av
ailab
i
lit
y
,
Au
t
h
o
r
izati
o
n
,
A
u
th
e
n
ticat
io
n
,
An
o
n
y
m
it
y
,
a
n
d
De
f
i
n
in
g
th
e
r
esp
o
n
s
ib
ilit
ie
s
.
I
n
ter
v
ie
w
s
a
n
d
s
u
r
v
e
y
w
er
e
co
n
d
u
cted
t
o
ex
p
lain
th
e
in
f
l
u
e
n
ce
o
f
t
h
ese
f
ac
to
r
s
o
n
t
h
e
d
ec
is
io
n
o
f
m
an
a
g
e
m
en
t in
f
o
r
m
atio
n
s
y
s
te
m
s
o
n
s
en
s
iti
v
e
d
ata
in
clo
u
d
en
v
ir
o
n
m
e
n
t.
ACK
NO
WL
E
D
G
E
M
E
NT
T
h
is
p
ap
er
is
s
p
o
n
s
o
r
ed
b
y
M
in
is
tr
y
o
f
Hi
g
h
er
E
d
u
ca
tio
n
Ma
la
y
s
ia
t
h
r
o
u
g
h
Fu
n
d
a
m
e
n
t
al
R
esear
ch
Gr
an
t
Sc
h
e
m
e
P
r
o
j
ec
t
n
o
.
:
FR
GS/1
/2
0
1
5
/I
C
T
0
4
/U
P
M/0
2
/
2
Vo
te
n
o
.
:
5
5
2
4
8
2
9
o
n
E
s
tab
lis
h
i
n
g
T
h
eo
r
y
f
o
r
C
lo
u
d
P
latf
o
r
m
Me
a
s
u
r
e
B
ase
d
o
n
SLA
Ma
n
ag
e
m
e
n
t a
n
d
E
n
f
o
r
ce
m
en
t.
RE
F
E
R
E
NC
E
S
[1
]
Zh
a
n
g
Q,
C
h
e
n
g
L
,
Bo
u
tab
a
R
.
Clo
u
d
c
o
m
p
u
ti
n
g
:
sta
te
-
of
-
th
e
-
a
rt
a
n
d
re
se
a
rc
h
c
h
a
ll
e
n
g
e
s.
J
o
u
r
n
a
l
o
f
in
ter
n
e
t
se
rv
ice
s a
n
d
a
p
p
li
c
a
ti
o
n
s
.
2
0
1
0
M
a
y
1
;1
(1
):7
-
18.
[2
]
M
e
ll
P
,
G
ra
n
c
e
T
.
T
h
e
NIS
T
d
e
fi
n
it
io
n
o
f
c
l
o
u
d
c
o
mp
u
ti
n
g
,
re
c
o
mm
e
n
d
a
ti
o
n
s
o
f
th
e
n
a
ti
o
n
a
l
i
n
stit
u
te
o
f
st
a
n
d
a
rd
s
a
n
d
tec
h
n
o
lo
g
y
.
Na
ti
o
n
a
l
I
n
stit
u
te o
f
S
tan
d
a
rd
s a
n
d
T
e
c
h
n
o
lo
g
y
.
2
0
1
1
S
e
p
:8
0
0
-
1
4
5
.
[3
]
Co
p
p
o
li
n
o
L
,
D’A
n
to
n
i
o
S
,
M
a
z
z
e
o
G
,
Ro
m
a
n
o
L
.
Clo
u
d
se
c
u
r
it
y
:
E
m
e
rg
in
g
th
re
a
ts
a
n
d
c
u
rre
n
t
so
lu
ti
o
n
s.
Co
mp
u
ter
s &
El
e
c
trica
l
En
g
in
e
e
r
in
g
.
2
0
1
7
A
p
r
1
;
5
9
:1
2
6
-
1
4
0
.
[4
]
Ra
m
a
c
h
a
n
d
ra
n
M
.
S
o
f
twa
re
s
e
c
u
rit
y
r
e
q
u
irem
e
n
ts
m
a
n
a
g
e
m
e
n
t
a
s
a
n
e
m
e
rg
in
g
c
lo
u
d
c
o
m
p
u
ti
n
g
se
rv
ice
.
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
I
n
fo
rm
a
t
io
n
M
a
n
a
g
e
me
n
t
.
2
0
1
6
A
u
g
1
;3
6
(
4
):5
8
0
-
5
9
0
.
[5
]
Ra
m
a
c
h
a
n
d
ra
G
,
I
f
ti
k
h
a
r
M
,
Kh
a
n
F
A
.
A
Co
m
p
re
h
e
n
siv
e
S
u
rv
e
y
o
n
S
e
c
u
rit
y
in
Clo
u
d
Co
m
p
u
t
in
g
.
Pro
c
e
d
i
a
Co
mp
u
ter
S
c
ien
c
e
.
2
0
1
7
Ja
n
1
;
1
1
0
:
4
6
5
-
4
7
2
.
[6
]
Ca
tt
e
d
d
u
D.
Cl
o
u
d
Co
m
p
u
ti
n
g
:
b
e
n
e
f
it
s,
risk
s
a
n
d
re
c
o
m
m
e
n
d
a
ti
o
n
s
f
o
r
in
f
o
r
m
a
ti
o
n
se
c
u
rit
y
.
In
W
e
b
a
p
p
li
c
a
ti
o
n
se
c
u
rity
2
0
1
0
(
p
p
.
1
7
-
1
7
).
S
p
ri
n
g
e
r,
Be
rli
n
,
He
id
e
l
b
e
rg
.
[7
]
S
e
n
J.
S
e
c
u
rit
y
a
n
d
p
riv
a
c
y
iss
u
e
s
in
c
lo
u
d
c
o
m
p
u
ti
n
g
.
Arc
h
it
e
c
tu
re
s
a
n
d
p
ro
t
o
c
o
ls
fo
r
se
c
u
r
e
in
fo
rm
a
ti
o
n
tec
h
n
o
l
o
g
y
i
n
fra
str
u
c
tu
re
s
.
2
0
1
3
S
e
p
3
0
:1
-
4
5
.
[8
]
Zi
ss
i
s
D,
L
e
k
k
a
s
D.
A
d
d
re
ss
in
g
c
lo
u
d
c
o
m
p
u
ti
n
g
se
c
u
rit
y
issu
e
s.
Fu
tu
re
Ge
n
e
ra
ti
o
n
c
o
mp
u
ter
sy
ste
ms
.
2
0
1
2
M
a
r
1
;2
8
(3
):
5
8
3
-
5
9
2
.
[9
]
T
e
b
a
a
M
,
Ha
jj
i
S
E.
F
r
o
m
sin
g
le
to
m
u
lt
i
-
c
lo
u
d
s
c
o
m
p
u
ti
n
g
p
riv
a
c
y
a
n
d
f
a
u
lt
to
lera
n
c
e
.
IER
I
p
ro
c
e
d
ia
.
2
0
1
4
Ja
n
1
;
1
0
:
1
1
2
-
1
1
8
.
[1
0
]
P
e
a
rso
n
S
,
Ch
a
rles
w
o
rth
A
.
Ac
c
o
u
n
t
a
b
il
it
y
a
s
a
wa
y
fo
rwa
rd
fo
r
p
riv
a
c
y
p
ro
tec
ti
o
n
i
n
th
e
c
lo
u
d
.
In
IEE
E
In
tern
a
ti
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
Cl
o
u
d
Co
m
p
u
ti
n
g
2
0
0
9
De
c
1
(p
p
.
1
3
1
-
1
4
4
).
S
p
ri
n
g
e
r,
Be
rli
n
,
He
id
e
lb
e
rg
.
[1
1
]
S
a
rip
a
ll
i
P
,
W
a
lt
e
rs
B.
Qu
irc
:
A
q
u
a
n
ti
t
a
ti
v
e
im
p
a
c
t
a
n
d
risk
a
ss
e
ss
me
n
t
fra
me
wo
rk
fo
r
c
l
o
u
d
se
c
u
rity
.
In
Cl
o
u
d
Co
m
p
u
ti
n
g
(CL
OU
D),
2
0
1
0
IE
E
E
3
rd
In
ter
n
a
ti
o
n
a
l
Co
n
f
e
re
n
c
e
o
n
2
0
1
0
Ju
l
5
(
p
p
.
2
8
0
-
2
8
8
).
IEE
E.
[1
2
]
S
u
b
a
sh
i
n
i
S
,
Ka
v
it
h
a
V.
A
su
rv
e
y
o
n
se
c
u
rit
y
issu
e
s
in
se
rv
ice
d
e
li
v
e
r
y
m
o
d
e
ls
o
f
c
lo
u
d
c
o
m
p
u
ti
n
g
.
J
o
u
r
n
a
l
o
f
n
e
two
rk
a
n
d
c
o
mp
u
ter
a
p
p
li
c
a
t
io
n
s
.
2
0
1
1
Ja
n
1
;3
4
(1
):1
-
11.
[1
3
]
Ku
lk
a
rn
i
G
,
W
a
g
h
m
a
re
R,
P
a
lw
e
R,
W
a
y
k
u
le
V
,
Ba
n
k
a
r
H,
Ko
li
K
.
Cl
o
u
d
sto
r
a
g
e
a
r
c
h
it
e
c
tu
re
.
In
T
e
le
c
o
m
m
u
n
ica
ti
o
n
S
y
ste
m
s,
S
e
rv
ice
s,
a
n
d
A
p
p
li
c
a
ti
o
n
s
(T
S
S
A
),
2
0
1
2
7
t
h
In
tern
a
ti
o
n
a
l
Co
n
f
e
re
n
c
e
o
n
2
0
1
2
Oc
t
3
0
(
p
p
.
7
6
-
8
1
).
IE
EE
.
[1
4
]
F
u
tral
W
,
G
re
e
n
e
J.
In
tel
T
ru
ste
d
Exe
c
u
ti
o
n
T
e
c
h
n
o
lo
g
y
fo
r
S
e
rv
e
r
Pl
a
tf
o
rm
s:
A
Gu
id
e
to
M
o
re
S
e
c
u
re
Da
ta
c
e
n
ter
s
.
A
p
re
ss
;
2
0
1
3
Oc
t
8
.
[1
5
]
Co
m
p
u
ti
n
g
S
C.
Bu
il
d
i
n
g
T
ru
st
a
n
d
C
o
mp
li
a
n
c
e
i
n
t
h
e
Cl
o
u
d
wit
h
I
n
tel®
T
r
u
ste
d
Exe
c
u
ti
o
n
T
e
c
h
n
o
lo
g
y
.
m
e
d
ia1
3
.
c
o
n
n
e
c
ted
so
c
ialm
e
d
ia.co
m
[1
6
]
Ag
u
iar
E,
Zh
a
n
g
Y,
Blan
to
n
M
.
A
n
o
v
e
rv
ie
w
o
f
issu
e
s
a
n
d
re
c
e
n
t
d
e
v
e
lo
p
m
e
n
ts
in
c
lo
u
d
c
o
m
p
u
ti
n
g
a
n
d
sto
ra
g
e
se
c
u
rit
y
.
In
Hig
h
Per
fo
rm
a
n
c
e
Cl
o
u
d
Au
d
it
i
n
g
a
n
d
Ap
p
li
c
a
ti
o
n
s
2
0
1
4
(
p
p
.
3
-
3
3
)
.
S
p
rin
g
e
r,
Ne
w
Yo
rk
,
NY
.
[1
7
]
T
a
ri
Z,
Yi
X
,
P
re
m
a
ra
th
n
e
US,
Be
rto
k
P
,
K
h
a
li
l
I.
S
e
c
u
ri
ty
a
n
d
p
riv
a
c
y
in
c
lo
u
d
c
o
m
p
u
ti
n
g
:
V
isi
o
n
,
tre
n
d
s,
a
n
d
c
h
a
ll
e
n
g
e
s.
IEE
E
Clo
u
d
Co
mp
u
ti
n
g
.
2
0
1
5
M
a
r;2
(
2
):
3
0
-
38.
[1
8
]
Krish
n
a
BH,
Kira
n
S
,
M
u
ra
li
G
,
Re
d
d
y
RP
.
S
e
c
u
rit
y
issu
e
s
in
se
rv
ice
m
o
d
e
l
o
f
c
lo
u
d
c
o
m
p
u
ti
n
g
e
n
v
iro
n
m
e
n
t.
Pro
c
e
d
ia
C
o
mp
u
ter
S
c
ien
c
e
.
2
0
1
6
Ja
n
1
;
8
7
:
2
4
6
-
2
5
1
.
[1
9
]
S
in
g
h
A
,
Ch
a
tt
e
rjee
K.
Clo
u
d
se
c
u
rit
y
is
su
e
s
a
n
d
c
h
a
ll
e
n
g
e
s:
A
su
rv
e
y
.
J
o
u
rn
a
l
o
f
Ne
two
rk
a
n
d
Co
mp
u
ter
Ap
p
li
c
a
ti
o
n
s
.
2
0
1
7
F
e
b
1
;
7
9
:
8
8
-
1
1
5
.
[2
0
]
M
ish
ra
S
,
T
rip
a
th
y
A
K,
Jo
sh
i
P
.
M
a
k
in
g
a
Clo
u
d
Da
ta
S
e
c
u
re
a
n
d
Eff
e
c
ti
v
e
f
o
r
B
e
tt
e
r
P
e
rf
o
r
m
a
n
c
e
o
f
S
e
r
v
ice
s.
In
d
o
n
e
sia
n
J
o
u
rn
a
l
o
f
El
e
c
trica
l
En
g
i
n
e
e
rin
g
a
n
d
C
o
mp
u
ter
S
c
ien
c
e
.
2
0
1
6
Ju
n
1
;2
(
3
):
6
9
5
-
7
0
2
.
[2
1
]
Qio
n
g
S
,
L
iu
M
,
P
a
n
g
S
.
Clo
u
d
Co
m
p
u
ti
n
g
A
p
p
li
c
a
ti
o
n
o
f
P
e
rs
o
n
a
l
I
n
f
o
rm
a
ti
o
n
'
s
S
e
c
u
rit
y
in
Ne
tw
o
rk
S
a
les
-
c
h
a
n
n
e
ls.
I
n
d
o
n
e
sia
n
J
o
u
rn
a
l
o
f
El
e
c
trica
l
En
g
in
e
e
rin
g
a
n
d
Co
m
p
u
ter
S
c
ien
c
e
.
2
0
1
3
De
c
1
;
1
1
(
1
2
)
:
7
3
3
1
-
7
3
3
8
.
[2
2
]
G
u
n
a
se
k
h
a
r
T
,
Ra
o
KT
,
Re
d
d
y
V
K,
Kira
n
P
S
,
Ra
o
BT
.
M
it
ig
a
ti
o
n
o
f
In
sid
e
r
A
tt
a
c
k
s
th
ro
u
g
h
M
u
lt
i
-
Cl
o
u
d
.
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
E
lec
trica
l
a
n
d
C
o
mp
u
ter
En
g
in
e
e
rin
g
.
2
0
1
5
F
e
b
1
;
5
(1
):
1
3
6
.
[
2
3]
S
a
str
y
KN
,
Ra
o
B
T
,
G
u
n
a
se
k
h
a
r
T
.
No
v
e
l
A
p
p
ro
a
c
h
f
o
r
Co
n
tro
l
D
a
ta
T
h
e
f
t
A
tt
a
c
k
in
Clo
u
d
Co
m
p
u
ti
n
g
.
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
E
lec
trica
l
a
n
d
C
o
mp
u
ter
En
g
in
e
e
rin
g
.
2
0
1
5
De
c
1
;5
(
6
).
[2
4
]
L
e
n
g
C,
Yu
H,
W
a
n
g
J,
Hu
a
n
g
J.
S
e
c
u
rin
g
p
e
rso
n
a
l
h
e
a
lt
h
re
c
o
rd
s
in
th
e
c
lo
u
d
b
y
e
n
f
o
rc
in
g
stick
y
p
o
li
c
ies
.
In
d
o
n
e
sia
n
J
o
u
rn
a
l
o
f
El
e
c
tr
ica
l
En
g
i
n
e
e
rin
g
a
n
d
C
o
mp
u
ter
S
c
ien
c
e
.
2
0
1
3
A
p
r
1
;
1
1
(
4
):
2
2
0
0
-
2
2
0
8
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
Th
e
F
a
cto
r
s
A
ffectin
g
o
n
Ma
n
a
g
in
g
S
en
s
itive
Da
ta
in
C
lo
u
d
C
o
mp
u
tin
g
(
Ha
ifa
a
Ja
s
s
im
Mu
h
a
s
in
)
1175
[
25
]
Kitch
e
n
h
a
m
B.
P
r
o
c
e
d
u
re
s f
o
r
p
e
rf
o
r
m
in
g
s
y
st
e
m
a
ti
c
re
v
ie
w
s.
Ke
e
le,
UK
,
Ke
e
le Un
iv
e
rsit
y
.
2
0
0
4
J
u
l;
3
3
(2
0
0
4
):1
-
26.
[
26
]
Kitch
e
n
h
a
m
B,
P
re
to
ri
u
s
R,
B
u
d
g
e
n
D,
Bre
re
to
n
O
P
,
T
u
rn
e
r
M
,
Ni
a
z
i
M
,
L
in
k
m
a
n
S
.
S
y
ste
m
a
ti
c
li
tera
tu
re
re
v
ie
w
s
in
so
f
tw
a
re
e
n
g
in
e
e
rin
g
–
a
tertiar
y
stu
d
y
.
In
fo
rm
a
ti
o
n
a
n
d
S
o
ft
w
a
re
T
e
c
h
n
o
l
o
g
y
.
2
0
1
0
A
u
g
1
;5
2
(8
):
7
9
2
-
8
0
5
.
[
27
]
W
a
n
g
Z.
S
e
c
u
rity
a
n
d
p
riv
a
c
y
i
ss
u
e
s
wit
h
in
th
e
Cl
o
u
d
C
o
mp
u
ti
n
g
.
In
C
o
m
p
u
tatio
n
a
l
a
n
d
In
f
o
r
m
a
ti
o
n
S
c
ien
c
e
s
(ICCIS
),
2
0
1
1
I
n
tern
a
ti
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
2
0
1
1
Oc
t
2
1
(
p
p
.
1
7
5
-
1
7
8
).
IEE
E.
[
28
]
W
a
lp
o
le
RE,
M
y
e
rs
RH,
M
y
e
rs
S
L
,
Ye
K.
P
ro
b
a
b
il
i
ty
a
n
d
sta
ti
stics
f
o
r
e
n
g
in
e
e
rs
a
n
d
sc
ien
ti
st
s.
Ne
w
Yo
rk
:
M
a
c
m
il
lan
;
1
9
9
3
Ja
n
.
[
29
]
S
o
ja
P
.
Ex
a
m
in
in
g
th
e
c
o
n
d
it
io
n
s
o
f
E
RP
im
p
lem
e
n
tatio
n
s:
les
so
n
s
lea
rn
t
f
ro
m
a
d
o
p
ters
.
B
u
sin
e
ss
Pro
c
e
ss
M
a
n
a
g
e
me
n
t
J
o
u
r
n
a
l
.
2
0
0
8
F
e
b
8
;1
4
(
1
):1
0
5
-
1
2
3
.
Evaluation Warning : The document was created with Spire.PDF for Python.