Review Article
[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
Table 4
Inclusion and exclusion criteria.
| Inclusion criteria | Exclusion criteria |
| (a). Articles proposing data protection techniques in the context of cloud computing. | (a). Articles other than the English language. | (b). Peer-reviewed articles only. | (b). Articles that are not supported the research questions. | (c). Take the latest study if there are several papers with the same objectives. | (c). Articles providing no validation of proposed techniques. | (d). Comparative studies that compare one or more data protection techniques in cloud computing. | (d). Articles that do not clearly define findings and unbiased results. | (e). Journal papers with impact factors only. | (e). Duplicate studies concerning title or content. | (f). Ranked conference papers only. | (f). Editorials, short papers, posters, technical reports, patents, and reviews. |
|
|