| Purpose of the algorithm | Number of sources and references | Run time trend |
| Data security | 24 (64, 68, 70, 71,78, 80, 81, 82, 83, 84, 86, 87, 88, 89, 90, 112, 116, 118, 119, 120, 121, 123, 130, 134) | Linear | Attack on cloud | 1 (65) | Linear | Privacy and preservation | 1 (66) | Linear | Security analysis | 1 (67) | Linear | Data protection | 1 (69) | Linear | Cloud security | 34 (72, 73, 74, 76, 77,79, 91, 93, 94, 95, 96, 97, 98, 100, 101, 102, 103, 104, 105, 108, 110, 111, 113, 114, 115, 117, 122, 124, 125, 128, 129, 133, 135, 136) | Linear | Intrusion detection | 1 (75) | Linear | Security, privacy and trust | 1 (85) | Linear | Security and privacy | 5 (92, 99, 107, 126, 131, 132) | Linear | Data privacy | 1 (106) | Linear | Security and privacy | 2 (109, 127) | Linear |
|
|