**Chapter 6**

*Cloud Computing Security - Concepts and Practice*

[33] Google. Google cloud platform and the eu data protection directive. Google Inc.; 2020. Available from: https:// cloud.google.com/security/compliance/

[32] Hon K, Millard C. Eu data protection law and the cloud. International Association of Privacy Professionals; 2020. Available from: https://iapp.org/resources/article/

[Accessed: February 2020]

eu-data-protection/ [Accessed:

[34] Ochei LC, Bass J, Petrovski A. Degrees of tenant isolation for cloudhosted software services: A cross-case analysis. Journal of Cloud Computing: Advances, Systems and Applications.

[35] Ochei LC, Bass JM, Petrovski A. A novel taxonomy of deployment patterns for cloud-hosted applications: A case study of global software development (gsd) tools and processes. International Journal on Advances in Software.

[36] Ochei LC, Petrovski A, Bass JM. Optimal deployment of components of cloud-hosted application for guaranteeing multitenancy isolation. Journal of Cloud Computing. 2019;**8**(1):1

[37] Walraven S. Middleware and methods for customizable SaaS [PhD thesis]. KU Leuven: Department of Computer Science; 2014, 2014. p. 6

[38] Walraven S, Van Landuyt D, Truyen E, Handekyn K, Joosen W. Efficient customization of multi-tenant software-as-a-service applications with service lines. Journal of Systems and

[39] Ochei LC, Petrovski A, Bass J. An approach for achieving the required degree of multitenancy isolation for components of a cloud-hosted application. In: 4th International IBM Cloud Academy Conference (ICACON

Software. 2014;**91**:48-62

February 2020]

2018;**7**(22)

2015;**8**(3-4):420-434

**98**

2016). 2016
