“…For instance, the focus of [14] [15] [16] is to analyze various factors (e.g., accountability, compromise servers, recovery, malicious insiders, data location, investigation, data segregation, availability, long-term viability, regulatory compliance, backup and recovery as well as privileged user access), which may affect the cloud user to trust the cloud. To evaluate the trustworthiness of the cloud resources, a cloud resource trustworthiness evaluation framework is proposed in [17], which utilizes an amor to constantly monitor and assess the cloud environment as well as check the resources the armor protects.…”