A Hierarchical Security-Auditing Methodology for Cloud Computing.
Zhuobing HanXiaohong LiEleni StrouliaPublished in: SCC (2015)
Keyphrases
- cloud computing
- security issues
- cloud computing environment
- cloud storage
- data privacy
- data center
- computing resources
- access control
- identity management
- cloud services
- network access
- service providers
- distributed computing
- computing infrastructure
- statistical databases
- trusted computing
- remote attestation
- big data
- data management
- business models
- security mechanisms
- information security
- computing technologies
- virtual machine
- cloud infrastructure
- cloud computing platform
- computing platform
- security policies
- intrusion detection
- data mining