Scheduler Vulnerabilities and Attacks in Cloud Computing
Fangfei ZhouManish GoelPeter DesnoyersRavi SundaramPublished in: CoRR (2011)
Keyphrases
- cloud computing
- security issues
- security mechanisms
- security risks
- security vulnerabilities
- computing resources
- data center
- cloud computing environment
- distributed computing
- data management
- big data
- service providers
- computing technologies
- business models
- information security
- scheduling algorithm
- security protocols
- computing platform
- map reduce
- computer systems
- cloud platform
- operating system
- intrusion detection
- data mining
- cloud storage
- middleware architecture