Using Cloud Computing to Implement a Security Overlay Network.
Khaled SalahJose M. Alcaraz CaleroSherali ZeadallySameera Al-MullaMohammed AlzaabiPublished in: IEEE Secur. Priv. (2013)
Keyphrases
- cloud computing
- overlay network
- security issues
- cloud computing environment
- cloud storage
- peer to peer
- data privacy
- identity management
- computing resources
- data center
- network access
- data management
- computing infrastructure
- trusted computing
- cloud services
- big data
- distributed computing
- network topology
- service providers
- load balancing
- security policies
- business models
- intrusion detection
- databases
- computing platform
- access control
- grid computing
- cloud computing platform
- key management
- cost effective
- data warehouse
- database systems