A novel redundancy technique to enhance the security of cloud computing.
A. Syed IsmailS. AshaPublished in: Int. J. Cloud Comput. (2023)
Keyphrases
- cloud computing
- security issues
- cloud computing environment
- cloud storage
- data privacy
- network access
- computing resources
- trusted computing
- identity management
- computing infrastructure
- data center
- big data
- cloud services
- remote attestation
- security mechanisms
- distributed computing
- service providers
- data management
- cloud computing platform
- computing technologies
- business models
- cloud infrastructure
- security policies
- network security
- intrusion detection
- information security
- access control
- computing platform
- load balancing
- wireless networks