Cyberattacks and Security of Cloud Computing: A Complete Guideline.
Muhammad DawoodShanshan TuChuangbai XiaoHisham AlasmaryMuhammad WaqasSadaqat ur RehmanPublished in: Symmetry (2023)
Keyphrases
- cloud computing
- security issues
- cloud computing environment
- cloud storage
- data privacy
- computing resources
- network access
- trusted computing
- identity management
- data center
- distributed computing
- service providers
- big data
- security mechanisms
- remote attestation
- data management
- cloud services
- computing technologies
- computing infrastructure
- intrusion detection
- map reduce
- computing platform
- cloud infrastructure
- open architecture
- cloud computing platform
- load balancing
- access control
- network security
- business models
- information security
- middleware architecture
- high performance computing
- computer security
- data analysis
- smart card
- wireless networks
- query processing