A new methodology for security evaluation in cloud computing.
Sasko RistovMarjan GusevMagdalena KostoskaPublished in: MIPRO (2012)
Keyphrases
- cloud computing
- security issues
- cloud computing environment
- cloud storage
- computing resources
- data center
- data privacy
- network access
- distributed computing
- computing infrastructure
- trusted computing
- data management
- cloud services
- service providers
- computing technologies
- identity management
- business models
- big data
- remote attestation
- security mechanisms
- cloud computing platform
- information security
- map reduce
- middleware architecture
- computing platform
- access control
- data mining
- service level agreements
- computer security
- databases