Obfuscation and Diversification for Securing Cloud Computing.
Shohreh HosseinzadehSamuel LaurénSampsa RautiSami HyrynsalmiMauro ContiVille LeppänenPublished in: ES (2015)
Keyphrases
- cloud computing
- identity management
- computing resources
- data management
- data privacy
- cloud computing environment
- data center
- big data
- distributed computing
- service providers
- business models
- map reduce
- computing technologies
- information security
- cloud computing platform
- commodity hardware
- database
- computing platform
- cost effective