Assessing network path vulnerabilities for secure cloud computing.
Sachin ShettyNicholas LunaKaiqi XiongPublished in: ICC (2012)
Keyphrases
- cloud computing
- security issues
- cloud computing environment
- security mechanisms
- data center
- identity management
- network access
- computing resources
- computing platform
- cloud storage
- cloud computing platform
- secure manner
- big data
- distributed computing
- data management
- computing technologies
- business models
- service providers
- private cloud
- future internet
- computing paradigm
- internet services
- network traffic
- information security
- trusted computing
- computing infrastructure
- wireless sensor networks
- middleware architecture
- databases
- service level agreements
- cost effective
- peer to peer
- database