Scheduler vulnerabilities and coordinated attacks in cloud computing.
Fangfei ZhouManish GoelPeter DesnoyersRavi SundaramPublished in: J. Comput. Secur. (2013)
Keyphrases
- cloud computing
- security issues
- security mechanisms
- security vulnerabilities
- security risks
- computing resources
- data center
- distributed computing
- cloud computing environment
- big data
- data management
- service providers
- cloud storage
- computing technologies
- business models
- scheduling algorithm
- information security
- cloud computing platform
- intrusion detection
- access control
- commodity hardware
- network security
- service level agreements
- databases
- response time
- data mining