Exploring the Firewall Security Consistency in Cloud Computing during Live Migration.
Shadha Mohamed AlAmriLin GuanPublished in: ICCCNT (2016)
Keyphrases
- cloud computing
- security issues
- cloud computing environment
- cloud storage
- network security
- network access
- intrusion detection
- data privacy
- identity management
- computing resources
- trusted computing
- service providers
- remote attestation
- data center
- distributed computing
- computing infrastructure
- cloud services
- computing technologies
- big data
- data management
- business models
- security mechanisms
- virtual machine
- information security
- access control
- computer networks
- database
- cloud computing platform
- cloud platform
- computing platform
- anomaly detection
- security protocols
- security requirements
- security policies
- data analysis