A New approach using redundancy technique to improve security in cloud computing.
Mohammed A. AlzainBen SohEric PardedePublished in: CyberSec (2012)
Keyphrases
- cloud computing
- security issues
- cloud computing environment
- cloud storage
- computing resources
- data privacy
- data center
- trusted computing
- computing infrastructure
- distributed computing
- network access
- identity management
- service providers
- data management
- computing technologies
- access control
- big data
- information security
- remote attestation
- cloud services
- cloud computing platform
- cloud platform
- business models
- computing platform
- security mechanisms
- intrusion detection
- database
- security protocols
- cost effective
- load balancing