Security tactics for secured cloud computing resources

In this paper, we propose the security tactics for secured cloud computing resources. It is composed by multistage anomaly detection scheme and honeypot in outside of cloud computing, and attribute-based access control in inside of cloud computing for secured cloud computing resource in order to sup...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ByungRae Cha, Jongwon Kim
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In this paper, we propose the security tactics for secured cloud computing resources. It is composed by multistage anomaly detection scheme and honeypot in outside of cloud computing, and attribute-based access control in inside of cloud computing for secured cloud computing resource in order to support safety future services.
ISSN:1550-445X
2332-5658
DOI:10.1109/ICOIN.2013.6496425