On the security of tenant transactions in the cloud

Vijay Varadharajan, Udaya Tupakula

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

1 Citation (Scopus)

Abstract

Cloud computing technologies are receiving a great deal of attention. Although there are several benefits with the cloud, the attackers can also use the cloud infrastructure for hosting malicious services and generating different types of attacks. In this paper we propose techniques for securing tenant transactions in the cloud.

Original languageEnglish
Title of host publicationProceedings
Subtitle of host publicationIEEE Fifth International Conference on Cloud Computing Technology and Science
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages525-530
Number of pages6
DOIs
Publication statusPublished - 2013
EventIEEE Fifth International Conference on Cloud Computing Technology and Science
- Bristol, United Kingdom
Duration: 2 Dec 20135 Dec 2013

Conference

ConferenceIEEE Fifth International Conference on Cloud Computing Technology and Science
Country/TerritoryUnited Kingdom
CityBristol
Period2/12/135/12/13

Fingerprint

Dive into the research topics of 'On the security of tenant transactions in the cloud'. Together they form a unique fingerprint.

Cite this