On the security of tenant transactions in the cloud

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

Abstract

Cloud computing technologies are receiving a great deal of attention. Although there are several benefits with the cloud, the attackers can also use the cloud infrastructure for hosting malicious services and generating different types of attacks. In this paper we propose techniques for securing tenant transactions in the cloud.

Original languageEnglish
Title of host publicationProceedings
Subtitle of host publicationIEEE Fifth International Conference on Cloud Computing Technology and Science
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages525-530
Number of pages6
DOIs
Publication statusPublished - 2013
EventIEEE Fifth International Conference on Cloud Computing Technology and Science
- Bristol, United Kingdom
Duration: 2 Dec 20135 Dec 2013

Conference

ConferenceIEEE Fifth International Conference on Cloud Computing Technology and Science
CountryUnited Kingdom
CityBristol
Period2/12/135/12/13

Fingerprint Dive into the research topics of 'On the security of tenant transactions in the cloud'. Together they form a unique fingerprint.

  • Cite this

    Varadharajan, V., & Tupakula, U. (2013). On the security of tenant transactions in the cloud. In Proceedings: IEEE Fifth International Conference on Cloud Computing Technology and Science (pp. 525-530). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE). Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom https://doi.org/10.1109/CloudCom.2013.76