Projects per year
Abstract
Cloud computing technologies are receiving a great deal of attention. Although there are several benefits with the cloud, attackers can also make use of the cloud infrastructure for hosting malicious services and generating different types of attacks. In this paper, we propose trust enhanced security techniques for securing tenant transactions in the cloud. Our model takes advantage of the features of trusted computing technology to enhance the design and enforcement of security policies and mechanisms in a cloud environment. Furthermore, the cloud service provider monitors the ongoing tenant transactions for different types of attacks and terminates the malicious transactions. Hence, our model can be used to enhance the security of tenant transactions in cloud.
Original language | English |
---|---|
Pages (from-to) | 2388-2403 |
Number of pages | 16 |
Journal | Computer Journal |
Volume | 58 |
Issue number | 10 |
Early online date | 17 Jun 2014 |
DOIs | |
Publication status | Published - Oct 2015 |
Fingerprint
Dive into the research topics of 'Trust Enhanced Security for Tenant Transactions in the Cloud Environment'. Together they form a unique fingerprint.Projects
- 1 Active
-
Cloud Security: Techniques for Securing Cloud Data and Services
Varadharajan, V., MQRES, M. & PhD Contribution (ARC), P. C.
1/01/14 → …
Project: Research