Projects per year
Cloud computing technologies are receiving a great deal of attention. Although there are several benefits with the cloud, attackers can also make use of the cloud infrastructure for hosting malicious services and generating different types of attacks. In this paper, we propose trust enhanced security techniques for securing tenant transactions in the cloud. Our model takes advantage of the features of trusted computing technology to enhance the design and enforcement of security policies and mechanisms in a cloud environment. Furthermore, the cloud service provider monitors the ongoing tenant transactions for different types of attacks and terminates the malicious transactions. Hence, our model can be used to enhance the security of tenant transactions in cloud.
FingerprintDive into the research topics of 'Trust Enhanced Security for Tenant Transactions in the Cloud Environment'. Together they form a unique fingerprint.
- 1 Active