Title :
Security tactics for secured cloud computing resources
Author :
Byungrae Cha ; JongWon Kim
Author_Institution :
SCENT Center, GIST, Gwangju, South Korea
Abstract :
In this paper, we propose the security tactics for secured cloud computing resources. It is composed by multistage anomaly detection scheme and honeypot in outside of cloud computing, and attribute-based access control in inside of cloud computing for secured cloud computing resource in order to support safety future services.
Keywords :
authorisation; cloud computing; resource allocation; attribute-based access control; cloud computing resource security; honeypot; multistage anomaly detection scheme; Access control; Cloud computing; Computer crime; Monitoring; Safety; Attributed Based Access Control; Cloud Computing; Honeypot; Multi-stage Anomaly Detection; Security Tactics;
Conference_Titel :
Information Networking (ICOIN), 2013 International Conference on
Conference_Location :
Bangkok
Print_ISBN :
978-1-4673-5740-1
Electronic_ISBN :
1976-7684
DOI :
10.1109/ICOIN.2013.6496425