Honeypots For Cloud Computing
AbstractWith the advance of internet use and the search for greater mobility, cloud computing is becoming an option for those who want to access their data and other services from anywhere . With the increased use and adoption of this technology by large companies, security has become a big issue to their growth. Cloud computing facilities (public as well as private) are becoming targets of numerous malicious attacks. In this paper, we provide a survey of cloud computing, highlighting security strategies using honeypots. We present some models of honeypots available in the literature and conclude the paper with a critical analysis.
How to Cite
MOURA, Eduardo Henrique de Carvalho; ABDELOUAHAB, Zair. Honeypots For Cloud Computing. INTERNATIONAL JOURNAL OF DATA & NETWORK SECURITY, [S.l.], v. 4, n. 1, p. 180-188, jan. 2016. ISSN 2319-1236. Available at: <https://cirworld.com/index.php/ijdns/article/view/454>. Date accessed: 25 feb. 2017.
Honeypots; Cloud Computing; Security; Virtualization.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.