Honeypots For Cloud Computing

  • Eduardo Henrique de Carvalho Moura Federal University of Maranhão – UFMA CCET/DEEE/UFMA Campus do bacanga São Luis MA 6500 080
  • Zair Abdelouahab Federal University of Maranhão – UFMA CCET/DEEE/UFMA Campus do bacanga São Luis MA 6500 080

Abstract

With the advance of internet use and the search for greater mobility, cloud computing is becoming an option for those who want to access their data and other services from anywhere . With the increased use and adoption of this technology by large companies, security has become a big issue to their growth. Cloud computing facilities (public as well as private) are becoming targets of numerous malicious attacks.   In this paper, we provide a survey of cloud computing, highlighting security strategies using honeypots. We present some models of honeypots available in the literature and conclude the paper with a critical analysis.
Published
2016-01-01
How to Cite
MOURA, Eduardo Henrique de Carvalho; ABDELOUAHAB, Zair. Honeypots For Cloud Computing. INTERNATIONAL JOURNAL OF DATA & NETWORK SECURITY, [S.l.], v. 4, n. 1, p. 180-188, jan. 2016. ISSN 2319-1236. Available at: <https://cirworld.com/index.php/ijdns/article/view/454>. Date accessed: 24 apr. 2017.
Section
Articles

Keywords

Honeypots; Cloud Computing; Security; Virtualization.