Cloud security game theory scoring from predation models in simulation
Abstract
References
Recommendations
A Game Theoretic Approach for Virtual Machine Allocation Security in Cloud Computing
NISS '19: Proceedings of the 2nd International Conference on Networking, Information Systems & SecurityThe Virtualization technologies make cloud computing desirable but they also introduce serious security risks like co-resident attack and interdependence between users on the same hypervisor. The previous works on the subject of virtualization security ...
TVGuarder: A Trace-Enable Virtualization Protection Framework against Insider Threats for IaaS Environments
Cloud computing has a most vulnerable security concerns as virtualization. This paper presents a Trace-enable Virtualization protection framework named TVGuarder, which protects IaaS user's important data from being illegally accessed or maliciously ...
A signaling game approach to mitigate co-resident attacks in an IaaS cloud environment
AbstractCloud service providers (CSPs) offer a variety of services that are opening the door to the infinite possibilities of cloud computing. Despite numerous benefits offered by the CSPs, there are, however, some security issues that may ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Kluwer Academic Publishers
United States
Publication History
Author Tags
Qualifiers
- Research-article
Funding Sources
- This work was supported in part by the U.S. Department of Education
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in