Secure Cloud Computing 2013
DOI: 10.1007/978-1-4614-9278-8_4
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Computing Security: What Changes with Software-Defined Networking?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 17 publications
0
16
0
Order By: Relevance
“…The flow table capacity issue has been presented in many previous works like [20][21][22][23][24]. They all point out the limitation of switch flow table memory and potential scalability and security issue.…”
Section: Related Workmentioning
confidence: 99%
“…The flow table capacity issue has been presented in many previous works like [20][21][22][23][24]. They all point out the limitation of switch flow table memory and potential scalability and security issue.…”
Section: Related Workmentioning
confidence: 99%
“…Attacks or strikes like jamming, sniffing can be tended to in the examination range of wireless networks. Commonly, in network, it is something has to trust the configurations manually delivered by a framework/network manager and detach network management traffic from general data traffic [Tsugawa et al, 2014]. Nevertheless, fog nodes are sent at the edge of Internet, which definitely pass on overpowering load to the network management, imagining the cost of keeping up massive scale cloud servers which are scattered all around all through the framework/network edge without basic access for upkeep.…”
Section: Network Fortificationmentioning
confidence: 99%
“…1 is the highest level view of the architecture, the cloud computing environment, called a cloud ecosystem in [8], and its main purpose is to provide a perspective of its components. Each component can be refined in the same way to define concrete architectures; for example, the network model can include firewalls or software-defined network (SDN) structures [39]. In Sect.…”
Section: Introductionmentioning
confidence: 99%