A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
The literature indicates that cloud computing is an exciting and advantageous architecture, well suited to support global business due to its scalability needs, but it also involves new and substantial security risks. This paper provides an overview of a configuration of a cloud that was implemented in the authors' laboratory and was broken into three layers: the cloud, zone, and virtual machine. Security mechanisms that were used in the study, including multi-level firewalling, are described.doi:10.48009/2_iis_2014_242-251 fatcat:x4pkudwjejcrheaj5vj74b2o4y