Figure 9From: Handling compromised components in an IaaS cloud installation Case Two - A virtual bogus compute worker is added as a consumer’s instance. Back to article page