Cloud System Performance and Security Improvements with Multi-Tenancy integration
Abstract
Cloud computing has emerged as a popular paradigm for delivering scalable and flexible computing resources to businesses and individuals. However, assuring the performance and security of cloud systems continues to be a significant concern. Multiple users or tenants can share the same cloud infrastructure thanks to multi-tenancy, a crucial notion in cloud computing. This dissertation explores the integration of multi-tenancy as a means to enhance the security and performance of cloud systems. The comprehensive review of the existing literature on cloud computing, multi-tenancy, and the associated security and performance challenges. It analyses the benefits and drawbacks of multi-tenancy and identifies the key research gaps that need to be addressed. To address the security concerns, the dissertation investigates various security mechanisms and techniques that can be employed within a multi-tenant cloud environment. It explores access control models, encryption techniques, and secure data isolation methods to ensure the privacy and integrity of tenant data. The dissertation also explores auditing and monitoring mechanisms to detect and mitigate potential security breaches.
Keywords: Cloud computing, multi-tenancy, Metlab, Interface Complexity, security
INTRODUCTION
The phrase “cloud computing” describes the method of gaining access to data and programs Cloud computing has emerged as a popular paradigm for delivering scalable and flexible computing resources to businesses and individuals. However, assuring the performance and security of cloud systems continues to be a significant concern. Multiple users or tenants can share the same cloud infrastructure thanks to multi-tenancy, a crucial notion in cloud computing. This dissertation explores the integration of multi-tenancy as a means to enhance the security and performance of cloud systems. The comprehensive review of the existing literature on cloud computing, multi-tenancy, and the associated security and performance challenges. It analyses the benefits and drawbacks of multi-tenancy and identifies the key research gaps that need to be addressed. To address the security concerns, the dissertation investigates various security mechanisms and techniques that can be employed within a multi-tenant cloud environment. It explores access control models, encryption techniques, and secure data isolation methods to ensure the privacy and integrity of tenant data. The dissertation also explores auditing and monitoring mechanisms to detect and mitigate potential security breaches. Stored on remote servers in various data centres over the Internet. Instead of storing data and applications locally on each user’s computer or mobile device, cloud computing stores everything on a centralized server. As with many other modern applications, Facebook can be accessed and updated from any web enabled device [9]. Cloud computing is rapidly becoming more widespread in the technical sector in today’s age of plentiful digital resources.
Keyworde: Cloud computing, multi-tenancy, Metlab, Interface Complexity, security
Full Text PDF
Refrences:
Ahmed MK, Mandebi J, Saha SK, Bobda C. Multi-Tenant Cloud FPGA: A Survey on Security.
arXiv preprint arXiv:2209.11158. 2022 Sep 22.
2. R. O. Akor, “Cloud-Based Software Performance Evaluation Engineering, Network Security, and,
Performance Evaluation” vol. 4480, no. 5, pp. 64–68, 2020, doi:
10.36349/easjecs.2020.v03i05.002.
3. Y. Alghofaili, A. Albattah, N. Alrajeh, M. A. Rassam, and B. A. S. Al-Rimy, “Secure cloud
infrastructure: A survey on issues, current solutions, and open challenges,” Appl. Sci., vol. 11, no.
19, 2021, doi: 10.3390/app11199005.
4. Ali shokrollahi yancheshmeh, “Multi-Tenancy Security in Cloud Computing,” Degree Proj. Inf.
Commun. Technol., pp. 1–73, 2019.
5. S. Q. A.-K. Al-Maliki, “Efficient Cloud-based Resource Sharing Through Multi-tenancy and Load
Balancing: An Exploration of Higher Education and Digital Libraries,” pp. 1–16, 2022.
6. B. Alouffi, M. Hasnain, A. Alharbi, W. Alosaimi, H. Alyami, and M. Ayaz, “A Systematic
Literature Review on Cloud Computing Security: Threats and Mitigation Strategies,” IEEE Access,
vol. 9, pp. 57792–57807, 2021, doi: 10.1109/ACCESS.2021.3073203.
7. L. Campanile, M. Iacono, S. Marrone, and M. Mastroianni, “On Performance Evaluation of
Security Monitoring in Multitenant Cloud Applications,” Electron. Notes Theor. Comput. Sci., vol.
353, pp. 107–127, 2020, doi: 10.1016/j.entcs.2020.09.020.
8. S. U. Chandrika and T. P. Perumal, “Modified ECC for Secure Data Transfer in Multi-Tenant Cloud
Computing,” Int. J. Comput. Netw. Inf. Secur., vol. 14, no. 6, pp. 76–88, 2022, doi:
10.5815/ijcnis.2022.06.06.
9. V. Chang, M. Ramachandran, Y. Yao, Y. H. Kuo, and C. S. Li, “A resiliency framework for an
enterprise cloud,” Int. J. Inf. Manage., vol. 36, no. 1, pp. 155–166, 2016, doi:
10.1016/j.ijinfomgt.2015.09.008.
10. Y. Cheng, “Design and Implementation of Cloud Computing Network Security Virtual Computing
and Defense Technology,” Secur. Commun. Networks, vol. 2022, 2022, doi:
10.1155/2022/7876199.
11. J. K. Dawson, T. Frimpong, J. B. H. Acquah, and Y. M. Missah, “Reconnoitering Security
Algorithms Performance in the Cloud: Systematic Literature Review Based on the Prisma
Archetype,” J. Theor. Appl. Inf. Technol., vol. 101, no. 6, pp. 2203–2227, 2023.
12. V. C. Hu, M. Iorga, W. Bao, A. Li, Q. Li, and A. Gouglidis, “General Access Control Guidance for
Cloud Systems,” NIST Spec. Publ., 2020, [Online]. Available:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-210.pdf
13. M. Kasthuri, “Blockchain based Data Security as a Service in Cloud Platform Security,” Int. J.
Cloud Comput. Serv. Archit., vol. 11, no. 6, pp. 1–8, 2021, doi: 10.5121/ijccsa.2021.11601.
14. X. Li, D. Pan, Y. Wang, and R. Ruiz, “Scheduling multi-tenant cloud workflow tasks with resource
reliability,” Sci. China Inf. Sci., vol. 65, no. 9, pp. 1–18, 2022, doi: 10.1007/s11432-020-3295-2.
15. S. Mangesh Latekar and R. Ravindran, “Resolving Multi Tenancy Issues Using Cloud
Automation,” Int. J. Sci. Res. Eng. Trends, vol. 6, no. 3, pp. 2395–566, 2020.
16. P. M. Mutulu and A. M. Kahonge, “A Multi-Tenancy Cloud Trust Model using Quality of Service
Monitoring: A Case of Infrastructure as a Service (IaaS),” Int. J. Comput. Appl., vol. 174, no. 27,
pp. 41–46, 2021, doi: 10.5120/ijca2021921175.
17. V. Narasayya and S. Chaudhuri, “Cloud Data Services: Workloads, Architectures and MultiTenancy,” Cloud Data Serv. Workload. Archit. Multi-Tenancy, 2021, doi:
10.1561/9781680837759.
18. X. Ou, “Research on data access security agent technology in cloud computing security,” J. Phys.
Conf. Ser., vol. 1693, no. 1, 2020, doi: 10.1088/1742-6596/1693/1/012013.
19. M. S. Sabri and R. Kapoor, “Challenges in Cloud Security a Review,” Rev. Artic. SSRN Electron.
J., vol. 9, no. 1, pp. 4143–4148, 2021, [Online]. Available: www.ijcrt.org
20. R. J. Victor and M. Singh, “Security analysis in multi-tenant cloud computing healthcare system,”
Int. J. Mech. Eng. Technol., vol. 9, no. 3, pp. 71–78, 2018.
21. M.Saraswathi, T.Bhuvaneswari, Multitenancy in Cloud-based Software, as a Service Application,
International Journal of Advanced Research in Computer Science and Software Engineering, Vol.
l3,issue11, page 1-4,2013
22. JKRSastry, M TrinathBasu, Securing Multi-tenancy systems through multi DB instances and
multiple databases on different physical servers, International Journal of Electrical and Computer
Engineering (IJECE), Volume 9, Issue 2, Pages 1385-1392, 2019.
https://doi.org/10.11591/ijece.v9i2.pp1385-1392
23. JKRSastry, M TrinathBasu, Multi-Factor Authentication through Integration with IMS System,
International Journal of Emerging Trends in Engineering Research, Volume 8, No. 1, Page, 88-113,
2020
24. M.Trinath Basu, Dr.JKRSastry, A full security included Cloud Computing Architecture,
International Journal of Engineering & Technology, Volume 7, Issue 2.7, Page 807-812, 2018.
25. Satveer Kaur and Amanpreet Singh “The concept ou Cloud Computing and Issues regarding its
Privacy and Security” International Journal ou Engineering Research & Technology (IJERT), Vol
1 Issue 3, May 2019.
26. Hamlen, K., Kantarcioglu, M., Khan, L. and Thuraisingham, V. (2010). Security Issues uor Cloud
Computing. International Journal ou Inuormation Security and Privacy, 4(2), 39-51. doi: 10.4018/
jisp.2010040103
27. Chen, D. and Zhao, H. (2012). Data Security and Privacy Protection Issues in Cloud Computing.
International Conuerence on Computer Science and Electronics Engineering, 647-651. doi:
10.1109/ ICCSEE.2018.193
28. Farzad Sabahi “Cloud Computing Security threats and Responses”, 2011 IEEE 3rd International
Conuerence on Communication Soutware and Network (ICCSN), pp. 245-249, May 2019.
29. Sekhar R V, Nandini N, Bhanumathy D and Hemalatha M, “Identity based authentication for data
stored in cloud” published in International Journal of Advanced Research in Computer Science and
Software Engineering, vol.5, 2015, 243-247.
30. King N J and Raja V T, “Protecting the privacy and security of sensitive customer data in the cloud
Computer law and Security Review,” vol.28, 2012, 308-319.
31. Khoshkholghi M A, Abdullah A, Latip R, Subramaniam S and Othman M, “Disaster Recovery in
Cloud Computing: A Survey Computer and Information Science,” vol.7, 2014, 39-54.
32. D. Descher, M., Masser, P., Feilhauer, T., Tjoa, A.M. and Huemer, “Retaining data control to the
client in infrastructure clouds,” Int. Conf. Availability, Reliab. Secur. (pp. 9-16). IEEE. pp. pp. 9–
16, 2009.
33. Farzad Sabahi. Cloud Computing Security Threats and Responses, in: IEEE 3rd International
Conference on Communication software and Networks (ICCSN), May 2011.p.245-249.
34. McAfee, 6 Cloud security issues that businesses experience, [Online]. Available:
https://www.mcafee.com/blogs/enterprise/cloud-security/6-cloud-security-issues-that-businessesexperience/. Last Visit Nov 17, 2020.
35. A. Singh and K. Chatterjee. (2017). “Cloud security issues and challenges: A survey,” Journal of
Network and Computer Applications, vol. 79, no. 5, pp. 88–115.