Cloud System Performance and Security Improvements with Multi-Tenancy integration

Author: Meenakshi Saini, Neha Bathla Journal of Multimedia Technology &Recent Advancements-STM Journals Issn: 2349-9028 Date: 2023-12-26 01:27 Volume: 10 Issue: 02 Keyworde: Cloud computing, multi-tenancy, Metlab, Interface Complexity, security Full Text PDF Submit Manuscript Journals


Keyworde: Cloud computing, multi-tenancy, Metlab, Interface Complexity, security

Full Text PDF


Ahmed MK, Mandebi J, Saha SK, Bobda C. Multi-Tenant Cloud FPGA: A Survey on Security.
arXiv preprint arXiv:2209.11158. 2022 Sep 22.
2. R. O. Akor, “Cloud-Based Software Performance Evaluation Engineering, Network Security, and,
Performance Evaluation” vol. 4480, no. 5, pp. 64–68, 2020, doi:
3. Y. Alghofaili, A. Albattah, N. Alrajeh, M. A. Rassam, and B. A. S. Al-Rimy, “Secure cloud
infrastructure: A survey on issues, current solutions, and open challenges,” Appl. Sci., vol. 11, no.
19, 2021, doi: 10.3390/app11199005.
4. Ali shokrollahi yancheshmeh, “Multi-Tenancy Security in Cloud Computing,” Degree Proj. Inf.
Commun. Technol., pp. 1–73, 2019.
5. S. Q. A.-K. Al-Maliki, “Efficient Cloud-based Resource Sharing Through Multi-tenancy and Load
Balancing: An Exploration of Higher Education and Digital Libraries,” pp. 1–16, 2022.
6. B. Alouffi, M. Hasnain, A. Alharbi, W. Alosaimi, H. Alyami, and M. Ayaz, “A Systematic
Literature Review on Cloud Computing Security: Threats and Mitigation Strategies,” IEEE Access,
vol. 9, pp. 57792–57807, 2021, doi: 10.1109/ACCESS.2021.3073203.
7. L. Campanile, M. Iacono, S. Marrone, and M. Mastroianni, “On Performance Evaluation of
Security Monitoring in Multitenant Cloud Applications,” Electron. Notes Theor. Comput. Sci., vol.
353, pp. 107–127, 2020, doi: 10.1016/j.entcs.2020.09.020.
8. S. U. Chandrika and T. P. Perumal, “Modified ECC for Secure Data Transfer in Multi-Tenant Cloud
Computing,” Int. J. Comput. Netw. Inf. Secur., vol. 14, no. 6, pp. 76–88, 2022, doi:
9. V. Chang, M. Ramachandran, Y. Yao, Y. H. Kuo, and C. S. Li, “A resiliency framework for an
enterprise cloud,” Int. J. Inf. Manage., vol. 36, no. 1, pp. 155–166, 2016, doi:
10. Y. Cheng, “Design and Implementation of Cloud Computing Network Security Virtual Computing
and Defense Technology,” Secur. Commun. Networks, vol. 2022, 2022, doi:
11. J. K. Dawson, T. Frimpong, J. B. H. Acquah, and Y. M. Missah, “Reconnoitering Security
Algorithms Performance in the Cloud: Systematic Literature Review Based on the Prisma
Archetype,” J. Theor. Appl. Inf. Technol., vol. 101, no. 6, pp. 2203–2227, 2023.
12. V. C. Hu, M. Iorga, W. Bao, A. Li, Q. Li, and A. Gouglidis, “General Access Control Guidance for
Cloud Systems,” NIST Spec. Publ., 2020, [Online]. Available:
13. M. Kasthuri, “Blockchain based Data Security as a Service in Cloud Platform Security,” Int. J.
Cloud Comput. Serv. Archit., vol. 11, no. 6, pp. 1–8, 2021, doi: 10.5121/ijccsa.2021.11601.
14. X. Li, D. Pan, Y. Wang, and R. Ruiz, “Scheduling multi-tenant cloud workflow tasks with resource
reliability,” Sci. China Inf. Sci., vol. 65, no. 9, pp. 1–18, 2022, doi: 10.1007/s11432-020-3295-2.
15. S. Mangesh Latekar and R. Ravindran, “Resolving Multi Tenancy Issues Using Cloud
Automation,” Int. J. Sci. Res. Eng. Trends, vol. 6, no. 3, pp. 2395–566, 2020.
16. P. M. Mutulu and A. M. Kahonge, “A Multi-Tenancy Cloud Trust Model using Quality of Service
Monitoring: A Case of Infrastructure as a Service (IaaS),” Int. J. Comput. Appl., vol. 174, no. 27,
pp. 41–46, 2021, doi: 10.5120/ijca2021921175.
17. V. Narasayya and S. Chaudhuri, “Cloud Data Services: Workloads, Architectures and MultiTenancy,” Cloud Data Serv. Workload. Archit. Multi-Tenancy, 2021, doi:
18. X. Ou, “Research on data access security agent technology in cloud computing security,” J. Phys.
Conf. Ser., vol. 1693, no. 1, 2020, doi: 10.1088/1742-6596/1693/1/012013.
19. M. S. Sabri and R. Kapoor, “Challenges in Cloud Security a Review,” Rev. Artic. SSRN Electron.
J., vol. 9, no. 1, pp. 4143–4148, 2021, [Online]. Available:
20. R. J. Victor and M. Singh, “Security analysis in multi-tenant cloud computing healthcare system,”
Int. J. Mech. Eng. Technol., vol. 9, no. 3, pp. 71–78, 2018.
21. M.Saraswathi, T.Bhuvaneswari, Multitenancy in Cloud-based Software, as a Service Application,
International Journal of Advanced Research in Computer Science and Software Engineering, Vol.
l3,issue11, page 1-4,2013
22. JKRSastry, M TrinathBasu, Securing Multi-tenancy systems through multi DB instances and
multiple databases on different physical servers, International Journal of Electrical and Computer
Engineering (IJECE), Volume 9, Issue 2, Pages 1385-1392, 2019.
23. JKRSastry, M TrinathBasu, Multi-Factor Authentication through Integration with IMS System,
International Journal of Emerging Trends in Engineering Research, Volume 8, No. 1, Page, 88-113,
24. M.Trinath Basu, Dr.JKRSastry, A full security included Cloud Computing Architecture,
International Journal of Engineering & Technology, Volume 7, Issue 2.7, Page 807-812, 2018.
25. Satveer Kaur and Amanpreet Singh “The concept ou Cloud Computing and Issues regarding its
Privacy and Security” International Journal ou Engineering Research & Technology (IJERT), Vol
1 Issue 3, May 2019.
26. Hamlen, K., Kantarcioglu, M., Khan, L. and Thuraisingham, V. (2010). Security Issues uor Cloud
Computing. International Journal ou Inuormation Security and Privacy, 4(2), 39-51. doi: 10.4018/
27. Chen, D. and Zhao, H. (2012). Data Security and Privacy Protection Issues in Cloud Computing.
International Conuerence on Computer Science and Electronics Engineering, 647-651. doi:
10.1109/ ICCSEE.2018.193
28. Farzad Sabahi “Cloud Computing Security threats and Responses”, 2011 IEEE 3rd International
Conuerence on Communication Soutware and Network (ICCSN), pp. 245-249, May 2019.
29. Sekhar R V, Nandini N, Bhanumathy D and Hemalatha M, “Identity based authentication for data
stored in cloud” published in International Journal of Advanced Research in Computer Science and
Software Engineering, vol.5, 2015, 243-247.
30. King N J and Raja V T, “Protecting the privacy and security of sensitive customer data in the cloud
Computer law and Security Review,” vol.28, 2012, 308-319.
31. Khoshkholghi M A, Abdullah A, Latip R, Subramaniam S and Othman M, “Disaster Recovery in
Cloud Computing: A Survey Computer and Information Science,” vol.7, 2014, 39-54.
32. D. Descher, M., Masser, P., Feilhauer, T., Tjoa, A.M. and Huemer, “Retaining data control to the
client in infrastructure clouds,” Int. Conf. Availability, Reliab. Secur. (pp. 9-16). IEEE. pp. pp. 9–
16, 2009.
33. Farzad Sabahi. Cloud Computing Security Threats and Responses, in: IEEE 3rd International
Conference on Communication software and Networks (ICCSN), May 2011.p.245-249.
34. McAfee, 6 Cloud security issues that businesses experience, [Online]. Available: Last Visit Nov 17, 2020.
35. A. Singh and K. Chatterjee. (2017). “Cloud security issues and challenges: A survey,” Journal of
Network and Computer Applications, vol. 79, no. 5, pp. 88–115.

If-Else Example