Cloud System Performance and Security Improvements with Multi-tenancy Integration

Authors

  • Meenakshi Saini Student, Department of Computer Science & Engineering, Yamuna Institute of Engineering & Technology (YIET), Gadholi, Yamuna Nagar, Haryana, India
  • Neha Bathla Assistant Professor, Department of Computer Science & Engineering, Yamuna Institute of Engineering & Technology (YIET), Gadholi, Yamuna Nagar, Haryana, India

Keywords:

Cloud computing, multi-tenancy, MetLab, interface complexity, security

Abstract

Cloud computing has emerged as a popular paradigm for delivering scalable and flexible computing resources to businesses and individuals. However, ensuring the performance and security of cloud systems continues to be a significant concern. Multiple users or tenants can share the same cloud infrastructure thanks to multi-tenancy, a crucial notion in cloud computing. This dissertation explores the integration of multi-tenancy as a means to enhance the security and performance of cloud systems. The comprehensive review of the existing literature on cloud computing, multi-tenancy, and the associated security and performance challenges. It analyses the benefits and drawbacks of multi-tenancy and identifies the key research gaps that need to be addressed. To address the security concerns, the dissertation investigates various security mechanisms and techniques that can be employed within a multi-tenant cloud environment. It explores access control models, encryption techniques, and secure data isolation methods to ensure the privacy and integrity of tenant data. The dissertation also explores auditing and monitoring mechanisms to detect and mitigate potential security breaches.

References

Chang V, Ramachandran M, Yao Y, Kuo YH, Li CS. A resiliency framework for an enterprise cloud. Int J Inf Manag. 2016; 36 (1): 155–166. doi: 10.1016/j.ijinfomgt.2015.09.008.

Cheng Y. Design and implementation of cloud computing network security virtual computing and defense technology. Secur Commun Netw. 2022; 2022: 1–7. doi: 10.1155/2022/7876199.

Kasthuri M. Blockchain based data security as a service in cloud platform security. Int J Cloud Compu: Serv Archit. 2021; 11 (6): 1–8. doi: 10.5121/ijccsa.2021.11601.

Li X, Pan D, Wang Y, Ruiz R. Scheduling multi-tenant cloud workflow tasks with resource reliability. Sci China Inf Sci. 2022; 65 (9): 1–18. doi: 10.1007/s11432-020-3295-2.

Latekar SM, Ravindran R. Resolving multi tenancy issues using cloud automation. Int J Sci Res Eng Trends. 2020; 6 (3): 2395–2566.

Mutulu PM, Kahonge AM. A multi-tenancy cloud trust model using quality of service monitoring: A case of infrastructure as a Service (IaaS). Int J Comput Appl. 2021;174 (27): 41–46. doi: 10.5120/ijca2021921175.

Narasayya V, Chaudhuri S. (2021). Cloud data services: workloads, architectures and multi-tenancy. [Online] Available at https://ieeexplore.ieee.org/document/9426558

Ou X. Research on data access security agent technology in cloud computing security. J Phys Conf Ser. 2020; 1693 (1). doi: 10.1088/1742-6596/1693/1/012013.

Sabri MS, Kapoor R. Challenges in cloud security a review Rev. Artic. 2021; 9 (1). 4143–4148.

Victor RJ, Singh M. Security analysis in multi-tenant cloud computing healthcare system. Int J Mech Eng Technol. 2018; 9 (3): 71–78.

Saraswathi M, Bhuvaneswari T. Multitenancy in cloud-based software, as a service application. Int J Adv Res Comput Sci Softw Eng. 2013; l3 (11): 1–4.

Sastry JKR, Basu MT. Securing Multi-tenancy systems through multi-DB instances and multiple databases on different physical servers. Int J Electr. 2019; 9 (2): 1385–1392. doi: 10.11591/ijece.v9i2.pp1385-1392.

Sastry M, Trinath Basu M-F. Authentication through integration with IMS system. Int J Emerg Trends Eng Res. 2020; 8 (1): 88–113.

Trinath Basu M, Dr. Sastry JKR. A full security included Cloud Computing Architecture. Int J Eng Technol. 2018; 7 (2): 807–812.

Kaur S, Amanpreet S. The concept of cloud computing and issues regarding its privacy and security. Int J Eng Res Technol. 2019; 1 (3).

Dawson JK, Frimpong T, Acquah JBH, Missah YM. Reconnoitering security algorithms performance in the cloud: systematic literature review based on the Prisma archetype. J Theor Appl Inf Technol. 2023; 101 (6): 2203–2227.

Hu VC, Iorga M, Bao W, Li A, Li Q, Gouglidis A. General access control guidance for cloud systems; 2020. NIST Spec Publ. [Online] Available at https://nvlpubs.nist.gov/nistpubs/

SpecialPublications/NIST.SP.800-210.pdf

Ahmed MK, Mandebi J, Saha SK, Bobda C. (2022). Multi-tenant cloud FPGA: a survey on security. arXiv Preprint. [Online] Available at https://arxiv.org/abs/2209.11158

Akor RO. Cloud-based software performance evaluation engineering, network security, and, performance evaluation. 2020; 4480 (5): 64–68. doi: 10.36349/easjecs.

Alghofaili Y, Albattah A, Alrajeh N, Rassam MA, Al-Rimy BAS. Secure cloud infrastructure: A survey on issues, current solutions, and open challenges. Appl Sci. 2021; 11 (19). doi: 10.3390/app11199005.

Yancheshmeh AS. Multi-tenancy security in cloud computing. [Online] Available at https://kth.diva-portal.org/smash/get/diva2:1412847/FULLTEXT01.pdf

Al-Maliki SQA-K. Efficient cloud-based resource sharing through multi-tenancy and load balancing: an exploration of higher education and digital libraries. Iraqi J Sci. 2023; 64 (8): 4147–4159.

Alouffi B, Hasnain M, Alharbi A, Alosaimi W, Alyami H, Ayaz M. A systematic literature review on cloud computing security: threats and mitigation strategies. IEEE Access. 2021; 9: 57792–57807. doi: 10.1109/ACCESS.2021.3073203.

Campanile L, Iacono M, Marrone S, Mastroianni M. On performance evaluation of security monitoring in multitenant cloud applications. Electron Notes Theor Comput Sci. 2020; 353: 107–127. doi: 10.1016/j.entcs.2020.09.020.

Chandrika SU, Perumal TP. Modified ECC for secure data transfer in multi-tenant cloud computing. Int J Comput Netw Inf Secur. 2022; 14 (6): 76–88. doi: 10.5815/ijcnis.2022.06.06.

Hamlen K, Kantarcioglu M, Khan L, Thuraisingham V. Security issues for cloud computing. Int J Inf Secur Priv. 2010; 4 (2): 39–51. doi: 10.4018/jisp.2010040103.

Chen D, Zhao H. Data security and privacy protection issues in cloud computing. Int Conf Comput Sci Electron Eng. 2012: 647–651. doi: 10.1109/ICCSEE.2012.193.

Sabahi F. Cloud computing security threats and responses. 2011 IEEE 3rd International Conference on Communication Software and Network (ICCSN); 2011 May 27–29; Xi’an, China: IEEE; 2011; 245–249 pp.

Sekhar RV, Nandini N, Bhanumathy D, Hemalatha M. ’Identity based authentication for data stored in cloud’ published in International. J Adv Res Comput Sci Softw Eng. 2015; 5: 243–247.

King NJ, Raja VT. Protecting the privacy and security of sensitive customer data in the cloud. Comput Law Secur Rev. 2012; 28 (3): 308–319.

Khoshkholghi MA, Abdullah A, Latip R, Subramaniam S, Othman M. Disaster recovery in cloud computing: a survey. Comp Info Sci. 7 (4): 39–54.

Descher M, Masser P, Feilhauer T, Tjoa AM, Huemer. Retaining data control to the client in infrastructure clouds. 2009 International Conference on Availability, Reliability and Security; 2009 March 16–19; Fukuoka, Japan: IEEE. 2009; 9–16 pp. doi: 10.1109/ARES.2009.78.

Sabahi F. Cloud computing security threats and responses. In: 2011 IEEE 3rd International Conference on Communication Software and Networks; 2011 May. Xi'an, China: IEEE; 2011. 245–249 pp. doi: 10.1109/ICCSN.2011.6014715.

Samani R. (2016). Is cloud security an exaggerated concern? | McAfee Blog. McAfee Blog. Online Available from: https://www.mcafee.com/blogs/other-blogs/executive-perspectives/cloud-security-exaggerated-concern/

Singh A, Chatterjee K. Cloud security issues and challenges: A survey. J Netw Comput Appl. 2017; 79 (5): 88–115. doi: 10.1016/j.jnca.2016.11.027.

Downloads

Published

2023-09-05