Enhancement of Security and Performance of Cloud System by Integration of Multi-Tenancy

Authors

  • Meenakshi Saini Student, Department of Computer Science & Engineering, Yamuna Institute of Engineering & Technology (YIET), Gadholi, Yamunanagar, Haryana, India
  • Neha Bathla Assistant Professor, Department of Computer Science & Engineering, Yamuna Institute of Engineering & Technology (YIET), Gadholi, Yamunanagar, Haryana, India

Keywords:

Cloud computing, multi-tenancy, METLAB, Interface Complexity

Abstract

Cloud computing is a well-liked model for offering flexible and scalable computing resources to both organizations and individuals. However, assuring the performance and security of cloud systems continues to be of significant concern. Multiple users or tenants can share the same cloud infrastructure thanks to multi-tenancy, a crucial notion in cloud computing. This study relates to the incorporation of multi-tenancy to improve the security and functionality of cloud computing systems, the thorough analysis of the literature already in existence on cloud computing, multi-tenancy, and the related security and performance issues. It examines the advantages and disadvantages of multi-tenancy and outlines the most important research gaps that require filling. The article analyzes several security methods and techniques that can be used in a multi-tenant cloud system to address security problems.

References

Ahmed MK, Mandebi J, Saha SK, Bobda C. Multi-tenant cloud FPGA: a survey on security. arXiv preprint arXiv:2209.11158. September 22, 2022. Available at https://arxiv.org/abs/2209.11158

Ogala E, Akor RO. Cloud-based software engineering, network security, and performance evaluation. East Afr Scholars J Eng Computer Sci. 2020; 3 (5): 64–68.

Alghofaili Y, Albattah A, Alrajeh N, Rassam MA, Al-Rimy BA. Secure cloud infrastructure: a survey on issues, current solutions, and open challenges. Appl Sci. 2021; 11 (19): 9005.

Yancheshmeh AS. Multi-Tenancy Security in Cloud Computing: Edge Computing and Distributed Cloud. Degree Project In Information and Communication Technology. MSc Thesis. Stockholm, Sweden: KTH Royal Institute of Technology; 2019.

Al-Maliki SQA-K. Efficient cloud-based resource sharing through multi-tenancy and load balancing: an exploration of higher education and digital libraries. Iraqi J Sci. 2023; 64 (8): pp. 4147–4159.

Alouffi B, Hasnain M, Alharbi A, Alosaimi W, Alyami H, Ayaz M. A systematic literature review on cloud computing security: threats and mitigation strategies. IEEE Access. 2021; 9: 57792–57807. doi: 10.1109/ACCESS.2021.3073203.

Campanile L, Iacono M, Marrone S, Mastroianni M. On performance evaluation of security monitoring in multitenant cloud applications. Electron Notes Theor Comput Sci. 2020; 353: 107–127. doi: 10.1016/j.entcs.2020.09.020.

Chandrika SU, Perumal TP. Modified ECC for secure data transfer in multi-tenant cloud computing. Int J Comput Netw Inform Secur. 2022; 14 (6): 76–88. doi: 10.5815/ijcnis.2022.06.06.

Chang V, Ramachandran M, Yao Y, Kuo YH, Li CS. A resiliency framework for an enterprise cloud. Int J Inform Manage. 2016; 36 (1): 155–166. doi: 10.1016/j.ijinfomgt.2015.09.008.

Cheng Y. Design and implementation of cloud computing network security virtual computing and defense technology. Secur Commun Netw. 2022; 2022: Article ID 7876199. doi: 10.1155/2022/7876199.

Dawson JK, Frimpong DT, Hayfron JB, Acquah D, Missah M. Reconnoitering security algorithms performance in the cloud: systematic literature review based on the Prisma archetype. J Theoret Appl Inform Technol. 2023; 101 (6): 2203–2227.

Hu VC, Iorga M, Bao W, Li A, Li Q, Gouglidis A. General access control guidance for cloud systems. NIST Special Publication 800-210. Washington, DC, USA: National Institute of Standards and Technology; 2020. Available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/

NIST.SP.800-210.pdf

Kasthuri M. Blockchain based data security as a service in cloud platform security. Int J Cloud Comput ServArchitect. 2021; 11 (1–6): 1–8.

Li X, Pan D, Wang Y, Ruiz R. Scheduling multi-tenant cloud workflow tasks with resource reliability. Sci China Inform Sci. 2022; 65 (9): 1–18. doi: 10.1007/s11432-020-3295-2.

Latekar M, Ravindran R. Resolving multi tenancy issues using cloud automation. Int J Sci Res Eng Trends. 2020; 6 (3): 1447–1451.

Mutulu PM, Kahonge AM. A multi-tenancy cloud trust model using quality of service monitoring: a case of infrastructure as a service (IaaS). Int J Comput Appl. 2021; 174 (27): 41–46. doi: 10.5120/ijca2021921175.

Narasayya V, Chaudhuri S. Cloud Data Services: Workloads, Architectures and Multi-tenancy. Hanover, MA, USA: Now Publishers; 2021.

Ou X. Research on data access security agent technology in cloud computing security. J Phys Conf Ser. 2020; 1693 (1): 012013. doi: 10.1088/1742-6596/1693/1/012013.

Kapoor R. Challenges in cloud security: a review. Int J Creative Res Thoughts. 2021; 9 (1): 4143–4148.

Saraswathi M, Bhuvaneswari T. Multitenant SaaS model of cloud computing: issues and solutions. In: 2014 International Conference on Communication and Network Technologies, Sivakasi, India, December 18–19, 2014. pp. 27–32.

Sastry JKR, Basu MT. Securing multi-tenancy systems through multi DB instances and multiple databases on different physical servers. Int J Electrical Computer Eng. 2019; 9 (2): 1385–1392. doi: 10.11591/ijece.v9i2.pp1385–1392.

Sastry JKR, Basu MT. Multi-factor authentication through integration with IMS system. Int J Emerg Trends Eng Res. 2020; 8 (1): 87–113.

Basu MT, Sastry JK. A fully security included cloud computing architecture. Int J Eng Technol. 2018; 7 (2): 807–812.

Kaur S, Singh A. The concept of cloud computing and issues regarding its privacy and security. Int J Eng Res Technol. 2012; 1 (3): 1–5.

Hamlen K, Kantarcioglu M, Khan L, Thuraisingham B. Security issues for cloud computing. Int J Inform Security Privacy. 2010; 4 (2): 36–48.

Chen D, Zhao H. Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering, Hangzhou, China, March 23–25, 2012. pp. 647–651.

Sabahi F. Cloud computing security threats and responses. In: 2011 IEEE 3rd International Conference on Communication Software and Networks, Xi’an, China, May 27–29, 2011. pp. 245–249.

Sekhar RV, Nandini N, Bhanumathy D, Hemalatha M. Identity based authentication for data stored in cloud. Int J Adv Res Computer Sci Softw Eng. 2015; 5 (3): 243–247.

King NJ, Raja VT. Protecting the privacy and security of sensitive customer data in the cloud. Computer Law Security Rev. 2012; 28 (3): 308–319.

Khoshkholghi MA, Abdullah A, Latip R, Subramaniam S, Othman M. Disaster recovery in cloud computing: a survey. Computer Inform Sci. 2014; 7 (4): 39–54.

Singh A, Chatterjee K. Cloud security issues and challenges: a survey. J Netw Computer Appl. 2017; 79: 88–115.

Published

2023-09-05