CFP last date
20 December 2024
Reseach Article

Framework using Multitenancy Architecture in Cloud Computing

by Varsha, Amit Wadhwa, Swati Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 15
Year of Publication: 2015
Authors: Varsha, Amit Wadhwa, Swati Gupta
10.5120/21615-4883

Varsha, Amit Wadhwa, Swati Gupta . Framework using Multitenancy Architecture in Cloud Computing. International Journal of Computer Applications. 121, 15 ( July 2015), 12-17. DOI=10.5120/21615-4883

@article{ 10.5120/21615-4883,
author = { Varsha, Amit Wadhwa, Swati Gupta },
title = { Framework using Multitenancy Architecture in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 15 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 12-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number15/21615-4883/ },
doi = { 10.5120/21615-4883 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:08:30.409503+05:30
%A Varsha
%A Amit Wadhwa
%A Swati Gupta
%T Framework using Multitenancy Architecture in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 15
%P 12-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As we all know Cloud computing is an emerging field in the world of computation and security of the data must be confined over the network. There are some security issues occurring while using services over the cloud and stress of our study is the multi-tenancy issue. Many organizations nowadays are looking for improving security while sharing resources, application etc. on same hardware and same software by implementing multi-factor authentication i. e. authentication requiring more than one independent mechanism to prove one's identity like One-time passwords. We describe how cloud computing can address these issues. Our approach is based on a flexible framework for supporting authentication with multi tenancy architecture. For that, we proposed a framework using multitenant architecture for secure cloud computing environment that secure our data over the cloud and support multi-tenancy nature with the help of OTP.

References
  1. "Security Guidance for Critical Areas of Focus in Cloud computing", April 2009, presented by Cloud Security Alliance (CSA).
  2. Arijit Ukil, Debasish Jana and Ajanta De Sarkar" A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE "International Journal of Network Security & Its Applications (IJNSA), Vol. 5, No. 5, September 2013 DOI: 10. 5121/ijnsa. 2013. 5502 11.
  3. Rabi Prasad Padhy, Manas Ranjan Patra and Suresh Chandra Satapathy ," Cloud Computing: Security Issues and Research Challenges", IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) Vol. 1, No. 2, December 2011.
  4. Kashif Munir and Prof Dr. Sellapan Palaniappan," FRAMEWORK FOR SECURE CLOUD COMPUTING ", International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol. 3, No. 2, April 2013.
  5. Ayesha Malik, Muhammad Mohsin Nazir "Security Framework for Cloud Computing Environment: A Review", Journal of Emerging Trends in Computing and Information Sciences ©2009-2012 CIS Journal. All rights reserved, VOL. 3, NO. 3, March 2012 ISSN 2079-8407
  6. Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, VasanthBala and PengNing, "Managing security of virtual machine images in a cloud environment", November 2009, Proceedings of the 2009 ACM workshop on Cloud computing security pages 91-96.
  7. Miranda Mow bray and Siani Pearson, "A Client- Based Privacy Manager for Cloud computing", June 2009, Proceedings of the Fourth International ICST Conference on communication system software and Middleware.
  8. Flavio Lombardi and Roberto Di Pietro, "Transparent Security for Cloud", March 2010, Proceedings of the 2010 ACM Symposium on Applied Computing, pages 414-415. Objectives of this paper is to study the major security issues arising in cloud environment.
  9. WeichaoWang, Zhiwei Li, Rodney Owens and Bharat Bhargava, "Secure and Efficient Access to Outsourced Data", December 2009, Proceedings of the ACM workshop on Cloud computing security, pages 55-65.
  10. Krešimir Popovi?, Željko Hocenski,"Cloud computing security issues and challenges", MIPRO 2010, May 24-28, 2010, Opatija, Croatia.
  11. Takeshi Takahashi, Gregory Blancy, Youki Kadobayashiy, Doudou Fally, Hiroaki Hazeyamay, Shin'ichiro Matsuo,"Enabling Secure Multitenancy in Cloud Computing: Challenges and Approaches".
  12. Nagarjuna,C. C kalyan srinivas,S. Sajida,Lokesh" SECURITY TECHNIQUES FOR MULTITENANCY APPLICATIONS IN CLOUD", C. C. Kalyan Srinivas et al, International Journal of Computer Science and Mobile Computing Vol. 2 Issue. 8, August- 2013, pg. 248-251.
  13. Image: Architectural Multi-Tenancy: http://devcentral. f5. com/weblogs/images/devcentral_f5_com/weblogs/macvittie/WindowsLiveWriter/ArchitecturalMultitenancy_46C0/image1. png.
  14. Paras Babu Tiwari Shashidhar Ram Joshi ,"Single Sign-on with One Time Password"
  15. Arvind D Meniya, Harkishan B Jethva ,"Single-Sign-On(SSO)across open cloud computing federation" International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 2, Issue 1,Jan-Feb 2012, pp. 891-895 891
  16. Miceli, Christopher, "One Time Password Scheme Via Secret Sharing Techniques" (2011). University of New Orleans Theses and Dissertations. Paper 1330.
  17. S. Jaya Nirmala 1, S. Mary Saira Bhanu 1, Ahtesham Akhtar Patel," A COMPARATIVE STUDY OF THE SECRET SHARING ALGORITHMS FOR SECURE DATA IN THE CLOUD",International Journal on Cloud Computing: Services and Architecture(IJCCSA),Vol. 2, No. 4, August 2012
  18. J. Petersson. Best practices for cloud computing multi-tenancy.
  19. S. Ramgovind, M. M. Eloff, E. Smith. "The Management of Security in Cloud Computing" In PROC 2010 IEEE International Conference on Cloud Computing 2010.
  20. Varsha, Amit Wadhwa, Swati gupta," Study of Security Issues in Cloud Computing", International Journal of Computer Science and Mobile Computing, Vol. 4 Issue. 6, June- 2015, pg. 230-234
  21. One-time Pad. Available online: http://users. telenet. be/d. rijmenants/en/onetimepad. htm
  22. Image: Introduction to cloud comptung: https://www. google. co. in/search?q=cloud+computing+architecture&biw=1360&bih=623&source=lnms&tbm=isch&sa=X&ei=oCeaVfvAGZKfugSz7a3wDg&ved=0CAYQ_AUoAQ&dpr=1#tbm=isch&q=cloud+computing+&imgrc=kSsq_wpQ-t9KWM%3A
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security issues Security model Authentication multi-tenancy.