A Brief Study of Risks Associated with Multi-Tenant Software Architecture in Cloud Environment

  IJCTT-book-cover
 
         
 
© 2022 by IJCTT Journal
Volume-70 Issue-9
Year of Publication : 2022
Authors : Praveen Sengar, Meetendra Singh Chahar, Amit Kohli, Abhay Shanker Mudgal
DOI :  10.14445/22312803/IJCTT-V70I9P101

How to Cite?

Praveen Sengar, Meetendra Singh Chahar, Amit Kohli, Abhay Shanker Mudgal, "A Brief Study of Risks Associated with Multi-Tenant Software Architecture in Cloud Environment," International Journal of Computer Trends and Technology, vol. 70, no. 9, pp. 1-5, 2022. Crossref, https://doi.org/10.14445/22312803/IJCTT-V70I9P101

Abstract
Cloud computing has acquired a lot of significance in previous years and is growing rapidly. Because of virtual machines, different clients can share one single machine by sharing its database, resources and hardware. Security inside the cloud is of principal significance as the interest and use of cloud computing incrementally. Multi-tenancy particularly acquaints with exclusive security risks with Cloud computing because of more than one tenant using similar actual PC hardware and having similar software and data. Multi-tenancy is a software architecture model which implies a server runs a software instance for each tenant yet serves various tenants. A tenant is an intelligently discrete client or association utilizing a common shared environment. Each tenant has its data access, authorizations, privileges, and permissions. Tenants have imparted admittance to predefined privileges to a particular software occurrence they use. As associations relocate to the cloud and fabricate new cloud-local application stacks, they face numerous accounts and membership tenancies across various cloud suppliers. While there can be security advantages to utilizing separate accounts, such as strong isolation and privilege control capabilities, there are some major Multi-tenancy security issues to know about. The upsides of a multi-tenant software architecture go past productivity and cost savings for your association. Multi-tenant likewise offers significant advantages to clients and end clients. However, gambles, particularly connected with security, should be considered too. This paper examined different risks related to multi-tenant software architecture in the cloud environment.

Keywords
Multi-tenant, Multi-tenant software architecture, Cloud security, Cloud computing, Virtual machine.

Reference

[1] K. Wood, M. Anderson, "Understanding the Complexity Surrounding Multitenancy in Cloud Computing", Eighth IEEE International Conference on e-Business Engineering, vol. 1, pp. 119-124, 2011.
[2] A. Abdulrahman, M. Sarfraz, et al., "A Distributed Access Control Architecture for Cloud Computing," IEEE Soft Ware, vol. 12, pp. 36-44, 2012.
[3] Z. Feng, B. Bai, et al., " Shrew Attack in Cloud Data Center Networks", Seventh International Conference on Mobile Adhoc and Sensor Networks, vol. 11, pp. 441-445, 2011.
[4] W. Tsai, Q. Shao, "Role-Based Access-Control Using Reference Ontology in Clouds", Tenth International Symposium on Autonomous Decentralized Systems, vol. 11, pp. 121-128, 2011
[5] C. Momm, W. Theilmann, " A Combined Workload Planning Approach for Multi-Tenant Business Applications", 35th IEEE Annual Computer Software and Applications Conference Workshops, vol. 11, pp. 255-260, 2011.
[6] B. Hay, K. Nance, et al., "Are Your Papers in Order? Developing and Enforcing Multi-Tenancy and Migration Policies in the Cloud", 45th Hawaii International Conference on System Sciences, vol. 12, pp. 5473-5479, 2012.
[7] Issac Odun-Ayo, Sanjay Misra, Olusola Abayomi-Alli, “Cloud Multi-tenancy: Issues and Developments”, 2017.
[8] R.John Victor and Monisha Singh, “Security Analysis in Multi-Tenant Cloud Computing Healthcare System,” IJMET, 2018.
[9] Wayne J. Brown, Vince Anderson, Qing Tan, “Multitenancy-Security Risks and Countermeasures”.
[10] C. C. Kalyan Srinivas, S. Sajida, Lokesh, “Security Techniques for Multi Tenanacy Applications in Cloud”, IJCSMC, 2013.
[11] [Online]. Available: Ascendixtech.com
[12] Dr. Amit Kumar Chaturvedi, Praveen Sengar, Kalpana Sharma, “Analyzing Resource Allocation Strategies with Elasticity in MultiTenant Cloud Environment”, International Journal of Computer Trends and Technology ( IJCTT ) – vol. 67, no. 3, pp. 151-155, 2019.
[13] Mangesh Latekar, Prof. Roshna Ravindran, “Resolving Multi-Tenancy Issues Using Cloud Automation”, International Journal of Scientific Research & Engineering Trends, vol. 6, no. 3, pp. 1447-1451, 2020.
[14] Dr. Amit Kr. Chaturvedi, Meetendra Singh Chahar, Dr. Kalpana Sharma, “Analysis on Privacy Preserving and Data Security for Cloud Data Storage”, International Journal of Computer Trends and Technology (IJCTT), vol. 60, no. 3, pp. 151-156, 2018.
[15] Vanga Odelu, Ashok Kumar Das, Adrijit Goswami, “A Secure Effective Dynamic Group Password-Based Authenticated Key Agreement Scheme for the Integrated EPR Information System”, Journal of King Saud University – Computer and Information Sciences, pp. 68–81, 2016.
[16] Dr.K.Karuppasamy, Ms.F.Margret Sharmila, Tharani .T, "Survey On Cloud Security And Algorithms," SSRG International Journal of Computer Science and Engineering, vol. 6, no. 11, pp. 40-42, 2019. Crossref, https://doi.org/10.14445/23488387/IJCSE-V6I11P108
[17] L. Malina*, J. Hajny, P. Dzurenda and V. Zeman, “Privacy-Preserving Security Solution for Cloud Services”, Journal of Applied Research and Technology, Science Direct, vol. 13, no. 1, pp. 20-31, 2015.
[18] D. Chandramohan, T. Vengattaraman, D. Rajaguru, P. Dhavache-lvan, “A New Privacy Preserving Technique for Cloud Service User Endorsement Using Multi-Agents”, Journal of King Saud University – Computer and Information Sciences, vol. 28, pp. 37-54, 2016.
[19] Y. A. A. S. Aldeen, M. Salleh, Y. Aljeroudi, “An Innovative Privacy Preserving Technique for Incremental Datasets on Cloud Computing”, Elsevier, Journal of Biomedical Informatics, vol. 62, pp. 107-116, 2016.
[20] Jian Wang Yan Zhao Shuo Jiang Jiajin Le, “Providing Privacy Preserving in Cloud Computing”, IEEE International Conference on Test and Measurement, pp. 213-216.
[21] N.M. Joseph, E. Daniel, N.A. Vasaanthi, “Survey on Privacy-Preserving Methods for Storage in Cloud Computing”, Amrita International Conference of Women in Computing (AICWIC’13), International Journal of Computer Applications® (IJCA), pp. 1-4.
[22] Dr. K. Kartheeban, A. Durai Murugan, “Privacy Preserving Data Storage Technique in Cloud Computing,” IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing, 2017.
[23] Mbugua Samuel Thaiya, et al., "On Software Modular Architecture: Concepts, Metrics and Trends," International Journal of Computer and Organization Trends, vol. 12, no. 1, pp. 3-10, 2022. Crossref, https://doi.org/10.14445/22492593/IJCOT-V12I1P302
[24] Hui Wang, “Privacy-Preserving Data Sharing in Cloud Computing”, Journal of Computer Science and Technology, vol. 25, no. 3, pp. 401-414, 2010.
[25] N. Vurukonda, B.T. Roa, “A study on Data Storage Security Issues in Cloud Computing”, Presented in the 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016), Published in Elsevier, Procedia Computer Science, vol. 92, pp. 128-135, 2016.
[26] M. B. Jayalekshmi and S. H. Krishnaveni, “A Study of Data Storage Security Issues in Cloud Computing”, Indian Journal of Science and Technology, vol. 8, no. 24, pp. 1-5, 2015.
[27] Akhil K.M., Praveen Kumar M, Pushpa B.R, “Enhanced Cloud Data Security Using AES Algorithm”, International Conference on Intelligent Computing and Control (I2c2), 2017.
[28] Amit Kumar Chaturvedi, Meetendra Singh Chahar, Kalpana Sharma, “Proposing PDM Model for Securing Data Storage on Cloud Servers”, International Journal of Engineering and Advanced Technology (IJEAT), vol. 9, no. 3, pp. 789-793, 2020.