Resolving Multitenancy Issues in Cloud Computing Service Models Using Software Defined Networks

Chinthagunta Mukundha*
*Associate Professor, Department of Information Technology, Sreenidhi Institute of Science and Technology, Ghatakesar, Hyderabad, Telangana, India.
Periodicity:May - July'2016
DOI : https://doi.org/10.26634/jcc.3.3.8295

Abstract

Now-a-days Cloud Computing has become more popular in all Information Technology areas. Cloud computing provides a number of services like Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). All these cloud computing models share common resources with different customers to provide services. To provide services to the customers, cloud computing uses a technique called Multitenancy. When cloud uses Multitenancy to provide services, there are so many data and security problems. Cloud security is becoming a major issue in adopting the cloud, where security is considered as one of the major critical concerns for the large customers of cloud. Multitenancy is a technique of sharing resources of cloud commonly across different customers. In SaaS applications, same database is shared by different users. If a common database is shared among different customers, there are chances for so many data related security issues like data loss or leakage, Account or session hijacking, etc., to occur. In this paper, the author has proposed solutions for the problems that occur in cloud computing models with Multitenancy by implementing secure key mechanism using Software Defined Networks (SDN) in the cloud computing service model.

Keywords

Multitenancy, Cloud Computing, Security, Resources, Database, Software Defined Networks

How to Cite this Article?

Mukundha, C. (2016). Resolving Multitenancy Issues in Cloud Computing Service Models Using Software Defined Networks. i-manager’s Journal on Cloud Computing, 3(3), 1-8. https://doi.org/10.26634/jcc.3.3.8295

References

[1]. Cloud Security Alliance, (2010). Top Threats to Cloud Computing V1.0.
[2]. Jon Brodkin, (2008). Gartner: Seven Cloud- Computing Security Risks. Infoword.
[3]. Dimitrios Zissis, and Dimitrios Lekkas, (2011). “Addressing cloud computing security issues”. Future Generation Computer Systems, Vol. 28, No. 3, pp. 583- 592.
[4]. S. Subashini, and V. Kavitha, (2011). “A Survey on security issues in service delivery models of cloud computing”. Journal of Network and Computer Applications, Vol. 34, No. 1, pp. 1-11.
[5]. Wayne A. Jansen, (2011). “Cloud Hooks: Security and privacy issues in cloud computing”. Proceedings of the 44th Hawaii International Conference on System Sciences, pp. 1-10.
[6]. David Teneyuca, (2011). “Internet cloud security: The illusion of inclusion”. Information Security Technical Report, Vol. 16, No. 3-4, pp. 102-107.
[7]. Afkham Azeez, Srinath Perera, Dimuthu Gamage, Ruwan Linton, Prabath Siriwardana, Dimuthu Leelaratne, Sanjiva Weerawarana, and Paul Fremantle, (2010). “Multi-Tenant SOA middleware for cloud computing”. IEEE 3rd International Conference on Cloud Computing, pp. 458-465.
[8]. Verizon RISK Team, (2012). Data Breach Investigations Report (DBIR).
[9]. Prasad Saripalli, and Ben Walters, (2010). “QUIRC: A quantitative impactand risk assessment framework for cloud security”. IEEE 3rd International Conference on Cloud Computing.
[10]. Hagai Bar-El, (n.d.). Introduction to Side Channel Attacks. Discretix technologies Ltd.
[11]. S. Pearson and A. Benameur, (2010). “Privacy, Security and Trust Issues Arising from Cloud Computing”. IEEE Second International Conference on Cloud Computing Technology and Science, Vol. 8, No. 6, pp. 692–702.
[12]. Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu, and Mukesh Singhal, (2010). “Information flow control in cloud computing”. IEEE Transactions on Network and Service management, Vol. 11, No. 1, pp. 76-89.
[13]. D. Milojicic, (2000). “Security and Privacy”. IEEE Concurrency, Vol. 8, No. 2, pp. 24–21.
[14]. Augusto Ciuffoletti, (2010). “Monitoring a virtual network infrastructure: An Iaas Perspective”. ACM SIGCOMM Computer communication Review, Vol. 40, No. 5, pp. 47-52.
[15]. Z. Chen and J. Yoon, (2010). “IT Auditing to Assure a Secure Cloud Computing”. 6th World Congress on Services, pp. 252– 259.
[16]. S. Bleikertz, M. Schunter, C.W. Probst, and K. Eriksson, (2010). “Security Audits of Multi-tier Virtual Infrastructures in Public Infrastructure Clouds Categories and Subject Descriptors”. CCSW’10, pp. 92–102.
[17]. R. Chakraborty, S. Ramireddy, T.S. Raghu, and H.R. Rao, (2010). “The Information Assurance Practices of Cloud Computing”. IT Professional, Vol. 12, No. 4, pp. 29–37.
[18]. R. Grandl, Y. Chen, J. Khalid, S. Yang, A. Anand, T. Benson, and A. Akella, (2013). “Harmony: Coordinating network, compute, and storage in software-defined clouds”. In Proceedings of the 4th Annual Symposium on Cloud Computing.
[19]. S.A. Baset, L. Wang, B.C. Tak, C. Pham, and C. Tang, (2014). “Toward achieving operational excellence in a cloud”. IBM Journal of Research and Development, Vol. 58, No. 2/3.
[20]. H. Alaqrabi, Lu Liu, Jie Xu, Richard Hill, Nick Antono poulos,and ongzhao Zhan,(2012) . “Investigation of IT security and compliance challenges in security-as-a-Service for cloud computing”. 15th IEEE International Symposium on Object/Component/ Service-Oriented Real-Time Distributed Computing Workshops (ISORCW).
[21]. Eric Keller, Jakub Szefer, Jennifer Rexford, and Ruby B. Lee, (2010). “NoHype: virtualized cloud infrastructure without the virtualization”. The 27th Annual International Symposium on Computer Architecture.
[22]. Francisco Rocha, Thomas Gross, and Aad van Moorsel, (2012). “Defense in-depth Against Malicious Insiders in the Cloud”. IEEE International Conference on Cloud Engineering.
[23]. Peng Li, Debin Gao, and Michael K. Reiter, (2012). “Mitigating Access-Driven Timing Channels in Clouds using StopWatch”. The 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.