An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure

被引:0
|
作者
Dey, Himel [1 ]
Islam, Rifat [1 ]
Arif, Hossain [1 ]
机构
[1] BRAC Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
关键词
Cloud; ECC; Kerberos; Multi-tenancy;
D O I
10.1109/icrest.2019.8644077
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud Computing is an important term of modern technology. The usefulness of Cloud is increasing day by day and simultaneously more and more security problems are arising as well. Two of the major threats of Cloud are improper authentication and multi-tenancy. According to the specialists both pros and cons belong to multi-tenancy. There are security protocols available but it is difficult to claim these protocols are perfect and ensure complete protection. The purpose of this paper is to propose an integrated model to ensure better Cloud security for Authentication and multi tenancy. Multi-tenancy means sharing of resources and virtualization among clients. Since multi-tenancy allows multiple users to access same resources simultaneously, there is high probability of accessing confidential data without proper privileges. Our model includes Kerberos authentication protocol to enhance authentication security. During our research on Kerberos we have found some flaws in terms of encryption method which have been mentioned in couple of IEEE conference papers. Pondering about this complication we have elected Elliptic Curve Cryptography. On the other hand, to attenuate arose risks due to multi-tenancy we are proposing a Resource Allocation Manager Unit, a Control Database and Resource Allocation Map. This part of the model will perpetuate resource allocation for the users.
引用
收藏
页码:502 / 506
页数:5
相关论文
共 50 条
  • [21] XBAC: A Unified Access Control Model for Heterogeneous Multi-Tenancy Cloud Environments
    Ayache, Meryeme
    Gawanmeh, Amjad
    Al-Karaki, Jamal N.
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1872 - 1878
  • [22] A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds
    Kurmus, Anil
    Gupta, Moitrayee
    Pletka, Roman
    Cachin, Christian
    Haas, Robert
    MIDDLEWARE 2011, 2011, 7049 : 471 - +
  • [23] Enhanced Cloud Patterns: A Case Studyof Multi-tenancy Patterns
    Adewojo, A. A.
    Bass, J. M.
    Allison, I. K.
    INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2015), 2015, : 53 - 58
  • [24] Towards Bandwidth Guarantee In Multi-tenancy Cloud Computing Networks
    Zhu, Jing
    Li, Dan
    Wu, Jianping
    Liu, Hongnan
    Zhang, Ying
    Zhang, Jingcheng
    2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2012,
  • [25] Resource management for bursty streams on multi-tenancy cloud environments
    Tolosana-Calasanz, Rafael
    Angel Banares, Jose
    Pham, Congduc
    Rana, Omer F.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 444 - 459
  • [26] A systematic review of scheduling approaches on multi-tenancy cloud platforms
    Ru, Jia
    Yang, Yun
    Grundy, John
    Keung, Jacky
    Hao, Li
    INFORMATION AND SOFTWARE TECHNOLOGY, 2021, 132 (132)
  • [27] Multi-Tenancy Cloud-Enabled Small Cell Security
    Abubakar, Babangida Albaba
    Mouratidis, Haralambos
    2019 2ND INTERNATIONAL CONFERENCE OF THE IEEE NIGERIA COMPUTER CHAPTER (NIGERIACOMPUTCONF), 2019, : 257 - 262
  • [28] Cryptographic Multi-Tenancy: Reducing Risk in Cloud Computing Environments
    Johnson, Robert
    WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, 2011, : 303 - 306
  • [29] Multi-tenancy Aware Ambient Assisted Living Platforms in the Cloud
    Stockloew, Carsten
    Medrano Gil, Alejandro M.
    Fides Valero, Alvaro
    Girolami, Michele
    Lenzi, Stefano
    AMBIENT INTELLIGENCE (AMI 2014), 2014, 8850 : 80 - 95
  • [30] Deployment of Virtual InfiniBand Clusters with Multi-tenancy for Cloud Computing
    Mauch, Viktor
    CLOUD COMPUTING 2015: THE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION, 2015, : 66 - 69