Cloud Computing Security Risks with Authorization Access for Secure Multi-Tenancy Based on AAAS Protocol

被引:0
|
作者
Abd, Sura Khalil [1 ]
Salih, Rawia Tahrir [1 ]
Al-Haddad, S. A. R. [1 ]
Hashim, Fazirulhisyam [1 ]
Abdullah, Azizol B. H. J. [2 ]
Yussof, Salman [3 ]
机构
[1] Univ Putra Malaysia, Comp & Commun Engn, Serdang, Malaysia
[2] Univ Putra Malaysia, Comp Sci & Informat Technol, Serdang, Malaysia
[3] UNITEN, Informat Technol, Serdang, Malaysia
关键词
Cloud Computing; Security Risks; Multi-Tenancy; AAAS Protocol;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Many cloud security complexities can be concerned as a result of its open system architecture. One of these complexities is multi-tenancy security issue. This paper discusses and addresses the most common public cloud security complexities focusing on Multi-Tenancy security issue. Multi-tenancy is one of the most important security challenges faced by public cloud services providers. Therefore, this paper presents a secure multi-tenancy architecture using authorization model Based on AAAS protocol. By utilizing cloud infrastructure, access control can be provided to various cloud information and services by our suggested authorization system. Each business can offer several cloud services. These cloud services can cooperate with other services which can be related to the same organization or different one. Moreover, these cooperation agreements are supported by our suggested system.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] An Efficient and Secure Access Authorization Policy for Cloud Storage Resources Based on Fuzzy Searchable Encryption
    Fu, Jun
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (07) : 356 - 366
  • [42] RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
    Kumar, Vinod
    Ahmad, Musheer
    Mishra, Dheerendra
    Kumari, Saru
    Khan, Muhammad Khurram
    VEHICULAR COMMUNICATIONS, 2020, 22
  • [43] New secure access control model for cloud computing based on Chaotic systems
    BenMbarak, Omessead
    Naanaa, Anis
    ElAsmi, Sadok
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 1485 - 1490
  • [44] Biometric based authentication and access control techniques to secure Mobile Cloud Computing
    Khatri, Sunil Kumar
    Monica
    Vadi, Vikas Rao
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 371 - 377
  • [45] A Multi-Level Authorization Based Tenant Separation Mechanism in Cloud Computing Environment
    Wei Ma
    Zhen Han
    Xiaoyong Li
    Jiqiang Liu
    中国通信, 2016, 13 (05) : 162 - 171
  • [46] Secure scheme on mobile multi cloud computing based on homomorphic encryption
    Zkik, Karim
    Orhanou, Ghizlane
    El Hajji, Said
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [47] A Multi-Level Authorization Based Tenant Separation Mechanism in Cloud Computing Environment
    Ma, Wei
    Han, Zhen
    Li, Xiaoyong
    Liu, Jiqiang
    CHINA COMMUNICATIONS, 2016, 13 (05) : 162 - 171
  • [48] Block chain based IAS protocol to enhance security and privacy in cloud computing
    Prasad S.N.
    Rekha C.
    Measurement: Sensors, 2023, 28
  • [49] A Semantic-Based Access Control for Ensuring Data Security in Cloud Computing
    Auxilia, M.
    Raja, K.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 171 - 175
  • [50] Using Location Based Encryption to Improve the Security of Data Access in Cloud Computing
    Abolghasemi, Meer Soheil
    Sefidab, Mandi Mokarrami
    Atani, Reza Ebrahimi
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 261 - 265