Home > Research > Publications & Outputs > Multi-tenancy in cloud computing

Links

Text available via DOI:

View graph of relations

Multi-tenancy in cloud computing

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
  • Hussain AlJahdali
  • Abdulaziz Albatli
  • Peter Garraghan
  • Paul Townend
  • Lydia Lau
  • Jie Xu
Close
Publication date12/06/2014
Host publication2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE)
PublisherIEEE
Pages344-351
Number of pages8
ISBN (electronic)9781479936168
<mark>Original language</mark>English

Abstract

As Cloud Computing becomes the trend of information technology computational model, the Cloud security is becoming a major issue in adopting the Cloud where security is considered one of the most critical concerns for the large customers of Cloud (i.e. governments and enterprises). Such valid concern is mainly driven by the Multi-Tenancy situation which refers to resource sharing in Cloud Computing and its associated risks where confidentiality and/or integrity could be violated. As a result, security concerns may harness the advancement of Cloud Computing in the market. So, in order to propose effective security solutions and strategies a good knowledge of the current Cloud implementations and practices, especially the public Clouds, must be understood by professionals. Such understanding is needed in order to recognize attack vectors and attack surfaces. In this paper we will propose an attack model based on a threat model designed to take advantage of Multi-Tenancy situation only. Before that, a clear understanding of Multi-Tenancy, its origin and its benefits will be demonstrated. Also, a novel way on how to approach Multi-Tenancy will be illustrated. Finally, we will try to sense any suspicious behavior that may indicate to a possible attack where we will try to recognize the proposed attack model empirically from Google trace logs. Google trace logs are a 29-day worth of data released by Google. The data set was utilized in reliability and power consumption studies, but not been utilized in any security study to the extent of our knowledge.