Home > Research > Publications & Outputs > Multi-tenancy in cloud computing

Links

Text available via DOI:

View graph of relations

Multi-tenancy in cloud computing

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Multi-tenancy in cloud computing. / AlJahdali, Hussain ; Albatli , Abdulaziz ; Garraghan, Peter et al.
2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE). IEEE, 2014. p. 344-351.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

AlJahdali, H, Albatli , A, Garraghan, P, Townend, P, Lau, L & Xu, J 2014, Multi-tenancy in cloud computing. in 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE). IEEE, pp. 344-351. https://doi.org/10.1109/SOSE.2014.50

APA

AlJahdali, H., Albatli , A., Garraghan, P., Townend, P., Lau, L., & Xu, J. (2014). Multi-tenancy in cloud computing. In 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE) (pp. 344-351). IEEE. https://doi.org/10.1109/SOSE.2014.50

Vancouver

AlJahdali H, Albatli A, Garraghan P, Townend P, Lau L, Xu J. Multi-tenancy in cloud computing. In 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE). IEEE. 2014. p. 344-351 doi: 10.1109/SOSE.2014.50

Author

AlJahdali, Hussain ; Albatli , Abdulaziz ; Garraghan, Peter et al. / Multi-tenancy in cloud computing. 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE). IEEE, 2014. pp. 344-351

Bibtex

@inproceedings{e3fee25a9f7f4ce0b19016dcff016771,
title = "Multi-tenancy in cloud computing",
abstract = "As Cloud Computing becomes the trend of information technology computational model, the Cloud security is becoming a major issue in adopting the Cloud where security is considered one of the most critical concerns for the large customers of Cloud (i.e. governments and enterprises). Such valid concern is mainly driven by the Multi-Tenancy situation which refers to resource sharing in Cloud Computing and its associated risks where confidentiality and/or integrity could be violated. As a result, security concerns may harness the advancement of Cloud Computing in the market. So, in order to propose effective security solutions and strategies a good knowledge of the current Cloud implementations and practices, especially the public Clouds, must be understood by professionals. Such understanding is needed in order to recognize attack vectors and attack surfaces. In this paper we will propose an attack model based on a threat model designed to take advantage of Multi-Tenancy situation only. Before that, a clear understanding of Multi-Tenancy, its origin and its benefits will be demonstrated. Also, a novel way on how to approach Multi-Tenancy will be illustrated. Finally, we will try to sense any suspicious behavior that may indicate to a possible attack where we will try to recognize the proposed attack model empirically from Google trace logs. Google trace logs are a 29-day worth of data released by Google. The data set was utilized in reliability and power consumption studies, but not been utilized in any security study to the extent of our knowledge.",
keywords = "Cloud Data, Cloud Computing, Security, Multi-Tenancy, Attack Models",
author = "Hussain AlJahdali and Abdulaziz Albatli and Peter Garraghan and Paul Townend and Lydia Lau and Jie Xu",
year = "2014",
month = jun,
day = "12",
doi = "10.1109/SOSE.2014.50",
language = "English",
pages = "344--351",
booktitle = "2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Multi-tenancy in cloud computing

AU - AlJahdali, Hussain

AU - Albatli , Abdulaziz

AU - Garraghan, Peter

AU - Townend, Paul

AU - Lau, Lydia

AU - Xu, Jie

PY - 2014/6/12

Y1 - 2014/6/12

N2 - As Cloud Computing becomes the trend of information technology computational model, the Cloud security is becoming a major issue in adopting the Cloud where security is considered one of the most critical concerns for the large customers of Cloud (i.e. governments and enterprises). Such valid concern is mainly driven by the Multi-Tenancy situation which refers to resource sharing in Cloud Computing and its associated risks where confidentiality and/or integrity could be violated. As a result, security concerns may harness the advancement of Cloud Computing in the market. So, in order to propose effective security solutions and strategies a good knowledge of the current Cloud implementations and practices, especially the public Clouds, must be understood by professionals. Such understanding is needed in order to recognize attack vectors and attack surfaces. In this paper we will propose an attack model based on a threat model designed to take advantage of Multi-Tenancy situation only. Before that, a clear understanding of Multi-Tenancy, its origin and its benefits will be demonstrated. Also, a novel way on how to approach Multi-Tenancy will be illustrated. Finally, we will try to sense any suspicious behavior that may indicate to a possible attack where we will try to recognize the proposed attack model empirically from Google trace logs. Google trace logs are a 29-day worth of data released by Google. The data set was utilized in reliability and power consumption studies, but not been utilized in any security study to the extent of our knowledge.

AB - As Cloud Computing becomes the trend of information technology computational model, the Cloud security is becoming a major issue in adopting the Cloud where security is considered one of the most critical concerns for the large customers of Cloud (i.e. governments and enterprises). Such valid concern is mainly driven by the Multi-Tenancy situation which refers to resource sharing in Cloud Computing and its associated risks where confidentiality and/or integrity could be violated. As a result, security concerns may harness the advancement of Cloud Computing in the market. So, in order to propose effective security solutions and strategies a good knowledge of the current Cloud implementations and practices, especially the public Clouds, must be understood by professionals. Such understanding is needed in order to recognize attack vectors and attack surfaces. In this paper we will propose an attack model based on a threat model designed to take advantage of Multi-Tenancy situation only. Before that, a clear understanding of Multi-Tenancy, its origin and its benefits will be demonstrated. Also, a novel way on how to approach Multi-Tenancy will be illustrated. Finally, we will try to sense any suspicious behavior that may indicate to a possible attack where we will try to recognize the proposed attack model empirically from Google trace logs. Google trace logs are a 29-day worth of data released by Google. The data set was utilized in reliability and power consumption studies, but not been utilized in any security study to the extent of our knowledge.

KW - Cloud Data

KW - Cloud Computing

KW - Security

KW - Multi-Tenancy

KW - Attack Models

U2 - 10.1109/SOSE.2014.50

DO - 10.1109/SOSE.2014.50

M3 - Conference contribution/Paper

SP - 344

EP - 351

BT - 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE)

PB - IEEE

ER -