A Study on Security and Privacy Frameworks for Cloud Computing in Multi-Tenant Infrastructures
Keywords:
Cloud Computing, Multi-Tenant Infrastructure, Security Framework, Privacy Preservation, Virtualization, Risk Management, Encryption, Data Isolation, Cloud Threats, Identity ManagementAbstract
Cloud computing has revolutionized the IT landscape, yet its multi-tenant infrastructure poses significant security and privacy concerns. This paper explores established frameworks, threat models, and protective architectures aimed at addressing these concerns. Through comparative analysis of literature and evaluation of technical frameworks, this study highlights vulnerabilities and mitigation strategies in multi-tenant environments. Furthermore, graphical models and charts are provided to illustrate how shared resource access and virtualized environments can be secured through encryption, isolation, and dynamic authentication strategies.
References
Subashini, Subashini, and Kavitha, V. "A survey on security issues in service delivery models of cloud computing." Journal of Network and Computer Applications, vol. 34, no. 1, 2011, pp. 1-11.
Sheta, S.V. (2023). The Importance of Software Documentation in the Development and Maintenance Phases. REDVET - Revista Electrónica de Veterinaria, 24(3), 609–618.
Popa, Raluca Ada, et al. "CryptDB: Protecting confidentiality with encrypted query processing." Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, 2011.
Zissis, Dimitrios, and Dimitrios Lekkas. "Addressing cloud computing security issues." Future Generation Computer Systems, vol. 28, no. 3, 2012, pp. 583-592.
Sheta, S.V. (2023). The Role of Test-Driven Development in Enhancing Software Reliability and Maintainability. Journal of Software Engineering (JSE), 1(1), 13–21. https://doi.org/10.2139/ssrn.5034145
Ristenpart, Thomas, et al. "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds." Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009.
Modi, Chirag, et al. "A survey on security issues and solutions at different layers of cloud computing." The Journal of Supercomputing, vol. 63, no. 2, 2013, pp. 561-592.
Sheta, S.V. (2022). An Overview of Object-Oriented Programming (OOP) and Its Impact on Software Design. Educational Administration: Theory and Practice, 28(4), 409–419.
Jensen, Meiko, et al. "On technical security issues in cloud computing." 2010 IEEE International Conference on Cloud Computing, IEEE, 2009.
Chow, Richard, et al. "Controlling data in the cloud: Outsourcing computation without outsourcing control." Proceedings of the 2009 ACM Workshop on Cloud Computing Security, 2009.
Sheta, S.V. (2022). A Study on Blockchain Interoperability Protocols for Multi-Cloud Ecosystems. International Journal of Information Technology and Electrical Engineering, 11(1), 1–11. https://ssrn.com/abstract=5034149
Kaufman, Lori. "Data security in the world of cloud computing." IEEE Security & Privacy, vol. 7, no. 4, 2009, pp. 61-64.
Takabi, Hassan, et al. "Security and privacy challenges in cloud computing environments." IEEE Security & Privacy, vol. 8, no. 6, 2010, pp. 24-31.
Pearson, Siani. "Privacy, security and trust in cloud computing." Privacy and Security for Cloud Computing, Springer, 2013, pp. 3-42.
Fernandes, Daniel AB, et al. "Security issues in cloud environments: a survey." International Journal of Information Security, vol. 13, no. 2, 2014, pp. 113-170.
Kuyoro, S. O., et al. "Cloud computing security issues and challenges." International Journal of Computer Networks (IJCN), vol. 3, no. 5, 2011.
Sheta, S.V. (2021). Security Vulnerabilities in Cloud Environments. Webology, 18(6), 10043–10063.
Gobjuka, Hasan. "Cloud security architecture and implementation." Journal of Computer Networks and Communications, 2012.
Grobauer, Bernd, Tobias Walloschek, and Elmar Stocker. "Understanding cloud computing vulnerabilities." IEEE Security & Privacy, vol. 9, no. 2, 2011.
Wang, Cong, et al. "Privacy-preserving public auditing for secure cloud storage." IEEE Transactions on Computers, vol. 62, no. 2, 2012, pp. 362-375.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Joseph Nirmal (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.