• DocumentCode
    153235
  • Title

    Multi-tenancy in Cloud Computing

  • Author

    Aljahdali, H. ; Albatli, Abdulaziz ; Garraghan, Peter ; Townend, Paul ; Lau, L. ; Jie Xu

  • Author_Institution
    Sch. of Comput., Univ. of Leeds, Leeds, UK
  • fYear
    2014
  • fDate
    7-11 April 2014
  • Firstpage
    344
  • Lastpage
    351
  • Abstract
    As Cloud Computing becomes the trend of information technology computational model, the Cloud security is becoming a major issue in adopting the Cloud where security is considered one of the most critical concerns for the large customers of Cloud (i.e. governments and enterprises). Such valid concern is mainly driven by the Multi-Tenancy situation which refers to resource sharing in Cloud Computing and its associated risks where confidentiality and/or integrity could be violated. As a result, security concerns may harness the advancement of Cloud Computing in the market. So, in order to propose effective security solutions and strategies a good knowledge of the current Cloud implementations and practices, especially the public Clouds, must be understood by professionals. Such understanding is needed in order to recognize attack vectors and attack surfaces. In this paper we will propose an attack model based on a threat model designed to take advantage of Multi-Tenancy situation only. Before that, a clear understanding of Multi-Tenancy, its origin and its benefits will be demonstrated. Also, a novel way on how to approach Multi-Tenancy will be illustrated. Finally, we will try to sense any suspicious behavior that may indicate to a possible attack where we will try to recognize the proposed attack model empirically from Google trace logs. Google trace logs are a 29-day worth of data released by Google. The data set was utilized in reliability and power consumption studies, but not been utilized in any security study to the extent of our knowledge.
  • Keywords
    cloud computing; resource allocation; security of data; Google trace logs; attack model; attack surfaces; attack vectors; cloud computing; cloud security; information technology computational model; multitenancy situation; public clouds; resource sharing; suspicious behavior; threat model; Cloud computing; Computational modeling; Databases; Resource management; Security; Servers; Virtualization; Attack Models; Cloud Computing; Cloud Data; Multi-Tenancy; Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium on
  • Conference_Location
    Oxford
  • Type

    conf

  • DOI
    10.1109/SOSE.2014.50
  • Filename
    6830928