The multi-tenant cloud computing architecture allows the service consumers to share the computing resources

Authors

  • Paulina Czarnecka Nicolaus Copernicus University, Toruń, Poland

Keywords:

Multi-tenant, Confidentiality, Forensic, Evidences, Scrutinize

Abstract

The log integrity is proved by log chains which are created in the implemented system and by the potential electronic evidence of past logs which are posted by the cloud service provider. The proposed system aids in performing the reasonable verifications that the cloud service provider or the forensic investigator is not tampering the logs. The novelty of the research conducted in this paper is a technique which applies the cuckoo filter, to the forensic logs which is supportive in proving the integrity of the evidences at a faster pace in comparison to the other filters. Gathering and scrutinizing the different types of logs are the vital steps in the forensic domain. Logs are commonly gathered by the cloud service providers or by some third party layers governed by the cloud service providers. Security of the logs is a crucial issue as the logs can be tampered accidentally or intentionally by an employee in the cloud service provider’s organization or by the forensic investigator, thus maligning the evidence in case a cyber-crime is committed through the cloud service provider’s infrastructure. The malicious attacker can also conspire with the cloud service provider or the forensic investigator to erase or malign the logs that are generated for one’s own criminal activity. To address such issues, a method is recommended which verifies the tampering of the virtual instance logs; Verification process confirms that the confidentiality and integrity of the logs remains intact.

Downloads

Download data is not yet available.

References

Almorsy, M., Grundy, J., & Ibrahim, A. S. (2011, July). Collaboration-based cloud computing security management framework. In 2011 IEEE 4th International Conference on Cloud Computing (pp. 364-371). IEEE.

Almorsy, M., Grundy, J., & Ibrahim, A. S. (2012, June). Tossma: A tenant-oriented saas security management architecture. In 2012 IEEE Fifth International Conference on Cloud Computing (pp. 981-988). IEEE.

Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

Al-Shardan, M. M., & Ziani, D. (2015). Configuration as a service in multi-tenant enterprise resource planning system. Lecture Notes on Software Engineering, 3(2), 95.

Ashalatha, R., & Agarkhed, J. (2016, March). Multi tenancy issues in cloud computing for SaaS environment. In 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1-4). IEEE.

Azeez, A., Perera, S., Gamage, D., Linton, R., Siriwardana, P., Leelaratne, D., ... & Fremantle, P. (2010, July). Multi-tenant SOA middleware for cloud computing. In 2010 IEEE 3rd international conference on cloud computing (pp. 458-465). IEEE.

Bakshi, K. (2011, March). Considerations for cloud data centers: Framework, architecture and adoption. In 2011 Aerospace Conference (pp. 1-7). IEEE.

Behl, A., & Behl, K. (2012, October). An analysis of cloud computing security issues. In 2012 world congress on information and communication technologies (pp. 109-114). IEEE.

Bezemer, C. P., & Zaidman, A. (2010, September). Multi-tenant SaaS applications: maintenance dream or nightmare?. In Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE) (pp. 88-92).

Brookbanks, M. D., Coffey, B. F., Dawson, C. J., Nellutla, T., Patterson, R. C., & Seaman, J. W. (2011). U.S. Patent Application No. 12/630,079.

Hajibaba, M., & Gorgin, S. (2014). A review on modern distributed computing paradigms: Cloud computing, jungle computing and fog computing. Journal of computing and information technology, 22(2), 69-84.

Kriouile, H., & Asri, B. E. (2018). A rich-variant architecture for a user-aware multi-tenant SaaS approach. arXiv preprint arXiv:1812.08253.

Mahmood, Z. (2011). Cloud computing for enterprise architectures: concepts, principles and approaches. In Cloud computing for Enterprise architectures (pp. 3-19). Springer, London.

Malathi, M. (2011, April). Cloud computing concepts. In 2011 3rd International Conference on Electronics Computer Technology (Vol. 6, pp. 236-239). IEEE.

McGrath, M. P., & Lamourine, M. A. (2015). U.S. Patent No. 9,058,198. Washington, DC: U.S. Patent and Trademark Office.

Mishra, A., Mathur, R., Jain, S., & Rathore, J. S. (2013). Cloud computing security. International Journal on Recent and Innovation Trends in Computing and Communication, 1(1), 36-39.

Motahari-Nezhad, H. R., Stephenson, B., & Singhal, S. (2009). Outsourcing business to cloud computing services: Opportunities and challenges. IEEE Internet Computing, 10(4), 1-17.

Odun-Ayo, I., Ananya, M., Agono, F., & Goddy-Worlu, R. (2018, July). Cloud computing architecture: A critical analysis. In 2018 18th International Conference on Computational Science and Applications (ICCSA) (pp. 1-7). IEEE.

Odun-Ayo, I., Misra, S., Abayomi-Alli, O., & Ajayi, O. (2017, December). Cloud multi-tenancy: Issues and developments. In Companion Proceedings of the10th International Conference on Utility and Cloud Computing (pp. 209-214).

Povedano-Molina, J., Lopez-Vega, J. M., Lopez-Soler, J. M., Corradi, A., & Foschini, L. (2013). DARGOS: A highly adaptable and scalable monitoring architecture for multi-tenant Clouds. Future Generation Computer Systems, 29(8), 2041-2056.

Rimal, B. P., & Choi, E. (2012). A service oriented taxonomical spectrum, cloudy challenges and opportunities of cloud computing. International Journal of Communication Systems, 25(6), 796819.

Rimal, B. P., Choi, E., & Lumb, I. (2009, August). A taxonomy and survey of cloud computing systems. In 2009 Fifth International Joint Conference on INC, IMS and IDC (pp. 44-51). Ieee.

Shue, D., Freedman, M. J., & Shaikh, A. (2012). Performance isolation and fairness for multi-tenant cloud storage. In Presented as part of the 10th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 12) (pp. 349-362).

Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24-31.

Tsai, W. T., Sun, X., & Balasooriya, J. (2010, April). Service-oriented cloud computing architecture. In 2010 seventh international conference on information technology: new generations (pp. 684689). IEEE.

Voorsluys, W., Broberg, J., & Buyya, R. (2011). Introduction to cloud computing. Cloud computing: Principles and paradigms, 1-44.

Vuyyuru, M., Annapurna, P., Babu, K. G., & Ratnam, A. S. K. (2012). An overview of cloud computing technology. International Journal of Soft Computing and Engineering, 2(3), 244-247.

Willis, D., Dasgupta, A., & Banerjee, S. (2014, September). ParaDrop: a multi-tenant platform to dynamically install third party services on wireless gateways. In Proceedings of the 9th ACM workshop on Mobility in the evolving internet architecture (pp. 43-48).

Wu, D., Rosen, D. W., & Schaefer, D. (2014). Cloud-based design and manufacturing: status and promise. In Cloud-based design and manufacturing (CBDM) (pp. 1-24). Springer, Cham.

Wu, D., Rosen, D. W., Wang, L., & Schaefer, D. (2015). Cloud-based design and manufacturing: A new paradigm in digital manufacturing and design innovation. Computer-Aided Design, 59, 1-14.

Youssef, A. E. (2012). Exploring cloud computing services and applications. Journal of Emerging Trends in Computing and Information Sciences, 3(6), 838-847.

Downloads

Published

2020-06-18

How to Cite

Czarnecka, P. (2020). The multi-tenant cloud computing architecture allows the service consumers to share the computing resources. Tennessee Research International of Social Sciences, 2(1), 1–24. Retrieved from http://triss.org/index.php/journal/article/view/17

Issue

Section

Research Articles