Multi-tenancyinCloudComputing.pdf - See discussions stats and author profiles for this publication at https\/www.researchgate.net\/publication\/260305189

Multi-tenancyinCloudComputing.pdf - See discussions stats...

This preview shows page 1 - 3 out of 9 pages.

See discussions, stats, and author profiles for this publication at: Multi-Tenancy in Cloud Computing Conference Paper · April 2014 DOI: 10.1109/SOSE.2014.50 CITATIONS 42 READS 3,156 6 authors , including: Some of the authors of this publication are also working on these related projects: Context-aware Intrusion Severity Analysis for Clouds View project Energy efficient datacentres View project Hussain Aljahdali King Abdulaziz City for Science and Technology 3 PUBLICATIONS 56 CITATIONS SEE PROFILE Abdulaziz Albatli Shaqra University 5 PUBLICATIONS 48 CITATIONS SEE PROFILE Peter Garraghan Lancaster University 30 PUBLICATIONS 593 CITATIONS SEE PROFILE Paul Townend 78 PUBLICATIONS 850 CITATIONS SEE PROFILE All content following this page was uploaded by Hussain Aljahdali on 11 May 2015. The user has requested enhancement of the downloaded file.
Image of page 1
Multi-Tenancy in Cloud Computing Hussain AlJahdali, Abdulaziz Albatli, Peter Garraghan, Paul Townend, Lydia Lau, Jie Xu School of Computing University of Leeds Leeds, United Kingdom {schla, sc11a2a, scpmg, p.m.townend, l.m.s.lau, j.xu}@leeds.ac.uk Abstract — As Cloud Computing becomes the trend of information technology computational model, the Cloud security is becoming a major issue in adopting the Cloud where security is considered one of the most critical concerns for the large customers of Cloud (i.e. governments and enterprises). Such valid concern is mainly driven by the Multi-Tenancy situation which refers to resource sharing in Cloud Computing and its associated risks where confidentiality and/or integrity could be violated. As a result, security concerns may harness the advancement of Cloud Computing in the market. So, in order to propose effective security solutions and strategies a good knowledge of the current Cloud implementations and practices; especially the public Clouds; must be understood by professionals. Such understanding is needed in order to recognize attack vectors and attack surfaces. In this paper we will propose an attack model based on a threat model designed to take advantage of Multi-Tenancy situation only. Before that, a clear understanding of Multi-Tenancy, its origin and its benefits will be demonstrated. Also, a novel way on how to approach Multi-Tenancy will be illustrated. Finally, we will try to sense any suspicious behavior that may indicate to a possible attack where we will try to recognize the proposed attack model empirically from Google trace logs. Google trace logs are a 29-day worth of data released by Google. The data set was utilized in reliability and power consumption studies, but not been utilized in any security study to the extent of our knowledge. Keywords – Cloud Computing; Security; Multi-Tenancy; Attack Models;Cloud Data.
Image of page 2
Image of page 3

You've reached the end of your free preview.

Want to read all 9 pages?

  • Winter '19
  • DR. Tesfa

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture