Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
Title | Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Abd, S. K., Salih, R. T., Al-Haddad, S. A. R., Hashim, F., Abdullah, A. B. H., Yussof, S. |
Conference Name | TENCON 2015 - 2015 IEEE Region 10 Conference |
Date Published | Nov. 2015 |
Publisher | IEEE |
ISBN Number | 978-1-4799-8641-5 |
Keywords | AAAS protocol, Access Control, authentication-authorization and accounting with secure transport protocol, authorisation, Authorization, authorization access, authorization system, cloud computing, cloud computing security risks, cloud infrastructure, cloud security complexity, cloud services, Complexity theory, Computer architecture, cryptographic protocols, multi-tenancy, multitenancy security issue, open system architecture, open systems, Protocols, pubcrawl170107, pubcrawl170108, public cloud security complexities, public cloud service providers, Resource management, risk management, security risks, web services |
Abstract | Many cloud security complexities can be concerned as a result of its open system architecture. One of these complexities is multi-tenancy security issue. This paper discusses and addresses the most common public cloud security complexities focusing on Multi-Tenancy security issue. Multi-tenancy is one of the most important security challenges faced by public cloud services providers. Therefore, this paper presents a secure multi-tenancy architecture using authorization model Based on AAAS protocol. By utilizing cloud infrastructure, access control can be provided to various cloud information and services by our suggested authorization system. Each business can offer several cloud services. These cloud services can cooperate with other services which can be related to the same organization or different one. Moreover, these cooperation agreements are supported by our suggested system. |
URL | https://ieeexplore.ieee.org/document/7373063 |
DOI | 10.1109/TENCON.2015.7373063 |
Citation Key | abd_cloud_2015 |
- Cryptographic Protocols
- web services
- security risks
- risk management
- resource management
- public cloud service providers
- public cloud security complexities
- pubcrawl170108
- pubcrawl170107
- Protocols
- open systems
- open system architecture
- multitenancy security issue
- multi-tenancy
- AAAS protocol
- computer architecture
- Complexity theory
- cloud services
- cloud security complexity
- cloud infrastructure
- cloud computing security risks
- Cloud Computing
- authorization system
- authorization access
- authorization
- authorisation
- authentication-authorization and accounting with secure transport protocol
- Access Control