Aljahdali, H, Albatli, A, Garraghan, P et al. (3 more authors) (2014) Multi-tenancy in cloud computing. In: Proceedings of the 8th IEEE International Symposium on Service-Oriented System Engineering. 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE), 07-11 Apr 2014, Oxford, UK. IEEE , 344 - 351. ISBN 978-1-4799-2504-9
Abstract
As Cloud Computing becomes the trend of information technology computational model, the Cloud security is becoming a major issue in adopting the Cloud where security is considered one of the most critical concerns for the large customers of Cloud (i.e. governments and enterprises). Such valid concern is mainly driven by the Multi-Tenancy situation which refers to resource sharing in Cloud Computing and its associated risks where confidentiality and/or integrity could be violated. As a result, security concerns may harness the advancement of Cloud Computing in the market. So, in order to propose effective security solutions and strategies a good knowledge of the current Cloud implementations and practices, especially the public Clouds, must be understood by professionals. Such understanding is needed in order to recognize attack vectors and attack surfaces. In this paper we will propose an attack model based on a threat model designed to take advantage of Multi-Tenancy situation only. Before that, a clear understanding of Multi-Tenancy, its origin and its benefits will be demonstrated. Also, a novel way on how to approach Multi-Tenancy will be illustrated. Finally, we will try to sense any suspicious behavior that may indicate to a possible attack where we will try to recognize the proposed attack model empirically from Google trace logs. Google trace logs are a 29-day worth of data released by Google. The data set was utilized in reliability and power consumption studies, but not been utilized in any security study to the extent of our knowledge.
Metadata
Item Type: | Proceedings Paper |
---|---|
Authors/Creators: |
|
Copyright, Publisher and Additional Information: | (c) 2014, IEEE. This is an author produced version of a paper published in Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE). Uploaded in accordance with the publisher's self-archiving policy |
Dates: |
|
Institution: | The University of Leeds |
Academic Units: | The University of Leeds > Faculty of Engineering & Physical Sciences (Leeds) > School of Computing (Leeds) > Institute for Computational and Systems Science (Leeds) |
Depositing User: | Symplectic Publications |
Date Deposited: | 03 Nov 2014 13:35 |
Last Modified: | 19 Dec 2022 13:28 |
Published Version: | http://dx.doi.org/10.1109/SOSE.2014.50 |
Status: | Published |
Publisher: | IEEE |
Identification Number: | 10.1109/SOSE.2014.50 |
Open Archives Initiative ID (OAI ID): | oai:eprints.whiterose.ac.uk:80819 |