Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol

Sura Khalil Abd, Rawia Tahrir Salih, S. A.R. Al-Haddad, Fazirulhisyam Hashim, Azizol B.Hj Abdullah, Salman Yussof

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Many cloud security complexities can be concerned as a result of its open system architecture. One of these complexities is multi-tenancy security issue. This paper discusses and addresses the most common public cloud security complexities focusing on Multi-Tenancy security issue. Multi-tenancy is one of the most important security challenges faced by public cloud services providers. Therefore, this paper presents a secure multi-tenancy architecture using authorization model Based on AAAS protocol. By utilizing cloud infrastructure, access control can be provided to various cloud information and services by our suggested authorization system. Each business can offer several cloud services. These cloud services can cooperate with other services which can be related to the same organization or different one. Moreover, these cooperation agreements are supported by our suggested system.

Original languageEnglish
Title of host publicationTENCON 2015 - 2015 IEEE Region 10 Conference
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479986415
DOIs
Publication statusPublished - 05 Jan 2016
Event35th IEEE Region 10 Conference, TENCON 2015 - Macau, Macao
Duration: 01 Nov 201504 Nov 2015

Publication series

NameIEEE Region 10 Annual International Conference, Proceedings/TENCON
Volume2016-January
ISSN (Print)2159-3442
ISSN (Electronic)2159-3450

Other

Other35th IEEE Region 10 Conference, TENCON 2015
CountryMacao
CityMacau
Period01/11/1504/11/15

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Electrical and Electronic Engineering

Cite this

Abd, S. K., Salih, R. T., Al-Haddad, S. A. R., Hashim, F., Abdullah, A. B. H., & Yussof, S. (2016). Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol. In TENCON 2015 - 2015 IEEE Region 10 Conference [7373063] (IEEE Region 10 Annual International Conference, Proceedings/TENCON; Vol. 2016-January). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/TENCON.2015.7373063