Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol

Access control; Cloud computing; Distributed database systems; Open systems; Web services; Authorization systems; Cloud computing securities; Cloud infrastructures; Cooperation agreement; Multi tenancies; Multi-tenancy architectures; Open system architecture; Security risks; Network architecture

Saved in:
Bibliographic Details
Main Authors: Abd S.K., Salih R.T., Al-Haddad S.A.R., Hashim F., Abdullah A.B.H., Yussof S.
Other Authors: 56516784600
Format: Conference Paper
Published: Institute of Electrical and Electronics Engineers Inc. 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-22881
record_format dspace
spelling my.uniten.dspace-228812023-05-29T14:13:01Z Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol Abd S.K. Salih R.T. Al-Haddad S.A.R. Hashim F. Abdullah A.B.H. Yussof S. 56516784600 57188662704 49963059800 57202656008 8984213200 16023225600 Access control; Cloud computing; Distributed database systems; Open systems; Web services; Authorization systems; Cloud computing securities; Cloud infrastructures; Cooperation agreement; Multi tenancies; Multi-tenancy architectures; Open system architecture; Security risks; Network architecture Many cloud security complexities can be concerned as a result of its open system architecture. One of these complexities is multi-tenancy security issue. This paper discusses and addresses the most common public cloud security complexities focusing on Multi-Tenancy security issue. Multi-tenancy is one of the most important security challenges faced by public cloud services providers. Therefore, this paper presents a secure multi-tenancy architecture using authorization model Based on AAAS protocol. By utilizing cloud infrastructure, access control can be provided to various cloud information and services by our suggested authorization system. Each business can offer several cloud services. These cloud services can cooperate with other services which can be related to the same organization or different one. Moreover, these cooperation agreements are supported by our suggested system. � 2015 IEEE. Final 2023-05-29T06:13:01Z 2023-05-29T06:13:01Z 2016 Conference Paper 10.1109/TENCON.2015.7373063 2-s2.0-84962179930 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962179930&doi=10.1109%2fTENCON.2015.7373063&partnerID=40&md5=9525f53cd368bf6f9d6756bd42529481 https://irepository.uniten.edu.my/handle/123456789/22881 2016-January 7373063 Institute of Electrical and Electronics Engineers Inc. Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description Access control; Cloud computing; Distributed database systems; Open systems; Web services; Authorization systems; Cloud computing securities; Cloud infrastructures; Cooperation agreement; Multi tenancies; Multi-tenancy architectures; Open system architecture; Security risks; Network architecture
author2 56516784600
author_facet 56516784600
Abd S.K.
Salih R.T.
Al-Haddad S.A.R.
Hashim F.
Abdullah A.B.H.
Yussof S.
format Conference Paper
author Abd S.K.
Salih R.T.
Al-Haddad S.A.R.
Hashim F.
Abdullah A.B.H.
Yussof S.
spellingShingle Abd S.K.
Salih R.T.
Al-Haddad S.A.R.
Hashim F.
Abdullah A.B.H.
Yussof S.
Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
author_sort Abd S.K.
title Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
title_short Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
title_full Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
title_fullStr Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
title_full_unstemmed Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
title_sort cloud computing security risks with authorization access for secure multi-tenancy based on aaas protocol
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2023
_version_ 1806427565410222080
score 13.222552