MULTI TENANCY SECURITY IN CLOUD COMPUTING
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.6, No. 3)Publication Date: 2017-03-30
Authors : Manjinder Singh; Charanjit Singh;
Page : 458-464
Keywords : Cloud Computing; Virtualization; SAAS; Multi tenancy; Security; RSA;
Abstract
The word Cloud is used as a metaphor for the internet, based on standardised use of a cloud like shape to denote a network. Cloud Computing is advanced technology for resource sharing through network with less cost as compare to other technologies. Cloud infrastructure supports various models IAAS, SAAS, PAAS. The term virtualization in cloud computing is very useful today. With the help of virtualization, more than one operating system is supported with all resources on single H/W. We can also say that we acquired single server but we used it for multiple functions(Web Server, database server, Application Serv er, DNS Server, DHCP Server). One more asset of cloud computing is Multi Tenancy. Sharing of one database to many tenants or we can say users is known as multi tenancy. Cloud computing customize the requirements of user and u r able to pay as per use. Netw ork applications share through multi tenancy for various users but security of data is basic issue. This paper discusses about the security with more encryption routines and upgrades performance with network route optimization.Due to increase in performanc e and security, more number of people attract towards CLOUD COMPUTING. Virtualization is a term of cloud computing. Virtualization is a very new technology in computer technologies. With the help of virtualization share the resources software and hardware. Best example of virtualization is THIN CLIENT technology, which runs more than one client with one server. Desktop virtualization shares the desktop with other thin client. Security and Performance issues link with desktop virtualization also. HP + Micros oft launch one server (H/W provided by HP and S/W provided by Microsoft Multipoint Server edition).
Other Latest Articles
- OPTIMIZATION TECHNIQUE BASED FOR OPTIMAL L OCATION OF FACTS DEVICES
- DETECTION OF METAMORPHIC VIRUSES USING BIO - INSPIRED FEATURE FUSION
- BRAIN COMPUTER INTERFACE BASED WHEELCHAIR: A ROBOTIC ARCHITECTURE
- REVIEW PAPER ON STUDENT PERFORMANCE EVALUATION THROUGH SUPERVISED LEARNING USING NEURAL NETWORK
- WEKA AS A DATA MINING TOOL TO ANALYZE STUDENTS’ ACADEMIC PERFORMANCES USING NAÏVE BAYES CLASSIFIER - A SURVEY
Last modified: 2017-03-28 20:03:09