Multi-Tenant IaaS Cloud Security Evaluation Model
-
Published:2024-07-10
Issue:
Volume:
Page:184-188
-
ISSN:2581-9429
-
Container-title:International Journal of Advanced Research in Science, Communication and Technology
-
language:en
-
Short-container-title:IJARSCT
Author:
Jasmine Sharon S 1, S. Nagasundaram 1
Affiliation:
1. Vels Institute of Science, Technology & Advanced Studies (VISTAS), Chennai, Tamil Nadu
Abstract
Tenants that rent computer resources to run sophisticated systems might benefit from increased resource flexibility provided by the infrastructure cloud (IaaS) service model. The user will thus be launched into virtual computers after completing the authentication procedure, where they will start the upload process to the cloud.Secure data access is offered by suggested system's implementation of virtual machines and key management.Session management and failed authentication are other key components of suggested solution. All facets of managing active sessions and handling user authentication fall under the purview of authentication and session management. The act of updating an account, changing a password, remembering a password, and other similar operations are examples of credential management functions that can compromise even the most robust authentication schemes.
Publisher
Naksh Solutions
Reference10 articles.
1. [1]. N. Santos, K. P. Gummadi, and R. Rodrigues, “Towards trusted cloud computing,” in Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud’09, (Berkeley, CA, USA), USENIX Association, 2009. 2. [2]. J. Schiffman, T. Moyer, H. Vijayakumar, T. Jaeger, and P. McDaniel, “Seeding Clouds with Trust Anchors,” in Proceedings of the 2010 ACM Workshop on Cloud Computing Security, CCSW ’10, (New York, NY, USA), pp. 43–46, ACM, 2010. 3. [3]. N. Paladi, A. Michalas, and C. Gehrmann, “Domain based storage protection with secure access control for the cloud,” in Proceedings of the 2014 International Workshop on Security in Cloud Computing, ASIACCS ’14, (New York, NY, USA), ACM, 2014. 4. [4]. M. Jordon, “Cleaning up dirty disks in the cloud,” Network Security, vol. 2012, no. 10, pp. 12–15, 2012. 5. [5]. Cloud Security Alliance, “The notorious nine cloud computing top threats 2013,” February 2013.
|
|