Proceedings of the 20th ACM Symposium on Access Control Models and Technologies 2015
DOI: 10.1145/2752952.2752964
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling

Abstract: A major concern in the adoption of cloud infrastructure-asa-service (IaaS) arises from multi-tenancy, where multiple tenants share the underlying physical infrastructure operated by a cloud service provider. A tenant could be an enterprise in the context of a public cloud or a department within an enterprise in the context of a private cloud. Enabled by virtualization technology, the service provider is able to minimize cost by providing virtualized hardware resources such as virtual machines, virtual storage … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…Therefore, it is more likely that there is a need for a new type of access control policy between tenants in intra-cloud communication [9]. A tenant can be an enterprise in the context of a public cloud or a department within an enterprise in the context of a private cloud [10]. The flexibility feature of IaaS enables the user to configure their own virtual machines and computing infrastructure [11].…”
Section: Security Challenges Of Infrastructure As a Servicementioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, it is more likely that there is a need for a new type of access control policy between tenants in intra-cloud communication [9]. A tenant can be an enterprise in the context of a public cloud or a department within an enterprise in the context of a private cloud [10]. The flexibility feature of IaaS enables the user to configure their own virtual machines and computing infrastructure [11].…”
Section: Security Challenges Of Infrastructure As a Servicementioning
confidence: 99%
“…Fine-grained attributebased access controls mechanism [12] Obtain virial recources in a secure manner Propose attribute-based constraints specification and enforcement [10] Multi-tenancy risks that arise in cloud IaaS…”
Section: Iaas Access Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…In [28], different virtual resource orchestration constraints are resumed and expressed by attribute-based paradigm. Regarding these constraints, a conflict-free strategy is developed to mitigate risks in IaaS Cloud [29]. Most of above works have been motivated from security requirements expressed by CSC.…”
Section: Related Workmentioning
confidence: 99%
“…Although, defenses against such vulnerabilities and researches on VM allocation and scheduling policies to mitigate multi-tenancy risks (Bijon et al, 2015); (Han et al, 2014) are already being proposed in the academic literature (Godfrey and Zulkernine, 2014); (Godfrey and Zulkernine, 2013); (Raj et al, 2009), multi-tenancy risk still cannot be ignored.…”
Section: Introductionmentioning
confidence: 99%