2019
DOI: 10.2139/ssrn.3358249
|View full text |Cite
|
Sign up to set email alerts
|

Suppleness of Multi-Tenancy in Cloud Computing: Advantages, Privacy Issues and Risk Factors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Multitenancy allows several tenants to share the same service instance. Figure 2 shows the Multitenancy path for resource sharing [3]. e connection between the front and rear ends is managed by a centralized computer.…”
Section: Introductionmentioning
confidence: 99%
“…Multitenancy allows several tenants to share the same service instance. Figure 2 shows the Multitenancy path for resource sharing [3]. e connection between the front and rear ends is managed by a centralized computer.…”
Section: Introductionmentioning
confidence: 99%
“…5) Open, Multi-Tenancy: It should allow new tenants to enter the system, connect services/agents by different vendors, and create new value out of them. The benefits of such a multi-tenancy include efficiency through shared resources and competitive costs [25]. 6) Distribution: It should allow the seamless distribution of computing tasks, on the one hand connecting different types of devices (e.g.…”
Section: A Requirementsmentioning
confidence: 99%
“…Virtualization abstracts and multiplexes the shared physical infrastructure of a cloud service provider (CSP) and hides the complexity of its underlying pool of virtualized resources. Multitenancy, on the other hand, allows different tenants to share the pool of virtualized resources provided by the CSP (Auer et al., 2019; Goyal et al., 2019). Both these techniques are realized by the concept of a VM instance.…”
Section: Introductionmentioning
confidence: 99%
“…It would only take another tenant, who might be a competitor, to launch an inter‐VM attack targeted at its rival to gain access to their confidential data. For this reason, the ever‐increasing demand of cloud computing services places VM placement at the heart of CSPs’ decision‐making process (Goyal et al., 2019).…”
Section: Introductionmentioning
confidence: 99%