600 Hits in 3.9 sec

Semantic-aware multi-tenancy authorization system for cloud architectures

Jorge Bernal Bernabe, Juan M. Marin Perez, Jose M. Alcaraz Calero, Felix J. Garcia Clemente, Gregorio Martinez Perez, Antonio F. Gomez Skarmeta
2014 Future generations computer systems  
The access control model has been specially designed taking into account the multi-tenancy nature of this kind of environments.  ...  The proposed model has been validated by means of a proof of concept implementation of the access control system for OpenStack with promising performance results.  ...  Tsai and Shao [8] provide a semantic-aware multi-tenancy access control model with hRBAC and cRBAC support. Authors use an ontology for building up the role hierarchy for a specific domain.  ... 
doi:10.1016/j.future.2012.05.011 fatcat:fzr4nd5hencpbgo6k6scq4yoym

Architecture Design of Healthcare Software-as-a-Service Platform for Cloud-Based Clinical Decision Support Service

Sungyoung Oh, Jieun Cha, Myungkyu Ji, Hyekyung Kang, Seok Kim, Eunyoung Heo, Jong Soo Han, Hyunggoo Kang, Hoseok Chae, Hee Hwang, Sooyoung Yoo
2015 Healthcare Informatics Research  
Acknowledgments This work was supported by the Global Creative Software Program (14-824-10-018, Healthcare SaaS Development for Mid-sized Hospital Information System) funded by the Ministry of Science,  ...  Thus, the HSP consisted of healthcare services for CDS and for basic functional services; data services for multi-tenancy and healthcare areas; cloud management services for cloud SaaS, such as OSS and  ...  in South Korea, the multi-tenancy model of the HSP was designed as a shared database with separate schema for each tenant though a single application.  ... 
doi:10.4258/hir.2015.21.2.102 pmid:25995962 pmcid:PMC4434058 fatcat:g6dtcsyspfevnccilm6iqwkkyy


R. Kalaiprasath, R. Elankavi, R. Udayakumar
2017 International Journal on Smart Sensing and Intelligent Systems  
for each threat.  ...  Cloud consumers can use our system to formulate their security policies and find compliant providers even if they are not familiar with the underlying technology.  ...  Identification, authentication and authorization: Multi-tenancy requires that consumers share common resources in public domain.  ... 
doi:10.21307/ijssis-2017-265 fatcat:e7kacretf5cvxi3w6466z533sm

Review of Advancements in Multi-tenant Framework in Cloud Computing

K Suresh, R Jagadeesh Kannan
2018 Indonesian Journal of Electrical Engineering and Computer Science  
In this study we present a review of multi-tenant frameworks and approaches used in the industry which reaps advantages to facilitate multi-tenancy.  ...  It remains a critical problem and pose hindrance in scalability of cloud computing.  ...  ., Multi-tenancy is one of the key highlights of cloud computing.  ... 
doi:10.11591/ijeecs.v11.i3.pp1102-1108 fatcat:lyiop2u325cbrnn6pudfy4lbl4

A Semantic Approach to Cloud Security and Compliance

Amit Hendre, Karuna Pande Joshi
2015 2015 IEEE 8th International Conference on Cloud Computing  
for each threat.  ...  Cloud consumers can use our system to formulate their security policies and find compliant providers even if they are not familiar with the underlying technology.  ...  Identification, authentication and authorization: Multi-tenancy requires that consumers share common resources in public domain.  ... 
doi:10.1109/cloud.2015.157 dblp:conf/IEEEcloud/HendreJ15 fatcat:qfx753lwczg4xjdyvdjk2hxji4

Resource Taxonomy for a Fog System

Lisbeth Olinda Lopez Verdecie, Kirill Krinkin
2021 Zenodo  
In this paper, we propose a semantic approach to address this issue of heterogeneity. We design a taxonomy whose purpose is to unify the representation of resources in a fog system.  ...  This heterogeneity is not suitable for collaborative environments such as the fog system, where a common understanding of resources is required when provisioning applications.  ...  Finally, we identify several inherent features of this paradigm, such as high virtualization, reliability, multi-tenancy, and support for mobility.  ... 
doi:10.5281/zenodo.4770822 fatcat:gysp5msipja5xjmu45lnwsijh4

Adopting Provenance-Based Access Control in OpenStack Cloud IaaS [chapter]

Dang Nguyen, Jaehong Park, Ravi Sandhu
2014 Lecture Notes in Computer Science  
The adoption of PBAC capabilities to the authorization engine of a multi-tenant cloud Infrastructure-as-a-Service (IaaS) such as OpenStack can enhance the access control capabilities of cloud systems.  ...  Built on this model, we present a cloud service architecture that provides PBAC authorization service and management.  ...  One of the important properties of cloud computing is multi-tenancy [10] , where resources within a physical system are allocated and divided between tenants.  ... 
doi:10.1007/978-3-319-11698-3_2 fatcat:famap5uavjby5gyyl47mneh3pu

Architecting cloud-enabled systems: a systematic survey of challenges and solutions

Muhammad Aufeef Chauhan, Muhammad Ali Babar, Boualem Benatallah
2016 Software, Practice & Experience  
We have systematically identified and reviewed 133 papers that report architecture related challenges and solutions for cloud-based software systems.  ...  We assert that the identified challenges and solutions classified into the categories form a body of knowledge that can be leveraged for designing or evaluating software architectures for cloudbased systems  ...  We also acknowledge Eddie Zhang for providing useful comments as a part of internal review of this paper. We appreciate Yue Zhou for help to draw the taxonomic diagram.  ... 
doi:10.1002/spe.2409 fatcat:s4hq4gy3yrhsvjxxwwtah2rumm

An Invincible Rudimentary Architecture for Data Security in Cloud Environment Using Multi Cloud

design of cloud secure service system.  ...  The main attention of this paper is to point out the works on security in cloud computing, show the proposed architecute of multi cloud instead of single cloud and the way for the future work for the efficient  ...  , end points, multi-tenancy [12] .  ... 
doi:10.35940/ijitee.g5457.0981119 fatcat:7r5i6galhnac3c5klsyf243vsu

Graph-Based Algorithm for a User-Aware SaaS Approach: Computing Optimal Distribution [article]

Houda Kriouile, Bouchra El Asri
2018 arXiv   pre-print
As a tool to exploit economies of scale, Software as a Service cloud models promote Multi-Tenancy which is the notion of sharing instances among a large group of tenants.  ...  In a try to solve this problem, the present paper propose a User-Aware approach for Software as a Service models using Rich-Variant Components.  ...  Several system architectural views are defined, for example [12] .  ... 
arXiv:1812.09941v1 fatcat:u6gkkmhmebcrdd6z37gfrufn7q

Unified Ontology Implementation of Cloud Computing for Distributed Systems

Zainab Salih Ageed, Rowaida Khalil Ibrahim, Mohammed A. M. Sadeeq
2020 Current Journal of Applied Science and Technology  
In this review, we focus on the use of many technologies and methods for utilizing the semantic web and ontology in cloud computing and distributed system as a solution for these challenges.  ...  The use RDF and OWL semantic technologies in the modeling of a multi-agent system are very effective in increases coordination the interoperability.  ...  The providers of software in cloud publish the software online to be used by multiple clouds users, this can be achieved by utilizing a software delivery model constructed by SaaS with multi-tenancy architecture  ... 
doi:10.9734/cjast/2020/v39i3431039 fatcat:glvn4asmivfihpmjnwk2jy7d6m

Authorization Policy Federation in Heterogeneous Multicloud Environments

Ioram S. Sette, David W. Chadwick, Carlos A. G. Ferraz
2017 IEEE Cloud Computing  
Prototypes were implemented for OpenStack and Amazon Web Services (AWS) cloud formats, and rules were successfully translated with a Level of Semantic Equivalence (LSE) higher than 80%.  ...  Current Infrastructure as a Service (IaaS) cloud platforms have their own authorisation system, containing different access control policies and models.  ...  Service Access and Manipulation Operation Specification (SAMOS) [9] is a semantic-aware multi-cloud orchestration solution based on ontologies.  ... 
doi:10.1109/mcc.2017.3791018 fatcat:sbh3yt4bj5a5nj7mderwwbzhhe

Infrastructure Management Support in a Multi-agent Architecture for Internet of Things

Bogdan Manate, Teodor-Florin Fortis, Viorel Negru
2014 2014 European Modelling Symposium  
This paper examines the cloud resources management for a multi-agent IoT architecture.  ...  Also, the security audit and its impact over a distributed multi-agent architecture that handles a large number of heterogeneous devices is discussed.  ...  ACKNOWLEDGMENT The work of the first author was supported by the strategic grant POSDRU/159/1.5/S/137750, "Project Doctoral and Postdoctoral programs support for increased competitiveness in Exact Sciences  ... 
doi:10.1109/ems.2014.36 dblp:conf/ems/ManateFN14 fatcat:7imlpixcdzamxjqdfjtrmgyi5u

Dynamic configuration management of cloud-based applications

Julia Schroeter, Peter Mucha, Marcel Muth, Kay Jugel, Malte Lochau
2012 Proceedings of the 16th International Software Product Line Conference on - SPLC '12 -volume 1  
Cloud-based applications are multi-tenant aware, whereas customers (i.e., tenants) share hardware and software resources.  ...  Based on an example scenario taken from the Indenica project, we identify requirements for applying methods from software product line (SPL) engineering to configure cloud-based multi-tenant aware applications  ...  Acknowledgements The authors like to thank the reviewers for their very valuable comments.  ... 
doi:10.1145/2364412.2364441 dblp:conf/splc/SchroeterMMJL12 fatcat:bqoccwndtvgfjm4wvtjv3jsbgm

Data Security Monitoring Platform in Cloud for Enterprise

Geng Yushui, Pang Shunpeng
2013 International Journal of Security and Its Applications  
Now most software systems in cloud platform use Multi -Tenancy architecture. A single software system serves for multiple client organization. All customers' data will not be stored in only one node.  ...  The model proposed by this paper uses multi-tenancy SaaS(Software as Service) application architecture, RBAC (Role-Based policies Access Control) model and operation in the context of environmental perception  ...  In a cloud computing environment, software application modes are based on the SaaS model. SaaS model is a single-instance and multi-user architecture.  ... 
doi:10.14257/ijsia.2013.7.6.07 fatcat:ls47dplocbcd7feetif7opapte
« Previous Showing results 1 — 15 out of 600 results