International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 9 - Issue 3, March 2020 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Design And Development Of Multi Tenancy In Cloud: Security Issues

[Full Text]



A. Yashwanth Reddy, Dr. R. P. Singh



Cloud Computing, Virtualization, Multi tenancy, Security, IAAS, SAAS, PAAS.



Words Cloud is actually utilized as an allegory for the web, based upon standard use a cloud like design to represent a network. Cloud Computing is actually enhanced innovation for information discussing by means of network along with much less expense as contrast to various other innovations. Cloud commercial infrastructure sustains a variety of versions IAAS, SAAS, PAAS. The condition virtualization in cloud processing is actually really helpful today. With the aid of virtualization, much more than one system software is actually assisted along with all information on singular H/W. Our experts may likewise state that our experts got solitary hosting server however our experts utilized it for numerous features (Web Server, data source hosting server, Application Server, DNS Server, DHCP Server). Another property of cloud computer is actually Multi Tenancy. Discussing of one data source to numerous occupants or even our experts can easily state customers is actually called multi occupancy. Cloud computer individualize the demands of consumer and also u r solvent according to usage. Network apps discuss with multi occupation for different customers however protection of information is actually simple problem. This Paper goes over concerning the safety and security along with even more file encryption regimens as well as upgrades efficiency along with network option optimization. As a result of raise in functionality and also safety, a majority of individuals entice in the direction of CLOUD COMPUTING. Virtualization is actually a regard to cloud computer Virtualization is actually a brand-new innovation in computer science.



[1] S. Pearson, “Privacy, security and trust in cloud computing,” in Privacy and Security for Cloud Computing (S. Pearson and G. Yee, eds.), Computer Communications and Networks, pp. 3–42, Springer London, 2013.
[2] V. Josyula, M. Orr, and G. Page, Cloud Computing: Automating the Virtualized Data Center, Cisco Systems, Inc., Indianapolis, USA, 2011.
[3] F. Liu et al., “NIST Cloud Computing Reference Architecture”, National Institute of Standards and Technology, U.S Department of Commerce, Special Publication 500-292, Sep. 2011.
[4] Mell, P. & Grance, T (2011) The NIST Definition of Cloud Computing, (Special Publication 800-145). Gaithersburg MD: National Institute of Standards and Technology.
[5] Singleton D., “It’s time for a cloud UI standard”, last retrieved 18 Nov 2013.
[6] Cloud Computing Security Issues in IAAS, Volume 2, Issue 1, January 2012, ISSN: 2277 128X.
[7] Cloud Computing Data Storage and Security Enhancement, Volume 1, Issue 6, August 2012.
[8] Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, "Privacy Preserving Public Auditing for Data Storage Security in, cloud Computing”, 2010.
[9] Sunita Rani and Ambrish Gangal, “Cloud Security with Encryption using Hybrid Algorithm and Secured Endpoints”, (IJCSIT), Vol. 3 (3), 2012, 4302 – 4304.
[10] Alok Tripath and Abhinav Mishra,” Cloud Computing Security Considerations”, IT Division, DOEACC Society, Gorakhpur Centre Gorakhpur, India, 2010, IEEE
[11] ” Advance Computer Technology” a book by Dr Deven shah. Edition-2011.
[12] “Cryptography and Network Security” a book by William Stallings, Fifth Edition [13] http://www.lsi-contest.com/2008/spec2_e.html.
[13] http://searchcloudsecurity.techtarget.com/tip/Clou d-computing-security-Choosing-a-VPN-type to connect-to-the-cloud.
[14] P. Kalpana, "Data Security in Cloud Computing using RSA Algorithm," International Journal of Research in Computer and Communication technology, vol. 1, 2012