• Title/Summary/Keyword: Multi-tenant

Search Result 18, Processing Time 0.023 seconds

Auto-configurable Security Mechanism for NFV

  • Kim, HyunJin;Park, PyungKoo;Ryou, Jaecheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.786-799
    • /
    • 2018
  • Recently, NFV has attracted attention as a next-generation network virtualization technology for hardware -independent and efficient utilization of resources. NFV is a technology that not only virtualize computing, server, storage, network resources based on cloud computing but also connect Multi-Tenant of VNFs, a software network function. Therefore, it is possible to reduce the cost for constructing a physical network and to construct a logical network quickly by using NFV. However, in NFV, when a new VNF is added to a running Tenant, authentication between VNFs is not performed. Because of this problem, it is impossible to identify the presence of Fake-VNF in the tenant. Such a problem can cause an access from malicious attacker to one of VNFs in tenant as well as other VNFs in the tenant, disabling the NFV environment. In this paper, we propose Auto-configurable Security Mechanism in NFV including authentication between tenant-internal VNFs, and enforcement mechanism of security policy for traffic control between VNFs. This proposal not only authenticate identification of VNF when the VNF is registered, but also apply the security policy automatically to prevent malicious behavior in the tenant. Therefore, we can establish an independent communication channel for VNFs and guarantee a secure NFV environment.

Design and Implementation of Smart Library System for Multi-tenant Environment Using Software on-demand (소프트웨어 온-디멘드 방식의 멀티테넌트 환경을 지원하는 스마트 도서관시스템 설계 및 구현)

  • Min, Byung-won
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.131-136
    • /
    • 2016
  • By providing Asp or Client/Server method, most library system service proposal has a problem that is hard to manage and high cost across the software like high cost of hardware and software license, installation and distribution, purchasing cost, upgrade, customization, problem management etc. As proposed in order to solve this problem, smart library system that supporting multi-tenant environment realized on-demand mode that is a simple and little initial investment costs and possible for low cost IT service.

Implementation of Integrated Management System for Digital Library Supporting Multi-tenant Environment Based on SaaS (SaaS 기반 멀티테넌트 환경을 지원하는 통합전자도서관시스템 구현)

  • Min, Byoung-Won;Oh, Yong-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.5
    • /
    • pp.93-103
    • /
    • 2011
  • Currently, the library system using the method of the software on the client / server and ASP by providing services in a manner of hardware and software, and cross-referencing, installation and deployment, Customization, Upgrade, risk management, and software licenses across the high-cost management of difficult and costly There is a problem. To solve these problems, SaaS based Integrated Management System for Digital Library, multi-tenant environments(SaaS Maturity Level 3 and above) as a key element in the implementation were developed. Therefore, almost no initial investment cost, easy, simple, low-cost IT services available on SaaS based software on-demand service model of how the system is implemented.

Analysis of Data Isolation Methods for Secure Web Site Development in a Multi-Tenancy Environment (멀티테넌시 환경에서 안전한 웹 사이트 개발을 위한 데이터격리 방법 분석)

  • Jeom Goo Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.35-42
    • /
    • 2024
  • Multi-tenancy architecture plays a crucial role in cloud-based services and applications, and data isolation within such environments has emerged as a significant security challenge. This paper investigates various data isolation methods including schema-based isolation, logical isolation, and physical isolation, and compares their respective advantages and disadvantages. It evaluates the practical application and effectiveness of these data isolation methods, proposing security considerations and selection criteria for data isolation in the development of multi-tenant websites. This paper offers important guidance for developers, architects, and system administrators aiming to enhance data security in multi-tenancy environments. It suggests a foundational framework for the design and implementation of efficient and secure multi-tenant websites. Additionally, it provides insights into how the choice of data isolation methods impacts system performance, scalability, maintenance ease, and overall security, exploring ways to improve the security and stability of multi-tenant systems.

The Spatial Performance of Multi-Level Shopping Clusters A Case Study of Nanshan Commercial Cultural District

  • Haofeng, Wang;Yupeng, Zhang;Xiaojun, Rao
    • International Journal of High-Rise Buildings
    • /
    • v.6 no.2
    • /
    • pp.149-163
    • /
    • 2017
  • With the intensification of urban development in Chinese cities, mixed land use in urban centers extends vertically into 3-D and expands its scale from a single building to commercial clusters. The multi-level pedestrian system in city centers also changed its role from one of traffic isolation to spatial integration, where transit nodes, street sidewalks, squares, building entrances, atriums, and corridors are interconnected, both horizontally and vertically, into a whole spatial system, within which pedestrian flows are guided and shopping facilities are arranged. This paper uses spatial configuration analysis of space syntax to examine the impacts of spatial patterns on movement distribution and the business performance of tenant mix in the multi-level commercial system of the Nanshan Commercial Cultural District in Shenzhen, China. The key objective is to better understand the interactions between the socio-economic variables and spatial design parameters of a shopping complex. The research findings point to the importance of multiplicity between syntactic variables and other spatial variables in influencing the pedestrian flows, business performance and tenant mix in highly complex commercial systems. Particularly noteworthy is the relationship between spatial accessibility measures and the location of escalators, and the ways in which individual commercial buildings are embedded into the overall spatial system. The study suggests that this may lead to the preliminary identification of the spatial qualities of effective vertical extensions of mixed land use in a high-density urban settings.

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

Extracting Neural Networks via Meltdown (멜트다운 취약점을 이용한 인공신경망 추출공격)

  • Jeong, Hoyong;Ryu, Dohyun;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1031-1041
    • /
    • 2020
  • Cloud computing technology plays an important role in the deep learning industry as deep learning services are deployed frequently on top of cloud infrastructures. In such cloud environment, virtualization technology provides logically independent and isolated computing space for each tenant. However, recent studies demonstrate that by leveraging vulnerabilities of virtualization techniques and shared processor architectures in the cloud system, various side-channels can be established between cloud tenants. In this paper, we propose a novel attack scenario that can steal internal information of deep learning models by exploiting the Meltdown vulnerability in a multi-tenant system environment. On the basis of our experiment, the proposed attack method could extract internal information of a TensorFlow deep-learning service with 92.875% accuracy and 1.325kB/s extraction speed.

High-revenue Online Provisioning for Virtual Clusters in Multi-tenant Cloud Data Center Network

  • Lu, Shuaibing;Fang, Zhiyi;Wu, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1164-1183
    • /
    • 2019
  • The rapid development of cloud computing and high requirements of operators requires strong support from the underlying Data Center Networks. Therefore, the effectiveness of using resources in the data center networks becomes a point of concern for operators and material for research. In this paper, we discuss the online virtual-cluster provision problem for multiple tenants with an aim to decide when and where the virtual cluster should be placed in a data center network. Our objective is maximizing the total revenue for the data center networks under the constraints. In order to solve this problem, this paper divides it into two parts: online multi-tenancy scheduling and virtual cluster placement. The first part aims to determine the scheduling orders for the multiple tenants, and the second part aims to determine the locations of virtual machines. We first approach the problem by using the variational inequality model and discuss the existence of the optimal solution. After that, we prove that provisioning virtual clusters for a multi-tenant data center network that maximizes revenue is NP-hard. Due to the complexity of this problem, an efficient heuristic algorithm OMS (Online Multi-tenancy Scheduling) is proposed to solve the online multi-tenancy scheduling problem. We further explore the virtual cluster placement problem based on the OMS and propose a novel algorithm during the virtual machine placement. We evaluate our algorithms through a series of simulations, and the simulations results demonstrate that OMS can significantly increase the efficiency and total revenue for the data centers.

Generic Costing Scheme Using General Equilibrium Theory for Fair Cloud Service Charging

  • Hussin, Masnida;Jalal, Siti Fajar;Latip, Rohaya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.58-73
    • /
    • 2021
  • Cloud Service Providers (CSPs) enable their users to access Cloud computing and storage services from anywhere in quick and flexible manners through the Internet. With the basis of 'pay-as-you-go' model, it makes the interactions between CSPs and the users play a vital role in shaping the Cloud computing market. A pool of virtualized and dynamically scalable Cloud services that delivered on demand to the users is associated with guaranteed performance and cost-provisioning. It needed a costing scheme for determining suitable charges in order to secure lease pricing of the Cloud services. However, it is hard to meet the satisfied prices for both CSPs and users due to their conflicting needs. Furthermore, there is lack of Service Level Agreements (SLAs) that allowing the users to take part into price negotiating process. The users may lose their interest to use Cloud services while reducing CSPs profit. Therefore, this paper proposes a generic costing scheme for Cloud services using General Equilibrium Theory (GET). GET helps to formulate the price function for various services' factors to match with various demands from the users. It is initially determined by identifying the market circumstances that a general equilibrium will be hold and reached. Specifically, there are two procedures of agreement made in response to (i) established equilibrium supply and demand, and (ii) service price formed and constructed in a price range. The SLAs in our costing scheme is integrated to satisfy both CSPs and users' needs while minimizing their conflicts. The price ranging strategy is deliberated to provide prices' options to the users with respect their budget limit. Meanwhile, the CSPs can adaptively charge based on users' preferences without losing their profit. The costing scheme is testable and analyzed in multi-tenant computing environments. The results from our simulation experiments demonstrate that the proposed costing scheme provides better users' satisfaction while fostering fairness pricing in the Cloud market.

A Study on Latent Characteristics of Rental Housing - A Case Study on 'Co-deweling' of Rental Housing in Seoul - (임대주택(賃貸住宅)의 내재적(內在的) 특성(特性)에 관(關)한 연구(硏究) - 서울의 공동거주형(共同居住型) 임대주택(賃貸住宅)의 사례(事例)를 중심(中心)으로 -)

  • Lee, Yun-Hee;Jung, Jae-Kook
    • Journal of the Korean housing association
    • /
    • v.21 no.4
    • /
    • pp.51-58
    • /
    • 2010
  • In the modernization process of the city, urbanization raised a variety of social issues. Urbanization brought noticeable changes in dwelling patterns, such as drastic changes in the housing lifestyle, that revolved around the metropolitan areas of Seoul and Busan etc. before and after the expansion of economic growth. Especially in 1985, when 23.8% of the country's population was concentrated in Seoul, the imbalance of housing supply and demand caused a vast range of housing shortage. The shortage, that resulted from public sector mishandling of natural housing demand, lead to the occurrence of private sector rental housing. The occurrence of this abnormal rental housing supply, became a major cause of Korea's typical lease system called 'Co-dwelling', where the leaseholder and tenant physically lives in the same residence. The leaseholder and tenant's 'Co-dwelling' started from partial renting of traditional Korean-style housing and transformed with the transition of dwelling form and time. However, after 1985, legalization of multi-family housing, Korean rental housing started to be planned in the beginning of it's housing construction and to be produced as an independent space with separate circulation. Also in terms of facility, it changed from partial renting of a space within the residence to an assembly of small individual spaces. However, the background of this deep-rooted 'Co-dwelling' lease system, in different forms and periods of residence, is still based on the lack of public sector rental housing supply and private sector supply of rental space to utilize extra space, 'Jeonsei' payment.