• 제목/요약/키워드: Multi-tenant

검색결과 18건 처리시간 0.024초

Auto-configurable Security Mechanism for NFV

  • Kim, HyunJin;Park, PyungKoo;Ryou, Jaecheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권2호
    • /
    • pp.786-799
    • /
    • 2018
  • Recently, NFV has attracted attention as a next-generation network virtualization technology for hardware -independent and efficient utilization of resources. NFV is a technology that not only virtualize computing, server, storage, network resources based on cloud computing but also connect Multi-Tenant of VNFs, a software network function. Therefore, it is possible to reduce the cost for constructing a physical network and to construct a logical network quickly by using NFV. However, in NFV, when a new VNF is added to a running Tenant, authentication between VNFs is not performed. Because of this problem, it is impossible to identify the presence of Fake-VNF in the tenant. Such a problem can cause an access from malicious attacker to one of VNFs in tenant as well as other VNFs in the tenant, disabling the NFV environment. In this paper, we propose Auto-configurable Security Mechanism in NFV including authentication between tenant-internal VNFs, and enforcement mechanism of security policy for traffic control between VNFs. This proposal not only authenticate identification of VNF when the VNF is registered, but also apply the security policy automatically to prevent malicious behavior in the tenant. Therefore, we can establish an independent communication channel for VNFs and guarantee a secure NFV environment.

소프트웨어 온-디멘드 방식의 멀티테넌트 환경을 지원하는 스마트 도서관시스템 설계 및 구현 (Design and Implementation of Smart Library System for Multi-tenant Environment Using Software on-demand)

  • 민병원
    • 중소기업융합학회논문지
    • /
    • 제6권4호
    • /
    • pp.131-136
    • /
    • 2016
  • 대부분 도서관시스템 서비스 제공은 ASP 또는 Client/Server 방식으로 제공함으로써 하드웨어 및 소프트웨어 라이센스의 고비용, 설치 및 배포, 구매비, Upgrade, Customization, 문제점 관리 등 소프트웨어 전반에 걸쳐 고비용과 관리가 힘든 문제점이 있다. 이러한 문제점을 해결하기 위해 제안된 멀티테넌트 환경을 지원하는 스마트도서관시스템에서는 간편하며, 쉽고, 초기 투자비용이 거의 없고, 저비용 IT 서비스가 가능한 소프트웨어 온-디멘드 방식으로 구현하였다.

SaaS 기반 멀티테넌트 환경을 지원하는 통합전자도서관시스템 구현 (Implementation of Integrated Management System for Digital Library Supporting Multi-tenant Environment Based on SaaS)

  • 민병원;오용선
    • 한국콘텐츠학회논문지
    • /
    • 제11권5호
    • /
    • pp.93-103
    • /
    • 2011
  • 현재, 도서관시스템의 소프트웨어 사용 방식은 클라이언트/서버 및 ASP 방식으로 서비스를 제공함으로써 하드웨어 및 소프트웨어 구매비, 설치 및 배포, Customization, Upgrade, 문제점 관리, 라이센스의 고비용 등 소프트웨어 전반에 걸쳐 관리가 힘들고 고비용의 문제점이 있다. 이러한 문제점을 해결하기 위해 SaaS 기반의 전자도서관시스템에서는 멀티테넌트 환경(SaaS 성숙도 레벨 3이상)에서 구현이 가능한 핵심요소들을 개발하였다. 그러므로 초기 투자비용이 거의 없고, 쉽고, 간편하며, 저비용 IT 서비스가 가능한 SaaS 기반의 소프트웨어 온-디멘드 방식의 서비스 모델로 시스템을 구현하였다.

멀티테넌시 환경에서 안전한 웹 사이트 개발을 위한 데이터격리 방법 분석 (Analysis of Data Isolation Methods for Secure Web Site Development in a Multi-Tenancy Environment)

  • 김점구
    • 융합보안논문지
    • /
    • 제24권1호
    • /
    • pp.35-42
    • /
    • 2024
  • 멀티테넌시 아키텍처는 클라우드 기반 서비스와 애플리케이션에서 중요한 역할을 하며, 이러한 환경에서 데이터 격리는 중요한 보안 과제로 부각되고 있다. 본 논문은 스키마 기반 격리, 논리적 격리, 물리적 격리 등 다양한 데이터 격리 방법들을 조사하고, 각각의 장단점을 비교 분석하였다. 데이터 격리 방법들의 실질적인 적용 사례와 효과를 평가하고, 이를 통해 멀티테넌트 웹 사이트 개발 시 고려해야 할 보안 요소들과 데이터 격리 방법의 선택 기준을 제안하였다. 본 논문은 멀티테넌시 환경에서의 데이터 보안을 강화하려는 개발자, 아키텍트 및 시스템 관리자에게 중요한 지침을 제안하고, 효율적이고 안전한 멀티테넌트 웹 사이트의 설계와 구현을 위한 기초적인 프레임워크를 제안한다. 그리고 데이터 격리 방법의 선택이 시스템의 성능, 확장성, 유지관리 용이성 및 전반적인 보안에 어떻게 영향을 미치는지에 대한 통찰력을 제공하며, 이를 통해 멀티테넌트 시스템의 보안과 안정성을 향상시키는 방안을 모색하였다.

The Spatial Performance of Multi-Level Shopping Clusters A Case Study of Nanshan Commercial Cultural District

  • Haofeng, Wang;Yupeng, Zhang;Xiaojun, Rao
    • 국제초고층학회논문집
    • /
    • 제6권2호
    • /
    • pp.149-163
    • /
    • 2017
  • With the intensification of urban development in Chinese cities, mixed land use in urban centers extends vertically into 3-D and expands its scale from a single building to commercial clusters. The multi-level pedestrian system in city centers also changed its role from one of traffic isolation to spatial integration, where transit nodes, street sidewalks, squares, building entrances, atriums, and corridors are interconnected, both horizontally and vertically, into a whole spatial system, within which pedestrian flows are guided and shopping facilities are arranged. This paper uses spatial configuration analysis of space syntax to examine the impacts of spatial patterns on movement distribution and the business performance of tenant mix in the multi-level commercial system of the Nanshan Commercial Cultural District in Shenzhen, China. The key objective is to better understand the interactions between the socio-economic variables and spatial design parameters of a shopping complex. The research findings point to the importance of multiplicity between syntactic variables and other spatial variables in influencing the pedestrian flows, business performance and tenant mix in highly complex commercial systems. Particularly noteworthy is the relationship between spatial accessibility measures and the location of escalators, and the ways in which individual commercial buildings are embedded into the overall spatial system. The study suggests that this may lead to the preliminary identification of the spatial qualities of effective vertical extensions of mixed land use in a high-density urban settings.

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

멜트다운 취약점을 이용한 인공신경망 추출공격 (Extracting Neural Networks via Meltdown)

  • 정호용;류도현;허준범
    • 정보보호학회논문지
    • /
    • 제30권6호
    • /
    • pp.1031-1041
    • /
    • 2020
  • 클라우드 컴퓨팅 환경에서 기계학습 서비스를 제공하는 Machine-Learning-as-a-Service(MLaaS) 등이 활발히 개발됨에 따라 보다 다양한 분야에서 인공지능 기술을 손쉽고 효과적인 방법으로 활용할 수 있게 되었다. 클라우드 환경에서는 가상화 기술을 통해 각 사용자에게 논리적으로 독립된 컴퓨팅 공간을 제공하는데, 최근 시스템의 취약점을 이용해 클라우드 테넌트(tenant) 사이에 다양한 부채널이 존재할 수 있다는 연구 결과가 발표되고 있다. 본 논문에서는 이러한 멀티-테넌시(multi-tenancy) 환경에서 멜트다운 취약점을 이용하여 딥러닝 모델의 내부 정보를 추출할 수 있는 현실적인 공격 시나리오를 제시한다. 이후 TensorFlow 딥러닝 서비스에 대한 실험을 통해 92.875%의 정확도와 1.325kB/s의 속도로 인공신경망의 모든 정보를 추출할 수 있음을 보인다.

High-revenue Online Provisioning for Virtual Clusters in Multi-tenant Cloud Data Center Network

  • Lu, Shuaibing;Fang, Zhiyi;Wu, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1164-1183
    • /
    • 2019
  • The rapid development of cloud computing and high requirements of operators requires strong support from the underlying Data Center Networks. Therefore, the effectiveness of using resources in the data center networks becomes a point of concern for operators and material for research. In this paper, we discuss the online virtual-cluster provision problem for multiple tenants with an aim to decide when and where the virtual cluster should be placed in a data center network. Our objective is maximizing the total revenue for the data center networks under the constraints. In order to solve this problem, this paper divides it into two parts: online multi-tenancy scheduling and virtual cluster placement. The first part aims to determine the scheduling orders for the multiple tenants, and the second part aims to determine the locations of virtual machines. We first approach the problem by using the variational inequality model and discuss the existence of the optimal solution. After that, we prove that provisioning virtual clusters for a multi-tenant data center network that maximizes revenue is NP-hard. Due to the complexity of this problem, an efficient heuristic algorithm OMS (Online Multi-tenancy Scheduling) is proposed to solve the online multi-tenancy scheduling problem. We further explore the virtual cluster placement problem based on the OMS and propose a novel algorithm during the virtual machine placement. We evaluate our algorithms through a series of simulations, and the simulations results demonstrate that OMS can significantly increase the efficiency and total revenue for the data centers.

Generic Costing Scheme Using General Equilibrium Theory for Fair Cloud Service Charging

  • Hussin, Masnida;Jalal, Siti Fajar;Latip, Rohaya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권1호
    • /
    • pp.58-73
    • /
    • 2021
  • Cloud Service Providers (CSPs) enable their users to access Cloud computing and storage services from anywhere in quick and flexible manners through the Internet. With the basis of 'pay-as-you-go' model, it makes the interactions between CSPs and the users play a vital role in shaping the Cloud computing market. A pool of virtualized and dynamically scalable Cloud services that delivered on demand to the users is associated with guaranteed performance and cost-provisioning. It needed a costing scheme for determining suitable charges in order to secure lease pricing of the Cloud services. However, it is hard to meet the satisfied prices for both CSPs and users due to their conflicting needs. Furthermore, there is lack of Service Level Agreements (SLAs) that allowing the users to take part into price negotiating process. The users may lose their interest to use Cloud services while reducing CSPs profit. Therefore, this paper proposes a generic costing scheme for Cloud services using General Equilibrium Theory (GET). GET helps to formulate the price function for various services' factors to match with various demands from the users. It is initially determined by identifying the market circumstances that a general equilibrium will be hold and reached. Specifically, there are two procedures of agreement made in response to (i) established equilibrium supply and demand, and (ii) service price formed and constructed in a price range. The SLAs in our costing scheme is integrated to satisfy both CSPs and users' needs while minimizing their conflicts. The price ranging strategy is deliberated to provide prices' options to the users with respect their budget limit. Meanwhile, the CSPs can adaptively charge based on users' preferences without losing their profit. The costing scheme is testable and analyzed in multi-tenant computing environments. The results from our simulation experiments demonstrate that the proposed costing scheme provides better users' satisfaction while fostering fairness pricing in the Cloud market.

임대주택(賃貸住宅)의 내재적(內在的) 특성(特性)에 관(關)한 연구(硏究) - 서울의 공동거주형(共同居住型) 임대주택(賃貸住宅)의 사례(事例)를 중심(中心)으로 - (A Study on Latent Characteristics of Rental Housing - A Case Study on 'Co-deweling' of Rental Housing in Seoul -)

  • 이윤희;정재국
    • 한국주거학회논문집
    • /
    • 제21권4호
    • /
    • pp.51-58
    • /
    • 2010
  • In the modernization process of the city, urbanization raised a variety of social issues. Urbanization brought noticeable changes in dwelling patterns, such as drastic changes in the housing lifestyle, that revolved around the metropolitan areas of Seoul and Busan etc. before and after the expansion of economic growth. Especially in 1985, when 23.8% of the country's population was concentrated in Seoul, the imbalance of housing supply and demand caused a vast range of housing shortage. The shortage, that resulted from public sector mishandling of natural housing demand, lead to the occurrence of private sector rental housing. The occurrence of this abnormal rental housing supply, became a major cause of Korea's typical lease system called 'Co-dwelling', where the leaseholder and tenant physically lives in the same residence. The leaseholder and tenant's 'Co-dwelling' started from partial renting of traditional Korean-style housing and transformed with the transition of dwelling form and time. However, after 1985, legalization of multi-family housing, Korean rental housing started to be planned in the beginning of it's housing construction and to be produced as an independent space with separate circulation. Also in terms of facility, it changed from partial renting of a space within the residence to an assembly of small individual spaces. However, the background of this deep-rooted 'Co-dwelling' lease system, in different forms and periods of residence, is still based on the lack of public sector rental housing supply and private sector supply of rental space to utilize extra space, 'Jeonsei' payment.