{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:40:18Z","timestamp":1654123218688},"reference-count":35,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7,1]]},"abstract":"<p>This paper is presented as part of a collaborative research project to develop a complex Cloud Service Delivery Platform (CSDP). The aim of the project is to develop a new disruptive approach for service provision to enable the creation of new value chains via Cloud Technology. This paper is primarily concerned with designing and implementing a novel Multi-tenancy architecture which supports a proposed hybrid authentication mechanism for greater resource optimization with enhanced security. The contribution of this paper is three-fold. First, it provides the reader with a concise classification of security concerns together with some developed concepts namely; Security-Aware cloud platform and a Cloud Adoption Model. Second, it proposes a hybrid authentication approach, coupling Single-Sign-On (SSO) with multi-factor authentication to enable improved security for Cloud federated access. Third, is to design and implement an integrated architecture enabling this hybrid authentication solution in a multi-tenancy setting. To the best of the authors knowledge, this work has not been attempted before and is unprecedented.<\/p>","DOI":"10.4018\/ijcac.2013070103","type":"journal-article","created":{"date-parts":[[2013,11,25]],"date-time":"2013-11-25T18:33:05Z","timestamp":1385404385000},"page":"34-49","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Cloud-Based Multi-Tenancy Architecture with Efficient Hybrid Authentication Mechanism for Enhanced Security and Resource Optimization"],"prefix":"10.4018","volume":"3","author":[{"given":"Elhadj","family":"Benkhelifa","sequence":"first","affiliation":[{"name":"Faculty of Computing, Engineering and Sciences, Staffordshire University, Stoke-on-Trent, UK"}]},{"given":"Dayan Abishek","family":"Fernando","sequence":"additional","affiliation":[{"name":"Faculty of Computing, Engineering and Sciences, Staffordshire University, Stoke-on-Trent, UK"}]},{"given":"Thomas","family":"Welsh","sequence":"additional","affiliation":[{"name":"Faculty of Computing, Engineering and Sciences, Staffordshire University, Stoke-on-Trent, UK"}]}],"member":"2432","reference":[{"key":"ijcac.2013070103-0","doi-asserted-by":"crossref","unstructured":"Ahn, G. J., & Shehab, M. (2009). Privacy-enhanced user-centric identity management. In Proc. IEEE Int\u2019l Conf 2009.","DOI":"10.1109\/ICC.2009.5199363"},{"key":"ijcac.2013070103-1","doi-asserted-by":"crossref","unstructured":"Armando, A., Carbone, R., Compagna, L., Cuellar, J., & Tobarra, L. (2008). Formal analysis of SAML 2.0 web browser single sign-on: Breaking the SAML-based single sign-on for Google Apps. In Proceedings of the 6th ACM Workshop 2008.","DOI":"10.1145\/1456396.1456397"},{"key":"ijcac.2013070103-2","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ijcac.2013070103-3","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., \u2026 Zaharia, M. (2009). Above the clouds: A Berkeley view of cloud computing. Technical report, University of California at Berkeley 2009."},{"key":"ijcac.2013070103-4","unstructured":"Bertino, E., et al. (2009). Privacy-preserving digital identity management for cloud computing. In Proceedings of the IEEE Computer Society Data Engineering Bulletin 2009."},{"key":"ijcac.2013070103-5","first-page":"2009","article-title":"Dynamic trust management.","author":"M.Blaze","year":"2009","journal-title":"Computer"},{"key":"ijcac.2013070103-6","doi-asserted-by":"crossref","unstructured":"Buyya, R. et al. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility.","DOI":"10.1109\/CCGRID.2009.97"},{"key":"ijcac.2013070103-7","unstructured":"Callewaert, P., Robinson, P. A., & Blatman, P. (2013). Cloud computing forecasting change."},{"key":"ijcac.2013070103-8","doi-asserted-by":"crossref","unstructured":"Catteddu, D., & Hogben, G. (2009). Cloud computing: Benefits, risks and recommendations for information security. In Proceedings of the ENISA 2009.","DOI":"10.1007\/978-3-642-16120-9_9"},{"key":"ijcac.2013070103-9","unstructured":"Chen, Y., et al. (2010). What\u2019s new about cloud computing security? Technical Report UCB\/EECS-2010-5."},{"key":"ijcac.2013070103-10","unstructured":"Chong, F., Carraro, G., & Mietzner, R. (2006). Multi-tenant data architecture."},{"key":"ijcac.2013070103-11","doi-asserted-by":"crossref","unstructured":"Cloud security myths and strategies uncovered. (2011), Whitepaper VMware, RSA, CSO 2011.","DOI":"10.1016\/S1353-4858(11)70060-5"},{"key":"ijcac.2013070103-12","author":"C.Fehling","year":"2010","journal-title":"A framework for optimized distribution of tenants in cloud applications\u2019 in cloud computing"},{"key":"ijcac.2013070103-13","unstructured":"Feresten, P. (2010). Storage multi-tenancy for cloud computing. In SNIA Cloud Storage 2010."},{"key":"ijcac.2013070103-14","unstructured":"Ferguson, D. F., & Hadar, E. (2010). Constructing and evaluating supply-chain systems in cloud-connected enterprise. In Proceedings of the 5th International Conference on Software and Data Technologies 2010."},{"key":"ijcac.2013070103-15","doi-asserted-by":"crossref","unstructured":"Hassan, M. M., Song, B., Yoon, C., Lee, H. W., & Huh, E. (2009). A novel market oriented dynamic collaborative cloud service infrastructure. In Proceedings of the SERVICES-2.0 World Conferences 2009.","DOI":"10.1109\/SERVICES-2.2009.20"},{"key":"ijcac.2013070103-16","unstructured":"HP CloudSystem matrix multi-tenancy capabilities. (n.d.). Retrieved June 20, 2013, from http:\/\/h20000.www2.hp.com\/bc\/docs\/support\/SupportManual\/c03162531\/c03162531.pdf"},{"key":"ijcac.2013070103-17","unstructured":"Industry and value leading open source virtualization platform. (n.d.). Retrieved June 22, 2013, from http:\/\/www.citrix.com\/products\/xenserver\/overview.html"},{"key":"ijcac.2013070103-18","doi-asserted-by":"crossref","unstructured":"Lenk, A., et al. (2009). What is inside the cloud? An architectural map of the cloud landscape. In Proceedings of the Workshop on Software Engineering Challenges of Cloud Computing in ICSE 2009. IEEE Computer Society, Canada.","DOI":"10.1109\/CLOUD.2009.5071529"},{"key":"ijcac.2013070103-19","unstructured":"Lewis, K. D., & Lewis, J. E. (2009). Web single sign-on authentication using SAML. IJCSI- International Journal of Computer Science Issues 2009."},{"key":"ijcac.2013070103-20","doi-asserted-by":"crossref","unstructured":"Mahmoud, H. A., Moon, H. J., & Chi, Y. (2013). CloudOptimizer: Multi-tenancy for I\/O-bound OLAP workloads.","DOI":"10.1145\/2452376.2452386"},{"key":"ijcac.2013070103-21","doi-asserted-by":"crossref","unstructured":"Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ijcac.2013070103-22","unstructured":"Momm, C., & Krebs, R. (2011). A qualitative discussion of different approaches for implementing multi-tenant SaaS offerings. In Proceedings of Software Engineering (SE2011)."},{"key":"ijcac.2013070103-23","doi-asserted-by":"crossref","unstructured":"Mudigonda, J., Yalagandula, P., Mogul, J., Stiekes, B., & Pouffary, Y. (2011). NetLord: A scalable multi-tenant network architecture for virtualized datacenters.","DOI":"10.1145\/2018436.2018444"},{"key":"ijcac.2013070103-24","unstructured":"Nicolas, P. (2006). Multi-tenant deployment models for SaaS."},{"key":"ijcac.2013070103-25","doi-asserted-by":"crossref","unstructured":"Norta, A., & Kutvonen, L. (2012). A cloud HUB for brokering business processes as a service. In Proceedings of the SRII Global Conference 2012.","DOI":"10.1109\/SRII.2012.40"},{"key":"ijcac.2013070103-26","unstructured":"Peterson, L., et al. (n.d.). Slice-based federation architecture, v2.0. Retrieved from http:\/\/groups.geni.net\/geni\/attachment\/wiki\/SliceFedArch\/SFA2.0.pdf"},{"key":"ijcac.2013070103-27","doi-asserted-by":"crossref","unstructured":"Ranjan, R., Buyya, R., & Parashar, M. (2012). Practice and experience special issue: Special section on autonomic cloud computing: technologies, services, and applications.","DOI":"10.1002\/cpe.1865"},{"key":"ijcac.2013070103-28","unstructured":"Raywood, D. (2010). Google adds two factor authenticationton Gmail via SMS one time passwords."},{"key":"ijcac.2013070103-29","unstructured":"Shin, D., & Ahn, G. J. (2005). Role-based privilege and trust management. Computer Systems Science & Eng. 2005."},{"key":"ijcac.2013070103-30","author":"B. C.Tak","year":"2011","journal-title":"To move or not to move: The economics of cloud computing"},{"key":"ijcac.2013070103-31","doi-asserted-by":"crossref","unstructured":"Takabi, H., et al. (2010). SecureCloud: Towards a comprehensive security framework for cloud computing environments. In Proceedings of the 1st IEEE International Workshop Emerging Applications for Cloud Computing (CloudApp. 2010), Seoul, South Korea.","DOI":"10.1109\/COMPSACW.2010.74"},{"key":"ijcac.2013070103-32","doi-asserted-by":"crossref","unstructured":"Vaquero, L. M., Rodero-Merino, L., Caceres, J., & Lindner, M. (2009). A break in the clouds: Towards a cloud definition.","DOI":"10.1145\/1496091.1496100"},{"key":"ijcac.2013070103-33","doi-asserted-by":"crossref","unstructured":"Wei, Y., & Blake, M. B. (2010). Service-oriented computing and cloud computing: challenges and opportunities. In Proceedings of the IEEE Internet Computing 2010.","DOI":"10.1109\/MIC.2010.147"},{"key":"ijcac.2013070103-34","unstructured":"Zhang, Y., & Joshi, J. (2009). Access control and trust management for emerging multi domain environments."}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=95042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:00:20Z","timestamp":1654120820000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcac.2013070103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.2013070103","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}