Please use this identifier to cite or link to this item: http://dspace2020.uniten.edu.my:8080/handle/123456789/9034
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAbd, S.K.
dc.contributor.authorSalih, R.T.
dc.contributor.authorAl-Haddad, S.A.R.
dc.contributor.authorHashim, F.
dc.contributor.authorAbdullah, A.B.H.
dc.contributor.authorYussof, S.
dc.date.accessioned2018-02-21T04:53:07Z-
dc.date.available2018-02-21T04:53:07Z-
dc.date.issued2016
dc.identifier.urihttp://dspace.uniten.edu.my/jspui/handle/123456789/9034-
dc.description.abstractMany cloud security complexities can be concerned as a result of its open system architecture. One of these complexities is multi-tenancy security issue. This paper discusses and addresses the most common public cloud security complexities focusing on Multi-Tenancy security issue. Multi-tenancy is one of the most important security challenges faced by public cloud services providers. Therefore, this paper presents a secure multi-tenancy architecture using authorization model Based on AAAS protocol. By utilizing cloud infrastructure, access control can be provided to various cloud information and services by our suggested authorization system. Each business can offer several cloud services. These cloud services can cooperate with other services which can be related to the same organization or different one. Moreover, these cooperation agreements are supported by our suggested system. © 2015 IEEE.
dc.titleCloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
item.fulltextNo Fulltext-
item.grantfulltextnone-
Appears in Collections:CCI Scholarly Publication
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.