A Novel Cloud-Based Multi-Tenancy Architecture with Efficient Hybrid Authentication Mechanism for Enhanced Security and Resource Optimization

A Novel Cloud-Based Multi-Tenancy Architecture with Efficient Hybrid Authentication Mechanism for Enhanced Security and Resource Optimization

Elhadj Benkhelifa (Faculty of Computing, Engineering and Sciences, Staffordshire University, Stoke-on-Trent, UK), Dayan Abishek Fernando (Faculty of Computing, Engineering and Sciences, Staffordshire University, Stoke-on-Trent, UK) and Thomas Welsh (Faculty of Computing, Engineering and Sciences, Staffordshire University, Stoke-on-Trent, UK)
Copyright: © 2013 |Pages: 16
DOI: 10.4018/ijcac.2013070103
OnDemand PDF Download:
$37.50

Abstract

This paper is presented as part of a collaborative research project to develop a complex Cloud Service Delivery Platform (CSDP). The aim of the project is to develop a new disruptive approach for service provision to enable the creation of new value chains via Cloud Technology. This paper is primarily concerned with designing and implementing a novel Multi-tenancy architecture which supports a proposed hybrid authentication mechanism for greater resource optimization with enhanced security. The contribution of this paper is three-fold. First, it provides the reader with a concise classification of security concerns together with some developed concepts namely; Security-Aware cloud platform and a Cloud Adoption Model. Second, it proposes a hybrid authentication approach, coupling Single-Sign-On (SSO) with multi-factor authentication to enable improved security for Cloud federated access. Third, is to design and implement an integrated architecture enabling this hybrid authentication solution in a multi-tenancy setting. To the best of the authors knowledge, this work has not been attempted before and is unprecedented.
Article Preview

2. Cloud: The Adoption Model

Despite the huge investments in marketing the Cloud technology, and despite the huge potentials in revolutionizing the current service provisioning approach, and creating substantial business growth and savings, the technology has only been partially exploited and the adoption rate is still much lower than anticipated.

Several industrial and research surveys and reports have been published analyzing the situation in an attempt to understand the reasons behind the slow adoption of the Cloud technology and act upon them in order to attract more businesses to the technology. There are many reasons why Cloud business services delivery is not widely exploited (Cloud Security Myths and Strategies Uncovered 2011). Security comes on the top of the list of concerns on all of these surveys and reports (Buyya, R. et al., 2009). However, part of this slow adoption can also be related to wrong user perceptions. Figure 1 illustrates our model for enhanced Cloud adoption.

Figure 1.

Cloud adoption model

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing