INNOVATIVE MULTI-TENANT ARCHITECTURES FOR WEB SERVICES WITH EMPHASIS ON PRIVACY PRESERVATION AND DATA ISOLATION
Keywords:
Multi-tenancy, Web Services, Privacy Preservation, Data Isolation, Cloud Computing, EncryptionAbstract
Multi-tenant architectures are increasingly pivotal in modern web services, enabling resource efficiency, scalability, and cost-effectiveness. However, achieving robust privacy preservation and data isolation in such environments remains a critical challenge. This paper explores innovative multi-tenant architectures with a focus on ensuring privacy and data isolation. By reviewing existing approaches and proposing new solutions, we highlight the benefits of context-aware partitioning, advanced encryption techniques, and tenant-level configurations to enhance security and compliance.
References
Zhang, Y., & Kumar, S. (2020). Multi-Tenancy in Cloud Computing: Challenges and Techniques. Cloud Computing Journal, 15(3), 34–46.
Gupta, R., & Singh, A. (2022). Privacy-Preserving Web Services for Multi-Tenant Systems. International Journal of Security, 9(2), 45–60.
Chen, M., & Yang, X. (2021). Hybrid Encryption for Cloud Security. Journal of Cryptographic Engineering, 10(1), 12–28.
Barham, P., Dragovic, B., and Fraser, K. "Xen and the Art of Virtualization." ACM SIGOPS Operating Systems Review, vol. 37, no. 5, 2003, pp. 164–177.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., and Konwinski, A. "A View of Cloud Computing." Communications of the ACM, vol. 53, no. 4, 2010, pp. 50–58.
Tsai, W.-T., Sun, X., and Balasooriya, J. "Service-Oriented Cloud Computing Architecture." 2010 Seventh International Conference on Information Technology: New Generations
(ITNG), 2010, pp. 684–689.
Buyya, R., Yeo, C. S., and Venugopal, S. "Market-Oriented Cloud Computing: Vision, Hype, and Reality." Proceedings of the 2008 IEEE International Symposium on Cluster Computing
and the Grid (CCGrid), 2008, pp. 50–57.
Yang, J., and Liu, Z. "Security and Privacy in Cloud Computing." Handbook of Research on End-to-End Cloud Computing Architecture Design, 2016, pp. 156–172.
Ristenpart, T., Tromer, E., Shacham, H., and Savage, S. "Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds." Proceedings of the 16th ACM
Conference on Computer and Communications Security (CCS), 2009, pp. 199–212.
Cheng, L., and Rao, S. "Data Isolation in Shared Cloud Environments." Journal of Cloud Security, vol. 8, no. 1, 2020, pp. 45–58.
Ren, K., Wang, C., and Wang, Q. "Security Challenges for the Public Cloud." IEEE Internet Computing, vol. 16, no. 1, 2012, pp. 69–73.
Ko, R. K., Lee, B. S., and Raj, H. "Cloud Computing Vulnerability Incidents: A Statistical Overview." Cloud Computing Security, 2013, pp. 93–119.
Mietzner, R., Leymann, F., and Unger, T. "Combining Different Multi-Tenancy Patterns in Service-Oriented Applications." Enterprise Distributed Object Computing Conference, 2009, pp. 131–140.
Jin, H., Ibrahim, S., and Bell, T. "High Performance Cloud Computing: A View of Scientific Applications." Proceedings of the IEEE, vol. 99, no. 8, 2011, pp. 1–12.
Buchbinder, N., Jain, K., and Naor, J. S. "Online Primal-Dual Algorithms for Maximizing Ad-Auctions Revenue." European Symposium on Algorithms (ESA), 2011, pp. 243–254.
Zhang, Y., and Kumar, S. "Multi-Tenancy in Cloud Computing: Challenges and Techniques." Cloud Computing Journal, vol. 15, no. 3, 2020, pp. 34–46.
Gupta, R., and Singh, A. "Privacy-Preserving Web Services for Multi-Tenant Systems." International Journal of Security, vol. 9, no. 2, 2022, pp. 45–60.
Chen, M., and Yang, X. "Hybrid Encryption for Cloud Security." Journal of Cryptographic Engineering, vol. 10, no. 1, 2021, pp. 12–28
Published
Issue
Section
License
Copyright (c) -1 Saurabh M Tiwari (Author)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.