Reconciling security and functional requirements in multi-Tenant clouds

Ghassan O. Karame, Matthias Neugschwandtner, Melek Önen, Hubert Ritzdorf

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    End-To-end security in the cloud has gained even more importance after the outbreak of data breaches and massive surveillance programs around the globe last year. While the community features a number of cloud-based security mechanisms, existing solutions either provide security at the expense of the economy of scale and cost effectiveness of the cloud (i.e., at the expense of resource sharing and deduplication techniques), or they meet the latter objectives at the expense of security (e.g., the customer is required to fully trust the provider). In this paper, we shed light on this problem, and we analyze the challenges in reconciling security and functional requirements in existing multi-Tenant clouds. We also explore the solution space to effectively enhance the current security offerings of existing cloud storage services. As far as we are aware, this is the first contribution which comprehensively explores possible avenues for reconciling the current cloud trends with end-To-end security requirements.

    Original languageEnglish
    Title of host publicationSCC 2017 - Proceedings of the 5th ACM International Workshop on Security in Cloud Computing, co-located with ASIA CCS 2017
    PublisherAssociation for Computing Machinery, Inc
    Pages11-18
    Number of pages8
    ISBN (Electronic)9781450349703
    DOIs
    Publication statusPublished - 2 Apr 2017
    Event5th ACM International Workshop on Security in Cloud Computing, SCC 2017 - Abu Dhabi, United Arab Emirates
    Duration: 2 Apr 2017 → …

    Other

    Other5th ACM International Workshop on Security in Cloud Computing, SCC 2017
    Country/TerritoryUnited Arab Emirates
    CityAbu Dhabi
    Period2/04/17 → …

    Keywords

    • Cloud security
    • Multi-Tenancy
    • Resource isolation
    • Secure dedu- plication
    • Shared ownership

    Fingerprint

    Dive into the research topics of 'Reconciling security and functional requirements in multi-Tenant clouds'. Together they form a unique fingerprint.

    Cite this