Academic literature on the topic 'Multi-Tenant Cloud Environments'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multi-Tenant Cloud Environments.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Multi-Tenant Cloud Environments"

1

Ratnangi, Nirek. "Improving Data Privacy and Compliance in ERP Systems using Linux VMs in Multi-Tenant Cloud Environments." European Journal of Advances in Engineering and Technology 9, no. 7 (2022): 87–89. https://doi.org/10.5281/zenodo.13919438.

Full text
Abstract:
The adoption of Enterprise Resource Planning (ERP) systems in multi-tenant cloud environments has brought significant operational efficiency. However, it also presents challenges related to data privacy and compliance. This paper explores the use of Linux-based Virtual Machines (VMs) as a solution to enhance data privacy and ensure compliance with regulations in multi-tenant cloud environments. The study focuses on leveraging the inherent security features of Linux and virtualization techniques to isolate data and enforce compliance across different tenants. The findings suggest that Linux VMs
APA, Harvard, Vancouver, ISO, and other styles
2

Syed, Ashraf. "Performance Analysis of Oracle APEX Applications in Multi-Tenant Cloud Environments." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–9. https://doi.org/10.55041/isjem03278.

Full text
Abstract:
The rapid adoption of multi-tenant cloud environments has transformed how enterprises deploy database- driven applications, offering cost efficiency and streamlined management. Oracle Application Express (APEX), a leading low-code platform integrated with Oracle Database, is increasingly utilized in such setups to develop scalable web applications. This paper investigates the performance of APEX applications within multi-tenant cloud environments, leveraging Oracle Database Multitenant architecture. We configured a container database (CDB) hosting multiple pluggable databases (PDBs), each runn
APA, Harvard, Vancouver, ISO, and other styles
3

Saurabh Ashwinikumar Dave, Nanda Kishore Gannamneni, Bipin Gajbhiye, Raghav Agarwal, Shalu Jain, and Pandi Kirupa Gopalakrishna. "Designing Resilient Multi-Tenant Architectures in Cloud Environments." International Journal for Research Publication and Seminar 11, no. 4 (2020): 356–73. http://dx.doi.org/10.36676/jrps.v11.i4.1586.

Full text
Abstract:
The increasing demand for scalable and cost-effective cloud solutions has led to the widespread adoption of multi-tenant architectures, where multiple customers share a single instance of software while maintaining data isolation. However, designing resilient multi-tenant architectures poses significant challenges, particularly in ensuring reliability, security, and performance across diverse tenant workloads. This paper explores the key design principles and strategies essential for building resilient multi-tenant systems in cloud environments. We discuss the importance of fault tolerance, em
APA, Harvard, Vancouver, ISO, and other styles
4

Anila, Gogineni. "Isolation Techniques for Preventing Cascading Failures in Multi-Tenant Multi-Cluster Environments." International Journal of Leading Research Publication 5, no. 4 (2024): 1–11. https://doi.org/10.5281/zenodo.14769609.

Full text
Abstract:
This paper discusses measures that can be employed to avoid domino effects in multi-tenant, multi-cluster architecture that is common in contemporary cloud systems. This paper aims at reviewing logical, physical, resource, fault, and network isolation techniques with a view of ascertaining how they curb failure domino effects across tenants. These advanced techniques demonstrate the necessity and care to be taken while choosing and deploying these techniques so as to combine low error handling with system performance. Finally, some suggestions about distance semantics implementation for large-
APA, Harvard, Vancouver, ISO, and other styles
5

Djamal, Ziani, and Al-Muwayshir Ruba. "Improving Privacy and Security in Multi-Tenant Cloud ERP Systems." Advanced Computing: An International Journal (ACIJ) 8, no. 5 (2017): 01–15. https://doi.org/10.5121/acij.2017.8500.

Full text
Abstract:
This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following propo
APA, Harvard, Vancouver, ISO, and other styles
6

Djamal, Ziani, and Al-Muwayshir Ruba. "Improving Privacy and Security in Multi-Tenant Cloud ERP Systems." Advanced Computing: An International Journal (ACIJ) 8, no. 5 (2017): 01–15. https://doi.org/10.5121/acij.2017.8501.

Full text
Abstract:
This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following propo
APA, Harvard, Vancouver, ISO, and other styles
7

Reagan Panguraj, Antony Ronald. "Systematic Approach to Security Testing in Multi-Tenant Cloud Systems." International Journal of Multidisciplinary Research and Growth Evaluation. 6, no. 1 (2025): 2139–42. https://doi.org/10.54660/.ijmrge.2025.6.1.2139-2142.

Full text
Abstract:
The evolution of cloud computing requires immediate focus on security testing multi-tenant cloud systems. A security challenge emerges from the shared infrastructure that multi-tenant environments present when different users and organizations operate from the same system. The necessary elements for protecting sensitive data and maintaining system integrity include both data isolation along with access control and vulnerability management with continuous monitoring. Traditional security testing techniques struggle to handle the rapid resource handling processes typical of cloud platform deploy
APA, Harvard, Vancouver, ISO, and other styles
8

Pasupuleti, Murali Krishna. "Secure Multi-Tenant Cloud Storage with Homomorphic Encryption." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 362–71. https://doi.org/10.62311/nesx/rphcrcscrcec5.

Full text
Abstract:
Abstract: Multi-tenant cloud environments present significant security challenges, particularly when handling sensitive data for diverse clients. This study proposes a secure storage architecture utilizing homomorphic encryption (HE) to allow computations on encrypted data while preserving privacy and tenant isolation. The system integrates role-based access control and policy-driven query interfaces to ensure confidentiality and secure access. A simulated multi-tenant environment was used to evaluate performance, measuring latency, throughput, ciphertext overhead, and inter-tenant data leakag
APA, Harvard, Vancouver, ISO, and other styles
9

Malikireddy, Sai Kiran Reddy. "Securing Multi-Tenant Cloud Environments with Graph-Based Models." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–8. https://doi.org/10.55041/ijsrem16789.

Full text
Abstract:
Multi-tenant approaches like cloud computing are vulnerable because separate tenants share a single hardware and networking platform. Privacy, acquisition, and segregation/removal of data resources are big challenges that they face. As a result, the following security challenges can be mitigated by harnessing the fairly recent graph-based models that allow for a more logical depiction of tenants, resources, and services herein. This paper presents the use of graph theory in a multi-tenant cloud to enhance the cloud environments' security in terms of access control, anomalies, and risk measures
APA, Harvard, Vancouver, ISO, and other styles
10

Charan Shankar Kummarapurugu. "Role-based access control in cloud-native applications: Evaluating best practices for secure multi-tenant Kubernetes environments." World Journal of Advanced Research and Reviews 1, no. 2 (2019): 045–53. http://dx.doi.org/10.30574/wjarr.2019.1.2.0008.

Full text
Abstract:
As cloud-native applications grow in complexity and adoption, particularly within multi-tenant Kubernetes environ- ments, security and access control mechanisms are paramount. Role-Based Access Control (RBAC) is increasingly utilized as a critical security framework to manage permissions across users and services in these cloud-native platforms. However, implementing RBAC in Kubernetes presents unique challenges, especially in multi-tenant setups where robust access separation and efficient permission management are essential. This paper explores best practices for RBAC in multi-tenant Kuberne
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Multi-Tenant Cloud Environments"

1

Li, I.-Wei, and 李羿葦. "A SLA-aware Multi-Tiered Storage Structure for Multi-tenant Cloud Computing Environments." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/88673900325772995711.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學與工程學系<br>104<br>In recent decades, due to the lower hardware and maintenance cost, shared storage system is widely adopted by data centers and cloud storage providers. In order to ensure the provided quality of the shared storage services, the service providers of shared storage systems thus set a service-level objectives (SLOs) to describe the provided quality of service for their tenants. Besides, recently, multi-tiered storage systems extends the storage hierarchy to include solid-state disks (SSDs) as an intermediate tier between main memory and mechanical disks, that i
APA, Harvard, Vancouver, ISO, and other styles
2

Flora, José Eduardo Ferreira. "Container-level Intrusion detection for multi-tenant environments." Master's thesis, 2019. http://hdl.handle.net/10316/88108.

Full text
Abstract:
Dissertação de Mestrado em Segurança Informática apresentada à Faculdade de Ciências e Tecnologia<br>A computação em nuvem fornece um serviço conveniente, on-demand, elástico e ubíquo, através de sistemas de virtualização de alto desempenho, entre outros recursos. Houve um crescimento no uso de containers nos últimos anos, mesmo em cenários críticos para o negócio. A sua instanciação leve, fácil e eficiente permite não apenas um uso elástico e on-demand de recursos, mas também uma administração facilitada. No entanto, a adoção de containers também aumenta os riscos de segurança agravados pelos
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Multi-Tenant Cloud Environments"

1

Beranek, Marek, Vladimir Kovar, and George Feuerlicht. "Framework for Management of Multi-tenant Cloud Environments." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94295-7_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moini, Shayan, George Provelengios, Daniel Holcomb, and Russell Tessier. "Countermeasures Against Voltage Attacks in Multi-tenant FPGAs." In Security of FPGA-Accelerated Cloud Computing Environments. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-45395-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bobda, Christophe, Joel Mandebi Mbongue, Sujan Kumar Saha, and Muhammed Kawser Ahmed. "Domain Isolation and Access Control in Multi-tenant Cloud FPGAs." In Security of FPGA-Accelerated Cloud Computing Environments. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-45395-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Somasundaram, Thamarai Selvi, Kannan Govindarajan, M. R. Rajagopalan, and S. Madhusudhana Rao. "A Broker Based Architecture for Adaptive Load Balancing and Elastic Resource Provisioning and Deprovisioning in Multi-tenant Based Cloud Environments." In Advances in Intelligent Systems and Computing. Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-0740-5_67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yadav, Anuj Kumar, M. L. Garg, and Ritika. "Security-Aware Efficient Multi-tenant Cloud Environment." In Algorithms for Intelligent Systems. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1620-7_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Raouf, Ahmed E. Abdel, Alshaimaa Abo-alian, and Nagwa L. Badr. "Towards Improvements on Multi-tenant RDBMS Migration in the Cloud Environment." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69717-4_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Thangavel M, Narmadha N, and Deepika B. "Sniffers Over Cloud Environment." In Critical Research on Scalability and Security Issues in Virtual Cloud Environments. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3029-9.ch006.

Full text
Abstract:
Cloud computing is a technology for complex computing, it eliminates the need to have computing hardware, storage space and software. Multi tenancy is considered as important element in which same resources will be shared by multiple users. The users are named as tenants in the cloud environment. The tenants may run their applications in their own cloud environment which will have some vulnerability. These vulnerabilities will cause some attacks to the tenant virtual machine. In general, the cloud providers will not provide that much security to the cloud tenants. So, it is the duty of the tenant to make some countermeasures to avoid these attacks. In a cloud environment, there may be multiple tenants in that there is a possible of malicious tenant also present in the cloud environment. The attacker will do sniffing attack by monitoring all the user traffic. In the cloud, it is a fact that all the user data will resides in same hardware so the attacker monitor the activities of all the user and observes the type of traffic.
APA, Harvard, Vancouver, ISO, and other styles
8

Rao, Anup Devangbhai. "Automated Device Management and Multi-Tenant Architecture." In Advances in Computational Intelligence and Robotics. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-3952-8.ch006.

Full text
Abstract:
Automated Device Management (ADM) and Multi-Tenant Architecture (MTA) are emerging as crucial enablers of scalable, efficient, and sustainable technology solutions. This chapter explores the integration of ADM with MTA to enhance resource optimization, energy efficiency, and cost-effectiveness in educational and sustainability-driven applications. By leveraging cloud-based automation, AI-driven monitoring, and IoT-enabled devices, institutions can achieve seamless provisioning, real-time analytics, and adaptive learning environments. The study highlights key challenges, including security, interoperability, and data privacy, while proposing innovative strategies for overcoming these barriers. A case study on educational technology adoption demonstrates the impact of ADM and MTA in creating inclusive, accessible, and sustainable digital learning ecosystems. The findings emphasize the role of automation and multi-tenancy in fostering a scalable, resilient infrastructure for education and sustainability.
APA, Harvard, Vancouver, ISO, and other styles
9

Sharma, Vijay Laxmi, Anita Yadav, and Amit Yadav. "Patenting Cloud-Based AI Inventions Legal and Regulatory Considerations." In Embracing the Cloud as a Business Essential. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-9581-3.ch012.

Full text
Abstract:
The implications of ownership and joint ownership in cloud environments, particularly in light of multi-tenant systems and open-source contributions, are discussed here. There is a focus on the roles that major organizations like the United States Patent and Trademark Office (USPTO), European Patent Office (EPO), and World Intellectual Property Organization (WIPO) play, as well as specific guidelines like the European Union Artificial Intelligence Act and executive orders issued by the United States on artificial intelligence. Furthermore, the chapter highlights the critical importance of data privacy regulations, such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), in the context of patenting cloud-based artificial intelligence inventions. Concerns pertaining to ethics, the possibility of patent trolls, and the overlap with trade secret protection are some of the challenges and risks that are associated with patenting in this rapidly changing environment.
APA, Harvard, Vancouver, ISO, and other styles
10

Hamilton, Howard, and Hadi Alasti. "Controlled Intelligent Agents' Security Model for Multi-Tenant Cloud Computing Infrastructures." In Cyber Security and Threats. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch025.

Full text
Abstract:
Data security in the cloud continues to be a huge concern. The adoption of cloud services continues to increase with more businesses transitioning from on premise technology infrastructures to outsourcing cloud-based infrastructures. As the cloud becomes more popular, users are increasingly demanding control over critical security elements of the data and technology assets that are in the cloud. In addition, there are still cries for greater data and security in the cloud. The goal of this paper is to provide cloud service users with greater control over data security in the cloud while at the same time optimizing overall security in the multi-tenant cloud computing environment. This paper introduces cloud-based intelligent agents that are configurable by the users and are expected to give greater compliance for data security in any of the cloud service models.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Multi-Tenant Cloud Environments"

1

Gali, Vinay Kumar, Sansar Singh Chauhan, Gopal Kumar Gupta, Padmini Rajendra Bulani, Vardhansinh Yogendrasinnh Ravalji, and Kumaresan Durvas Jayaraman. "Ensuring Data Integrity in Multi-Tenant Cloud Environments Through Advanced Testing." In 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT). IEEE, 2025. https://doi.org/10.1109/ce2ct64011.2025.10941416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pakević, Veljko, and Angelina Njeguš. "Intelligent Software Systems for Multi-Tenant Cloud Environments: Challenges and Solutions." In Sinteza 2025. Singidunum University, 2025. https://doi.org/10.15308/sinteza-2025-48-54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ponmalar, A., Rajkumar Pandiarajan, I. Sudha, P. S. Ramesh, and J. Jagannathan. "Securing Multi-Tenant Cloud Environments with Fully Homomorphically Encrypted Secure Multiparty Computation." In 2024 International Conference on Recent Advances in Science and Engineering Technology (ICRASET). IEEE, 2024. https://doi.org/10.1109/icraset63057.2024.10895974.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tyagi, Jayant, and Mayank Sharma. "Enhancing Privacy-Preserving Data Mining in Cloud-Based Data Warehouses: A Federated Learning Approach for Secure Multi-Tenant Environments." In 2025 IEEE 10th International Conference on Smart Cloud (SmartCloud). IEEE, 2025. https://doi.org/10.1109/smartcloud66068.2025.00016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maenhaut, Pieter-Jan, Hendrik Moens, Veerle Ongenae, and Filip De Turck. "Scalable user data management in multi-tenant cloud environments." In 2014 10th International Conference on Network and Service Management (CNSM). IEEE, 2014. http://dx.doi.org/10.1109/cnsm.2014.7014171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Kuai, Feng Wang, and Lin Gu. "Profiling-as-a-Service in Multi-tenant Cloud Computing Environments." In 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops). IEEE, 2012. http://dx.doi.org/10.1109/icdcsw.2012.88.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shanker, Bhawani, Amina Tufail, Chandradeep Bhatt, Keshav Kaushik, Ahthasham Sajid, and Inam Ullah Khan. "Advancing Survey on Multi-Tenant Cloud Environments: Challenges and Solutions." In 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS). IEEE, 2024. http://dx.doi.org/10.1109/iscs61804.2024.10581137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vicenzi, Julio Costella, Tiago Knorst, Michael G. Jordan, Guilherme Korol, Antonio Carlos Schneider Beck, and Mateus Beck Rutzig. "TRIPP: Transparent Resource Provisioning for Multi-Tenant CPU-GPU based Cloud Environments." In 2021 XI Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 2021. http://dx.doi.org/10.1109/sbesc53686.2021.9628223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Arumugam, Suganya, Brindha Mahendran, Prabhavathi Viswanathan, and Seema Rajesh. "A predictive analysis of virtual machine application efficiency in multi-tenant cloud environments." In INTERNATIONAL CONFERENCE ON GREEN COMPUTING FOR COMMUNICATION TECHNOLOGIES (ICGCCT – 2024). AIP Publishing, 2025. https://doi.org/10.1063/5.0263278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Altran, Luiz Fernando, Guilherme Galante, and Marcio Seiji Oyamada. "Label-affinity-Scheduler: Considering Business Requirements in Container Scheduling for Multi-Cloud and Multi-Tenant Environments." In 2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC). IEEE, 2022. http://dx.doi.org/10.1109/sbesc56799.2022.9964784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!