To see the other types of publications on this topic, follow the link: Multi-Tenant Cloud Environments.

Journal articles on the topic 'Multi-Tenant Cloud Environments'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Multi-Tenant Cloud Environments.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ratnangi, Nirek. "Improving Data Privacy and Compliance in ERP Systems using Linux VMs in Multi-Tenant Cloud Environments." European Journal of Advances in Engineering and Technology 9, no. 7 (2022): 87–89. https://doi.org/10.5281/zenodo.13919438.

Full text
Abstract:
The adoption of Enterprise Resource Planning (ERP) systems in multi-tenant cloud environments has brought significant operational efficiency. However, it also presents challenges related to data privacy and compliance. This paper explores the use of Linux-based Virtual Machines (VMs) as a solution to enhance data privacy and ensure compliance with regulations in multi-tenant cloud environments. The study focuses on leveraging the inherent security features of Linux and virtualization techniques to isolate data and enforce compliance across different tenants. The findings suggest that Linux VMs
APA, Harvard, Vancouver, ISO, and other styles
2

Syed, Ashraf. "Performance Analysis of Oracle APEX Applications in Multi-Tenant Cloud Environments." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–9. https://doi.org/10.55041/isjem03278.

Full text
Abstract:
The rapid adoption of multi-tenant cloud environments has transformed how enterprises deploy database- driven applications, offering cost efficiency and streamlined management. Oracle Application Express (APEX), a leading low-code platform integrated with Oracle Database, is increasingly utilized in such setups to develop scalable web applications. This paper investigates the performance of APEX applications within multi-tenant cloud environments, leveraging Oracle Database Multitenant architecture. We configured a container database (CDB) hosting multiple pluggable databases (PDBs), each runn
APA, Harvard, Vancouver, ISO, and other styles
3

Saurabh Ashwinikumar Dave, Nanda Kishore Gannamneni, Bipin Gajbhiye, Raghav Agarwal, Shalu Jain, and Pandi Kirupa Gopalakrishna. "Designing Resilient Multi-Tenant Architectures in Cloud Environments." International Journal for Research Publication and Seminar 11, no. 4 (2020): 356–73. http://dx.doi.org/10.36676/jrps.v11.i4.1586.

Full text
Abstract:
The increasing demand for scalable and cost-effective cloud solutions has led to the widespread adoption of multi-tenant architectures, where multiple customers share a single instance of software while maintaining data isolation. However, designing resilient multi-tenant architectures poses significant challenges, particularly in ensuring reliability, security, and performance across diverse tenant workloads. This paper explores the key design principles and strategies essential for building resilient multi-tenant systems in cloud environments. We discuss the importance of fault tolerance, em
APA, Harvard, Vancouver, ISO, and other styles
4

Anila, Gogineni. "Isolation Techniques for Preventing Cascading Failures in Multi-Tenant Multi-Cluster Environments." International Journal of Leading Research Publication 5, no. 4 (2024): 1–11. https://doi.org/10.5281/zenodo.14769609.

Full text
Abstract:
This paper discusses measures that can be employed to avoid domino effects in multi-tenant, multi-cluster architecture that is common in contemporary cloud systems. This paper aims at reviewing logical, physical, resource, fault, and network isolation techniques with a view of ascertaining how they curb failure domino effects across tenants. These advanced techniques demonstrate the necessity and care to be taken while choosing and deploying these techniques so as to combine low error handling with system performance. Finally, some suggestions about distance semantics implementation for large-
APA, Harvard, Vancouver, ISO, and other styles
5

Djamal, Ziani, and Al-Muwayshir Ruba. "Improving Privacy and Security in Multi-Tenant Cloud ERP Systems." Advanced Computing: An International Journal (ACIJ) 8, no. 5 (2017): 01–15. https://doi.org/10.5121/acij.2017.8500.

Full text
Abstract:
This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following propo
APA, Harvard, Vancouver, ISO, and other styles
6

Djamal, Ziani, and Al-Muwayshir Ruba. "Improving Privacy and Security in Multi-Tenant Cloud ERP Systems." Advanced Computing: An International Journal (ACIJ) 8, no. 5 (2017): 01–15. https://doi.org/10.5121/acij.2017.8501.

Full text
Abstract:
This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following propo
APA, Harvard, Vancouver, ISO, and other styles
7

Reagan Panguraj, Antony Ronald. "Systematic Approach to Security Testing in Multi-Tenant Cloud Systems." International Journal of Multidisciplinary Research and Growth Evaluation. 6, no. 1 (2025): 2139–42. https://doi.org/10.54660/.ijmrge.2025.6.1.2139-2142.

Full text
Abstract:
The evolution of cloud computing requires immediate focus on security testing multi-tenant cloud systems. A security challenge emerges from the shared infrastructure that multi-tenant environments present when different users and organizations operate from the same system. The necessary elements for protecting sensitive data and maintaining system integrity include both data isolation along with access control and vulnerability management with continuous monitoring. Traditional security testing techniques struggle to handle the rapid resource handling processes typical of cloud platform deploy
APA, Harvard, Vancouver, ISO, and other styles
8

Pasupuleti, Murali Krishna. "Secure Multi-Tenant Cloud Storage with Homomorphic Encryption." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 362–71. https://doi.org/10.62311/nesx/rphcrcscrcec5.

Full text
Abstract:
Abstract: Multi-tenant cloud environments present significant security challenges, particularly when handling sensitive data for diverse clients. This study proposes a secure storage architecture utilizing homomorphic encryption (HE) to allow computations on encrypted data while preserving privacy and tenant isolation. The system integrates role-based access control and policy-driven query interfaces to ensure confidentiality and secure access. A simulated multi-tenant environment was used to evaluate performance, measuring latency, throughput, ciphertext overhead, and inter-tenant data leakag
APA, Harvard, Vancouver, ISO, and other styles
9

Malikireddy, Sai Kiran Reddy. "Securing Multi-Tenant Cloud Environments with Graph-Based Models." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–8. https://doi.org/10.55041/ijsrem16789.

Full text
Abstract:
Multi-tenant approaches like cloud computing are vulnerable because separate tenants share a single hardware and networking platform. Privacy, acquisition, and segregation/removal of data resources are big challenges that they face. As a result, the following security challenges can be mitigated by harnessing the fairly recent graph-based models that allow for a more logical depiction of tenants, resources, and services herein. This paper presents the use of graph theory in a multi-tenant cloud to enhance the cloud environments' security in terms of access control, anomalies, and risk measures
APA, Harvard, Vancouver, ISO, and other styles
10

Charan Shankar Kummarapurugu. "Role-based access control in cloud-native applications: Evaluating best practices for secure multi-tenant Kubernetes environments." World Journal of Advanced Research and Reviews 1, no. 2 (2019): 045–53. http://dx.doi.org/10.30574/wjarr.2019.1.2.0008.

Full text
Abstract:
As cloud-native applications grow in complexity and adoption, particularly within multi-tenant Kubernetes environ- ments, security and access control mechanisms are paramount. Role-Based Access Control (RBAC) is increasingly utilized as a critical security framework to manage permissions across users and services in these cloud-native platforms. However, implementing RBAC in Kubernetes presents unique challenges, especially in multi-tenant setups where robust access separation and efficient permission management are essential. This paper explores best practices for RBAC in multi-tenant Kuberne
APA, Harvard, Vancouver, ISO, and other styles
11

Ravikanth Reddy Gudipati. "Implementing a multi-tenant FIDO relying party server: Architecture, security, and scalability considerations." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 765–73. https://doi.org/10.30574/wjaets.2025.15.1.0304.

Full text
Abstract:
The transition to passwordless authentication using FIDO standards marks a transformative shift in modern security architecture, particularly in multi-tenant environments. This technical exploration delves into the comprehensive implementation considerations for building robust multi-tenant FIDO Relying Party (RP) servers. The content addresses key architectural components, including WebAuthn and CTAP protocol integration, database architecture models, tenant isolation strategies, and identity federation mechanisms. Critical security aspects, including cross-tenant protection and audit logging
APA, Harvard, Vancouver, ISO, and other styles
12

Ramanan Hariharan. "Zero Trust Security in Multi-Tenant Cloud Environments." Journal of Information Systems Engineering and Management 10, no. 45s (2025): 623–44. https://doi.org/10.52783/jisem.v10i45s.8899.

Full text
Abstract:
As more organizations move to use the multi-tenant cloud infrastructure, the perimeter-based security model is insufficient for the concept of zero-trust security states. Thatently, curing this complex environment, It has “never trust, always verify”. Completely contradicting the conventional models, Zero Trust continually promotes authentication and validation of every access request (inside or outside the network perimeter). As they try to understand how to protect the isolation of tenants, stop alteration movements, and support identity cross services, the paper investigates the challenges
APA, Harvard, Vancouver, ISO, and other styles
13

Rimal, Bhaskar Prasad, and Martin Maier. "Workflow Scheduling in Multi-Tenant Cloud Computing Environments." IEEE Transactions on Parallel and Distributed Systems 28, no. 1 (2017): 290–304. http://dx.doi.org/10.1109/tpds.2016.2556668.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Pasham, Sai Dikshit. "Graph-Based Models for Multi-Tenant Security in Cloud Computing." International Journal of Scientific Research and Management (IJSRM) 9, no. 08 (2021): 611–33. https://doi.org/10.18535/ijsrm/v9i08.ec02.

Full text
Abstract:
Multi-tenant cloud computing scenarios have a high level of security risks because tenants share the same hardware and network. Control of data privacy, access to resources and isolation of these resources pose a significant challenge. Therefore, the security challenges above can be addressed by employing the relatively new and exciting graph-based models that enable a more structured and reasoned representation of the relationships and interactions of tenants, resources, and services. In this paper, graph theory for managing multi-tenant cloud environments has been discussed to improve the se
APA, Harvard, Vancouver, ISO, and other styles
15

Yogeswara, Reddy Avuthu. "Policy-Driven Security in Multi-Tenant Cloud DevOps Platforms." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 8, no. 1 (2020): 1–13. https://doi.org/10.5281/zenodo.14059441.

Full text
Abstract:
Multi-tenant cloud DevOps platforms pose unique security challenges, requiring policies that ensure data isolation, secure access control, and continuous compliance. This pa- per explores policy-driven security frameworks and automation strategies for such platforms. Graphs are used to illustrate the role of policy-as-code, identity management, and compliance monitoring across multi-tenant environments.
APA, Harvard, Vancouver, ISO, and other styles
16

Sree Lakshmi Done and Dr. Siva Rama Krishna T. "A Survey on Hybrid Secure Key Management System (HSKMS) for Multi-Tenant Cloud Environments." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 78–84. https://doi.org/10.46647/ijetms.2025.v09si01.012.

Full text
Abstract:
In a multi-tenant cloud environment, cleanliness could be ensured by securely accessing and effectively keying information using different available ways and techniques. Because of existing challenges such as the security of sensitive data and key management in multi-tenant cloud environments, many traditional key management techniques face contention issues like inadequate scalability, single points of failures, and cyber threats. In this paper, we discuss this problem by diving into existing key management techniques available to secure sensitive data and present a robust, scalable, and priv
APA, Harvard, Vancouver, ISO, and other styles
17

Swati Yadav. "Enhancing Security in Multi-Tenant Cloud Environments: Threat Detection, Prevention, and Data Breach Mitigation." Journal of Information Systems Engineering and Management 10, no. 22s (2025): 61–72. https://doi.org/10.52783/jisem.v10i22s.3472.

Full text
Abstract:
Although multi-tenant cloud infrastructures are more cost-effective and scalable, they also raise serious security issues, especially with regard to insider threats and data breaches. The security and integrity of data are seriously threatened by these dangers, which come from authorised users. By examining potential insider threats, risk factors, and mitigation techniques, this study investigates the vulnerabilities present in multi-tenant cloud infrastructures. To improve cloud security, a multi-layered security architecture is suggested, incorporating enhanced access control mechanisms, beh
APA, Harvard, Vancouver, ISO, and other styles
18

Gannavarapu, Pramod. "Best Practices in Implementing Azure Entra Conditional Access for Multi-Tenant Environments." International journal of networks and security 05, no. 01 (2025): 118–46. https://doi.org/10.55640/ijns-05-01-08.

Full text
Abstract:
Azure Entra Conditional Access is a first-class security product that enforces identity and access management policies in multi-tenant environments to implement secure access to the most important resources. Azure Entra lets businesses manage user IDs, enhance the protections, and reduce risks on a hybrid cloud infrastructure through integration with Azure Active Directory. This article discusses the main features, practices, and benefits of Azure Entra Conditional Access that enable the application of granular security policies based on criteria, including user role, device compliance, locati
APA, Harvard, Vancouver, ISO, and other styles
19

Kiran, Kumar Voruganti. "Federated Machine Learning for Collaborative DevOps in Multi-Tenant Cloud Environments." Journal of Scientific and Engineering Research 7, no. 10 (2020): 230–38. https://doi.org/10.5281/zenodo.12666973.

Full text
Abstract:
Federated Machine Learning (FML) represents a transformative approach to collaborative DevOps, particularly within multi-tenant cloud environments. By enabling decentralized machine learning model training across various data sources without necessitating data centralization, FML enhances data privacy, security, and compliance, crucial aspects for multi-tenant cloud platforms. This research delves into the integration of FML within DevOps practices, highlighting its potential to address key challenges such as data security, model accuracy, and operational efficiency. Key findings from the stud
APA, Harvard, Vancouver, ISO, and other styles
20

Ritesh Kumar, Ritesh Kumar. "Multi-Tenant SaaS Architectures: Design Principles and Security Considerations." Journal of Software Engineering and Simulation 6, no. 5 (2020): 28–41. https://doi.org/10.35629/3795-06052841.

Full text
Abstract:
Multi-Tenant Software-as-a-Service (SaaS) architectures enable cost-efficient, scalable, and maintainable cloud-based applications. However, designing a secure multi-tenant system introduces challenges related to data isolation, access control, tenant resource management, and compliance. This paper explores key design principles for building secure and scalable multi-tenant SaaS applications, comparing database partitioning strategies (single-tenant vs. multi-tenant models) and isolation techniques (network, compute, and data security). Additionally, role-based access control (RBAC) and attrib
APA, Harvard, Vancouver, ISO, and other styles
21

Lokeshnath Kummara, Keerthi Reddy K, Ganesh D, Keerthana V, and Manideep Sai Y. "Secure Data Retrieval in Multi-Tenant Cloud Environment." international journal of engineering technology and management sciences 9, no. 2 (2025): 368–76. https://doi.org/10.46647/ijetms.2025.v09i02.045.

Full text
Abstract:
the increasing importance of cross-tenant keyword search in the fast tracks of cloud applications is aimed at perfecting their use of data. This introduces severe difficulties in terms of privacy and security, particularly in multi-tenant environments, wherein multiple owners of the data have to be considered. Most pre-existing solutions have been devised for single-tenancy systems, and they lack the ingredients for multi-tenancy. In this light, we propose a solution allowing secure keyword searching across tenants while respecting privacy concerns. Our paradigm will guarantee verifiability an
APA, Harvard, Vancouver, ISO, and other styles
22

Provelengios, George, Daniel Holcomb, and Russell Tessier. "Mitigating Voltage Attacks in Multi-Tenant FPGAs." ACM Transactions on Reconfigurable Technology and Systems 14, no. 2 (2021): 1–24. http://dx.doi.org/10.1145/3451236.

Full text
Abstract:
Recent research has exposed a number of security issues related to the use of FPGAs in embedded system and cloud computing environments. Circuits that deliberately waste power can be carefully crafted by a malicious cloud FPGA user and deployed to cause denial-of-service and fault injection attacks. The main defense strategy used by FPGA cloud services involves checking user-submitted designs for circuit structures that are known to aggressively consume power. Unfortunately, this approach is limited by an attacker’s ability to conceive new designs that defeat existing checkers. In this work, o
APA, Harvard, Vancouver, ISO, and other styles
23

Sharma, Anshul. "Secure Efficiency: Navigating Performance Challenges in Multi-Tenant Cloud Security Implementations." International Journal for Research in Applied Science and Engineering Technology 12, no. 9 (2024): 1307–18. http://dx.doi.org/10.22214/ijraset.2024.64311.

Full text
Abstract:
Multi-tenant cloud environments offer significant advantages in terms of cost-efficiency and scalability, but they also present unique challenges in balancing robust security measures with optimal performance. This article examines the intricate relationship between security implementations and system performance in shared cloud infrastructures. Through a comprehensive analysis of data isolation techniques, access control mechanisms, network security protocols, and threat detection systems, we identify key areas where security measures can impact performance metrics such as latency, throughput
APA, Harvard, Vancouver, ISO, and other styles
24

Anuj Harishkumar Chaudhari. "Multi-tenancy: Deep dive on how cloud platforms serve many users at once." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 394–403. https://doi.org/10.30574/wjarr.2025.26.2.1608.

Full text
Abstract:
This article provides a comprehensive exploration of multi-tenancy in cloud computing environments, examining how a single infrastructure efficiently serves multiple users while maintaining isolation. It explores the architectural foundations, implementation strategies, and operational considerations that make multi-tenancy the cornerstone of modern cloud platforms. Beginning with an examination of fundamental concepts, it contrasts multi-tenant and single-tenant models, highlighting the economic and operational advantages of shared architectures. It covers essential components including Kuber
APA, Harvard, Vancouver, ISO, and other styles
25

Rishi Kumar Sharma. "Multi-Tenant Architectures in Modern Cloud Computing: A Technical Deep Dive." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 307–17. https://doi.org/10.32628/cseit25111236.

Full text
Abstract:
This comprehensive article explores the evolution and implementation of multi-tenant architectures in modern cloud computing environments, focusing on their role in Software-as-a-Service solutions. The article examines how these architectures enable efficient resource sharing while maintaining strict data isolation among tenants. This article demonstrates how integrating AI-driven observability frameworks and advanced security mechanisms, such as IAM and KMS, can improve scalability by 70% and reduce operational costs by 60%, offering practical solutions to modern multi-tenant architecture cha
APA, Harvard, Vancouver, ISO, and other styles
26

Hashim, Wahidah, and Noor Al-Huda K. Hussein. "Securing Cloud Computing Environments: An Analysis of Multi-Tenancy Vulnerabilities and Countermeasures." SHIFRA 2024 (February 5, 2024): 9–17. http://dx.doi.org/10.70470/shifra/2024/002.

Full text
Abstract:
The rise of cloud computing has brought significant advancements in scalability, flexibility, and cost-efficiency, with multi-tenancy emerging as a core feature that allows multiple tenants to share the same physical infrastructure. However, this shared environment introduces serious security vulnerabilities, including data breaches, side-channel attacks, denial of service (DoS) attacks, and insecure APIs, all of which threaten the confidentiality, integrity, and availability of tenant data. The problem statement addressed in this study revolves around the challenge of securing multi-tenant en
APA, Harvard, Vancouver, ISO, and other styles
27

Researcher. "INNOVATIVE MULTI-TENANT ARCHITECTURES FOR WEB SERVICES WITH EMPHASIS ON PRIVACY PRESERVATION AND DATA ISOLATION." International Journal of Web Services (IJWS) 1, no. 1 (2025): 1–7. https://doi.org/10.5281/zenodo.14716959.

Full text
Abstract:
Multi-tenant architectures are increasingly pivotal in modern web services, enabling resource efficiency, scalability, and cost-effectiveness. However, achieving robust privacy preservation and data isolation in such environments remains a critical challenge. This paper explores innovative multi-tenant architectures with a focus on ensuring privacy and data isolation. By reviewing existing approaches and proposing new solutions, we highlight the benefits of context-aware partitioning, advanced encryption techniques, and tenant-level configurations to enhance security and compliance.
APA, Harvard, Vancouver, ISO, and other styles
28

Wu, Jing, Feng Zhi Zhao, and Yu Dan Dong. "Study on Cloud Data Destruction Mechanism and its Application." Applied Mechanics and Materials 477-478 (December 2013): 1487–90. http://dx.doi.org/10.4028/www.scientific.net/amm.477-478.1487.

Full text
Abstract:
The cloud data security is the primary concern users, especially in multi-tenant cloud environments residual data can cause data leakage problem, but most of the cloud service providers do not provide data processing residual solution. This study was designed HDFS multi-level security mechanisms and data destruction and data based on bidirectional heartbeat overwrite technology combined with the data from the destruction mechanism to ensure effective destruction of data under the premise of safety requirements and performance can be achieved demand balance.
APA, Harvard, Vancouver, ISO, and other styles
29

Chen, Hai Yan. "Design and Implement of a Computer Forensics Model for Cloud Environments." Applied Mechanics and Materials 599-601 (August 2014): 1848–51. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1848.

Full text
Abstract:
With the maturing and wide application of cloud computing technology, there are more and more crimes in the environment of cloud computing, effective investigation of evidence against these crimes are extremely important and urgent. Because it features the characteristics of computing environment of virtual, mass storage, distribution of data, multi-tenant and so on, the cloud calculating sets an extremely hard condition for investigation of evidence. For this purpose, this paper presents a reference evidential model for cloud computing environments, and it also discusses the implement to the
APA, Harvard, Vancouver, ISO, and other styles
30

Kwon, Seokmin, and Hyokyung Bahn. "Enhanced Scheduling of AI Applications in Multi-Tenant Cloud Using Genetic Optimizations." Applied Sciences 14, no. 11 (2024): 4697. http://dx.doi.org/10.3390/app14114697.

Full text
Abstract:
The artificial intelligence (AI) industry is increasingly integrating with diverse sectors such as smart logistics, FinTech, entertainment, and cloud computing. This expansion has led to the coexistence of heterogeneous applications within multi-tenant systems, presenting significant scheduling challenges. This paper addresses these challenges by exploring the scheduling of various machine learning workloads in large-scale, multi-tenant cloud systems that utilize heterogeneous GPUs. Traditional scheduling strategies often struggle to achieve satisfactory results due to low GPU utilization in t
APA, Harvard, Vancouver, ISO, and other styles
31

Ritesh Kumar, Ritesh Kumar. "Cloud Cybersecurity: Navigating Evolving Threats and Architecting Resilient Defenses." Journal of Software Engineering and Simulation 8, no. 8 (2022): 21–29. https://doi.org/10.35629/3795-08082129.

Full text
Abstract:
The rapid adoption of cloud computing has revolutionized enterprise architectures, introducing new and evolving cybersecurity challenges. As organizations increasingly migrate to cloud-based infrastructures, traditional security models are proving inadequate against emerging threats targeting cloud workloads, APIs, and identity management systems. Misconfigurations, supply chain vulnerabilities, ransomware-as-a-service, and zero-day exploits are being actively leveraged by attackers to exploit weaknesses in multi-tenant environments. Additionally, the complexity of hybrid and multi-cloud deplo
APA, Harvard, Vancouver, ISO, and other styles
32

Researcher. "OPTIMIZING MULTI-TENANT SD-WAN DEPLOYMENTS: AN INTEGRATED APPROACH TO SECURITY, PERFORMANCE, AND REGULATORY COMPLIANCE." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 1467–81. https://doi.org/10.5281/zenodo.14506771.

Full text
Abstract:
<em>The widespread adoption of Software-Defined Wide Area Networks (SD-WAN) has led to multi-tenant cloud-hosted deployments, presenting unique challenges in balancing security, performance, and regulatory compliance. This article presents a comprehensive framework for addressing these challenges through empirical analysis of implementations across diverse enterprise environments. The article examines critical security considerations, including data isolation, access control management, and shared infrastructure risks, while proposing robust mitigation strategies through network segmentation a
APA, Harvard, Vancouver, ISO, and other styles
33

Sreenu, Maddipudi. "The Future of Data Separation in Cloud: Ensuring Compliance and Security in Critical Sectors." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 2 (2022): 1–6. https://doi.org/10.5281/zenodo.14540961.

Full text
Abstract:
As organizations increasingly migrate their critical workloads to cloud environments, ensuring the separation of data for compliance, security, and operational reasons becomes paramount. This is especially true for industries that deal with sensitive, regulated, or mission-critical data, such as healthcare, finance, energy, and government sectors. This paper explores the future of data separation in cloud environments, focusing on the technologies, strategies, and challenges involved in maintaining stringent compliance standards and robust security measures. By leveraging emerging tools, techn
APA, Harvard, Vancouver, ISO, and other styles
34

Serdіuk, Nataliіa, and Maksym Volgust. "EFFICIENT MANAGEMENT OF BIG DATA IN SMART MANUFACTURING THROUGH MULTI-TENANT CLOUD SYSTEMS." Problems of Modeling and Design Automatization 1, no. 21 (2025): 39–44. https://doi.org/10.31474/2074-7888-2025-1-21-39-44.

Full text
Abstract:
The article explores the use of multitenant architecture in cloud information systems for intelligent continuous production. It examines the role of multitenancy in ensuring efficient management of large data volumes and optimizing computational resources. The advantages of implementing multitenant architecture for simultaneously serving multiple clients while ensuring data isolation and stable system performance are highlighted. A detailed system architecture is proposed, utilizing application containerization through Docker and orchestration with Kubernetes. The process of integration with c
APA, Harvard, Vancouver, ISO, and other styles
35

Al-Jody, Taha, Hamza Aagela, and Violeta Holmes. "Inspiring the Next Generation of HPC Engineers with Reconfigurable, Multi-Tenant Resources for Teaching and Research." Sustainability 13, no. 21 (2021): 11782. http://dx.doi.org/10.3390/su132111782.

Full text
Abstract:
There is a tradition at our university for teaching and research in High Performance Computing (HPC) systems engineering. With exascale computing on the horizon and a shortage of HPC talent, there is a need for new specialists to secure the future of research computing. Whilst many institutions provide research computing training for users within their particular domain, few offer HPC engineering and infrastructure-related courses, making it difficult for students to acquire these skills. This paper outlines how and why we are training students in HPC systems engineering, including the technol
APA, Harvard, Vancouver, ISO, and other styles
36

Miguel Alvarez. "Autonomous CPU Resource Allocation in Cloud Environments Using Reinforcement Learning." Frontiers in Artificial Intelligence Research 2, no. 2 (2025): 167–74. https://doi.org/10.71465/fair279.

Full text
Abstract:
Efficient CPU resource allocation is essential for optimizing performance and cost in cloud environments, where workloads are dynamic and multi-tenant applications demand real-time adaptability. Traditional allocation strategies rely on static heuristics or rule-based scheduling, which often fail to scale or generalize under rapidly changing conditions. This paper proposes an autonomous CPU resource allocation framework based on reinforcement learning (RL), which dynamically learns optimal allocation policies by interacting with the cloud environment. We present a model-free deep reinforcement
APA, Harvard, Vancouver, ISO, and other styles
37

Nagaraj Parvatha. "Securing multi-tenant cloud platforms during global crises: A zero trust approach." International Journal of Science and Research Archive 1, no. 1 (2020): 123–32. https://doi.org/10.30574/ijsra.2020.1.1.0017.

Full text
Abstract:
Scalable, cost-effective solutions are offered by multi-tenant cloud platforms, but they are plagued by enormous security issues, especially in the face of emerging global crises like pandemics or geopolitical wars. This work focuses on how the Zero Trust security model can be deployed to tackle vulnerabilities in such environments such as unauthorized access, privilege escalation, or insider threats. Through a methodology that blends theoretical analysis with architectural modeling and case study evaluations, the study shows how Zero Trust principles — continuous verification, least privilege
APA, Harvard, Vancouver, ISO, and other styles
38

Bernardi, Mario Luca, Marta Cimitile, and Francesco Mercaldo. "Cross-Organisational Process Mining in Cloud Environments." Journal of Information & Knowledge Management 17, no. 02 (2018): 1850014. http://dx.doi.org/10.1142/s0219649218500144.

Full text
Abstract:
Cloud computing market is continually growing in the last years and becoming a new opportunity for business for private and public organisations. The diffusion of multi-tenants distributed systems accessible by clouds leads to the birth of some cross-organisational environments, increasing the organisation efficiency, promoting the business dynamism and reducing the costs. In spite of these advantages, this new business model drives the interest of researchers and practitioners through new critical issues. First of all, the multi-tenant distributed systems need new techniques to improve the tr
APA, Harvard, Vancouver, ISO, and other styles
39

Srinivas Kolluri. "Unified Identity Management in the Cloud: SAP IAS Integration with SAP BTP." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 662–70. https://doi.org/10.32996/jcsts.2025.7.5.73.

Full text
Abstract:
SAP Identity Authentication Service (IAS) integration with SAP Business Technology Platform (BTP) provides enterprise-grade identity management for distributed cloud environments. Built on SAP NetWeaver AS ABAP infrastructure, the solution delivers secure authentication, authorization, and identity governance through standardized protocols and security controls. The integration framework enables unified access management across cloud and on-premise applications through sophisticated token management, policy enforcement, and audit mechanisms. The implementation supports diverse authentication m
APA, Harvard, Vancouver, ISO, and other styles
40

Abhishek Das, Sivaprasad Nadukuru, Saurabh Ashwini kumar Dave, Om Goel, Prof.(Dr.) Arpit Jain, and Dr. Lalit Kumar. "N Optimizing Multi-Tenant DAG Execution Systems for High-Throughput Inference." Darpan International Research Analysis 12, no. 3 (2024): 1007–36. http://dx.doi.org/10.36676/dira.v12.i3.139.

Full text
Abstract:
In large-scale data processing and machine learning systems, Directed Acyclic Graphs (DAGs) serve as the backbone for orchestrating complex workflows that involve multiple dependent stages. Multi-tenant DAG execution systems are increasingly being used to handle concurrent workloads from multiple users and applications. However, these systems face significant challenges when it comes to achieving high-throughput inference, particularly in shared environments where resource contention, scheduling efficiency, and tenant isolation become critical concerns. High-throughput inference is a necessity
APA, Harvard, Vancouver, ISO, and other styles
41

Rahul Singh Thakur. "Multi-Tenant Log Search: Designing for Cost-Effectiveness and Performance at Scale." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 854–61. https://doi.org/10.32996/jcsts.2025.7.4.99.

Full text
Abstract:
This article presents a novel architecture for multi-tenant log search systems that addresses the critical challenges of cost efficiency and performance at scale. As organizations deploy increasingly complex distributed systems, the ability to efficiently query and analyze logs becomes essential for maintaining operational reliability. Traditional log search solutions face significant restrictions when scaled to multi-tenant environments, particularly regarding resource efficiency, performance isolation, and cost sustainability. The architecture proposed here employs a comprehensive approach t
APA, Harvard, Vancouver, ISO, and other styles
42

Et.al, Ahmad Faiz Ghazali. "A Survey of Malware Risk Detection Techniques in Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 868–76. http://dx.doi.org/10.17762/turcomat.v12i3.797.

Full text
Abstract:
This article aims to contribute in securing information technology (IT) systems and processes for information security by utilizing malware risk detection for decision-making processes to mitigate cyber-attacks. It has potential to be a real threat to the businesses and industrial applications. The risk management is an essential component where it can present a new information security model for supporting decision making. The current ideologies such as the anti-virus, malware and firewalls detection and protection are proving to be ineffective as they were not specifically designed for multi
APA, Harvard, Vancouver, ISO, and other styles
43

Kiran, Kumar Voruganti. "AI-Enhanced Continuous Feedback Loops for Optimizing DevOps Pipelines in Cloud Environments." Journal of Scientific and Engineering Research 11, no. 5 (2024): 249–57. https://doi.org/10.5281/zenodo.12666943.

Full text
Abstract:
The integration of AI-enhanced continuous feedback loops within DevOps pipelines presents a transformative approach to optimizing cloud environments. This research explores the application of advanced machine learning algorithms to automate and refine the iterative processes fundamental to DevOps, enhancing deployment speed, system reliability, and operational efficiency. By leveraging AI for real-time analytics and automated decision-making, the study addresses critical challenges such as resource allocation, anomaly detection, and predictive maintenance. The proposed framework incorporates e
APA, Harvard, Vancouver, ISO, and other styles
44

Chidera Ogeawuchi, Jeffrey, Abel Chukwuemeke Uzoka, Abraham Ayodeji Abayomi, Oluwademilade Aderemi Agboola, Toluwase Peter Gbenle, and Samuel Owoade. "Advancements in Scalable Data Modeling and Reporting for SaaS Applications and Cloud Business Intelligence." International Journal of Advanced Multidisciplinary Research and Studies 4, no. 6 (2024): 2155–62. https://doi.org/10.62225/2583049x.2024.4.6.4267.

Full text
Abstract:
As Software-as-a-Service (SaaS) applications and cloud-based Business Intelligence (BI) platforms proliferate across industries, the demand for scalable, responsive, and intelligent data modeling and reporting solutions has become paramount. This paper presents a comprehensive conceptual and technical exploration of scalable data architectures and reporting mechanisms tailored for SaaS ecosystems and cloud-native BI environments. It begins by contextualizing the rise of multi-tenant cloud systems and outlines the need for resilient data modeling practices that balance extensibility with operat
APA, Harvard, Vancouver, ISO, and other styles
45

Naman Kumar Verma. "Security Analysis in Cloud." Journal of Information Systems Engineering and Management 10, no. 43s (2025): 359–72. https://doi.org/10.52783/jisem.v10i43s.8378.

Full text
Abstract:
Cloud computing has reformed the businesses ways and provides the facilities to the people to store, get, and handle information by providing scalable and flexible computing resources. However, the rapid adoption of cloud services has introduced the security challenges that cause noteworthy dangers for confidentiality, integrity, and availability of sensitive information. These challenges include issues such as data breaches, loss of control over data, insecure interfaces and APIs, account hijacking, and inadequate access controls. Additionally, the multi-tenant environment of the cloud enviro
APA, Harvard, Vancouver, ISO, and other styles
46

Bouacha, Manal, and Hanae Sbai. "Business-IT Alignment in Cloud environment Proposed Framework." ITM Web of Conferences 52 (2023): 02006. http://dx.doi.org/10.1051/itmconf/20235202006.

Full text
Abstract:
Nowadays, business process reuse is becoming a trendy topic in the enterprise as well as in scientific research to reduce the cost and time of process development for the benefit of the enterprise. Moreover, with the emergence of cloud environments and the various advantageous and competitive aspects of cloud computing, it becomes necessary to develop non-installable or so-called multi-tenant applications. In this sense, BPM researchers are working on improving the BPaaS (Business Process as Service) model, which enables business processes to be managed in the context of the cloud. However, th
APA, Harvard, Vancouver, ISO, and other styles
47

Almanasir, Rasha, Deyaa Al-solomon, Saif Indrawes, Mohammed Amin Almaiah, Umar Islam, and Marwan Alshar'e. "Classification of threats and countermeasures of cloud computing." Journal of Cyber Security and Risk Auditing 2025, no. 2 (2025): 27–42. https://doi.org/10.63180/jcsra.thestap.2025.2.3.

Full text
Abstract:
This article focuses on the study of cloud computing, it’s various models, and cloud service types such as SaaS, PaaS, and IaaS. It emphasizes the security challenges and cyber threats associated with cloud environments, while also proposing methods and solutions to protect these systems. The study underlines the advantages of cloud computing in offering rapid, cost-effective access to technology and services, but also points out the vulnerabilities of multi-tenant architectures and the need for robust security measures to address these risks. Additionally, the article presents a detailed anal
APA, Harvard, Vancouver, ISO, and other styles
48

Karthikeyan S and Thenmozhi N. "Fortifying the Cloud: Navigating Data Security Challenges and Pioneering Future-Ready Solutions." International Research Journal on Advanced Science Hub 6, no. 10 (2024): 277–301. http://dx.doi.org/10.47392/irjash.2024.039.

Full text
Abstract:
Cloud computing has transformed data storage, management, and processing, offering scalability, flexibility, and cost-efficiency. However, it presents significant security challenges. This paper examines critical data security elements in cloud computing, with a focus on maintaining confidentiality, integrity, and availability. Current security mechanisms, including encryption, identity management, firewalls, and intrusion detection, are reviewed alongside their limitations in multi-tenant environments, insecure APIs, and insider threats. Network challenges are addressed, particularly the inte
APA, Harvard, Vancouver, ISO, and other styles
49

Amaan Javed. "Driving innovation through experimentation: Empowering human-AI collaboration in multi-tenant customer care platforms." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1259–70. https://doi.org/10.30574/wjaets.2025.15.3.1033.

Full text
Abstract:
Generative AI is rapidly transforming enterprise systems, particularly in multi-tenant customer care platforms, creating an urgent need for systematic evaluation methodologies. This article introduces a reusable framework for conducting GenAI experimentation in cloud-native environments, addressing the limitations of traditional A/B testing when applied to non-deterministic AI systems. The framework extends conventional approaches by incorporating business-relevant metrics, deterministic cohort assignment strategies, and tenant-aware analysis capabilities that capture the multidimensional impa
APA, Harvard, Vancouver, ISO, and other styles
50

Shiksha, Rout. "Auditing Change Management in Cloud Computing Environments: New Challenges and Solutions." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–9. https://doi.org/10.5281/zenodo.14065115.

Full text
Abstract:
Cloud computing environments have revolutionized the way organizations operate, offering scalability, flexibility, and cost-efficiency. They also introduce unique challenges to change management auditing, which can impact security, compliance, and overall IT governance. Traditional change management practices are often insufficient due to the dynamic, multi-tenant, and geographically dispersed nature of cloud environments. Key challenges include lack of visibility into service providers internal controls, complex data sovereignty requirements, and dependency on vendor-driven updates. Additiona
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!