Fig 1 - uploaded by Pravallika Mannem
Content may be subject to copyright.
construction of the proposed model

construction of the proposed model

Source publication
Article
Full-text available
Cloud computing has been disrupting the way businesses work through an effective, and low-cost platform for delivering services and resources. However, as cloud computing is growing at a faster pace the complexity of administering and upkeep of such huge systems has become more complex. Time-consuming and resource-intensive tasks make repetitive op...

Similar publications

Article
Full-text available
Cloud computing has been disrupting the way businesses work through an effective, and low-cost platform for delivering services and resources. However, as cloud computing is growing at a faster pace the complexity of administering and upkeep of such huge systems has become more complex. Time-consuming and resource-intensive tasks make repetitive op...

Citations

... However, this shared infrastructure poses unique privacy and security challenges, as data from different tenants coexist within the same virtual and physical spaces. In such settings, data breaches, unauthorized access, and inference attacks become real risks, as data belonging to different users can potentially be accessed or inferred by others [10]. ...
Article
Full-text available
Security and specifically data privacy remains a big concern especially in multi tenancy since it brings resource sharing that exposes environment to more security threats such as hacking. Standard data protection techniques provide security measures but are not efficient in dealing with new and complex threats, such as between inhabitant's data leakage. This paper presents a privacy-preserving framework that uses data fragmentation, multi-cloud distribution, and management control through an intermediary entity known as a trusted proxy. Storing such data in segments across the different CSPs means that none of the CSP has complete access to the dataset, improving on the data privacy, reliability, and solidity. The experimentation proves that the framework optimizes privacy and throughput by outperforming a comparable solution targeting privacy-sensitive, multi-tenant systems.