JOURNAL ARTICLE

Graph-Based Models for Multi-Tenant Security in Cloud Computing

Sai Dikshit Pasham

Year: 2021 Journal:   International Journal of Scientific Research and Management (IJSRM) Vol: 9 (08)Pages: 611-633

Abstract

Multi-tenant cloud computing scenarios have a high level of security risks because tenants share the same hardware and network. Control of data privacy, access to resources and isolation of these resources pose a significant challenge. Therefore, the security challenges above can be addressed by employing the relatively new and exciting graph-based models that enable a more structured and reasoned representation of the relationships and interactions of tenants, resources, and services. In this paper, graph theory for managing multi-tenant cloud environments has been discussed to improve the security of the cloud environments through the sophisticated control of access, detection of anomalies, and risk assessments. These transformed cloud resources and tenant interaction can be modeled by graphs to build security models that are effective in monitoring risks, detecting pre-identified abnormalities and controlling for them where necessary. Further, the paper presents different graph-based approaches and methods including graph search, community identification and machine learning for anomaly detection for enhancing security of multi-tenanted cloud environments. These models prove to be useful for avoiding cross-tenancy data breaches, framework invasions, and battles for ambitious resources through realistic cases and concrete examples from VM deployment. The work also expresses the limitations of scaling, privacy issues, and compatibility with traditional security models as well as potential research areas considering the combination with AI and blockchain. In conclusion, graph-based models provide a rather sound approach to providing the specific multi-tenant security in the cloud, further developments of which will be crucial to the further improvement of cloud security.

Keywords:
Cloud computing Computer science Graph Cloud computing security Computer security Distributed computing Theoretical computer science Operating system

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.23
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Graph Theory and Algorithms
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cloud Computing and Resource Management
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Securing Multi-Tenant Cloud Environments with Graph-Based Models

Sai Kiran Reddy Malikireddy

Journal:   INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT Year: 2024 Vol: 08 (12)Pages: 1-8
JOURNAL ARTICLE

Controlled Intelligent Agents' Security Model for Multi-Tenant Cloud Computing Infrastructures

Howard J. HamiltonHadi Alasti

Journal:   International Journal of Grid and High Performance Computing Year: 2017 Vol: 9 (1)Pages: 1-13
JOURNAL ARTICLE

Collaborative network security in multi-tenant data center for cloud computing

Zhen ChenWenyu DongHang LiPeng ZhangXinming ChenJunwei Cao

Journal:   Tsinghua Science & Technology Year: 2014 Vol: 19 (1)Pages: 82-94
© 2026 ScienceGate Book Chapters — All rights reserved.