{"title":"Multi-Tenant IaaS Cloud Security Evaluation Model","authors":"Jasmine Sharon S, S. Nagasundaram","doi":"10.48175/ijetir-1234","DOIUrl":null,"url":null,"abstract":"Tenants that rent computer resources to run sophisticated systems might benefit from increased resource flexibility provided by the infrastructure cloud (IaaS) service model. The user will thus be launched into virtual computers after completing the authentication procedure, where they will start the upload process to the cloud.Secure data access is offered by suggested system's implementation of virtual machines and key management.Session management and failed authentication are other key components of suggested solution. All facets of managing active sessions and handling user authentication fall under the purview of authentication and session management. The act of updating an account, changing a password, remembering a password, and other similar operations are examples of credential management functions that can compromise even the most robust authentication schemes.","PeriodicalId":341984,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"28 13","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Research in Science, Communication and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.48175/ijetir-1234","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Tenants that rent computer resources to run sophisticated systems might benefit from increased resource flexibility provided by the infrastructure cloud (IaaS) service model. The user will thus be launched into virtual computers after completing the authentication procedure, where they will start the upload process to the cloud.Secure data access is offered by suggested system's implementation of virtual machines and key management.Session management and failed authentication are other key components of suggested solution. All facets of managing active sessions and handling user authentication fall under the purview of authentication and session management. The act of updating an account, changing a password, remembering a password, and other similar operations are examples of credential management functions that can compromise even the most robust authentication schemes.