Search results for: tenancy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9

Search results for: tenancy

9 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 137
8 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device

Procedia PDF Downloads 417
7 A Comparative Analysis of Social Stratification in the Participation of Women in Agricultural Activity: A Case Study of District Khushab (Punjab) and D. I. Khan (KPK), Pakistan

Authors: Sohail Ahmad Umer

Abstract:

Since last few decades a question is raising on the subject of the importance of women in different societies of the world particularly in the developing societies of Asia and Africa. Female population constitutes almost 50% of the total population of the world and is playing a significant role in the economy with male population. In Pakistan, a developing country of Asia with majority of Muslim population, working women role is more focused. Women of rural background who are working as voluntary workers and their working hours are neither recorded nor recognized. Agricultural statistics shows that the female participation rate is below 40% while other sources claim them below 20%. Here in present study, another effort has been made to compare the women role in two different provinces of Pakistan to analyze the participation of women in agricultural activities like sowing, picking, irrigating the fields, harvesting and threshing of crops, caring and feeding of the animals, collecting the firewood and etc,as without these activities the farming would be incomplete. One hundred villages in the district Khushab (Punjab) and one hundred villages in district D.I.Khan (KPK) were selected and 33% of the families of each village have been interviewed to study their input in agriculture work. Another important feature is the social stratification therefore the contribution by different variables like the ownership, tenancy, education and caste has also been studied.

Keywords: caste, social stratification, tenancy, voluntary workers

Procedia PDF Downloads 361
6 Configuration as a Service in Multi-Tenant Enterprise Resource Planning System

Authors: Mona Misfer Alshardan, Djamal Ziani

Abstract:

Enterprise resource planning (ERP) systems are the organizations tickets to the global market. With the implementation of ERP, organizations can manage and coordinate all functions, processes, resources and data from different departments by a single software. However, many organizations consider the cost of traditional ERP to be expensive and look for alternative affordable solutions within their budget. One of these alternative solutions is providing ERP over a software as a service (SaaS) model. This alternative could be considered as a cost effective solution compared to the traditional ERP system. A key feature of any SaaS system is the multi-tenancy architecture where multiple customers (tenants) share the system software. However, different organizations have different requirements. Thus, the SaaS developers accommodate each tenant’s unique requirements by allowing tenant-level customization or configuration. While customization requires source code changes and in most cases a programming experience, the configuration process allows users to change many features within a predefined scope in an easy and controlled manner. The literature provides many techniques to accomplish the configuration process in different SaaS systems. However, the nature and complexity of SaaS ERP needs more attention to the details regarding the configuration process which is merely described in previous researches. Thus, this research is built on strong knowledge regarding the configuration in SaaS to define specifically the configuration borders in SaaS ERP and to design a configuration service with the consideration of the different configuration aspects. The proposed architecture will ensure the easiness of the configuration process by using wizard technology. Also, the privacy and performance are guaranteed by adopting the databases isolation technique.

Keywords: configuration, software as a service, multi-tenancy, ERP

Procedia PDF Downloads 377
5 Multi-Level Security Measures in Cloud Computing

Authors: Shobha G. Ranjan

Abstract:

Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.

Keywords: cloud computing, cloud security, integrity, multi-tenancy, security

Procedia PDF Downloads 480
4 Microeconomic Consequences of the Housing Market Deformation in the Selected Region of the Czech Republic

Authors: Hana Janáčková

Abstract:

Housing can be sorted as basic needs of households. Purchase of acceptable ownership housing is important investments for most them. For rental housing households must consider the part of rent expenditure paid in the total household income. For this reason, financial considerations of households in this area depend on the government innervations (public administration) in housing - on housing policy. Market system of housing allocation, whether ownership or tenancy, is based on the fact that housing is a scarce good. The allocation of housing is based on demand and supply. The market system of housing can sometimes have a negative impact on some households, the market is unable to satisfy certain groups of the population that are not able or willing to accept market price. For these reasons, there is a more or less regulation of the market. Regulation is both on the demand and supply side, and the state determines the rules of behaviour for all economic entities of the housing market. This article submits results of analysis of selected regulatory interference of the state in the housing market and assesses their implications deforming the market in the selected region of the Czech Republic. The first part describes tools of supports and the second part discusses deformations and analyses their consequences on the demand side of housing market and on supply side.

Keywords: housing, housing market, microeconomic consequences, deformation

Procedia PDF Downloads 370
3 Enhanced Disk-Based Databases towards Improved Hybrid in-Memory Systems

Authors: Samuel Kaspi, Sitalakshmi Venkatraman

Abstract:

In-memory database systems are becoming popular due to the availability and affordability of sufficiently large RAM and processors in modern high-end servers with the capacity to manage large in-memory database transactions. While fast and reliable in-memory systems are still being developed to overcome cache misses, CPU/IO bottlenecks and distributed transaction costs, disk-based data stores still serve as the primary persistence. In addition, with the recent growth in multi-tenancy cloud applications and associated security concerns, many organisations consider the trade-offs and continue to require fast and reliable transaction processing of disk-based database systems as an available choice. For these organizations, the only way of increasing throughput is by improving the performance of disk-based concurrency control. This warrants a hybrid database system with the ability to selectively apply an enhanced disk-based data management within the context of in-memory systems that would help improve overall throughput. The general view is that in-memory systems substantially outperform disk-based systems. We question this assumption and examine how a modified variation of access invariance that we call enhanced memory access, (EMA) can be used to allow very high levels of concurrency in the pre-fetching of data in disk-based systems. We demonstrate how this prefetching in disk-based systems can yield close to in-memory performance, which paves the way for improved hybrid database systems. This paper proposes a novel EMA technique and presents a comparative study between disk-based EMA systems and in-memory systems running on hardware configurations of equivalent power in terms of the number of processors and their speeds. The results of the experiments conducted clearly substantiate that when used in conjunction with all concurrency control mechanisms, EMA can increase the throughput of disk-based systems to levels quite close to those achieved by in-memory system. The promising results of this work show that enhanced disk-based systems facilitate in improving hybrid data management within the broader context of in-memory systems.

Keywords: in-memory database, disk-based system, hybrid database, concurrency control

Procedia PDF Downloads 396
2 Heat Stress Adaptive Urban Design Intervention for Planned Residential Areas of Khulna City: Case Study of Sonadanga

Authors: Tanjil Sowgat, Shamim Kobir

Abstract:

World is now experiencing the consequences of climate change such as increased heat stress due to high temperature rise. In the context of changing climate, this study intends to find out the planning interventions necessary to adapt to the current heat stress in the planned residential areas of Khulna city. To carry out the study Sonadanga residential area (phase I) of Khulna city has been taken as the study site. This residential neighbourhood covering an area of 30 acres has 206 residential plots. The study area comprises twelve access roads, one park, one playfield, one water body and two street furniture’s. This study conducts visual analysis covering green, open space, water body, footpath, drainage and street trees and furniture and questionnaire survey deals with socio-economic, housing tenancy, experience of heat stress and urban design interventions. It finds that the current state that accelerates the heat stress condition such as lack of street trees and inadequate shading, maximum uses are not within ten minutes walking distance, no footpath for the pedestrians and lack of well-maintained street furniture. It proposes that to adapt to the heat stress pedestrian facilities, buffer sidewalk with landscaping, street trees and open spaces, soft scape, natural and man-made water bodies, green roofing could be effective urban design interventions. There are evidences of limited number of heat stress adaptive planned residential area. Since current sub-division planning practice focuses on rigid land use allocation, it partly addresses the climatic concerns through creating open space and street trees. To better respond to adapt to the heat stress, urban design considerations in the context of sub-division practice would bring more benefits.

Keywords: climate change, urban design, adaptation, heat stress, water-logging

Procedia PDF Downloads 278
1 The Use of Telecare in the Re-design of Overnight Supports for People with Learning Disabilities: Implementing a Cluster-based Approach in North Ayrshire

Authors: Carly Nesvat, Dominic Jarrett, Colin Thomson, Wilma Coltart, Thelma Bowers, Jan Thomson

Abstract:

Introduction: Within Scotland, the Same As You strategy committed to moving people with learning disabilities out of long-stay hospital accommodation into homes in the community. Much of the focus of this movement was on the placement of people within individual homes. In order to achieve this, potentially excessive supports were put in place which created dependence, and carried significant ongoing cost primarily for local authorities. The greater focus on empowerment and community participation which has been evident in more recent learning disability strategy, along with the financial pressures being experienced across the public sector, created an imperative to re-examine that provision, particularly in relation to the use of expensive sleepover supports to individuals, and the potential for this to be appropriately scaled back through the use of telecare. Method: As part of a broader programme of redesigning overnight supports within North Ayrshire, a cluster of individuals living in close proximity were identified, who were in receipt of overnight supports, but who were identified as having the capacity to potentially benefit from their removal. In their place, a responder service was established (an individual staying overnight in a nearby service user’s home), and a variety of telecare solutions were placed within individual’s homes. Active and passive technology was connected to an Alarm Receiving Centre, which would alert the local responder service when necessary. Individuals and their families were prepared for the change, and continued to be informed about progress with the pilot. Results: 4 individuals, 2 of whom shared a tenancy, had their sleepover supports removed as part of the pilot. Extensive data collection in relation to alarm activation was combined with feedback from the 4 individuals, their families, and staff involved in their support. Varying perspectives emerged within the feedback. 3 of the individuals were clearly described as benefitting from the change, and the greater sense of independence it brought, while more concerns were evident in relation to the fourth. Some family members expressed a need for greater preparation in relation to the change and ongoing information provision. Some support staff also expressed a need for more information, to help them understand the new support arrangements for an individual, as well as noting concerns in relation to the outcomes for one participant. Conclusion: Developing a telecare response in relation to a cluster of individuals was facilitated by them all being supported by the same care provider. The number of similar clusters of individuals being identified within North Ayrshire is limited. Developing other solutions such as a response service for redesign will potentially require greater collaboration between different providers of home support, as well as continuing to explore the full range of telecare, including digital options. The pilot has highlighted the need for effective preparatory and ongoing engagement with staff and families, as well as the challenges which can accompany making changes to long-standing packages of support.

Keywords: challenges, change, engagement, telecare

Procedia PDF Downloads 156