Deep Learning Approaches to Cloud Security. Группа авторов

Чтение книги онлайн.

Читать онлайн книгу Deep Learning Approaches to Cloud Security - Группа авторов страница 14

Deep Learning Approaches to Cloud Security - Группа авторов

Скачать книгу

work from one place to another place. This service totally depends on the needs of the organisation. The requirement of tenants and which type or place the tenant requires is up to the organisation’s needs [4].

Schematic illustration of types of tenant.

      In a Multi-Tenancy system, it is easy to modify and make changes as required by the tenant. Multi-Tenant systems combine the work place between the client and the tenant, but the concept or logic should be separate to each other. The organisation shares the data and configurations, as well as services of management with the user and tenant [5].

      There are basically three major concepts in Multi-Tenancy, as show in the Figure 2.2.

      1 1. A shared database which is used to manage the Multi-Tenancy system means this facility helps make data available and manages the cost or storage area flexibility and scalability management. It reduces the complexity of managing the database and makes it easily available to each tenant and workspace.

      2 2. One database and many schemas means all tenants use the same database in a different manner. Each tenant uses their requirement of data and every tenant requirement is different as the work is different. According the tenant, the services are provided to the tenant. The complexity and cost will also affect the structure used by the tenant.

      3 3. Many databases and schemas means, in this type of model, that tenant data is stored in the database in different locations in a different database or that the tenant can create different databases as they are required. Accordingly, the new database will create a cost and complexity increase [6].

      2.2.3 Concept of Multi-Tenancy with Cloud Computing

Schematic illustration of multi-Tenancy models.

      Multi-Tenancy cloud computing systems create a sparse work area for each tenant for storage or project data and login privacy policies. The tenant only uses their personal and secure area for work and accesses only know work or data. In the case of other requirements of data, another tenant’s permission or access key is required for access.

      The Single Tenant Cloud Computing environment does not provide to all facilities. When compared to a Multi-Tenancy system, it provides more storage, access features, and security and privacy policies.

      It provides a virtual environment for work easily, with less complexity maintaining work and hardware and no restrictions to devices or location [7].

       Example of Multi-Tenancy with Cloud Computing:

Schematic illustration of multi-Tenant Cloud structure.

      In Multi-Tenant cloud based systems, security uses the Deep Learning Method to overcome all the requirements of a tenant, including privacy policies and services required. Using Deep Learning Methods for developing the privacy structure of Cloud Computing provides better services according to the requirements of a tenant. Accordingly, at the request of the tenant, resources and service availability fulfil requests and the privacy and security services are developed and maintained. In the cloud computing environment, there are public, private, single, and multi-tenant structures available to use according to the requirements of a tenant. Different structures have different needs for privacy and security services. If better services are not available, the tenant may not use the structure, therefore, using Deep Learning methods develops privacy and security services. The services are developed according to the organisation’s needs using Deep Learning [8].

      Privacy in Cloud Computing is maintained by a distributed system concept in a Multi-Tenancy based application using encryption techniques to protect data, synchronize work, and regulate base data modification if the tenant is authorized or not, so all factors are required to check and manage [9]. The privacy management system is used to manage the security of sophisticated data access.

Schematic illustration of concept of Cloud Security.

Скачать книгу