Variability in Multi-Tenant Enterprise Software

Total Page:16

File Type:pdf, Size:1020Kb

Variability in Multi-Tenant Enterprise Software UTRECHT UNIVERSITY Variability in Multi-Tenant Enterprise Software by Jaap Kabbedijk A thesis submitted in partial fulfillment for the degree of Doctor in the Faculty of Science Department of Information and Computing Sciences December 2014 SIKS Dissertation Series No. 2014-29 The research reported in this thesis has been carried out under the auspices of SIKS, the Dutch Research School for Information and Knowledge Systems. The cover image is from the board game Tzolkin: The Mayan Calendar by Czech Games Edition. The photo is provided by BoardGameGeek member Joshua R. ISBN/EAN: 978-90-393-6177-1 ©2014, Jaap Kabbedijk. All rights reserved Variability in Multi-Tenant Enterprise Software Variabiliteit in Multi-tenant Bedrijfssoftware (met een samenvatting in het Nederlands) Proefschrift ter verkrijging van de graad van doctor aan de Universiteit Utrecht op gezag van de rector magnificus, prof. dr. G.J. van der Zwaan, ingevolge het besluit van het college voor promoties in het openbaar te verdedigen op dinsdag 23 december 2014 des middags te 12.45 uur door Jaap Kabbedijk geboren op 27 mei 1986 te Oosterhout Promotor: Prof.dr. S. Brinkkemper Prof.dr.ir. J.C. Wortmann Copromotor: Dr. R.L. Jansen This research was financially supported by the NWO ‘Product as a Service’ project. “Somewhere in the deeply remote past it seriously traumatized a small random group of atoms drifting through the empty sterility of space and made them cling together in the most extraordinarily unlikely patterns. These patterns quickly learnt to copy themselves (this was part of what was so extraordinary of the patterns) and went on to cause massive trouble on every planet they drifted on to. That was how life began in the Universe.” Douglas Adams, The Hitchhiker’s Guide to the Galaxy Preface Before I started my PhD., I was not really aware of what such an endeavour would entail. Now, almost four years later, I do know. I now know one can not fulfil this journey alone. The are many people to thank and I will try to do this here. Most probably I missed the most obvious, important and valuable ones. For this I apologize beforehand. If you are one of them, feel blessed; you can count yourself among my most important and valuable friends. Right after my first publication and presentation at a scientific conference, I decided the thrill and travel of academic interaction was something I would like to experience more. This was during my master studies and I made the life changing choice to become a PhD. This was a major choice. An important choice, and a choice I don’t regret. Using the enthusiasm I had when I started, the literal and intellectual travels began. On the way I learned to value the people supporting my professionally. Slinger, thank you for helping me structure and improve my studies. Thanks also for not only being an academic mentor, but also a friend for beers and laughs. Unsurprisingly, my gratitude also goes to my promotor Sjaak, who was busy at times, but always tried to help me find out what was best for me. I also express my thanks to my second promotor Hans Wortmann and the people I worked with during my research project and at the many software companies I visited. There are too many people to name them all, but Liz, Werner, Ronald, Rolf and Machiel, you are certainly among the many I should actually all thank explicitly. So, now for the people that helped me out, often not by supporting me directly in writing my thesis, but by being there for and supporting me. Of course my parents; pap en mam, bedankt dat jullie er altijd voor me zijn. Also, all my friends. There are, luckily, too many of you to write all the names down, but thank you all. Special thanks goes to Kevin, who has been my soul mate for almost ten years now. Last, but certainly not least, my love goes to Eline. Knowing what I know now, I can safely state that I learned a lot about software patterns, software architecture, research methods and the academic culture. But most importantly, I learned that a PhD., like most things in life, is enjoyed best when you have the people you love, support you. Jaap iv Contents Preface iv 1 Introduction3 1.1 Motivation................................3 1.2 Scientific Relevance...........................5 1.3 Positioning the Research........................6 1.3.1 Enterprise Software.......................7 1.3.2 Software as a Service......................8 1.3.3 Software Architecture...................... 10 1.3.4 Software Quality........................ 10 1.3.5 Software Patterns........................ 12 1.3.6 Variability............................ 13 1.4 Research Approach........................... 13 1.4.1 Research Questions....................... 14 1.4.2 Research Methods....................... 17 1.4.3 Validation and Evaluation................... 20 1.5 Dissertation Outline.......................... 21 I Variability and Multi-tenancy 25 2 Defining Multi-Tenancy 27 2.1 Introduction............................... 28 2.2 Research Method............................ 30 2.2.1 Academic Literature Collection................ 31 2.2.2 Industrial Literature Collection................ 32 2.3 Classification.............................. 34 2.3.1 Academic Literature Classification.............. 34 2.3.2 Industrial Literature Classification.............. 36 2.4 Observations............................... 37 2.4.1 Academic Paper Results.................... 38 2.4.2 Blog Post Results........................ 38 2.5 Definition................................ 40 2.6 Research Agenda............................ 43 2.7 Threats to Validity........................... 46 v vi CONTENTS 2.8 Conclusion................................ 46 3 The Role of Variability Patterns 49 3.1 Introduction............................... 50 3.2 Concepts................................. 51 3.2.1 Tenant-based Variability.................... 51 3.2.2 Variability Patterns....................... 52 3.3 Conceptual Model............................ 53 3.3.1 Application Example...................... 54 3.4 Discussion................................ 55 3.5 Conclusion................................ 56 4 Variability in Multi-tenant Systems 57 4.1 Introduction............................... 58 4.2 Research Approach........................... 59 4.2.1 Validation............................ 59 4.3 Related Work and Definitions..................... 60 4.3.1 Multi-tenancy.......................... 60 4.3.2 Variability............................ 61 4.3.3 Software Patterns........................ 62 4.4 User-Variability Trade-off....................... 63 4.5 Variability Patterns........................... 64 4.5.1 Customizable Data Views................... 64 4.5.2 Module Dependent Menu.................... 65 4.5.3 Pre/Post Update Hooks.................... 67 4.6 Conclusion and Future Research.................... 68 5 Variability Consequences of the CQRS Pattern 69 5.1 Introduction............................... 70 5.2 Related Work.............................. 71 5.3 Research Approach........................... 73 5.3.1 Research Questions....................... 74 5.3.2 Validation............................ 75 5.4 CQRS Implementation......................... 75 5.5 CQRS Sub Patterns.......................... 77 5.5.1 Event Sourcing......................... 77 5.5.2 Event Store........................... 77 5.5.3 Aggregate Root......................... 78 5.5.4 Command Handler....................... 79 5.5.5 Query Model Builder...................... 80 5.5.6 Query Handler......................... 80 5.5.7 Snapshotting.......................... 81 5.6 Variability Influences.......................... 82 5.7 Discussion and Future Research.................... 83 5.8 Conclusion................................ 84 CONTENTS vii II Selecting Patterns in Systems Design 85 6 Multi-Tenant Architecture Assessment 87 6.1 Introduction............................... 88 6.2 Research Approach........................... 89 6.2.1 Structured Literature Research................ 90 6.2.2 Expert Validation........................ 92 6.3 Multi-Tenant Architecture Assessment Model............ 93 6.4 Multi-tenant Architectures....................... 94 6.4.1 Expert Validation........................ 97 6.5 MTA Assessment Criteria....................... 98 6.5.1 Expert Evaluation....................... 100 6.6 MTA Decision Matrix......................... 101 6.7 Discussion and Conclusion....................... 104 7 Comparing Dynamical Adaptation Patterns 105 7.1 Introduction............................... 106 7.2 Related Work.............................. 107 7.3 Research Approach........................... 110 7.3.1 Validation............................ 111 7.4 Pattern Description Method...................... 111 7.5 Dynamic Functionality Adaptation Patterns............. 114 7.5.1 Problem Statement....................... 114 7.5.2 Component Interceptor Pattern................ 115 7.5.3 Event Distribution Pattern................... 116 7.5.4 Pattern Comparison...................... 118 7.6 Dynamic Data Model Extension Patterns............... 122 7.6.1 Problem Statement....................... 122 7.6.2 Datasource Router Pattern................... 124 7.6.3 Custom Property Object Pattern............... 126 7.6.4 Pattern Comparison...................... 127 7.7 Conclusion................................ 132 8 Software Pattern Evaluation Method 135 8.1 Introduction............................... 136 8.2 Related Work.............................. 137 8.3 Research Approach........................... 138 8.4 SPEM - Software Pattern Evaluation
Recommended publications
  • Towards Efficient Migration for Elastic And
    UCSB Computer Science Technical Report 2010-05. Who’s Driving this Cloud? Towards Efficient Migration for Elastic and Autonomic Multitenant Databases Aaron Elmore Sudipto Das Divyakant Agrawal Amr El Abbadi Department of Computer Science University of California, Santa Barbara, CA, USA {aelmore, sudipto, agrawal, amr}@cs.ucsb.edu Abstract emerging class of applications and managing their data. Sharing The success of cloud computing as a platform for deploying web- the underlying data management infrastructure amongst a pool of applications has led to a deluge of applications characterized by tenants is thus essential for efficient use of resources and low cost small data footprints but unpredictable access patterns. An auto- of operations. Large multitenant databases are therefore an inte- nomic and scalable multitenant database management system (DBMS) gral part of the infrastructure to serve such large number of small is therefore an important component of the software stack for plat- applications [16, 19, 20]. forms supporting these applications. Elastic load balancing is a The concept of a multitenant database has been predominantly key requirement for effective resource utilization and operational used in the context of Software as a Service (SaaS). The Sales- cost minimization. Efficient techniques for database migration are force.com model [19] is often cited as a canonical example of this thus essential for elasticity in a multitenant DBMS. Our vision service paradigm. However, various other models of multitenancy is a DBMS where multitenancy is viewed as virtualization in the in the database tier [14, 16] and their interplay with resource shar- database layer, and migration is a first class notion with the same ing in the various cloud paradigms (IaaS, PaaS, and SaaS) are often stature as scalability, availability etc.
    [Show full text]
  • A Framework for Achieving the Required Degree of Multitenancy
    A framework for achieving the required degree of multitenancy isolation for deploying components of a cloud-hosted s e rvice Ochei, LC, Petrovski, A and Bass, J http://dx.doi.org/10.1504/IJCC.2018.10016238 Titl e A framework for achieving the required degree of multitenancy isolation for deploying components of a cloud-hosted service Aut h or s Ochei, LC, Petrovski, A and Bass, J Typ e Article URL This version is available at: http://usir.salford.ac.uk/id/eprint/47114/ Published Date 2 0 1 8 USIR is a digital collection of the research output of the University of Salford. Where copyright permits, full text material held in the repository is made freely available online and can be read, downloaded and copied for non- commercial private study or research purposes. Please check the manuscript for any further copyright restrictions. For more information, including our policy and submission procedure, please contact the Repository Team at: [email protected] . 1 A Framework for Achieving the Required Degree of Multitenancy Isolation for Deploying Components of a Cloud-hosted Service Laud Charles Ochei School of Computing and Digital Media, Robert Gordon University, Aberdeen AB10 7QB, United Kingdom. Email: [email protected] * Corresponding author Andrei Petrovski School of Computing and Digital Media, Robert Gordon University, Aberdeen AB10 7QB, United Kingdom. Email: [email protected] Julian M. Bass School of Computing, Science, and Engineering, University of Salford, Salford M5 4WT, United Kingdom. Email: [email protected] Abstract: When a cloud offering is provided to multiple users/tenants, multitenancy isolation has to be implemented.
    [Show full text]
  • Multitenancy in Saas: a Comprehensive Survey Pallavi G B, Dr
    International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 ISSN 2229-5518 41 Multitenancy in SaaS: A comprehensive Survey Pallavi G B, Dr. P Jayarekha Abstract— Cloud computing is a technology which provides enterprise-grade computing resources as services to customers through internet. One of the popularly available services is software viz., software as a service (SaaS). Many of the SaaS providers make use of a multitenant model to host their applications. Multitenancy is an architectural approach in which a single instance of a software application serves multiple customers referred as tenants, where one application is run on a single database instance for multiple organizations. However, since sharing of a single instance of software leads to distribution of underlying hardware resources among tenants, a multitenant platform poses challenges with respect to architectural, implementation and security issues. In this paper, we have made an extensive survey to understand the various aspects of these issues. The study results can be used not only to identify advantages and disadvantages of these aspects, but also to identify areas requiring future research. Index Terms— Architecture, Implementation, Multitenancy, SaaS, Security, Metadata, Survey —————————— —————————— 1 INTRODUCTION Cloud Computing has become an important computing Multitenancy invariably occurs at the database layer of the technology. Bhaskar Prasad et al., [1] in their survey states that SaaS application[5] i.e., customer share the same hardware cloud computing has emerged as a popular computing model resources by using a single shared application and database to support large volumetric data using clusters of commodity instance, while at the same time tenants are isolated from one computers.
    [Show full text]
  • The Multitenant Cloud Architecture
    Juee Daryapurkar et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April- 2014, pg. 640-647 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 3, Issue. 4, April 2014, pg.640 – 647 RESEARCH ARTICLE The Multitenant Cloud Architecture Understanding the Design of Salesforce.com’s Internet Application Development Platform JUEE DARYAPURKAR, Computer Science and Engineering, H.V.P.M. College of Engineering, Amravati Email: [email protected] PROF. KARUNA BAGDE, Computer Science and Engineering, H.V.P.M. College of Engineering, Amravati Email: [email protected] ABSTRACT Force.com is the preeminent on-demand application development platform in use today, supporting some 47,000+ organizations. Individual enterprises and commercial software-as-a service (SaaS) vendors trust the platform to deliver robust, reliable, Internet-scale applications. To meet the extreme demands of its large user population, Force.com’s foundation is a metadata driven software architecture that enables multitenant applications. This paper explains the patented technology that makes the Force.com platform fast, scalable, and secure for any type of application. Keywords: Force.com, multitenant, software-as-a service (SaaS) INTRODUCTION History has shown that every so often, incremental advances in technology and changes in business models create major paradigm shifts in the way software applications are designed, built, and delivered to end users. The invention of personal computers (PCs), computer networking and graphical user interfaces (UIs) gave rise to the adoption of client/server applications over expensive, inflexible, character-mode mainframe applications and today, reliable broadband Internet access, service-oriented architectures (SOAs), and the cost © 2014, IJCSMC All Rights Reserved 640 Juee Daryapurkar et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April- 2014, pg.
    [Show full text]
  • Security Guidance for Critical Areas of Focus in Cloud Computing V4.0
    The permanent and official location for Cloud Security Alliance’security S Guidance for Critical Areas of Focus in Cloud Computing v4.0 is https://cloudsecurityalliance.org/download/security- guidance-v4/. Official Study Guide for the © 2017 Cloud Security Alliance – All Rights Reserved. The Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 (“Guidance v4.0”) is licensed by the Cloud Security Alliance under a Creative Commons Attribution-NonCommercial- ShareAlike 4.0 International License (CC-BY-NC-SA 4.0). Sharing - You may share and redistribute the Guidance in any medium or any format, only for non- commercial purposes. Adaptation - You may adapt, transform, modify and build upon the Guidance v4 and distribute the modified Guidance v4.0, only for non-commercial purposes. Attribution - You must give credit to the Cloud Security Alliance, link to Guidance v4.0 webpage located at https://cloudsecurityalliance.org/download/security-guidance-v4/, and indicate whether changes were made. You may not suggest that CSA endorsed you or your use. Share-Alike - All modifications and adaptations must be distributed under the same license as the original Guidance v4.0. No additional restrictions - You may not apply legal terms or technological measures that restrict others from doing anything that this license permits. Commercial Licenses - If you wish to adapt, modify, share or distribute copies of the Guidance v4.0 for revenue generating purposes you must first obtain an appropriate license from the Cloud Security Alliance. Please contact us at [email protected]. Notices: All trademark, copyright or other notices affixed onto the Guidance v4.0 must be reproduced and may not be removed.
    [Show full text]
  • An Approach to Add Multi-Tenancy to Existing Applications
    An Approach to Add Multi-tenancy to Existing Applications Uwe Hohenstein and Preeti Koka Siemens AG, Corporate Technology, Otto-Hahn-Ring 6, D-81730 Muenchen, Germany Keywords: Multi-tenancy, Cloud Migration, Aspect-Orientation, AspectJ, Industrial Application, Case Study. Abstract: Multi-tenancy, i.e., sharing resources amongst several tenants, is a key element to make SaaS profitable by saving resources and operational costs. This paper considers multi-tenancy in the context of Cloud migra- tion and presents an approach to let existing applications become multi-tenant. The novelty of this approach is that no reengineering and modification of the application’s source code is required. Adding some new components is sufficient to achieve tenant management, authentication, tenant isolation, and also customiza- tion. Using a case study, the paper demonstrates in detail how to benefit from aspect-orientation, particular- ly the AspectJ language, in this respect and concludes with experiences. 1 INTRODUCTION while entering SaaS business. This paper takes a practical view on Cloud mi- According to (Mell and Grance, 2011), Cloud com- gration and presents a low-effort approach for offer- puting is a model for enabling convenient, on- ing legacy applications as multi-tenant SaaS in a demand network access to a shared pool of configu- Cloud – without refactoring the source code. To rable computing resources that can rapidly be deliv- explore our idea, we use an existing industrial appli- ered with a minimal management effort or service cation that was originally not developed for a multi- provider interaction. tenant environment and serves users of exactly one Particularly, software is more and more becom- tenant.
    [Show full text]
  • Multi-Tenancy Design Patterns in Saas Applications: a Performance Evaluation Case Study
    International Journal of Digital Society (IJDS), Volume 9, Issue 1, March 2018 Multi-tenancy Design Patterns in SaaS Applications: A Performance Evaluation Case Study Adeniyi O. Abdul1, Julian Bass1, Hossein Ghavimi2, Natalie MacRae2 and Peter Adam2 1School of Computing, Science and Engineering, University of Salford 2Add Energy Ltd. Abstract Utility-like computing has emerged as the future burden. Multi-tenancy has emerge as a technology of computing for many organizations seeking to that can help businesses effectively share cloud remain competitive in today's business environment. resources while maximizing their sales profit and Promising features such as rapid elasticity, low cost reducing the cost of application hosting, software provisioning, pay-as-use model, layered security, development and maintenance. On this premise, measured service, resource pooling, are the reasons multi-tenancy in a SaaS application is a architectural companies are opting for this technology. Cloud pattern that entails several tenants (customers) to technologies are provided as services ranging from share resources at different tiers of an application. Infrastructure as a Service (IaaS), Platform as a This might range from tenants sharing the same user Service (PaaS), Software as a Service (SaaS) and interface components, business logic right down to Data as a Service (DaaS). SaaS has become one of data layer, however each tenant only access de facto approach for deploying cloud base services functions or components and data belonging to their or applications for many businesses. At the core of business entity. In contrast to multi-user model SaaS is Multi-tenancy; multi-tenancy gives (traditional), where an application is designed and customers (i.e.
    [Show full text]
  • Multitenant Software As a Service: Application Development Approach
    International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970) Volume-3 Number-3 Issue-11 September-2013 Multitenant Software as a Service: Application Development Approach Suhas Gajakosh1, Mukta Takalikar2 Abstract basic definitions and comparisons of various cloud computing services and models. The customers of Software as a Service (SaaS) is bringing new cloud computing subscribes to the service from cloud revolution to IT industry. SaaS has changed the way providers and generally pay-per-use method is used Software developed, deployed and maintained. SaaS for billing of the subscribed services. This relieves eliminates the requirement of customers (tenants) to the customers from having on premise hardware or purchase, install and maintenance of infrastructure software. The service architecture can be visualized and software. Customers only have to pay for as: services provided by SaaS vendors. Multitenancy in SaaS application is most important feature for the success of SaaS application. However there are many challenges in the development, deployment, and security of such application. This paper addresses the issue of how to effectively support multitenancy in SaaS application and proposes SaaS architecture to support multitenancy in e- commerce application. Keywords Figure 1: Cloud Computing Service Architecture Cloud Computing, Software-as-a-Service, Multitenancy, SaaS Architecture, and e-commerce. First layer Infrastructure as a service (IaaS) is above the real infrastructure includes various
    [Show full text]
  • Multi-Tenancy Security in Cloud Computing
    DEGREE PROJECT IN INFORMATION AND COMMUNICATION TECHNOLOGY, SECOND CYCLE, 30 CREDITS STOCKHOLM, SWEDEN 2019 Multi-Tenancy Security in Cloud Computing Edge Computing and Distributed Cloud ALI SHOKROLLAHI YANCHESHMEH KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Multi-Tenancy Security in Cloud Computing Ali Shokrollahi Yancheshmeh Master of Science Thesis Communication Systems School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Examiner: Peter Sjödin Supervisor: Markus Hidell Ericsson Supervisor: Christopher Price Stockholm, Sweden Dec 2019 Abstract With the advent of technology cloud computing has become the next generation of network computing where cloud computing can deliver both software and hardware as on-demand services over the Internet. Cloud computing has enabled small organizations to build web and mobile apps for millions of users by utilizing the concept of “pay-as-you-go” for applications, computing, network and storage resources as on-demand services. These services can be provided to the tenants in different categories: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). In order to decrease the costs for the cloud users and increase resource utilization, cloud providers try to share the resources between different organizations (tenants) through a shared environment which is called Multi-Tenancy. Even though multi-tenancy‟s benefits are tremendous for both cloud providers and users, security and privacy concerns are the primary obstacles to Multi-Tenancy. Since Multi-Tenancy dramatically depends on resource sharing, many experts have suggested different approaches to secure Multi-Tenancy. One of the solutions is resource allocation and isolation techniques.
    [Show full text]
  • Implementation Patterns for Multi-Tenancy
    Implementation Patterns for Multi-Tenancy SUMIT KALRA, Indian Institute of Technology Kanpur PRABHAKAR TV, Indian Institute of Technology Kanpur Recently multi-tenant applications for SaaS in cloud computing are on rise. These applications increase the degree of resource sharing among tenants with various functional and non-functional requirements. However, often it results in higher design complexity. In this work, we discuss various design patterns to build these applications with efficient tenant management. We divided these patterns in the three categories. The categorization is based on their applicability to design, development, and runtime phases during software development life cycle. These patterns make an application tenant aware and enable multi-tenancy without adding much overhead and complexity in its design. Categories and Subject Descriptors: D.2.11 [Software Engineering]: Software Architectures—(Design) Patterns General Terms: Design Additional Key Words and Phrases: Multi-tenant, Tenant operation and management ACM Reference Format: Kalra, S. and Prabhakar, T V. 2017. Implementation Patterns for Multi-Tenancy. HILLSIDE Proc. of Conf. on Pattern Lang. of Prog. 23 (October 2016), 16 pages. 1. INTRODUCTION A multi-tenant application can host multiple tenants with heterogeneous requirements on a single instance of the application that provides sufficient degree of variability and customizability [Krebs et al. 2012]. Economical benefits from multi-tenancy results in increased interest in recent years in industry and academic community. A tenant can be either an individual user or an organization ( a group of users with same requirements). Another deployment approach to handle tenants with heterogeneous requirements is multi-instance, where a SaaS service provider creates a dedicated instance for each tenant.
    [Show full text]
  • Multi-Tenant Saas Application Platform: a Survey
    International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358 Multi-Tenant SaaS Application Platform: A Survey Basant Kumar Gupta, Keisam Thoiba Meetei PG Scholar, Computer Science and Engineering, Galgotias University, Greater Noida U.P, India Abstract: Now days cloud computing is a very noble Internet based on-demand, pay-as-per-use, utility based computing platform which provides software as a service to the end user as rent basis to reduce the cost of purchasing the software as well as reducing the maintenance costs which is more sophisticated to the end user. It makes IT industry more available at the door step of the users. But here security measures over the cloud-hosted platform are less. A multi-tenant based SaaS application platform provides a security framework which improves collaboration between cloud service providers and cloud service consumers. Multi-tenant database allows multiple instances emulates single instance which provides a SaaS security framework model. Due to sharing of a single application among the multiple tenants brings down the overall cost of IT infrastructures. In this recent era of IT infrastructure Software-as-a- Service (SaaS) is becoming a dominant technology which utilize a standardized SaaS application developed by SaaS application developer. There is an application, metadata driven architecture introduced by Force.com satisfy the multitenancy of SaaS application. Keywords: Cloud computing, security framework, multi-tenancy, SaaS, metadata 1. Introduction Security is considered one of the peak ranked right of admission issues in adopting the cloud computing model, as Software-as-a-Service (SaaS) is a cloud computing service reported by IDC [7].
    [Show full text]
  • A Comprehensive Study on Multi-Tenancy Techniques in Cloud Computing Models
    International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 13, Issue 9 (September 2017), PP.59-64 A Comprehensive Study on Multi-Tenancy Techniques in Cloud Computing Models *1stDr.Chinthagunta Mukundha,2nd Mandadi Kavya, 3rdO.Sahithi Reddy 4thR.Tejaswini 1Associate Professor,Dept of IT, Sreenidhi Institute of Science & Technology,Hyderabad, 2,3,4UG Student, Dept of IT, Sreenidhi Institute of Science & Technology, Hyderabad, Corresponding Author: Dr.Chinthagunta Mukundha ABSTRACT: Cloud Computing is the most trending Information Technology computational model. This environment is enabled with an Internet to provide computing resources comprised of software, servers, Storages and applications that can be accessed by any type of client. Cloud computing is the fundamental model to provide the services like Infrastructure as a Service, Platform as a Service and Software as a Service. Majority of these services are offered based on pay per use lease style investment with very low or no startup costs to purchase all hardware or software components. The feature provides economic benefits to both users and service providers since it reduces the management cost and thus lowers the subscription price. Many users are, however, reluctant to subscribe to cloud computing services due to security concerns. To enable deployment of cloud computing, we need to advance new techniques like secure multi-tenancy, resource isolation need to be advanced further. Keywords: Cloud Computing, Multi-tenancy, Security, Virtualization, Resource Isolation. I. INTRODUCTION Cloud Computing is defined as “It is a model, where the software and hardware resources of a data centre is shared using virtualization technology, which also provides on demand, instant and elastic services to its users and resources offered on lease style.
    [Show full text]