DocumentCode :
2786557
Title :
TOSSMA: A Tenant-Oriented SaaS Security Management Architecture
Author :
Almorsy, Mohamed ; Grundy, John ; Ibrahim, Ahmed S.
Author_Institution :
Centre for Comput. & Eng. Software Syst., Swinburne Univ. of Technol., Melbourne, VIC, Australia
fYear :
2012
fDate :
24-29 June 2012
Firstpage :
981
Lastpage :
988
Abstract :
Multi-tenancy helps service providers to save costs, improve resource utilization, and reduce service customization and maintenance time by sharing of resources and services. On the other hand, supporting multi-tenancy adds more complexity to the shared application´s required capabilities. Security is a key requirement that must be addressed when engineering new SaaS applications or when re-engineering existing applications to support multi-tenancy. Traditional security (re)engineering approaches do not fit with the multi-tenancy application model where tenants and their security requirements emerge after the system was first developed. Enabling, runtime, adaptable and tenant-oriented application security customization on single service instance is a key challenging security goal in multi-tenant application engineering. In this paper we introduce TOSSMA, a Tenant-Oriented SaaS Security Management Architecture. TOSSMA allows service providers to enable their tenants in defining, customizing and enforcing their security requirements without having to go back to application developers for maintenance or security customizations. TOSSMA supports security management for both new and existing systems. Service providers are not required to write security integration code to use a specific security platform or mechanism. In this paper, we describe details of our approach and architecture, our prototype implementation of TOSSMA, give a usage example of securing a multi-tenant SaaS, and discuss our evaluation experiments of TOSSMA.
Keywords :
cloud computing; security of data; TOSSMA architecture; application security customization; multitenancy application model; multitenant application engineering; resource sharing; resource utilization; security engineering approach; security integration code; security management; security mechanism; security platform; security requirement; service customization; service maintenance; service provider; service sharing; software-as-a-service; tenant-oriented SaaS security management architecture; Authentication; Authorization; Computer architecture; Databases; Runtime; Service oriented architecture; Cloud computing; SaaS application security; cloud computing security; multi-tenancy security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on
Conference_Location :
Honolulu, HI
ISSN :
2159-6182
Print_ISBN :
978-1-4673-2892-0
Type :
conf
DOI :
10.1109/CLOUD.2012.146
Filename :
6253613
Link To Document :
بازگشت