2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing 2011
DOI: 10.1109/3pgcic.2011.39
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Schema Shared Approach for Cloud Based Multitenant Database with Authentication and Authorization Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…3 CSIT six times, and second big disadvantage is more processing time is required for performing the transactions like insertion, deletion or modification etc. So authors [7] proposed one approach in which they introduced the concept of XML objects in extension table which significantly reduces the size of extension tale which was the biggest problem in earlier approach. For authentication and authorization Kerberos protocols were used and with the help of this approach automatically multiple tables can be generated.…”
Section: Authentication and Authorizationmentioning
confidence: 99%
See 1 more Smart Citation
“…3 CSIT six times, and second big disadvantage is more processing time is required for performing the transactions like insertion, deletion or modification etc. So authors [7] proposed one approach in which they introduced the concept of XML objects in extension table which significantly reduces the size of extension tale which was the biggest problem in earlier approach. For authentication and authorization Kerberos protocols were used and with the help of this approach automatically multiple tables can be generated.…”
Section: Authentication and Authorizationmentioning
confidence: 99%
“…To have isolation among various tenants it has become very important to have a predefined authentication and authorization control for each tenant. Authors in [7] proposed an efficient authentication and authorization model as shown in Fig. 3 CSIT six times, and second big disadvantage is more processing time is required for performing the transactions like insertion, deletion or modification etc.…”
Section: Authentication and Authorizationmentioning
confidence: 99%
“…It is the augmentation of this tenant data that enables the verification of private data that has been supplied previously, a scheme that was introduced by Pippa [50] and is described as identity-based cryptography. This approach ensures that tenants within a multitenant environment can only be granted access to the workspace that they have been allocated.…”
Section: A Dynamic Authenticationmentioning
confidence: 99%
“…Furthermore, other server arrays, which are most likely to be clouds, can be allocated to undertake privacy-asa-service duties. These duties include the ability to provide identitybased cryptography and identity-based signature generation for cloud computing [50]. Such clouds arrange the key structures as hierarchies as per Figure 1.…”
Section: A Dynamic Authenticationmentioning
confidence: 99%
“…The extension tables assist in validating private details about a tenant before issuing a private key for accessing the user's workspace. This concept is referred to as "identity-based cryptography" [32]. The root key is the public key for unlocking a cloud or grid-based workspace.…”
Section: A Dynamic Authenticationmentioning
confidence: 99%