Laud Charles Ochei
Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system.
Ochei, Laud Charles; Petrovski, Andrei; Bass, Julian M.
Julian M. Bass
John A. Miller
Implementing the required degree of isolation between tenants is one of the significant challenges for deploying a multitenant application on the cloud. This paper applies COMITRE (Component-based approach to multitenancy isolation through request re-routing) to empirically evaluate the degree of isolation between tenants enabled by three multitenancy patterns (i.e., shared component, tenant-isolated component, and dedicated component) for a cloud-hosted Bug tracking system using Bugzilla. The study revealed among other things that a component deployed based on dedicated component offers the highest degree of isolation (especially for database transactions where support for locking is enabled). Tenant isolation based on performance (e.g., response time) favoured shared component (compared to resource consumption (e.g., CPU and memory) which favoured dedicated component). We also discuss key challenges and recommendations for implementing multitenancy for application components in cloud-hosted bug tracking systems with guarantees for isolation between multiple tenants.
|Start Date||Jun 27, 2016|
|Publication Date||Sep 1, 2016|
|Publisher||Institute of Electrical and Electronics Engineers|
|Institution Citation||OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2016. Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system. In Zhang, J., Miller, J.A. and Xu, X. (eds.) Proceedings of the 13th Institute of Electrical and Electronics Engineers (IEEE) International services computing conference 2016 (SCC 2016), 27 June - 2 July 2016, San Francisco, USA. Piscataway: IEEE [online], pages 379-386. Available from: https://doi.org/10.1109/SCC.2016.56|
|Keywords||Multitenancy; Degree of isolation; Tenant; GSDtools; Cloud patterns|
OCHEI 2016 Implementing the required
You might also like
Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm.
The use of machine learning algorithms for detecting advanced persistent threats.
Fuzzy logic applied to value of information assessment in oil and gas projects.