Article Preview
TopIntroduction
Cloud computing is a critical component of the digital paradigm. It has become an indispensable element of our everyday lives. Through virtualization, it allows the cloud provider to share pools of configurable resources (hardware/software), resulting in new complicated business models that were before unforeseeable. Many industries have embraced cloud computing because it lowers the cost of doing activities flexibly. From the user's perspective, they may take advantage of massive computational power and storage without having to invest in hardware and software. Cloud computing, often known as just computing, is a type of computing that makes use of Internet technology to provide dynamic applications and storage on-demand, as well as broad network access, resource sharing, quick elasticity, and monitored service (Pandey et al., 2021). In Cloud computing, everything is a service. These services are named Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) (Ahmad, 2021). Infrastructure as a Service (IaaS) (Pandey et al., 2011) is one of the main blocks of cloud computing services. At this initial stage cloud, consumers can configure environments virtually with high flexibility and without having to concern about having giant rooms of physical computers. To deal with a proper cloud infrastructure, efficient resource management is essential (Kaur et al., 2019). Getting hardware resources is a costly effort in the business, and their utilization must do adequately. To get more money a cloud service provider provides its services in sharable mode i.e. multi-tenancy (Wang et al., 2018). A secure cloud computing architecture at the IaaS level must be applied. A very effective technique i.e. KASLR that protects unknown attacks on IaaS but it has a significant impact on memory de-duplication savings (Vano-Garcia & Marco-Gisbert, 2020). In the cloud computing paradigm, SaaS is widely used. To save cost and 100% resources utilization Cloud providers provide SaaS in sharable mode. Sharing resources is termed multi-tenancy (Huang et al., 2020). The advantages of multi-tenancy lead 100% utilization of the resources but at the same time, it risks the security of the data and services. Chances of unauthorized access to SaaS are high in the case of multi-tenancy.
Multi-tenancy - A single program occasion that served numerous clients is called multi-tenancy, or inhabitants. In the open cloud, multi-tenancy is characterized as a shared computer program occasion (Cloudflare, n.d.). The occupants are disconnected from each other by means of consent. Confinement of information can be taken care of by cloud suppliers. The benefits of multi-tenancy are superior utilize of resources.
Authenticating or authorizing a resource automatically based on their exclusive physical or behavioral characteristic is known as biometric recognition (Alsaasi, 2021). Biometric recognition is of two types, anatomical and behavioral. After authentication, the authorization could be done by a person’s behavioral biometrics (Maghsoudi & Tappert, 2016). For example signature, keystroke dynamics, gait, and voices are the most dominant way for security reason.