Understanding the Complexity Surrounding Multitenancy in Cloud Computing

Katie Woods, Mark Anderson

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

32 Citations (Scopus)


The purpose of this paper is to explore the challenges and complexity of multi-tenancy issues that have emerged though the development and adoption of cloud computing. The paper will focus specifically around cloud deployment and data storage, in particular relation to privacy concerns due to multi-tenancy. The reason for this lies with the identification of Software as a Service (SaaS) as the most likely adopted service model, particularly for those who are teleworking, as this relies on the service provider adopting a multi-tenancy environment within the data centre. The paper takes the perspective that, for both legal reasons and as part of shared obligation, it is necessary for users to recognise the need for common standards of policy and procedure. For example, this may be in levels of protection to prevent data protection and privacy laws being compromised. Both cloud service providers and legislative bodies need to acknowledge the impact that multi-tenancy can have on user privacy and act accordingly in regulatory steps and in encouraging a culture of adhering to common user standards. Such matters must be addressed at the earliest levels of growth in user demand to be optimally effective, especially when scalability is a fundamental driver for the adoption of cloud computing.
Original languageEnglish
Title of host publicatione-Business Engineering (ICEBE), 2011 IEEE 8th International Conference on
PublisherIEEE Computer Society
Number of pages399
ISBN (Print)978-1-4577-1404-7
Publication statusPublished - 19 Oct 2011
EventIEEE International Conference on E-Business Engineering - Beijing, China
Duration: 19 Oct 201121 Oct 2011


ConferenceIEEE International Conference on E-Business Engineering


Dive into the research topics of 'Understanding the Complexity Surrounding Multitenancy in Cloud Computing'. Together they form a unique fingerprint.

Cite this