WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Multi-tenant SaaS applications: maintenance dream or nightmare?
Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE)
SaaS-model-based approach for mobile government security
International Journal of Mobile Communications
Native support of multi-tenancy in RDBMS for software as a service
Proceedings of the 14th International Conference on Extending Database Technology
Optimizing integrated application performance with cache-aware metascheduling
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part II
An approach to developing multi-tenancy SaaS using metaprogramming
Proceedings of the 18th Brazilian symposium on Multimedia and the web
Dynamic performance management in multi-tenanted business process servers using nonlinear control
ICSOC'12 Proceedings of the 10th international conference on Service-Oriented Computing
Understanding the interactions between users and versions in multi-tenant systems
Proceedings of the 2013 International Workshop on Principles of Software Evolution
Multi-tenancy performance benchmark for web application platforms
ICWE'13 Proceedings of the 13th international conference on Web Engineering
Hi-index | 0.00 |
Multi-tenancy is one of key characteristics of the service oriented computing especially for Software as a Service (SaaS) to leverage economy of scale to drive down total cost of ownership for both service consumer and provider. This paper aims to study the technologies to build a cost-effective, secure and scalable multi-tenant infrastructure, especially in data tier. We first explore all the key implementation patterns of data tier multi-tenancy on aspects of isolation, security, customization & scalability etc. Furthermore, we mainly evaluate the performance of these design patterns on aspects of isolation and security via a series of experiments and simulations. This paper also identifies the potential performance bottlenecks, summarizes corresponding optimization approaches and best implementation practices for different multi-tenant business usage models.