As long as no kind of automated access to the files is necessary, this would work perfectly with standard password-protected public shares, which can also be renamed. e.g cloud.yourdomain.tld/s/customer1
.
Or you could use the Guests app I mentioned. Guest users by default can only access files shared to them and cannot create any files outside of shares, cannot find other users, can only use whitelisted apps. etc. See here for more details: guests/README.md at master · nextcloud/guests · GitHub
EDIT: Just saw the following: guests/README.md at master · nextcloud/guests · GitHub
By default, guests will not be able to list other users in the system, but if a guest gets added to a group they will be able to list users within that group (and, for example, share files with those users).
As a result, guests will be able to see each other as they are part of the same guest group. To prevent that behavior, you can add the guest group to the “Exclude groups from sharing” settings. You can find more information in our documentation about sharing.
Not sure how I should feel about this, and I’m not a developer, so I can’t give a technical explanation, but apperantly the Guests App, only separates its users from normal users by putting them in a special “Guests” group, and thus ultimately has the same potential pitfalls like with normal users and groups, which imho makes it a bit too easy to configure it in a way that other users could be found, either through misconfiguration or through bugs that could be introduced in Nextcloud.
I’m not sure, but to me this all doesn’t seem really secure by design, and so I can only repeat myself that Nextcloud is definitely not suitable for multi-tenancy. Is it suitable for this particular use case? Maybe. Would it be suitable for a bank to share things that way with completly unrelated customers? Probably not 
Either way, I would recommend at least to test it extensively before putting it in production.