Data Security for Software as a Service

Author(s):  
Pradeep Kumar Tiwari ◽  
Sandeep Joshi

Cloud computing is a BUZZ word of modern computing scenario. Cloud computing services are flexible and cost effective with resource utilization. Cloud computing have three service models SaaS (Software as a Service) PaaS (Plateform as a Service) and Iaas (Infrastructure as a Service). SaaS provide on demand application services such as email, ERP and CRM etc. Multi user can access applications and they can interact to each other at same time. All users data can be reside at same place. This flexibility of SaaS service also gives the security breaches. Loop holes of SaaS harder to find and maintain. The authors discuss here security vulnerabilities of SaaS with possible solutions. This study would be helpful to elaborate to understand data security issues and privacy solutions over SaaS.

2016 ◽  
pp. 864-880
Author(s):  
Pradeep Kumar Tiwari ◽  
Sandeep Joshi

Cloud computing is a BUZZ word of modern computing scenario. Cloud computing services are flexible and cost effective with resource utilization. Cloud computing have three service models SaaS (Software as a Service) PaaS (Plateform as a Service) and Iaas (Infrastructure as a Service). SaaS provide on demand application services such as email, ERP and CRM etc. Multi user can access applications and they can interact to each other at same time. All users data can be reside at same place. This flexibility of SaaS service also gives the security breaches. Loop holes of SaaS harder to find and maintain. The authors discuss here security vulnerabilities of SaaS with possible solutions. This study would be helpful to elaborate to understand data security issues and privacy solutions over SaaS.


2016 ◽  
pp. 1162-1190
Author(s):  
Peter Sasvari ◽  
Zoltán Nagymate

Innovation capability has increasingly been searched by the ICT sector in cloud computing applications recently. This chapter describes the economic potentials of cloud computing and explores the characteristics of its usage among Hungarian enterprises. Although enterprises are aware of the basic concept of cloud computing, they have concerns about its application mainly due to data security issues and the lack of education. The chance of using cloud computing services is mainly facilitated by the creation of easier application and consultation would positively affect their usage. According to microenterprises and corporations, faster information flow and remote access are the key benefits of cloud usage. In the case of small-sized enterprises, the two main advantages are easier system recoverability and a higher level of mobility in case of a system breakdown. For the medium-sized enterprises, remote access and greater data security were the key benefits of using cloud computing services in 2014.


Author(s):  
Peter Sasvari ◽  
Zoltán Nagymate

Innovation capability has increasingly been searched by the ICT sector in cloud computing applications recently. This chapter describes the economic potentials of cloud computing and explores the characteristics of its usage among Hungarian enterprises. Although enterprises are aware of the basic concept of cloud computing, they have concerns about its application mainly due to data security issues and the lack of education. The chance of using cloud computing services is mainly facilitated by the creation of easier application and consultation would positively affect their usage. According to microenterprises and corporations, faster information flow and remote access are the key benefits of cloud usage. In the case of small-sized enterprises, the two main advantages are easier system recoverability and a higher level of mobility in case of a system breakdown. For the medium-sized enterprises, remote access and greater data security were the key benefits of using cloud computing services in 2014.


2017 ◽  
Vol 17 (4) ◽  
pp. 3-31 ◽  
Author(s):  
P. Ravi Kumar ◽  
P. Herbert Raj ◽  
P. Jelciana

AbstractCloud computing is emerging as one of the powerful computing technologies in the field of Information Technology due to its flexibility and cost reduction. This paper provides a detailed survey on security issues of the services provided by cloud computing and solutions to mitigate them. The main objective of this paper is to empower a new researcher to figure out the concepts of cloud computing, the services provided by them, and the security issues in the services. It also provides solutions to avoid or mitigate the different security issues which occur in the services provided by cloud computing. Additionally, it provides insight into the cloud computing model proposed by the National Institute of Standards and Technology (NIST), data stages and data security basics in a multi-tenant environment. This paper explores the different security methods proposed by different researchers and analyzes them.


2014 ◽  
Vol 687-691 ◽  
pp. 3032-3035
Author(s):  
Qin Li

This paper describes cloud computing services, analyzes the types of services and cloud computing services corresponding structural model; research focus on cloud computing data security issues were discussed in the service mode.


2014 ◽  
Vol 3 (2) ◽  
pp. 440-445
Author(s):  
Atefeh Heydari ◽  
Mohammad Ali Tavakoli ◽  
Mohammad Riazi

Traditionally, computational needs of organizations were alleviated by purchasing, updating and maintaining required equipments. Beside expensive devices, physical space to hold them, technical staffs to maintain them and many other side costs were essential prerequisites of this matter. Nowadays with the development of cloud computing services, a huge number of peoples and organizations are served in terms of computational needs by large scale computing platforms. Offering enormous amounts of economical compute resources on-demand motivates organizations to outsource their computational needs incrementally. Public cloud computing vendors offer their infrastructure to the customers via the internet. It means that the control of customers’ data is not in their hands anymore. Unfortunately various security issues are emerged from this subject. In this paper the security issues of public cloud computing are overviewed. More destructive security issues are highlighted in order to be used by organizations in making better decisions for moving to cloud.


Cloud computing services mature both economically and technologically and play a more and more extensive role in the domain of software and information systems engineering. SaaS offers advantage for both service providers and consumers. SaaS is faced with the question of appropriate techniques applying at early phase of Requirements engineering of producing system. The paper highlights two traditional methods namely i* and VORD belonging respectively to Goal oriented Requirements Engineering and Viewpoints approaches. The approach proposed try to dealing with the requirements elicitation in the context of Software-as-a-service SaaS. So, the approach benefits from strengths of both VORD and i* models and propose a combination of them in a new approach namely VORDi*.


Author(s):  
Yulin Yao

Cloud Computing has offered many services to organizations and individuals. The emerging types of services such as analytics, mobile services and emerging software as a service have been offered but there is a lack of analysis on the current status. Core technologies for emerging Cloud services have been identified and presented. This brief opinion paper provides an overview of the current emerging Cloud services and explains the benefits for several disciplines. Four areas have been identified that may bring in more positive impacts for the future direction.


2016 ◽  
pp. 1283-1315
Author(s):  
Omondi John Opala ◽  
Shawon S. M. Rahman ◽  
Abdulhameed A. Alelaiwi

Cloud computing is synonymous with outsourced data center management and agile solution architecture that improves the scalability for delivery of services for enterprises. It has the capability to revolutionize how data is delivered from commodity to Information Technology as a service. At its core, Cloud computing is a new approach to distributed computing and shared pooling of IT infrastructure linked together to offer centralized IT services on demand. Companies that provide Cloud computing services manage multiple virtualized computation systems that allow for dynamic on-demand provisioning of IT delivery as services. This chapter presents a study of the factors that influence the adoption of Cloud computing in enterprises based on managements' perception of security, cost-effectiveness, and IT compliance. The results of a linear regression analysis testing are presented, which indicate that managers' perceptions of cost-effectiveness and IT compliance are more significantly correlated to the enterprise adoption of Cloud computing than security.


Sign in / Sign up

Export Citation Format

Share Document