Full Paper View Go Back
Analysis of Cloud Computing Security Issues in Software as a Service
Vishnu Patidar1 , Makhan Kumbhkar2
Section:Review Paper, Product Type: Isroset-Journal
Vol.2 ,
Issue.3 , pp.1-5, May-2014
Online published on Jul 01, 2014
Copyright © Vishnu Patidar, Makhan Kumbhkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Vishnu Patidar, Makhan Kumbhkar, “Analysis of Cloud Computing Security Issues in Software as a Service,” International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.3, pp.1-5, 2014.
MLA Style Citation: Vishnu Patidar, Makhan Kumbhkar "Analysis of Cloud Computing Security Issues in Software as a Service." International Journal of Scientific Research in Computer Science and Engineering 2.3 (2014): 1-5.
APA Style Citation: Vishnu Patidar, Makhan Kumbhkar, (2014). Analysis of Cloud Computing Security Issues in Software as a Service. International Journal of Scientific Research in Computer Science and Engineering, 2(3), 1-5.
BibTex Style Citation:
@article{Patidar_2014,
author = {Vishnu Patidar, Makhan Kumbhkar},
title = {Analysis of Cloud Computing Security Issues in Software as a Service},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {5 2014},
volume = {2},
Issue = {3},
month = {5},
year = {2014},
issn = {2347-2693},
pages = {1-5},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=136},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=136
TI - Analysis of Cloud Computing Security Issues in Software as a Service
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Vishnu Patidar, Makhan Kumbhkar
PY - 2014
DA - 2014/07/01
PB - IJCSE, Indore, INDIA
SP - 1-5
IS - 3
VL - 2
SN - 2347-2693
ER -
Abstract :
Cloud computing is current buzzword in the market. It is standard in which the assets can be leveraged on per use basis thus reducing the cost and complexity of service providers. Cloud computing promises to cut operational and capital costs and more importantly let IT departments focus on strategic projects instead of keeping datacenters running. It is much more than simple internet. It is a construct that allows user to access applications that actually reside at location other than user’s own computer or other Internet-connected devices. There are numerous benefits of this construct. For instance other company hosts user application[1]. This implies that they handle cost of servers, they manage software updates and depending on the contract user pays less i.e. for the service only. Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for both Cloud providers and consumers as well. Software as a Service (SaaS) serves as the foundation layer for the other delivery models, and a lack of security in this layer will certainly affect the other delivery models, i.e., PaaS, and SaaS that are built upon IaaS layer. This paper presents an elaborated study of SaaS components’ security and determines vulnerabilities and countermeasures. Service Level Agreement should be Considered very much importance [1].
Key-Words / Index Term :
Computing, Cloud Computing Security, Service Level Agreement (SLA), Software as a Service (SaaS)
References :
[1].M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “ Technical Security Issues in Cloud Computing”. IEEE, 2009.
[2]. Greg Boss, Padma Malladi, Denis Quan, Linda Legregni, Harold Hall, “Cloud Computing”, http://www.ibm.com/developerswork/websphere/zones/hip ods/library.html, October 2007, pp. 4-4.
[3]G. Frankova, Service Level Agreements: Web Services and Security, ser. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, vol. 4607.
[4]. “Service Level Agreement and Master Service Agreement”, http://www.softlayer.com/sla.html, accessed on April 05, 2009.
[5]. S. Berger, R. Caceres, D. Pendarakis, R. Sailer, E. Valdez, R. Perez, W. Schildhauer, and D. Srinivasan, “Security for the cloud infrastrcture: trusted virtual data center (TVDc).” [Online]. Available: www.kiskeya.net/ramon/work/pubs/ibmjrd09.pdf
[6]. http://www.cloudsecurity.org, accessed on April 10, 2009.
[7]. “Sampling issues we are addressing”, http://cloudsecurityalliance.org/issues.html#15, accessed on April 09, 2009.
[8]. MikeKavis,”Real time transactions in the cloud”, http://www.kavistechnology.com/ blog/?p=789, accessed on April 12, 2009.
[9]. “Secure group addresses cloud computing risks”, http://www.secpoint.com/security-group-addresses-cloudcomputing- risks.html, April 25, 2009.
[10]. “Service Level Agreement Definition and contents”, http://www.service-level-agreement.net, accessed on March 10, 2009.
[11]“Cloud security alliance: Security guidance for critical areas of focus in cloud computing v2.1,” Dec 2009. Available at: www.cloudsecurityalliance.org.
[12]. “Wesam Dawoud, Ibrahim Takouna, Christoph Meinel Infrastructure as a Service Security.
[13]. Dynamic job Scheduling in Cloud Computing based on horizontal load “Mousumi Paul1, Debabrata Samanta2, Goutam Sanyal3 Department of CSE” Vol 2 (5), 1552-1556, ISSN:2229-6093
[14]. V. Vijayalakshmi et al. / International Journal of Engineering Science and Technology (IJEST) “STUDY ON RECENT TRENDS AND OPPORTUNITIES IN CLOUD COMPUTING”
[15]. M.Sudha et. al. / (IJCSE) International Journal on Computer Science and Engineering “Investigation on Efficient Management of workflows in cloud computing Environment”, Vol. 02, No. 05, 2010.
[16] S L Saini, Dinesh Kumar Saini, Jabar H. Yousif and Sandhya V Khandage “Cloud Computing and Enterprise Resource Planning Systems” , ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online)
[17 ] M.Sudha et. al. / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 05, 2010, 1841-1845 , “Investigation on Efficient Management of workflows in cloud computing Environment “
[18] SADHANA RANA . “ RISK ANALYSIS IN WEB APPLICATIONS BY USING CLOUD COMPUTING” , International Journal of Multidisciplinary Research Vol.2 Issue 1, January 2012, ISSN 2231 5780.
[19] Makhan Kumbhkar at el ,“Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution” Vol-1,Issue-6 ISSN: 2320-7639.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.