Log-Based Approach for Security Implementation in Cloud CRM’s

Enterprise applications in the cloud satisfy customer needs as well as business needs along with the capability of supporting multiple users and managing massive data storage. On the other hand, these applications contain sensitive data that needs to be security compliant. The increasing adoption of cloud-based applications, owing to several advantages over the traditional ones such as cost savings, availability, time savings, etc., have also posed many issues and challenges that need to be addressed. One of the important applications, cloud-based CRM’s, is the best example of the same. This paper aims to identify certain security and privacy threats over the SaaS-based CRM solutions and the measures to overcome them in order to ensure smooth functioning of business processes. The paper also highlights logs’ monitoring and troubleshooting mechanisms so as to enhance 24/7 business continuity operations.

[1]  Raffael Marty,et al.  Cloud application logging for forensics , 2011, SAC.

[2]  Siyu Xiao,et al.  Application Research of CRM Based on SaaS , 2010, 2010 International Conference on E-Business and E-Government.

[3]  M. Vanitha,et al.  Performance enhanced security for enterprise cloud application , 2016, 2016 International Conference on Computer Communication and Informatics (ICCCI).

[4]  Simone Braun,et al.  Towards Efficient and Secure Data Storage in Multi-tenant Cloud-Based CRM Solutions , 2015, 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC).

[5]  Imre Petkovic,et al.  CRM in the cloud , 2010, IEEE 8th International Symposium on Intelligent Systems and Informatics.

[6]  Nitin Mishra Encrypted IT Auditing and Log Management on Cloud Computing , 2011 .

[7]  Mahdi Seify,et al.  New Method for Risk Management in CRM Security Management , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[8]  Yonggang Wen,et al.  StealthyCRM: A Secure Cloud CRM System Application that Supports Fully Homomorphic Database Encryption , 2015, 2015 International Conference on Cloud Computing Research and Innovation (ICCCRI).

[9]  Ahmad Ghafarian Foreniscs analysis of cloud computing services , 2015, 2015 Science and Information Conference (SAI).