Data Security for Software as a Service

Cloud computing is a BUZZ word of modern computing scenario. Cloud computing services are flexible and cost effective with resource utilization. Cloud computing have three service models SaaS (Software as a Service) PaaS (Plateform as a Service) and Iaas (Infrastructure as a Service). SaaS provide on demand application services such as email, ERP and CRM etc. Multi user can access applications and they can interact to each other at same time. All users data can be reside at same place. This flexibility of SaaS service also gives the security breaches. Loop holes of SaaS harder to find and maintain. The authors discuss here security vulnerabilities of SaaS with possible solutions. This study would be helpful to elaborate to understand data security issues and privacy solutions over SaaS.

[1]  Dave Cliff,et al.  A financial brokerage model for cloud computing , 2011, Journal of Cloud Computing: Advances, Systems and Applications.

[2]  Vladimir A. Oleshchuk,et al.  Security and privacy in the cloud a long-term view , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[3]  Robert P. Biuk-Aghai,et al.  Critical path based approach for predicting temporal exceptions in resource constrained concurrent workflows , 2009, Int. J. Inf. Technol. Web Eng..

[4]  Pradnyesh Rane Securing SaaS Applications: A Cloud Security Perspective for Application Providers , 2011 .

[5]  Wei Xie,et al.  Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.

[6]  Hai V. Tran Data Management Challenges in Cloud Computing , 2013, 2013 13th International Conference on Computational Science and Its Applications.

[7]  Yang Tang,et al.  FADE: Secure Overlay Cloud Storage with File Assured Deletion , 2010, SecureComm.

[8]  Wayne A. Jansen,et al.  Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[9]  Jörg Schwenk,et al.  All your clouds are belong to us: security analysis of cloud management interfaces , 2011, CCSW '11.

[10]  Garth A. Gibson,et al.  RAID: high-performance, reliable secondary storage , 1994, CSUR.

[11]  H K Huang,et al.  Medical image security in a HIPAA mandated PACS environment. , 2003, Computerized medical imaging and graphics : the official journal of the Computerized Medical Imaging Society.

[12]  Farzad Sabahi,et al.  Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[13]  Deepak H. Sharma,et al.  Security-as-a-Service from Clouds: A Comprehensive Analysis , 2013 .

[14]  Daniele Catteddu,et al.  Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .

[15]  Timothy Grance,et al.  Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .

[16]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[17]  Nilanjan Dey,et al.  Recent Research on Multi Input Multi Output (MIMO) based Mobile ad hoc Network: A Review , 2014, Int. J. Serv. Sci. Manag. Eng. Technol..

[18]  Tal Garfinkel,et al.  Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.

[19]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[20]  G. Sahoo,et al.  Securing Software as a Service Model of Cloud Computing: Issues and Solutions , 2013, CloudCom 2013.

[21]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[22]  Nilanjan Dey,et al.  Image Segmentation Using Rough Set Theory: A Review , 2014, Int. J. Rough Sets Data Anal..

[23]  Tommaso Cucinotta,et al.  Challenges in real-time virtualization and predictable cloud computing , 2014, J. Syst. Archit..

[24]  Ravi Pendse,et al.  Security in multi-tenancy cloud , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.

[25]  Siani Pearson,et al.  Privacy, Security and Trust in Cloud Computing , 2013 .

[26]  Peter Weiß,et al.  Basics to Develop Web Services for Human Resources , 2009 .

[27]  Jemal H. Abawajy,et al.  Big Data in Complex Systems: Challenges and Opportunities , 2015 .

[28]  A. Whyte,et al.  THE GRAMM-LEACH-BLILEY ACT OF 1999: RISK IMPLICATIONS FOR THE FINANCIAL SERVICES INDUSTRY , 2004 .

[29]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[30]  Ben Archibald Expect more from your SaaS vendor. , 2009, Occupational health & safety.

[31]  Tomayess Issa,et al.  Artificial Intelligence Technologies and the Evolution of Web 3.0 , 2015 .

[32]  Gail-Joon Ahn,et al.  SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.

[33]  Tal Garfinkel,et al.  When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.

[34]  Elio Toppano,et al.  How Culture May Influence Ontology Co-Design: A Qualitative Study , 2011, Int. J. Inf. Technol. Web Eng..

[35]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[36]  Hua Wang,et al.  Improved security of a dynamic remote data possession checking protocol for cloud storage , 2014, Expert Syst. Appl..

[37]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[38]  Marcos A. Simplício,et al.  A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.

[39]  Dirk Söffker,et al.  Modeling of Complex Human-Process Interaction as Framework for Assistance and Supervisory Control of Technical Processes , 2012, Int. J. Inf. Technol. Web Eng..

[40]  K. Popovic,et al.  Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.

[41]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[42]  Mehmet Hadi Gunes,et al.  Enhancing data privacy and integrity in the cloud , 2011, 2011 International Conference on High Performance Computing & Simulation.

[43]  Hamid Banirostam,et al.  A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure , 2013, 2013 UKSim 15th International Conference on Computer Modelling and Simulation.

[44]  Yang Gao,et al.  Secure cloud storage based on cryptographic techniques , 2012 .

[45]  Zaigham Mahmood,et al.  Data Location and Security Issues in Cloud Computing , 2011, 2011 International Conference on Emerging Intelligent Data and Web Technologies.

[46]  Adel Taweel,et al.  Engineering Reliable Service Oriented Architecture: Managing Complexity and Service Level Agreements , 2011 .

[47]  B. B. Amberker,et al.  Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy Preservation , 2012, 2012 International Symposium on Cloud and Services Computing.

[48]  Zhuolin Yang,et al.  Virtualization security for cloud computing service , 2011, 2011 International Conference on Cloud and Service Computing.

[49]  David Taniar,et al.  Image Mining: A Case for Clustering Shoe prints , 2008, Int. J. Inf. Technol. Web Eng..

[50]  Fahima Cheikh,et al.  Web Services Composition Problem: Model and Complexity , 2011 .

[51]  Adam Jatowt,et al.  Utilizing Past Web for Knowledge Discovery , 2009 .

[52]  Arthur Tatnall Web Technologies: Concepts, Methodologies, Tools and Applications , 2010 .