Challenges and Solutions to Impart Security on Software as A Service Model of Cloud Computing

Authors

  • Kranthi Kumar Rudrarapu  VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, Telangana, India
  • L. Jai Vinita  VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, Telangana, India
  • Dr. P. Neelakantan  VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, Telangana, India

Keywords:

Cloud Computing, software as a service, security

Abstract

The buzzword in the IT business enterprise in recent times is cloud computing and it has a potential impact on several business applications as well as in our regular life. Many of the abilities that make cloud computing attractive have now not certainly challenged the existing security system, however, have additionally determined out new security issues. This paper gives an insightful evaluation of the existing fame on cloud computing protection issues based totally on a detailed survey and it additionally makes an try and describe the protection dreadful conditions in software as a service (SaaS) version of cloud computing and additionally endeavours to offer destiny safety research instructions.

References

  1. Pratap Murukutla, K.C. Shet (2012).Single Sign On for Cloud .In: International Conference on Computing Sciences,2012 IEEE DOI 10.1109/ICCS.2012.66
  2. Choudhary V.(2007). Software as a service: implications for investment in software development. In: International conference on system sciences, 2007, p. 209.
  3. Amlan Jyoti Choudhury, Pardeep Kumar,Mangal Sain, Hyotaek Lim, Hoon Jae-Lee(2011).A Strong User Authentication Framework for Cloud Computing.In: IEEE Asia -Pacific Services Computing Conference,2011 IEEE DOI 10.1109/APSCC.2011.14
  4. Cloud Security Alliance. Security Guidance for critical areas of focus in cloud computing Version 2.1.(2009) , (http://www.cloudsecurityalliace.org/guidance/csaguide.pdf).
  5. Cloud Security Alliance. Security best practices for cloud computing,2010b [Accessed :July 2012].
  6. Cloud Security Alliance. Guidance for identity & accessmanagement V2.1,2010a [Accessed :July 2012]. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol.3, No.4, August 2013 10
  7. Heiser J.( 2009) What you need to know about cloud computing security and compliance, Gartner, Research, ID Number: G00168345. [2] Seccombe A.., Hutton A, Meisel A, Windel A, Mohammed A, Licciardi A, (2009). Security guidance for critical areas of focus in cloud computing, v2.1. Cloud Security Alliance, 25 p.
  8. Softlayer. Service Level Agreement and Master Service Agreement,2009 /http:// www.softlayer.com/sla.htmlS [Accessed: October2012].
  9. Mell P, Grance T (2011) The NIST definition of Cloud Computing. NIST, Special Publication 800– 145, Gaithersburg, MD
  10. European Union. Directive 95/46/EC of the European parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data; 1995.
  11. ITU,2013. Cloud Computing Focus Group. .[Accessed : January 2013]
  12. SNIA.(2013).Storage Networking Industry Association. .[Accessed : January 2013]
  13. DTMF,2013.Distributed Management Task Force. .[Accessed : January 2013]
  14. IEEE CCSSG. IEEE Cloud Computing Standard Study Group. .[Accessed : January 2013]

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Kranthi Kumar Rudrarapu, L. Jai Vinita, Dr. P. Neelakantan, " Challenges and Solutions to Impart Security on Software as A Service Model of Cloud Computing , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.1102-1108, November-December-2017.