Filters








3,000 Hits in 7.1 sec

Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure

Annanda Rath, Bojan Spasic, Nick Boucart, Philippe Thiran
2019 Computers  
In this paper, we explore the security patterns for Cloud SaaS. We work on the patterns covering different security aspects from system and data security to privacy.  ...  However, there are many concerns around issues like system security, communication security, data security, privacy, latency and availability.  ...  In this paper, we address this new area, the Cloud. We identify the Cloud SaaS security patterns for different security aspects, from data and system security to privacy.  ... 
doi:10.3390/computers8020034 fatcat:jnioswntibdazml2t5tmwt5jeq

A pattern-based method for establishing a cloud-specific information security management system

Kristian Beckers, Isabelle Côté, Stephan Faßbender, Maritta Heisel, Stefan Hofbauer
2013 Requirements Engineering  
Assembling an Information Security Management System (ISMS) according to the ISO 27001 standard is difficult, because the standard provides only very sparse support for system development and documentation  ...  We analysed the ISO 27001 demands for these multidisciplinary challenges and for cloud computing systems.  ...  SaaS processes and stores Data input and output from the End Customers. The Cloud Provider, Cloud Customer, Cloud Developer, and End Customer are part of the Direct System Environment.  ... 
doi:10.1007/s00766-013-0174-7 fatcat:v2ayri4rnzg6zktupgnx2dxuqe

An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing Example

Kristian Beckers, Stephan Fassbender, Holger Schmidt
2012 2012 Seventh International Conference on Availability, Reliability and Security  
The problem is even more complex for cloud computing systems, because of the international distribution, huge amounts of processed data, and a large number of stakeholders that own or process the data.  ...  The requirements artifacts then serve as inputs for existing patterns for the identification of laws relevant for the online banking cloud system.  ...  Use the descriptions from the law patterns, cloud system analysis pattern and the templates.  ... 
doi:10.1109/ares.2012.25 dblp:conf/IEEEares/BeckersFS12 fatcat:e3lielrvjrdfzku3avlqg4vovm

Configuration in ERP SaaS Multi-Tenancy [article]

Djamal Ziani
2014 arXiv   pre-print
Allowing many customers to change software configurations without impacting others customers and with preserving security and efficiency of the provided services, becomes a big challenge to SaaS vendors  ...  Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS provides software application as Web based delivery to server many customers.  ...  So, to ensure the privacy and the security of the tenant configuration data, we suggest that each tenant will use a separate database to save the transactional and the configuration data. 5.2.2.  ... 
arXiv:1405.0650v1 fatcat:tle6pei4kbbkdhrgpg2a54rxte

Security of Cloud Virtualized Resource on a SaaS Encryption Solution

Chinedu Paschal Uchenna
2018 Science Journal of Energy Engineering  
Its major objective is to design and implement an encryption system for protecting valuable data (such as passwords, messages, files) in the cloud environment.  ...  The security of the cloud infrastructure entails protecting cloud data from unauthorized access, preventing malicious programs from corrupting the virtual resource and ensuring the secure cloud data remains  ...  The cloud encryption system is a cloud-based SaaS application with full data security and privacy measure in place for the cloud application service environment.  ... 
doi:10.11648/j.sjee.20180601.12 fatcat:2egomlvchraibglrljtgmwvkfu

Dynamic Resource Monitoring of SaaS with Attestation for a Trusted Cloud Environment

Udhayakumar Shanmugam, Latha Tamilselvan
2016 International Journal of Security and Its Applications  
Consequently, every resource that is shared in the cloud is not secure enough, hence, the need to monitor these shared services for its trustworthiness has aroused.  ...  An Application Monitoring Engine (AME) gets invoked at runtime to detect any changes in the behavior and analysis its pattern.  ...  Trust in cloud computing requires data to be digitally signed for integrity and hence privacy preservation must be provided through efficient cryptographic techniques.  ... 
doi:10.14257/ijsia.2016.10.4.05 fatcat:jrhge7k3lngqdpbnzy7qwv2dnm

A Case Study : Security as A Service (SAAS) in Cloud Computing Environment

Vivekanand A, Trilok Singh Randhawa
2018 International Journal of Scientific Research in Science and Technology  
Security-as-a-service (SaaS) is an outsourcing model for security management in cloud computing environment.  ...  Outsourcing of administrative tasks, such as log management, to save time and money and allow an organization to devote more time to its core competencies.  ...  The data privacy and service availability in cloud computing are the key security problem.  ... 
doi:10.32628/ijsrst18401110 fatcat:jjmsyrfx45calnbf5jad4nodzi

SAAS: Attack Detection and Prevention with Forensic in cloud Environment

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In this paper system proposed forensic investigation of cloud security for trusted and untrusted environments.  ...  Basically cloud computing security is essential nowadays, it has arisen as a technology to allow users as well as clients to access communications, data storage, software as well as exploitation Environment  ...  PROPOSED METHODOLOGY In the proposed research work to design and implement a system that can provide the security to data, in cloud environment and provide the security from insider attacks like collusion  ... 
doi:10.35940/ijitee.l2900.119119 fatcat:lxs4nfs6tjgqhok43plj5wucm4

Signature Verification SaaS Implementation on Microsoft Azure Cloud

Joel Philip, Vinayak A. Bharadi
2016 Procedia Computer Science  
Signatures recognition systems can be used to identify precisely user identity by making use of signature information such as x, y variations and pressure from a tablet PC.  ...  This makes way for using dynamic, i.e., online handwritten signature based biometric system is more accurate than the static ones, hence can be useful for signature verification applications.  ...  But WLD differs from Local Binary Pattern and SIFT.  ... 
doi:10.1016/j.procs.2016.03.053 fatcat:kg47tuu6sjebnmbcvd72yhndk4

A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications [article]

Obinna Ethelbert, Faraz Fatemi Moghaddam, Philipp Wieder, Ramin Yahyapour
2017 arXiv   pre-print
This paper is focused on the security and privacy challenges of cloud computing with specific reference to user authentication and access management for cloud SaaS applications.  ...  A theoretical analysis of the proposed model portrays a system that is secure, lightweight and highly scalable for improved cloud resource security and management.  ...  However, security and privacy issues in the cloud SaaS model has been an area of challenge; in fact, authentication & authorization, confidentiality of data, security of network information and infrastructures  ... 
arXiv:1710.08281v1 fatcat:ksw2biakxvar5h6zac34hjueui

uFETCH: A Unified Searchable Encryption Scheme and Its SaaS-Native to Make DBMS Privacy-Preserving

Shen-Ming Chung, Ming-Der Shieh, Tzi-Cker Chiueh, Chia-Chia Liu, Chia-Heng Tu
2020 IEEE Access  
to make database management system (DBMS) privacy-preserving.  ...  secure in the widely-adopted 3-tier cloud structure to help cloud service providers ease regulation compliance with out-sourced repository.  ...  With the merit of SaaS-native to make off-the-shelf DBMS privacy-preserving, uFETCH brings the following contributions to advocate cloud security and privacy. [7] .  ... 
doi:10.1109/access.2020.2994598 fatcat:hsn4mkgikrcf5axnxroygiitaa

A Systematic Mapping Study on the Multi-tenant Architecture of SaaS Systems

Victor H. S. C. Pinto, Helder J. F. Luz, Ricardo R. Oliveira, Paulo S. L. Souza, Simone R. S. Souza
2016 Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering  
Multi-tenant Architecture (MTA) is an organizational pattern for SaaS that enables a single instance of an application to be hosted on the same hardware and accessed by multiple customers, so-called tenants  ...  Tenants are able to configure the system according to their particular needs.  ...  TOSSMA (Tenant Oriented SaaS Security Management Architecture): an architecture to isolate resources for tenants through the injection of authorization controls [30] Data combination privacy [31]  ... 
doi:10.18293/seke2016-068 dblp:conf/seke/PintoLOSS16 fatcat:mxeqpnlvlzfrbkvmeswmfd6elm

BodyCloud: A SaaS approach for community Body Sensor Networks

Giancarlo Fortino, Daniele Parisi, Vincenzo Pirrone, Giuseppe Di Fatta
2014 Future generations computer systems  
Cloud computing can provide a flexible storage and processing infrastructure to perform both online and offline analysis of data streams generated in BSNs.  ...  This paper proposes BodyCloud, a SaaS approach for community BSNs that supports the development and deployment of Cloudassisted BSN applications.  ...  -The definition of a high-level global security framework for BodyCloud which allows for data privacy at the different sites (Body, Cloud, Analyst and Viewer).  ... 
doi:10.1016/j.future.2013.12.015 fatcat:gedkd4vlhjgbzl6rx7mtetlk2a

SAAS Based E-Court Applications in E-Governance in India

Vasista T.G
2018 International Journal of Managing Public Sector Information and Communication Technologies  
SaaS based Cloud computing model has a potential to offer solutions in the form of automated useroriented legal case management system while addressing the capital expenditure and it's Return on Investment  ...  Corrupt officials and greedy lawyers may instead of speeding up, actually can cause administrative delays in which they have no effect on outcomes but transfer apparent responsibility for decision from  ...  Mohammed Ahmed Turki Al-Sudairi and Deanship of Library Affairs of King Saud University, Riyadh, Saudi Arabia for accessing and utilizing knowledge resources during the year 2013 in this regard.  ... 
doi:10.5121/ijmpict.2018.9301 fatcat:i6m7gubewngfvkwwl6cjhkksia

An Approach for Investigating Perspective of Cloud Software-as-a-Service (SaaS)

Sushil Bhardwaj, Leena Jain, Sandeep Jain
2010 International Journal of Computer Applications  
and managing the production operations. • Ensuring the security and privacy of client data. • Have the ability to gather comprehensive information about flaws, performance and usage patterns to improve  ...  SaaS vendor advertently takes responsibility for deploying and managing the IT infrastructure (servers, operating system software, databases, data center space, network access, power and cooling, etc.)  ... 
doi:10.5120/1450-1962 fatcat:bt36rb74r5bxlkx7jkq2h4lrka
« Previous Showing results 1 — 15 out of 3,000 results