Software as a Service, a Detailed Study on Challenges and Security Threats
|International Journal of Computer Science and Engineering|
|© 2015 by SSRG - IJCSE Journal|
|Volume 2 Issue 12|
|Year of Publication : 2015|
|Authors : S.Kokila, T. Princess Raichel|
How to Cite?
S.Kokila, T. Princess Raichel, "Software as a Service, a Detailed Study on Challenges and Security Threats," SSRG International Journal of Computer Science and Engineering , vol. 2, no. 12, pp. 9-14, 2015. Crossref, https://doi.org/10.14445/23488387/IJCSE-V2I12P103
Cloud computing, without a doubt, has turned into the trendy expression in the IT business today. Taking a gander at the potentialsway it has on various business applications and also in our ordinary life, it can absolutely be said thatthis troublesome innovation arrives to sit tight. Large portions of the components that make distributed computing appealing, have challenged the current security framework, as well as uncovered new security issues. This paper gives an astute investigation of the current status on distributed computing security issues in view of a point by point overview conveyed by the creator. It likewise makes an endeavor to depict the security challenges in Software as a Service (SaaS) model of distributed computing furthermore tries to give future security research bearings.
Cloud Computing, Software as a Service, Security Issues.
 OpenSSL Project. http://www.openssl.org/.
 P. Anderson and L. Zhang. Fast and secure laptop backups withencrypted de-duplication. In Proc. of USENIX LISA, 2010.
 M. Bellare, S. Keelveedhi, and T. Ristenpart.Dupless: Serveraided encryption for deduplicated storage. In USENIX SecuritySymposium, 2013.
 M. Bellare, S. Keelveedhi, and T. Ristenpart.Messagelockedencryption and secure deduplication. In EUROCRYPT, pages 296–312, 2013.
 M. Bellare, C. Namprempre, and G. Neven. Security proofs foridentity-based identification and signature schemes. J. Cryptology,22(1):1–61, 2009.
 M. Bellare and A. Palacio.Gq and schnorr identification schemes:Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162–177, 2002.
 S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider.Twinclouds: An architecture for secure cloud computing.In Workshopon Cryptography and Security in Clouds (WCSC 2011), 2011.
 J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer.Reclaiming space from duplicate files in a serverlesscloudfile system. In ICDCS, pages 617–624, 2002.
 D. Ferraiolo and R. Kuhn. Role-based access controls. In 15thNIST-NCSC National Computer Security Conf., 1992.
 GNU Libmicrohttpd. http://www.gnu.org/software/libmicrohttpd/.
 S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg.Proofs ofownership in remote storage systems. In Y. Chen, G. Danezis,and V. Shmatikov, editors, ACM Conference on Computer andCommunications Security, pages 491–500. ACM, 2011.
 J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou. Secure deduplicationwith efficient and reliable convergent key management. In IEEETransactions on Parallel and Cloud Systems, 2013.
 libcurl. http://curl.haxx.se/libcurl/.
 C. Ng and P. Lee. Revdedup: A reverse deduplication storagesystem optimized for reads to latest backups. In Proc. of APSYS,Apr 2013.12
 W. K. Ng, Y. Wen, and H. Zhu. Private data deduplicationprotocols in cloud storage. In S. Ossowski and P. Lecca, editors,Proceedings of the 27th Annual ACM Symposium on Applied Computing, pages 441–446. ACM, 2012