Open Access Open Access  Restricted Access Subscription or Fee Access

Software as a Service Security Challenges in Cloud Computing

C. Kalpana


Cloud computing is clearly one of today‟s most
enticing technology areas to its cost-efficiency and flexibility.
There is a growing trend of using cloud services for ever growing storage and data processing needs. However, adopting a cloud computing paradigm may have positive as well as negative effects on the security of service consumers. This paper primarily aims to highlight the major security challenges existing in current cloud
computing Service Provider Software as a Service (SaaS). We also describe some elements of our vision. The core issue is that with the advent of the cloud, the cloud provider also has some control of the cloud users data. We aim to provide tools supporting the current capabilities of the cloud while limiting cloud provider control of data and enabling all cloud users to benefit from cloud data through enhanced business intelligence.


Software as a Service,cloud computing Service Provider Software as a Service (SaaS).

Full Text:



R. Buyya, C. S. Yeo, and S. Venugopal, “Market-Oriented

CloudComputing: Vision, Hype, and Reality for Delivering IT

Servicesas Computing Utilities,” Proceedings of the 10th IEEE

InternationalConference on High Performance Computing and

Communications,p. 9, August 2008. [Online]. Available:

SLA Management Team, SLA Management Handbook, 4th ed.

EnterprisePerspective, 2004.

G. Frankova, Service Level Agreements: Web Services and Security,

ser.Lecture Notes in Computer Science. Berlin, Heidelberg: Springer

BerlinHeidelberg, 2007, vol. 4607.

P. Patel, A. Ranabahu, and A. Sheth, “ServiceLevel Agreement in

Cloud Computing,” CloudWorkshops at OOPSLA09, 2009. [Online].



D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman,L.

Youseff, and D. Zagorodnov, “The Eucalyptus Open-Source Cloud-

Computing System,” Cluster Computing and the Grid, IEEE

InternationalSymposium on, vol. 0, pp. 124–131, 2009.

T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and

Privacy: An Enterprise Perspective on Risks and Compliance, 1st ed.,




R. Kanneganti and P. Chodavarapu, SOA Security.

ManningPublications, 2008. [Online]. Available:


M. McIntosh and P. Austel, “XML signature element wrapping

attacksand countermeasures,” Workshop On Secure Web Services,

M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, On Technical

Security Issues in Cloud Computing. IEEE, 2009.

B. D. Payne, “Xenaccess.” [Online]. Available:

M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, On Technical

Security Issues in Cloud Computing. IEEE, 2009.

Greg Boss, Padma Malladi, Denis Quan, Linda Legregni, Harold Hall,

“Cloud Computing”,

ods/library.html, October 2007, pp. 4-4

“Service Level Agreement Definition and contents”,, accessed on March 10, 2009.

“Cloud security alliance: Security guidance for critical areas of focus

in cloud computing v2.1,” Dec 2009. Available at:

“Wesam Dawoud, Ibrahim Takouna, Christoph Meinel Infrastructure

as a Service Security,

Tripathi, A.; Mishra, A.; IT Div., Gorakhpur Centre, Gorakhpur, India

“Cloud Computing Security Considerations”, Signal Processing,

Communications and Computing (ICSPCC), 2011 IEEE International


UNDERSTANDING The Cloud Computing Stack SaaS, Paas, IaaS,

© Diversity Limited, 2011 Non-commercial reuse with attribution


Laura Smith on “ A health care community cloud takes shape”



  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.