Security Measures on Mobile Technology Using Software as a Service (SaaS)
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014

Security Measures on Mobile Technology Using Software as a Service (SaaS)

Apoorva P, Akshay S

Deploying cloud computing in an enterprise infrastructure bring significant security concerns. In this paper, we have discussed about security and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. This paper discusses the importance of security in Mobile Technology using Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Here all kind of authentication mechanism is used such as SAML based, SSO and LDAP based authentication for more security. For authorization XACML is used. By following OSGi standard security plug-in has been developed so that anybody can just add the plug-in as a jar file and get the security features such as LADP registration, authentication. So this system is more flexible and compact than others.

Keywords: Iaas, SaaS, LADP, Cloud computing, Authentication

Edition: Volume 3 Issue 7, July 2014

Pages: 1293 - 1296

Share this Article

How to Cite this Article?

Apoorva P, Akshay S, "Security Measures on Mobile Technology Using Software as a Service (SaaS)", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20141286, Volume 3 Issue 7, July 2014, 1293 - 1296

126 PDF Views | 96 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Iaas'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Birds Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2681 - 2688

A Proposed Framework Using Neural Network in Web Mining for Improving the Performance of E-Learning System

Dar Masroof Amin, Atul Garg

Share this Article

Similar Articles with Keyword 'SaaS'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Birds Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1088 - 1093

Multi-Tenant SaaS Application Platform: A Survey

Basant Kumar Gupta, Keisam Thoiba Meetei

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2438 - 2441

STOC: Energy Cost Models of Smartphones for Task Offloading to the Cloud

Rahitha K, Gireesh T K

Share this Article

Similar Articles with Keyword 'Cloud computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Birds Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Similar Articles with Keyword 'Authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2234 - 2237

Analysis of Protective Mechanism in Roaming Network for Secure Communication

Ashwini A. Lokhande, Sonali U. Nimbhorkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1347 - 1350

A QR-Code Authentication for Medical Image Access Environment

Inakollu Ramesh, K. B. V. Rama Narasimham

Share this Article
Top