International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Secure and Efficient Multitenant Database in SaaS Delivery Model for an Ad hoc Cloud

Basant Kumar Gupta, Kalicharan Sahu

To implement secured SaaS delivery model; save costs; reduced service customizations and improved resource utilization; recently cloud service providers rapidly use the Multitenant database technology. Organizations can collaborate to create a Data Center which does not harm their availability and ability of gaining profit. These organizations are now days competed by spreading locations of their certain edges of others. Here Ad-Hoc cloud helps vendors in remote areas. Here the necessity increases for multitenant database in ad-hoc cloud to help multiple organizations to integrate and compete with each others. Here shared databases shared schema approach has been proposed which offers huge numbers of tenants as per database server. Authentication and Authorization are the noble specifications when we are going to deal with multitenancy. Most secured authentication protocol Kerberos is used on the top of multitenant database for taking participation in educational institutions.

Keywords: Multitenant Database, SaaS, Ad hoc Cloud, Kerberos, Authentication, Authorization

Edition: Volume 3 Issue 6, June 2014

Pages: 1082 - 1087


How to Cite this Article?

Basant Kumar Gupta, Kalicharan Sahu, "Secure and Efficient Multitenant Database in SaaS Delivery Model for an Ad hoc Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014407, Volume 3 Issue 6, June 2014, 1082 - 1087

27 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'SaaS'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2366 - 2370

A Survey on Multi-Keyword Ranked Query Search over Encrypted Cloud Storage

Jaikishan Tindwani, Aruna Gupta

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1861 - 1865

Security Rudiments for SaaS Application Development and Deployment

Anand Singh

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1285 - 1288

Integrity Attestation for Software-as-a Service Clouds

Chashu Mol R, Alfia A P

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1678 - 1681

Integrity Attestation and Auto-correction of Services for SaaS Clouds

Amulya Rachna, John Prakash Veigas

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1877 - 1880

Cloud Computing an Emerging Tool to Survive E-Business Especially Small and Medium Sized Business

Dr. Pragati Saxena

Share this article



Similar Articles with Keyword 'Kerberos'

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1443 - 1446

A Survey on Authenticated Key Exchange Protocols Used for Accessing Storage Devices in Parallel Network File System

Anila P, Prajeesh C B

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1937 - 1942

Achieving Data Confidentiality and Authentication in Cloud Computing

Abhilash S Nath, Reshna T

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2314 - 2318

Cloud And Parallel Network File System Using Authenticated Key Exchange Protocols

Anupama T, Refeeda K

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1082 - 1087

Secure and Efficient Multitenant Database in SaaS Delivery Model for an Ad hoc Cloud

Basant Kumar Gupta, Kalicharan Sahu

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2502 - 2506

Password Prestidigitation for Key Exchange Authentication Protocol

Anila P, Prajeesh C B

Share this article



Similar Articles with Keyword 'Authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2302 - 2305

Authentication Using Text and Graphical Password

Mayur H Patel, Nimit S Modi

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2927 - 2930

Incorporating Google Cloud Based Pub/Sub in Implementation of Identity Concentrated Encryption

Shilpashree K S, Harshavardhan L

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2644 - 2649

Misbehavior Packet Detection Approach using Effective Trust in Delay-Tolerant Networks

Prerana S. Jagadale, Prashant Jawalkar

Share this article



Similar Articles with Keyword 'Authorization'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1590 - 1593

Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks

Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1833 - 1838

Study of Secure Fault Tolerant Routing Protocol for IoT

Chaithra.S, Gowrishankar S

Share this article
Top