A Multi-Tenant Framework for an Enterprise System on Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 5 Issue 2, February 2016

A Multi-Tenant Framework for an Enterprise System on Cloud

Dr. Sarvjit Singh Bhatia, Vikram Gupta

Enterprise systems provide integrated information for all activities in an organization. These systems serve as a vital asset to any organization and hence it becomes mandatory to ensure their security. Information security combines systems, operations and internal controls to ensure the availability, integrity and confidentiality of data and operational procedures in an organization. In the present scenario these services are offered on the cloud mainly to reduce inherent risk associated with the traditional enterprise systems. Cloud computing represents a significant shift in the way that IT resources are managed, operated, and consumed. This change exposes several benefits to enterprises, promoting greater IT efficiency and agility. This paper is intended to suggest a Multitenant security framework of enterprise systems on cloud. The dependency on integrated information systems (Enterprise Systems) in an organization is increasing day by day. An enterprise system is a combination of several applications that supports and automates business processes and manages business data. The term enterprise system is often used synonymously with enterprise business application or with the more restricted term an enterprise resource planning (ERP) system [Gulla, (2004) ]. Enterprise Systems help in carrying out various tasks with greater operational efficiency and reliability. They also facilitate to keep information updated and available across the organization 24 * 7. These systems process thousands of transactions every day and store information about all aspects of the business. According to Haigh D [Haigh, (2004) ] the potential benefits of enterprise systems depend on the way they are employed to improve the business processes. As enablers of successful business reengineering projects, they help the organizations to save money, keep their business data consistent, current and available, speed up business processes, and improve the quality and reliability of the processes.

Keywords: Enterprise Systems, Information security, Cloud computing, multi tenancy, Enterprise Resource Planning ERP

Edition: Volume 5 Issue 2, February 2016

Pages: 740 - 743

Share this Article

How to Cite this Article?

Dr. Sarvjit Singh Bhatia, Vikram Gupta, "A Multi-Tenant Framework for an Enterprise System on Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV153195, Volume 5 Issue 2, February 2016, 740 - 743

75 PDF Views | 60 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Information security'

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 773 - 778

Information Security in ICT from an Islamic Perspective

Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

Share this Article

Similar Articles with Keyword 'Cloud computing'

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015

Pages: 1736 - 1745

Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs

Haider N. Hussain

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2109 - 2113

Secured Deduplication using Hybrid Cloud Approach

Gaurav Kakariya, Sonali Rangdale

Share this Article

Similar Articles with Keyword 'Enterprise Resource Planning ERP'

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 740 - 743

A Multi-Tenant Framework for an Enterprise System on Cloud

Dr. Sarvjit Singh Bhatia, Vikram Gupta

Share this Article

Review Papers, Information Technology, India, Volume 4 Issue 8, August 2015

Pages: 1255 - 1257

Evolution of Modern Enterprise Resource Planning (ERP) Systems on Technological Background

Nileema B.Patil, Madhuri Samel, Priya Tilak, Dolly Boban

Share this Article
Top