A survey of common security vulnerabilities and corresponding countermeasures for SaaS

被引:0
|
作者
Kim, Donghoon [1 ]
Vouk, Mladen A. [1 ]
机构
[1] North Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
来源
2014 GLOBECOM WORKSHOPS (GC WKSHPS) | 2014年
关键词
CLOUD; ISSUES; ACCESS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Software as a Service (SaaS) is the most prevalent service delivery mode for cloud systems. This paper surveys common security vulnerabilities and corresponding countermeasures for SaaS. It is primarily focused on the work published in the last five years. We observe current SaaS security trends and a lack of sufficiently broad and robust countermeasures in some of the SaaS security area such as Identity and Access management due to the growth of SaaS applications.
引用
收藏
页码:59 / 63
页数:5
相关论文
共 50 条
  • [21] Content Delivery Network Security: A Survey
    Ghaznavi, Milad
    Jalalpour, Elaheh
    Salahuddin, Mohammad A.
    Boutaba, Raouf
    Migault, Daniel
    Preda, Stere
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04): : 2166 - 2190
  • [22] Bigdata Driven Cloud Security: A Survey
    Raja, K.
    Hanifa, Sabibullah Mohamed
    INTERNATIONAL CONFERENCE ON MATERIALS, ALLOYS AND EXPERIMENTAL MECHANICS (ICMAEM-2017), 2017, 225
  • [23] An Implementation of Convergence Security Solution for Overcoming of Security Vulnerabilities in Industrial Control Communication Network
    Lee, June-Kyoung
    Lee, Seong-Woo
    Lee, Kyoung-Hak
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (02) : 545 - 565
  • [24] An Implementation of Convergence Security Solution for Overcoming of Security Vulnerabilities in Industrial Control Communication Network
    June-Kyoung Lee
    Seong-Woo Lee
    Kyoung-Hak Lee
    Wireless Personal Communications, 2019, 105 : 545 - 565
  • [25] Security Attacks and Countermeasures in Surveillance Wireless Sensor Networks
    Sert, Seyyit Alper
    Onur, Ertan
    Yazici, Adnan
    2015 9TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2015, : 201 - 205
  • [26] Security Threats, Countermeasures, and Challenges of Digital Supply Chains
    Hammi, Badis
    Zeadally, Sherali
    Nebhen, Jamel
    ACM COMPUTING SURVEYS, 2023, 55 (14S)
  • [27] Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure
    Rath, Annanda
    Spasic, Bojan
    Boucart, Nick
    Thiran, Philippe
    COMPUTERS, 2019, 8 (02)
  • [28] A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments
    Iosif, Andrei-Cristian
    Gasiba, Tiago Espinha
    Zhao, Tiange
    Lechner, Ulrike
    Pinto-Albuquerque, Maria
    UBIQUITOUS SECURITY, 2022, 1557 : 171 - 188
  • [29] Modelling an IoT Testbed in Context with the Security Vulnerabilities of South Africa
    Nair, Kishor Krishnan
    Dube, Erick
    Lefophane, Samuel
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 244 - 248
  • [30] A Survey of Challenges Associated with Cloud Computing Security
    Amalarethinam, D. I. George
    Vinnarasi, J.
    APPLIED INTELLIGENCE AND INFORMATICS, AII 2023, 2024, 2065 : 470 - 483