A survey of common security vulnerabilities and corresponding countermeasures for SaaS

被引:0
|
作者
Kim, Donghoon [1 ]
Vouk, Mladen A. [1 ]
机构
[1] North Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
CLOUD; ISSUES; ACCESS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Software as a Service (SaaS) is the most prevalent service delivery mode for cloud systems. This paper surveys common security vulnerabilities and corresponding countermeasures for SaaS. It is primarily focused on the work published in the last five years. We observe current SaaS security trends and a lack of sufficiently broad and robust countermeasures in some of the SaaS security area such as Identity and Access management due to the growth of SaaS applications.
引用
收藏
页码:59 / 63
页数:5
相关论文
共 50 条
  • [31] A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures
    Obaidat, Muath A.
    Obeidat, Suhaib
    Holst, Jennifer
    Al Hayajneh, Abdullah
    Brown, Joseph
    COMPUTERS, 2020, 9 (02)
  • [32] Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A Survey
    Sinha, Preeti
    Jha, V. K.
    Rai, Amit Kumar
    Bhushan, Bharat
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSPC'17), 2017, : 288 - 293
  • [33] Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
    Barrowclough, John Patrick
    Asif, Rameez
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [34] Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures
    Islam, Shama Naz
    Baig, Zubair
    Zeadally, Sherali
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6522 - 6530
  • [35] Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study
    Dey, Vishal
    Pudi, Vikramkumar
    Chattopadhyay, Anupam
    Elovici, Yuval
    2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES), 2018, : 398 - 403
  • [36] BLOCKCHAIN APPROACH TO CYBER SECURITY VULNERABILITIES ATTACKS AND POTENTIAL COUNTERMEASURES
    Sambana, Bosubabu
    Ramesh, Yegireddi
    Rao, Molli Srinivasa
    Rao, T. Chalapathi
    Patnaik, N. P. M.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2020, 14 (01): : 1 - 14
  • [37] Security Vulnerabilities and Countermeasures in the RPL-based Internet of Things
    Yang, Wei
    Wang, Yuan
    Lai, Zhixiang
    Wan, Yadong
    Cheng, Zhuo
    2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018), 2018, : 49 - 54
  • [38] A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures, and Challenges
    Tahirkheli, Abeer Iftikhar
    Shiraz, Muhammad
    Hayat, Bashir
    Idrees, Muhammad
    Sajid, Ahthasham
    Ullah, Rahat
    Ayub, Nasir
    Kim, Ki-Il
    ELECTRONICS, 2021, 10 (15)
  • [39] A Survey of Attacks on Controller Area Networks and Corresponding Countermeasures
    Jo, Hyo Jin
    Choi, Wonsuk
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) : 6123 - 6141
  • [40] Security slicing for auditing common injection vulnerabilities
    Thome, Julian
    Shar, Lwin Khin
    Bianculli, Domenico
    Briand, Lionel
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 : 766 - 783