SlideShare a Scribd company logo
1 of 6
Download to read offline
Most Downloaded
Article for an year in
Academia
Advanced Computing: An International
Journal ( ACIJ )
ISSN: 2229 - 6727 [Online]; 2229 - 726X [Print]
http://airccse.org/journal/acij/acij.html
IMPROVING PRIVACY AND SECURITY IN MULTITENANT CLOUD ERP SYSTEMS
Djamal Ziani and Ruba Al-Muwayshir
Department of Information Systems, King Saud University, Riyadh, Saudi Arabia
ABSTRACT
This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of
definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their
respective challenges and issues regarding security and privacy, are provided. Next, a set of
security challenges is listed, discussed, and mapped to the existing solutions to solve these
problems. This thesis aims to build an effective approach to the cloud ERP security management
model in terms of data storage, data virtualization, data isolation, and access security in cloud
ERP. The following proposed techniques are used to improve the security for multi-tenant SaaS:
database virtualization, implementation of data encryption and search functionality on databases
and developed systems, distribution of data between tenant and ERP providers, secure
application deployment in multi-tenant environments, implementation of the authentication and
developed systems together as a two-factor authentication, and improved user access control for
multi-tenant ERP clouds.
KEYWORDS
ERP, ERP system, ERP problems, ERP security challenges, ERP security solutions, ERP and
cloud computing
For More Details : http://aircconline.com/acij/V8N5/8517acij01.pdf
Volume Link : http://airccse.org/journal/acij/vol8.html
REFERENCES
[1] M.A. Vouk, (2008) “Cloud computing–issues, research and implementations”, CIT. Journal of
Computing and Information Technology, Vol. 16, No. 4, pp235-246.
[2] A. Patel & M. Kumar, (2013) “A Proposed Model for Data Security of Cloud Storage Using Trusted
Platform Module”, International Journal of Advanced Research in Computer Science and Software
Engineering, Vol. 3, No. 4.
[3] D.P.D.S. Abburu, (2012). “An Approach for Data Storage Security in Cloud Computing”, IJCSI
International Journal of Computer Science Issues, Vol. 9, No. 2.
[4] M. Almorsy, J. Grundy, & A.S. Ibrahim, (2012, June) “Tossma: A tenant-oriented saas security
management architecture”, In Cloud computing (cloud), 2012 IEEE 5th international conference on (pp.
981-988). IEEE.
[5] S. Subashini & V. Kavitha, (2010), “A Survey on Security Issues in Service Delivery Models of
Cloud Computing”, Journal of Network and Computer Applications, Vol. 34, No.1, pp1 -11.
[6] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, Konwinski, A., ... & M. Zaharia, (2010) “A
view of cloud computing”, Communications of the ACM, 53(4), 50-58.
[7] A. Azeez, S. Perera, D. Gamage, R. Linton, P. Siriwardana, D. Leelaratne, ... & P. Fremantle, (2010,
July), “Multi-tenant SOA middleware for cloud computing”, In Cloud computing (cloud), 2010 ieee 3rd
international conference on (pp. 458-465). IEEE.
[8] D. Banks, J. Erickson, & M. Rhodes, (2009), “Multi-tenancy in cloud-based collaboration services”,
Information Systems Journal. BCG (2012).
[9] M. Armbrust et al., (2009), “A view of cloud computing”, Communications of the ACM, 53(4), p.50.
Available at: http://inst.cs.berkeley.edu/~cs10/fa10/lec/20/2010-11-10-CS10-L20-AF-Cloud
Computing.pdf [Accessed July 30, 2012].
[10] S.L. Dinesh Kumar Saini, Yousif,, J.H. Sandhya, & V. Khandage, (2011), “Cloud Computing and
Enterprise Resource Planning Systems”, Proceedings of the World Congress on Engineering, Vol. 4.
[11] D. Harnik, B. Pinkas, A. Shulman-Peleg, (2010), “Side channels in Cloud services: deduplication in
Cloud Storage”, IEEE Security Privacy, Vol. 8, No. 6, pp40–47.
[12] E. Fathi Kiadehi, & S. Mohammadi, (2012), “Cloud ERP: Implementation of Enterprise Resource
Planning Using Cloud Computing Technology”, Journal of Basic and Applied Scientific Research, Vol. 6.
[13] U. Somani, K. Lakhani, M. Mundra, (2010), “Implementing digital signature with RSA encryption
algorithm to enhance the data Security of Cloud in Cloud Computing”, In: 1st International conference on
parallel distributed and grid Computing (PDGC), IEEE Computer Society Washington, DC, USA,
pp211–216.
[14] G. F Fathima Haseen Raihana & J. A. Jamal Mohamed College, (2012), “CLOUD ERP– A
SOLUTION MODEL”, IRACST - International Journal of Computer Science and Information
Technology & Security (IJCSITS), ISSN, Vol. 2, No. 4, pp4.
[15] S. Xiao & W. Gong, (2010), “Mobility Can help: protect user identity with dynamic credential”, In:
Eleventh International conference on Mobile data Management (MDM), IEEE Computer Society,
Washington, DC, USA, pp378–380.
[16] R. Mietzner, T. Unger, R. Titze, & F. Leymann, (2009), “Combining Different Multi-Tenancy
Patterns in Service Oriented Applications,” presented at the IEEE Enterprise Distributed Object
Conference, Auckland.
[17] E. Kimberling, (2011), “Is SaaS ERP right for your organization,” 360° ERP Blog.
[18] A. Lenart, (2011), “ERP in the Cloud–Benefits and Challenges”, In Research in systems analysis and
design: Models and methods, pp39-50, Springer Berlin Heidelberg.
[19] Md Asif Mushtaque, R. Sindhu, (2014), “A New Innovation On User’S Level Security For Storage
Data In Cloud Computing”, International Journal of Grid Distribution Computing 7.3, pp213-220.
[20] J. Müller, J. Krüger, S. Enderlein, M. Helmich, & A. Zeier, A, (2009), “Customizing enterprise
software as a service applications: Back-end extension in a multi-tenancy environment”, In Enterprise
Information Systems, pp66-77. Springer Berlin Heidelberg.
[21] S. Na, K. Kim, & E. Huh, (2013), “A Methodology for Evaluating Cloud Computing Security
Service-Level Agreements”, International Journal of Advancements in Computing Technology (IJACT),
Vol. 5, No. 13.
[22] R. Muhleman, P. Kim, V. J. Homan, & J. Breese-Vitelli, (2012), “Cloud Computing: Should I Stay
or Should I Cloud?”, presented at the Conference on Information Systems Applied Research, New
Orleans Louisiana, USA.
[23] M. Okuhara, T. Shiozaki, & T. Suzuki, (2010), “Security architecture for cloud computing”, Fujitsu
Sci. Tech. J, Vol. 46, No. 4, pp397-402.
[24] Z. Pervez, S. Lee, & Y.K. Lee, (2010, February), “Multi-tenant, secure, load disseminated SaaS
architecture”, In Advanced Communication Technology (ICACT), 2010 The 12th International
Conference on (Vol. 1, pp214-219). IEEE.
[25] P.S. Petra Schubert, & A.F. Femi Adisa, (2011), “Cloud Computing for Standard ERP Systems:
Reference Framework and Research Agenda”, Arbeitsberichte aus dem Fachbereich Informatik, Vol. 4,
No. 27, pp29.
[26] L. Qian, Z. Luo, Y. Du, & L. Guo, L, (2009), “Cloud computing: An overview”, In Cloud
Computing, pp626-631. Springer Berlin Heidelberg.
[27] G. Reddy & N. Subashini, (2014), “Secure Storage Services and Erasure Code Implementation in
Cloud Servers”, International Journal of Engineering Research & Technology (IJERT), Vol. 3, No. 1,
pp1810-1814.
[28] P. Hofmann, (2010), “Cloud Computing: The Limits of Public Clouds for Business Applications”,
IEEE Internet Computing, Vol.. 14, No. 6, pp90–93.
[29] A. Satapathy, & J. Badajena, (2013), “A Secure Model and Algorithms for Cloud Computing based
on Multicloud Service Providers”, International Journal Computational Intelligence and Informatics, Vol.
3, No. 1.
[30] B. McCrea, “Putting the spotlight on ERP,” Logistics Management, pp32 – 35, Jun-2011.
[31] Y. Xu, N. Rahmati, & V. Lee, (2008, June), “A review of literature on Enterprise Resource Planning
systems”, In Service Systems and Service Management, 2008 International Conference on (pp1-6). IEEE.
[32] S. Salleh, S. Maliza, T. Yen, & C. Chan, (2012), “Cloud Enterprise Systems: A Review of Literature
and its Adoption”, presented at the PACIS 2012 Proceedings, Hochiminh City, 2012.
[33] J. Esteves, & J. Pastor, (2001), “ENTERPRISE RESOURCE PLANNING SYSTEMS RESEARCH:
AN ANNOTATED BIBLIOGRAPHY”, Communications of AIS, Vol. 7, No. 8.
[34] N. Sahin, (2013), “Cloud ERP Security: Guidelines for Evaluation”, Department of Computer and
Systems Sciences.
[35] J. Umble, R. Ronald, M. Haft, & U. Michael, (2003), “Enterprise resource planning: Implementation
procedures and critical success factors”, European Journal of Operational Research, Vol. 146, pp241–257.
[36] X. Xun, (2012), “From cloud computing to cloud manufacturing”, Robotics and Computer-
Integrated Manufacturing Vol. 28, pp75–86. New Zealand.
[37] S. Walraven, E. Truyen, W. Joosen, F. Kon, & A. Kermarrec, (2011), “A Middleware Layer for
Flexible and Cost-Efficient Multi-tenant Applications”, IFIP International Federation for Information
Processing, pp370–389.
[38] W. Voorsluys, J. Broberg, & R. Buyya, (2011), “Introduction to cloud computing”, Cloud
computing: Principles and paradigms, 2-44.
[39] L. Bangfan, Z. Huihui, & W. Meng, (2014), “How to Design the Cloud Computing Used in
Egovernment’s Information Security?”, Applied Mechanics and Materials, Vol. 536-537, pp616-619.
[40] A. Bezemer & C. P., Zaidman. (2010), “Multi-tenant SaaS applications: maintenance dream or
nightmare?”, in In Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and
International Workshop on Principles of Software Evolution (IWPSE), pp88–92.
[41] M. Kapuruge, A. Colman, J. Han, A. Bouguettaya, M. Hauswirth, & L. Liu, L, (2011), “Achieving
Multi-tenanted Business Processes in SaaS Applications”, Springer-Verlag Berlin Heidelberg. pp143–
157.
[42] E. Shehab, M. Sharp, L. Supramaniam, & T Spedding, (2004), “Enterprise resource planning An
integrative review”, Business Process Management Journal, Vol. 10 No. 4.
[43] J. Ju, Y. Wang, J. Fu, J. Wu, & Z. Lin, (2010), “Research on Key Technology in SaaS”, in 2010
International Conference on Intelligent Computing and Cognitive Informatics, pp. 384–387.
[44] H. Wang & Z. Zheng, (2010), “Software architecture driven configurability of multi-tenant SaaS
application”, in Web Information Systems and Mining (WISM), 2010, pp418–424.
[45] D. Johnson, (2010), “Multi-tenant versus Single-tenant ERP – a comparison,” [Online]. Available:
http://erpcloudnews.com/2010/06/multi-tenant-versus-single-tenant-erp-a-comparison/. [Accessed: 28-
Aug-2013].
[46] D. Banks, J. Erickson, & M. Rhodes, (2009), “Multi-tenancy in Cloud-based Collaboration
Services”, Hewlett-Packard Development Company, L.P.
AUTHORS
Djamal Ziani has been an associate professor in the Computer Sciences and
Information Systems College at King Saud University since 2009. He is also a
researcher in ERP and a member of the data management group of CCIS, King Saud
University. He received a Master’s degree in Computer Sciences from the University
of Valenciennes, France in 1992, and Ph.D. in Computer Science from the University
of Paris, Dauphine, France in 1996. From 1998 to 2009, he was a consultant and
project manager in many companies in Canada, such as SAP, Bombardier
Aerospace, and Montreal Stock Exchange.
Ruba Almuwayshir is a teaching assistant at AlJouf University and a master’s student at King Saud
University.

More Related Content

What's hot

Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...AIRCC Publishing Corporation
 
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applicationsMobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applicationseSAT Publishing House
 
New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...AIRCC Publishing Corporation
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYEditor Jacotech
 
Presentation 2019 08-30
Presentation 2019 08-30Presentation 2019 08-30
Presentation 2019 08-30Mahdi_Fahmideh
 
Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018ITIIIndustries
 
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHMOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHijitcs
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Efficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big databaseEfficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big databaseijccsa
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingIAEME Publication
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Discovering and Understanding The Security Issues In IoT Cloud
Discovering and Understanding The Security Issues In IoT CloudDiscovering and Understanding The Security Issues In IoT Cloud
Discovering and Understanding The Security Issues In IoT CloudCSCJournals
 
Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...
Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...
Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...IJECEIAES
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 

What's hot (18)

Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...
 
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applicationsMobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applications
 
New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 
Presentation 2019 08-30
Presentation 2019 08-30Presentation 2019 08-30
Presentation 2019 08-30
 
B1802041217
B1802041217B1802041217
B1802041217
 
Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018
 
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information Technology
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHMOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
Efficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big databaseEfficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big database
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
Discovering and Understanding The Security Issues In IoT Cloud
Discovering and Understanding The Security Issues In IoT CloudDiscovering and Understanding The Security Issues In IoT Cloud
Discovering and Understanding The Security Issues In IoT Cloud
 
Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...
Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...
Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
 

Similar to Most downloaded article for an year in academia - Advanced Computing: An International Journal (ACIJ)

Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxmichael591
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyAIRCC Publishing Corporation
 
December 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2022: Most Download Articles in Web & Semantic Technology
May 2022: Most Download Articles in Web & Semantic TechnologyMay 2022: Most Download Articles in Web & Semantic Technology
May 2022: Most Download Articles in Web & Semantic Technologydannyijwest
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfacijjournal
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingJames Heller
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHCLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHIJCSEA Journal
 
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHCLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHIJCSEA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

Similar to Most downloaded article for an year in academia - Advanced Computing: An International Journal (ACIJ) (20)

Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information Technology
 
December 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its Applications
 
May 2022: Most Download Articles in Web & Semantic Technology
May 2022: Most Download Articles in Web & Semantic TechnologyMay 2022: Most Download Articles in Web & Semantic Technology
May 2022: Most Download Articles in Web & Semantic Technology
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its Applications
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its Applications
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHCLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
 
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHCLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 

More from acijjournal

Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfacijjournal
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfacijjournal
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdfacijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Developmentacijjournal
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principlesacijjournal
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...acijjournal
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...acijjournal
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
 
10th International Conference on Cloud Computing: Services and Architecture (...
10th International Conference on Cloud Computing: Services and Architecture (...10th International Conference on Cloud Computing: Services and Architecture (...
10th International Conference on Cloud Computing: Services and Architecture (...acijjournal
 

More from acijjournal (20)

Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdf
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdf
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
 
10th International Conference on Cloud Computing: Services and Architecture (...
10th International Conference on Cloud Computing: Services and Architecture (...10th International Conference on Cloud Computing: Services and Architecture (...
10th International Conference on Cloud Computing: Services and Architecture (...
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 

Recently uploaded (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 

Most downloaded article for an year in academia - Advanced Computing: An International Journal (ACIJ)

  • 1. Most Downloaded Article for an year in Academia Advanced Computing: An International Journal ( ACIJ ) ISSN: 2229 - 6727 [Online]; 2229 - 726X [Print] http://airccse.org/journal/acij/acij.html
  • 2. IMPROVING PRIVACY AND SECURITY IN MULTITENANT CLOUD ERP SYSTEMS Djamal Ziani and Ruba Al-Muwayshir Department of Information Systems, King Saud University, Riyadh, Saudi Arabia ABSTRACT This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following proposed techniques are used to improve the security for multi-tenant SaaS: database virtualization, implementation of data encryption and search functionality on databases and developed systems, distribution of data between tenant and ERP providers, secure application deployment in multi-tenant environments, implementation of the authentication and developed systems together as a two-factor authentication, and improved user access control for multi-tenant ERP clouds. KEYWORDS ERP, ERP system, ERP problems, ERP security challenges, ERP security solutions, ERP and cloud computing For More Details : http://aircconline.com/acij/V8N5/8517acij01.pdf Volume Link : http://airccse.org/journal/acij/vol8.html
  • 3. REFERENCES [1] M.A. Vouk, (2008) “Cloud computing–issues, research and implementations”, CIT. Journal of Computing and Information Technology, Vol. 16, No. 4, pp235-246. [2] A. Patel & M. Kumar, (2013) “A Proposed Model for Data Security of Cloud Storage Using Trusted Platform Module”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 4. [3] D.P.D.S. Abburu, (2012). “An Approach for Data Storage Security in Cloud Computing”, IJCSI International Journal of Computer Science Issues, Vol. 9, No. 2. [4] M. Almorsy, J. Grundy, & A.S. Ibrahim, (2012, June) “Tossma: A tenant-oriented saas security management architecture”, In Cloud computing (cloud), 2012 IEEE 5th international conference on (pp. 981-988). IEEE. [5] S. Subashini & V. Kavitha, (2010), “A Survey on Security Issues in Service Delivery Models of Cloud Computing”, Journal of Network and Computer Applications, Vol. 34, No.1, pp1 -11. [6] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, Konwinski, A., ... & M. Zaharia, (2010) “A view of cloud computing”, Communications of the ACM, 53(4), 50-58. [7] A. Azeez, S. Perera, D. Gamage, R. Linton, P. Siriwardana, D. Leelaratne, ... & P. Fremantle, (2010, July), “Multi-tenant SOA middleware for cloud computing”, In Cloud computing (cloud), 2010 ieee 3rd international conference on (pp. 458-465). IEEE. [8] D. Banks, J. Erickson, & M. Rhodes, (2009), “Multi-tenancy in cloud-based collaboration services”, Information Systems Journal. BCG (2012). [9] M. Armbrust et al., (2009), “A view of cloud computing”, Communications of the ACM, 53(4), p.50. Available at: http://inst.cs.berkeley.edu/~cs10/fa10/lec/20/2010-11-10-CS10-L20-AF-Cloud Computing.pdf [Accessed July 30, 2012]. [10] S.L. Dinesh Kumar Saini, Yousif,, J.H. Sandhya, & V. Khandage, (2011), “Cloud Computing and Enterprise Resource Planning Systems”, Proceedings of the World Congress on Engineering, Vol. 4. [11] D. Harnik, B. Pinkas, A. Shulman-Peleg, (2010), “Side channels in Cloud services: deduplication in Cloud Storage”, IEEE Security Privacy, Vol. 8, No. 6, pp40–47. [12] E. Fathi Kiadehi, & S. Mohammadi, (2012), “Cloud ERP: Implementation of Enterprise Resource Planning Using Cloud Computing Technology”, Journal of Basic and Applied Scientific Research, Vol. 6. [13] U. Somani, K. Lakhani, M. Mundra, (2010), “Implementing digital signature with RSA encryption algorithm to enhance the data Security of Cloud in Cloud Computing”, In: 1st International conference on parallel distributed and grid Computing (PDGC), IEEE Computer Society Washington, DC, USA, pp211–216. [14] G. F Fathima Haseen Raihana & J. A. Jamal Mohamed College, (2012), “CLOUD ERP– A SOLUTION MODEL”, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN, Vol. 2, No. 4, pp4.
  • 4. [15] S. Xiao & W. Gong, (2010), “Mobility Can help: protect user identity with dynamic credential”, In: Eleventh International conference on Mobile data Management (MDM), IEEE Computer Society, Washington, DC, USA, pp378–380. [16] R. Mietzner, T. Unger, R. Titze, & F. Leymann, (2009), “Combining Different Multi-Tenancy Patterns in Service Oriented Applications,” presented at the IEEE Enterprise Distributed Object Conference, Auckland. [17] E. Kimberling, (2011), “Is SaaS ERP right for your organization,” 360° ERP Blog. [18] A. Lenart, (2011), “ERP in the Cloud–Benefits and Challenges”, In Research in systems analysis and design: Models and methods, pp39-50, Springer Berlin Heidelberg. [19] Md Asif Mushtaque, R. Sindhu, (2014), “A New Innovation On User’S Level Security For Storage Data In Cloud Computing”, International Journal of Grid Distribution Computing 7.3, pp213-220. [20] J. Müller, J. Krüger, S. Enderlein, M. Helmich, & A. Zeier, A, (2009), “Customizing enterprise software as a service applications: Back-end extension in a multi-tenancy environment”, In Enterprise Information Systems, pp66-77. Springer Berlin Heidelberg. [21] S. Na, K. Kim, & E. Huh, (2013), “A Methodology for Evaluating Cloud Computing Security Service-Level Agreements”, International Journal of Advancements in Computing Technology (IJACT), Vol. 5, No. 13. [22] R. Muhleman, P. Kim, V. J. Homan, & J. Breese-Vitelli, (2012), “Cloud Computing: Should I Stay or Should I Cloud?”, presented at the Conference on Information Systems Applied Research, New Orleans Louisiana, USA. [23] M. Okuhara, T. Shiozaki, & T. Suzuki, (2010), “Security architecture for cloud computing”, Fujitsu Sci. Tech. J, Vol. 46, No. 4, pp397-402. [24] Z. Pervez, S. Lee, & Y.K. Lee, (2010, February), “Multi-tenant, secure, load disseminated SaaS architecture”, In Advanced Communication Technology (ICACT), 2010 The 12th International Conference on (Vol. 1, pp214-219). IEEE. [25] P.S. Petra Schubert, & A.F. Femi Adisa, (2011), “Cloud Computing for Standard ERP Systems: Reference Framework and Research Agenda”, Arbeitsberichte aus dem Fachbereich Informatik, Vol. 4, No. 27, pp29. [26] L. Qian, Z. Luo, Y. Du, & L. Guo, L, (2009), “Cloud computing: An overview”, In Cloud Computing, pp626-631. Springer Berlin Heidelberg. [27] G. Reddy & N. Subashini, (2014), “Secure Storage Services and Erasure Code Implementation in Cloud Servers”, International Journal of Engineering Research & Technology (IJERT), Vol. 3, No. 1, pp1810-1814. [28] P. Hofmann, (2010), “Cloud Computing: The Limits of Public Clouds for Business Applications”, IEEE Internet Computing, Vol.. 14, No. 6, pp90–93. [29] A. Satapathy, & J. Badajena, (2013), “A Secure Model and Algorithms for Cloud Computing based on Multicloud Service Providers”, International Journal Computational Intelligence and Informatics, Vol. 3, No. 1. [30] B. McCrea, “Putting the spotlight on ERP,” Logistics Management, pp32 – 35, Jun-2011.
  • 5. [31] Y. Xu, N. Rahmati, & V. Lee, (2008, June), “A review of literature on Enterprise Resource Planning systems”, In Service Systems and Service Management, 2008 International Conference on (pp1-6). IEEE. [32] S. Salleh, S. Maliza, T. Yen, & C. Chan, (2012), “Cloud Enterprise Systems: A Review of Literature and its Adoption”, presented at the PACIS 2012 Proceedings, Hochiminh City, 2012. [33] J. Esteves, & J. Pastor, (2001), “ENTERPRISE RESOURCE PLANNING SYSTEMS RESEARCH: AN ANNOTATED BIBLIOGRAPHY”, Communications of AIS, Vol. 7, No. 8. [34] N. Sahin, (2013), “Cloud ERP Security: Guidelines for Evaluation”, Department of Computer and Systems Sciences. [35] J. Umble, R. Ronald, M. Haft, & U. Michael, (2003), “Enterprise resource planning: Implementation procedures and critical success factors”, European Journal of Operational Research, Vol. 146, pp241–257. [36] X. Xun, (2012), “From cloud computing to cloud manufacturing”, Robotics and Computer- Integrated Manufacturing Vol. 28, pp75–86. New Zealand. [37] S. Walraven, E. Truyen, W. Joosen, F. Kon, & A. Kermarrec, (2011), “A Middleware Layer for Flexible and Cost-Efficient Multi-tenant Applications”, IFIP International Federation for Information Processing, pp370–389. [38] W. Voorsluys, J. Broberg, & R. Buyya, (2011), “Introduction to cloud computing”, Cloud computing: Principles and paradigms, 2-44. [39] L. Bangfan, Z. Huihui, & W. Meng, (2014), “How to Design the Cloud Computing Used in Egovernment’s Information Security?”, Applied Mechanics and Materials, Vol. 536-537, pp616-619. [40] A. Bezemer & C. P., Zaidman. (2010), “Multi-tenant SaaS applications: maintenance dream or nightmare?”, in In Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE), pp88–92. [41] M. Kapuruge, A. Colman, J. Han, A. Bouguettaya, M. Hauswirth, & L. Liu, L, (2011), “Achieving Multi-tenanted Business Processes in SaaS Applications”, Springer-Verlag Berlin Heidelberg. pp143– 157. [42] E. Shehab, M. Sharp, L. Supramaniam, & T Spedding, (2004), “Enterprise resource planning An integrative review”, Business Process Management Journal, Vol. 10 No. 4. [43] J. Ju, Y. Wang, J. Fu, J. Wu, & Z. Lin, (2010), “Research on Key Technology in SaaS”, in 2010 International Conference on Intelligent Computing and Cognitive Informatics, pp. 384–387. [44] H. Wang & Z. Zheng, (2010), “Software architecture driven configurability of multi-tenant SaaS application”, in Web Information Systems and Mining (WISM), 2010, pp418–424. [45] D. Johnson, (2010), “Multi-tenant versus Single-tenant ERP – a comparison,” [Online]. Available: http://erpcloudnews.com/2010/06/multi-tenant-versus-single-tenant-erp-a-comparison/. [Accessed: 28- Aug-2013]. [46] D. Banks, J. Erickson, & M. Rhodes, (2009), “Multi-tenancy in Cloud-based Collaboration Services”, Hewlett-Packard Development Company, L.P.
  • 6. AUTHORS Djamal Ziani has been an associate professor in the Computer Sciences and Information Systems College at King Saud University since 2009. He is also a researcher in ERP and a member of the data management group of CCIS, King Saud University. He received a Master’s degree in Computer Sciences from the University of Valenciennes, France in 1992, and Ph.D. in Computer Science from the University of Paris, Dauphine, France in 1996. From 1998 to 2009, he was a consultant and project manager in many companies in Canada, such as SAP, Bombardier Aerospace, and Montreal Stock Exchange. Ruba Almuwayshir is a teaching assistant at AlJouf University and a master’s student at King Saud University.