Authorization Model for Securing Cloud SaaS Services (Netflix)

Authorization Model for Securing Cloud SaaS Services (Netflix)

Tanveer Ahmad, Rajiv Pandey, Mohammad Faisal
Copyright: © 2022 |Pages: 13
DOI: 10.4018/IJDST.307903
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

At the enterprise level, cloud software as a service (SaaS) is in high demand. As software as a service (SaaS) can be easily provided in a multitenant way, its execution assessment, information inactivity, and authorization are critical issues related to the cloud supplier at the time of providing administrations to sellers. Netflix is a mixed media supplier that gives online streaming from a library of movies and TV arrangement. Netflix services are exclusively based on cloud SaaS. The highlight of the study is to analyze the finest hones over secure cloud environment in authorization perspective based on behavioral biometrics. A conceptual authorization is displayed in this paper to secure cloud services, especially SaaS, when unauthorized access is supported by legitimate users. The use case is taken as Netflix.
Article Preview
Top

Introduction

Cloud computing is a critical component of the digital paradigm. It has become an indispensable element of our everyday lives. Through virtualization, it allows the cloud provider to share pools of configurable resources (hardware/software), resulting in new complicated business models that were before unforeseeable. Many industries have embraced cloud computing because it lowers the cost of doing activities flexibly. From the user's perspective, they may take advantage of massive computational power and storage without having to invest in hardware and software. Cloud computing, often known as just computing, is a type of computing that makes use of Internet technology to provide dynamic applications and storage on-demand, as well as broad network access, resource sharing, quick elasticity, and monitored service (Pandey et al., 2021). In Cloud computing, everything is a service. These services are named Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) (Ahmad, 2021). Infrastructure as a Service (IaaS) (Pandey et al., 2011) is one of the main blocks of cloud computing services. At this initial stage cloud, consumers can configure environments virtually with high flexibility and without having to concern about having giant rooms of physical computers. To deal with a proper cloud infrastructure, efficient resource management is essential (Kaur et al., 2019). Getting hardware resources is a costly effort in the business, and their utilization must do adequately. To get more money a cloud service provider provides its services in sharable mode i.e. multi-tenancy (Wang et al., 2018). A secure cloud computing architecture at the IaaS level must be applied. A very effective technique i.e. KASLR that protects unknown attacks on IaaS but it has a significant impact on memory de-duplication savings (Vano-Garcia & Marco-Gisbert, 2020). In the cloud computing paradigm, SaaS is widely used. To save cost and 100% resources utilization Cloud providers provide SaaS in sharable mode. Sharing resources is termed multi-tenancy (Huang et al., 2020). The advantages of multi-tenancy lead 100% utilization of the resources but at the same time, it risks the security of the data and services. Chances of unauthorized access to SaaS are high in the case of multi-tenancy.

  • Multi-tenancy - A single program occasion that served numerous clients is called multi-tenancy, or inhabitants. In the open cloud, multi-tenancy is characterized as a shared computer program occasion (Cloudflare, n.d.). The occupants are disconnected from each other by means of consent. Confinement of information can be taken care of by cloud suppliers. The benefits of multi-tenancy are superior utilize of resources.

Authenticating or authorizing a resource automatically based on their exclusive physical or behavioral characteristic is known as biometric recognition (Alsaasi, 2021). Biometric recognition is of two types, anatomical and behavioral. After authentication, the authorization could be done by a person’s behavioral biometrics (Maghsoudi & Tappert, 2016). For example signature, keystroke dynamics, gait, and voices are the most dominant way for security reason.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 2 Issues (2023)
Volume 13: 8 Issues (2022)
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing