A Novel Security Integration for Vulnerability Avoidance in Enterprise Cloud Applications (CloudERP)
نویسندگان
چکیده
Studies have shown that some existing enterprise applications including bussiness ERPs, Social Networks, etc implements a single layer security scheme which can easily be hacked. Also, these applications suffer from multiple security vulnerabilities, including SQL Injection Attacks (SQLIA), Social engineering, spoofing, etc. For most mission critical enterprises, their organizational critical assets can be dumped in an ERPs, which needs to be protected very adequately. This paper then develops a Cloud based Enterprise Resource Planning System (CloudERP) while reengineering a second (Layer-2) security appliance called Advanced Encryption Validation Key (AEVK) which is an authentication scheme based on Advanced MD5 Encryption (A-MD5) algorithm. The proposed approach is expected to replace the overall process architecture and security integrations in existing ERP vendor systems owing to its computational as well as security features. Our methology involved the use of Netbeans 7.0.1, JAVA Server Page and MySQL tools in this work.
منابع مشابه
A Framework for Evaluating Cloud Computing User’s Satisfaction in Information Technology Management
Cloud computing is a new discussion in enterprise IT. It has already become popular in terms of distributed technology in some companies. It enables managers to setup and run the intended businesses by avoiding excessive spending on computers, software and hiring expert staff, which proves to be cost effective. Cloud computing also helps users pay for the IT services without spending massive am...
متن کاملایجاد نیمه خودکار مشاپ های سازمانی با استفاده از توصیفات معنایی
Mashups are next generation of web applications. A mashup is a lightweight web application that is created by combining information or capabilities from more than one existing resources to deliver a new and integrated experience to the user. Mashups introduce a new class of integration techniques in enterprises for implementing situational applications (i.e. applications that come together to s...
متن کاملVulnerability Bandwidth Depletion Attack on Distributed Cloud Computing Network: A QoS Perspective
A previous work on Airport Information Resource Management System (AIRMS) established that sophisticated attacks in the form of Denial of Service (DoS), Distributed DoS (DDoS), and related attacks are becoming the most effective schemes used by cyber terrorists on such enterprise systems. Similarly, a novel Smart Green Energy Management Distributed Cloud Computing Network (SGEM-DCCN) was develo...
متن کاملSecurity Hardening for SAS® 9.3 Enterprise BI Web Applications
Web configuration for SAS 9.3 Enterprise BI Web applications need to be secured according to an organization's security policy. This paper examines the Web configuration security enhancement options and the protection of Web applications from security vulnerability attacks. Security enhancements for the configuration include single sign-on, integration with a reverse proxy security server, sett...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کامل