Skip to main content

Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy

  • Conference paper
  • First Online:
Book cover Security and Privacy in Communication Networks (SecureComm 2016)

Abstract

Cloud computing is geared towards the effective and efficient use of computational resources and it has been making a big revolution in the field of information technology by reducing capital investment. It delivers computing as a service, that enables effective utilization of computational resources, rather than, a product, for a fraction of the cost. This paper explores key security issues associated with PaaS and proposed mitigating strategies are provided. These security challenges slow down the adoption of PaaS. Mitigating these security issues could increase PaaS adoption. This paper focuses on the security issues associated with Platform as a Service (PaaS) offering on a public cloud platform and provides various mitigating techniques to address these security issues. If properly implemented, we could realize an increase in PaaS adoption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Brunette, G.: Platform as a service offering. J. Cloud Comput. 10(3), 17–21 (2015)

    MathSciNet  Google Scholar 

  2. Dijk, M., Juels, A.: Attributes of platform as a service offering. J. Cloud Comput. 17(4), 20–23 (2015)

    Google Scholar 

  3. Gallagher, M.: Understanding platform as a service models. J. Inf. Technol. 18(4), 33–37 (2015)

    Google Scholar 

  4. Kaufmann, M.: Data security in the world of cloud computing. J. Secur. Priv. 9(2), 54–63 (2015)

    Google Scholar 

  5. Mell, P., Grance, T.: The NIST definition of cloud computing. http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf. Accessed 25 Mar 2016

  6. Momm, C.: The principle of minimizing TCB (2014). https://mommconrad.com/threats/multitenancyplatformsv1.0.pdf. Accessed 21 Mar 2016

  7. Natis, Y.: Research on platform as a service. J. Cloud Comput. Secur. 10(1), 11–16 (2015)

    Google Scholar 

  8. Osvik, D., Shamir, A.: The concept of cloud computing. J. Inf. Technol. 12(3), 26–29 (2015)

    Google Scholar 

  9. Percival, C.: Securing the transport layer. p. 25. The New York Times. http://www.nytimes.com. Accessed 20 Jan 2015

  10. Saltzer, J.: Protection and the control of information sharing. In: ACM Conference on Information Sharing and Protection, vol. 6, no. 2, pp. 11–15 (2014)

    Google Scholar 

  11. Shacham, H., Savage, S.: Exploring information leakage in third-party commute clouds. J. Cloud Comput. 9(1), 13–17 (2015)

    Google Scholar 

  12. Subashini, S., Kavitha, V.: Shared resources in the cloud. J. Netw. Comput. Appl. 14(2), 27–29 (2015)

    Google Scholar 

  13. Takabi, H., Joshi, D.: Security and privacy challenge in cloud computing environments. J. Cloud Comput. Secur. 23(1), 66–72 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fidel Ikundi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Ikundi, F., Islam, R., White, P. (2017). Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy. In: Deng, R., Weng, J., Ren, K., Yegneswaran, V. (eds) Security and Privacy in Communication Networks. SecureComm 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 198. Springer, Cham. https://doi.org/10.1007/978-3-319-59608-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59608-2_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59607-5

  • Online ISBN: 978-3-319-59608-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics