Skip to main content
Log in

Colluder detection in SaaS cloud applications with subscription based license

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The use of web applications has been increased by the rapid growth of the Internet. The software application providers moved to cloud computing and offered software as a service (SaaS) as the basis for software delivery to minimize the unauthorized copying of applications by stealing the product key or transforming the license file of the applications. Different forms of SaaS application licensing schemes exist. Subscription-based license has many benefits for the service provider as the business can forecast its revenue through this and can provide its products with better service as well as from the point of view of the customer; customers can relax for the whole subscription duration, can use the application without worry and can get service at any time. Most SaaS application providers support this because of the advantages of the subscription-based licensing scheme. This leads to another problem of unauthorized use of an application’s user authentication data. Upon subscription, application providers provide user authentication. But the user authentication information has been exchanged with other entities knowingly or unknowingly. Therefore, many individuals use the same authentication information to access the application, which leads to a huge loss for service providers. The loss is in the form of finance, an excessive spike in cloud server traffic and an increased burden on customer service provision. We proposed a new method for user authentication that will make it easier to memorize and identify colluders. The proposed method automatically keeps tracks of user system with its unique key and detects colluders.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. About | UPPAAL. [Online]. Available: https://uppaal.org/. Accessed 09 May 2021

  2. Ahmed I, Khan A, Habib MA, Anjum A, Ahmed M (2018) A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks. Int J Parallel Program. https://doi.org/10.1007/s10766-018-0601-y

    Article  Google Scholar 

  3. Comms /CPN – CPN Tools. [Online]. Available: http://cpntools.org/2018/01/09/comms-cpn/. Accessed 09 May 2021

  4. CPN Tools – A tool for editing, simulating, and analyzing Colored Petri nets. [Online]. Available: http://cpntools.org/. Accessed 09 May 2021

  5. GitHub - Z3Prover/z3: The Z3 Theorem Prover. [Online]. Available: https://github.com/Z3Prover/z3. Accessed: 09 May 2021

  6. Lou X, Hwang K (2009) Collusive piracy prevention in P2P content delivery networks. IEEE Trans Comput 58(7):970–983. doi: https://doi.org/10.1109/TC.2009.26

    Article  MathSciNet  Google Scholar 

  7. McKeay M (2019) 2019 A year in review

  8. Nick I (2020) Public cloud revenue to grow 6.3% in 2020 — Gartner. Information Age. [Online]. Available: https://www.information-age.com/public-cloud-revenue-to-grow-6-3-in-2020-gartner-123490499/. Accessed 13 Feb 2021

  9. Sun AY, Zhong Z, Jeong H, Yang Q (2019) Building complex event processing capability for intelligent environmental monitoring. Environ Model Softw 116:1–6. doi: https://doi.org/10.1016/j.envsoft.2019.02.015

    Article  Google Scholar 

  10. Zhang H, Ye L, Shi J, Du X, Chen H (2013) Preventing piracy content propagation in peer-to-peer networks. IEEE J Sel Areas Commun 31(supplement):105–114. https://doi.org/10.1109/JSAC.2013.SUP.0513010

  11. Zhou R, Hwang K, Cai M (2008) GossipTrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans Knowl Data Eng 20(9):1282–1295

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kailash Chandra Mishra.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mishra, K.C., Dutta, S. Colluder detection in SaaS cloud applications with subscription based license. Multimed Tools Appl 82, 12135–12149 (2023). https://doi.org/10.1007/s11042-022-13825-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13825-9

Keywords

Navigation