Cloud Computing: Software As A Service
Cloud Computing: Software As A Service
Aniruddha S Rumale∗
Assistant Professor, Computer Engineering
S.V.P.M.’s College of Engineering Dinesh N Chaudhari
Malegaon-bk, Baramati, Pune, India-413115 Professor & Dean, Department of computer engineering
Email: [email protected] Jawaharlal Darda Inst. Of Engg. & Technology
Yavatmal, INDIA
Email: [email protected]
Abstract— At present, SaaS(Software as a Service) is a new cloud architecture is at service or active. Figure 1 will depict
mantra for many software industries and individuals. How this architectural difference among three cloud computing
software can be offered as a service? What are the requirements architectures.
and issues of SaaS? What is architectural difference between
SaaS, and other cloud computing models? What are the
implementation challenges for SaaS? These are the few questions The CSP providing SaaS, provides sufficient storage and
one need to answer while implementing SaaS.
Computational capacity using IaaS(Infrastructure as a Service)
Offering software as a service actually minimizes the
to cloud user(CU) [4]. CUs only require to have a minimal
software piracy. It also makes software update and distribution hardware with high speed Internet connectivity. As software
process easy. Centrally maintaining a software in secure are offered only as a service, neither CSP nor user require to
environment of CSP (Cloud Service Provider) frees the user from install any software at users’ machine.
providing security to it. SaaS is an upper layer of cloud
computing, so Cloud users do not require very high end
omputational power at their end. CSP provides it with SaaS. This
helps in cost cutting at users’ end, by reducing the amount of
buying extra hardware for carrying their work.
Authorized licensed use limited to: Uskudar Universitesi. Downloaded on October 07,2021 at 11:59:35 UTC from IEEE Xplore. Restrictions apply.
Using a SaaS, an industry or individual can create an The computational and storage infrastructure of CSP can
archive of their software versions, available to end users for be offered independently as IaaS to CUs. Saas includes them
usage, using PAYG. PAYG involves calculating charges on partially, to fulfill the computational and storage demands
usage. Different modes of PAYG [2] can be used by the CSP. of software offered as a service. Various operating systems
and development environments, termed usually as platforms,
Fixed PAYG is paying a fix amount after every month, can be offered as Platform as a Service(PaaS) [10], [11]. All
irrespective of usage. Dynamic PAYG is paying a amount these services need to be offered via secure channel and IAM
calculated based on some pre-agreed usage based formula after check for maximum trust. Because SaaS and like technologies
every month. In Prepaid PAYG a fixed amount is first depends on Internet; all threats and issues of Internet are
deposited into account of CSP. CSP then deducts the charges applicable to them [12].
from this deposited amount, based upon some usage based
formula. The paper is arranged in five sections to discuss SaaS:
(I) Introduction, (II) Requirements of SaaS implementation,
In prepaid PAYG model, to reduce the complexity, the (III) Implementation challenges for SaaS, (IV) Proposed
deposit made by user remains valid only for some fix duration. model of SaaS implementation using virtualization technology,
User needs to use all his deposit within that fix duration. If and (V) summary.
one go on comparing cost of PAYG, with investment that one
need to do, to have all required infrastructure to run a software,
with security and maintenance cost; PAYG is having very II. REQUIREMENTS OF SAAS IMPLEMENTATION
negligible cost. Due to the economy of PAYG, many users
instead of using and maintaining pirated software, can go for The first requirement is a software to offer as a service.
SaaS, resulting in reduced software piracy. Any software, like office, photo editors, web publishers, ERP
suite, etc. can be offered as a service to end users. SaaS
SaaS involves business and commerce. This implies CSP require a high performance Internet connection to connect
and CUs to follow law, International as well as local law. our machine(or LAN) to CSP-sever offering SaaS. Proper
Law need everything to be documented, agreed and signed security system need to be pre-installed on the machine(or
properly with legal agreement. Cloud computing and all LAN) to secure it from any threats arising due to connectivity
Service Oriented Computing(SOC) models, call such to Internet. This security at local machine(or LAN) involves
agreement as SLA(Service Level Agreement) [6]. firewalls, DMZ, Honeypots, Antiviruses, etc.
CSP generally keep some predesigned SLAs, to choose Web services(WS) [13] are used to offer the software
from, for CUs. User chooses a SLA, based on requirements remotely as a service to users. A proper care required to be
and digitally signs it. SaaS requires an user to accept the SLA taken for nonviolence of copyrights and patents of the software
for providing the services as per users’ requirements [7]. This offered as a service. This is why many software offered as a
implies the need of SLA monitoring system [8], for providing services are either custom made or web based; or are free open
services as per SLA [9]. The monitoring system also monitors source software. So if one is having a good software, which
usage for PAYG, to calculate the bills. if offered as a service to world won’t create any copyright or
The schematic is similar to the schematics of Utility patent violations, then one can implement ones’ SaaS cloud
computing, SOA and other SOC models. It has (i) IAM [5] easily.
system to provide login and usage credentials, (ii) Monitoring Once software to be offered as a service are finalized; next
system to monitor the SLA and usage, and providing input to requirement is to model IAM with the SLA and PAYG billing
billing system [8], (iii) Security system to provide security to system. IAM is necessary to restrain the services only to
cloud: SaaS, (iv) Web Service deployment unit, offering legitimate users. Based on the SLA, the WS deployment unit
software to users as per SLA [7], (v) Software archive, from need to run the software instances in independent user shells
which CSP is offering different software as service to different [6], [13]. Each user shell, running the software, must have to
users. give both, local-storage or cloud-storage option to the user. The
security system of cloud ensures encryption of the users’ data
on cloud-storage. This safeguards the data against inadvertent
access and theft.
All Data between user and CSP must need to be
communicated or shared via secure channel. [14], [15] This
requirement requires activation of security certificates, HTTPS,
and other security related factors of Internet communication
and data sharing. This implies that SaaS require to be safe
enough, so that users can trust it. Because SaaS or other
SOC(Service Oriented Computing) models need to follow the
local and global law; all software, offered as a service to users
Fig. 2. Block schematic of SaaS must not have to make any law violation. This requires a
rigorous check for possible copyrights, patents, and other
Authorized licensed use limited to: Uskudar Universitesi. Downloaded on October 07,2021 at 11:59:35 UTC from IEEE Xplore. Restrictions apply.
violations, that may occur due to implementation and/or use of SaaS involves commerce and law. A strong monitoring
SaaS by user. system requires to identify and shun any and all illegal
activities carried out by either the CSP or users. To have such
III. IMPLEMENTATION CHALLENGES FOR SAAS a system is quite a challenging task, as it needs to fulfill the
right to privacy of individual users.
Having a proper software or a set of software is the first
challenge to overcome. Usage of software must not violet law. Being commercial in nature, success of SaaS totally depend
SaaS can only be efficient if CUs and CSPs are connected with upon the number of users using it. This number depends upon,
high speed trusted communication channel. Apart from this i) Usability of software offered as a service, ii) Ease of use of
following challenges are need to be resolve for implementation service, iii) Timely launch of the service, iv) Regular update
of SaaS. of service, v) Competitive costing of service, vi) advertising
and marketing of SaaS, etc.
Multi-tenant architecture [16]–[19]: Multi-tenancy utilizes
sharing of single sharable resource among more than To maintain the existing userbase(the number of users) and
one tenant, while each tenant getting the impression increasing it with time, requires persistent maintenance of total
that the resource is dedicated only to him/her. Fine quality of service(QoS) implementation throughout the life of
grain parallelism and concurrency with other distinctive CSP and SaaS. Offering unhampered QoS throughout the SaaS
features of distributed computing are exploited for life(time from beginning to end of SaaS) is one big challenge,
achieving multi-tenancy. Each CU can customize the if overlooked by the CSP, could cause a total failure of the
appearance of the service as per his/her liking due to system [26].
multi-tenancy, while CSP need only to update the single To use SaaS efficiently CUs are required to have 24×7 high
serving core of the software to propagate the update to speed Internet connection with CSP. Internet is backbone of
all tenants. all SOC architectures like SaaS, PaaS, IaaS, SOA, etc. High
Virtualization [20], [21]: Virtualization is fundamental to speed Internet is still a problem in many countries from third
cloud computing. A CSP uses virtualization to provide the world. Exposure of Intranet to Internet, while using SaaS,
different platforms to the CUs. Buying all the supporting makes it more vulnerable to all security threats and attacks,
hardware for each and every service isn’t a feasible that could be possible due to exposure to Internet. A proper
solution, so CSPs generally relay on the Virtual machines security measures must have to be taken care by CUs at their
or virtualization concept. A software imitating the real end using firewalls and antiviruses against such attacks and
hardware, acts as base for loading an operating system threats.
on it. Virtualization helps in 100% utilization of resources
with minimum expenses on real hardware. A. Advantages of SaaS
Security [22]–[24]: Secure communication channel, secure Advantages of SaaS are: i) User won’t need to make any
data transmission, and secure data storage, these are the capital investment in Software and other supporting systems.
primary requirements of any SOC. Various measures for ii) For CU software maintenance cost reduces to zero, as
providing security, like VPN, SSL, Encryption, etc. can software is actually maintained by SaaS provider. iii) Reduces
be used. A new paradigm of SLA based security [25] is software piracy and dangers of it to a substantial amount due
gaining popularity among the CSPs and CUs. Security to flexible PAYG model. iv) SaaS support flexible and
only can gain the trust of users in SOC like SaaS. For effective collaborative development. v) SaaS makes it possible
secure storage data encryption, data compartmentalization to work from anywhere and whenever, for the user, subject to
and data redundancy are required to be used at CSP. Internet connectivity with CSP.
Other challenges in implementing SaaS are: documentation For SaaS provider, SaaS is business. A big organization
and implementation of SLAs within the boundaries of legal acting as CSP get paid for its investments in heavy duty
system. Giving a 24×7 support to users’s activities require hardware, software, and staff, without getting any hindrance
continuous uninterrupted power supply(UPS) at CSP with high in its regular operations. The resources offered as a service
bandwidth communication links. It also requires hardware get utilized to there 100% capacity and provider get paid for
redundancy(real as well as virtual) with storage redundancy it. This increases revenue for SaaS provider [27], [28].
to avoid and manage any failure while operating as SaaS Software manufacturer get relief from distributing their
provider. software on physical media worldwide. Low cost option of
SaaS require some human investment at CSP. PAYG due to SaaS causes many small time users to go for
Programmers, system maintainers, and other personnel require SaaS account instead of pirated version of Software. Version
to make SaaS possible, may cause threats to it by stealing user- controlling and updates of software using SaaS is easier than
data or tampering the hardware. Strong data encryption, using physical media distribution.
compartmentalization, and secure storage policies can assist in
this scenario [14]. B. Disadvantages of SaaS
SaaS users have no control over the usage of versions of
software offered as a service. This happens as CSP after
Authorized licensed use limited to: Uskudar Universitesi. Downloaded on October 07,2021 at 11:59:35 UTC from IEEE Xplore. Restrictions apply.
updating the existing software offered as a service, may no to the external world. Every VM can be loaded with similar
longer provide its old version as a service to the user. This or different operating systems and applications accordingly.
some time may cause a problem to CUs, if interface of Whenever the request for particular service will arrive at
new version is drastically different than old version or if master VM, it will automatically call and provide that service
new updated version of the software is no longer backward from the other VMs to the user. The virtualization software
compatible. will act as a router and interconnect for the VMs. A block
scenario of private SaaS is as given in figure 3.
If CSP compels user to save all the data processed using
SaaS on CSP’s cloud storage, then CU will automatically loose Master VM is configured just like namenode of Hadoop,
any control over data. This can be avoided by providing the with rest of the VMs as subnode. Architecture similar to single
facility to store all data locally at CU’s terminal. node cluster of Hadoop is prepared to form a SaaS. To provide
Internet vulnerabilities can play as threats while using SaaS. UPS to our SaaS cloud infrastructure, authors used a laptop
Denial of Service attack, data theft by sniffers or hackers, with said configuration, with intel COREi7 processor. Laptop,
inconsistency in data processing due to poor Internet due to its battery backup, provides required UPS to our SaaS
connectivity are the few major threats to SaaS. cloud in absence of power supply, atleast for an hour. Another
reason to use Laptop to create a virtual SaaS Cloud is, its
readiness with WiFi, Ethernet, other connectivity ports and
mobility. To be certain for performance, authors used the
C. Future of SaaS recent operating systems on host as well as on VMs.
MicroSoft is offering its Office software, Office365, using
SaaS. Amazon is offering many of its services via Amazon’s The software on different VMs with different platforms
Elastic Cloud. Oracle is offering many of its software as
service via cloud. Many Free Open Source Software(FOSS)
are already available via SaaS. Google, Yahoo, rediff and so
on, all these companies are using Cloud computing to offer
their infrastructure, platforms, as well as software as a Service
to end user.
SaaS is actually becoming popular due to mobile devices
like smart phones and laptops. Users are using more
mobileapps (web based application software giving access to
particular web service or software as a service) to use web
services, as well as web based software like Microsoft’s then can be called on clients’ machine using AJAX, REST
Office365, Google’s SketchUp. We can say that SaaS is having and other advanced technologies, useful in implementation
a great future scope. of SOC systems. The Interface for clients must have to be
portable. Using web based solutions for accessing software as
a service is one good solution. The simplistic view of our SaaS
IV. PROPOSED MODEL OF PRIVATE SAAS cloud is as given in figure 4.
IMPLEMENTATION USING VIRTUALIZATION
TECHNOLOGY
Implementing a SaaS in its real scale is very costly affair. Fig. 3. A block scenario of private SaaS
But using private cloud concept, one can implement SaaS at
small scale level using a sufficiently advanced hardware. A Implementing such private SaaS at any institute reduces
Computer with 16GB or more RAM, and with 1TB or more the work of administrator from extra monitoring of different
hard-disk can be used to form a virtual data center. Using software installed in LAN. Maintaining software on SaaS with
16GB RAM, one can create 5 virtual machines of 2GB RAM, implementation of stringent security measures is now sufficient
or 10 VMs of 1GB RAM. The host machine thus will have to offer all software readily to the users in institute. Even if
only 6GB of RAM to run the VMs. Software is licensed to single user, single machine; running its
The Created VMs can be used to form a computing and instances remotely on the SaaS cloud won’t violet any license
storage grid. No VMs, except the one, which is acting as term, and many users can use that software via CU-interface at
master and connected with host, and via host with the external the same time. Updating and upgrading software becomes
world; is the only VM visible to host machine as well as more easy as any changes made in software at SaaS cloud
automatically reflect at every users’ terminal.
Authorized licensed use limited to: Uskudar Universitesi. Downloaded on October 07,2021 at 11:59:35 UTC from IEEE Xplore. Restrictions apply.
V. SUMMARY
SaaS helps in working collaboratively on many projects, such Virtualization helps the single hardware to act like grid,
as: software development, official documentation, academic increasing hardware utilization to its maximum capacity.
research, etc. The care that one need to take while Private SaaS implementation is very useful for academic
implementing private SaaS, is to provide a secure channel of projects and collaborative development. Due to its advantages
communication for data transfer between CUs and SaaS. If and continuously advancing technology, one can say that SaaS
some serious type of research, confidential one, is carried out is having promising future.
using private SaaS, then it must have to be kept isolated from
Internet and any other inadvertent access. The machine or REFERENCES
network, which might be used for implementation of private [1] P. Mell and T. Grance, “The NIST Definition of Cloud Computing
SaaS, must have to be equipped with IDS (Intrusion Detection (Draft),” National Institute of Standards and Technology, U.S.
Systems), DMZ(Demilitarized Zones) and firewall, Honeypots, Department of commerce, Tech. Rep., 2011. [Online]. Available:
Antivirus, MalWare-&-SpyWare removers, etc. to provide www.nist.org
maximum security to SaaS cloud. Having similar type of [2] Aniruddha S Rumale and Dr. D N Chaudhari, “Cloud Computing:
security at CUs’ terminal is also desirable. Infrastructure as a Service,” International Journal of Inventive
Engineering and Sciences (IJIES) ISSN: 23199598, vol. 1, no. 3, pp. 1–
If security measures as discussed in above paragraph 7, February 2013.
presents in private SaaS, then one even can use Internet, to [3] Steven Muthula. (2015, Nov) Understanding the Cloud Computing
Stack: SaaS, PaaS, IaaS and Big Data. [Online]. Available:
connect with it. Security measures adds assurance of minimal https://www.linkedin.com/pulse/understanding-cloud-computingstack-
damage to the working system and its users. Such secured saas-paas-iaas-big-steven-murhula
private SaaS can allow the users(generally members of private [4] H. Beard, Cloud Computing Best Practices : For Managing and
SaaS or employees of Institute, who is having private SaaS) Measuring Processes for On-Demand Computing, Applications and Data
to work from remote places, from anywhere of the world, in centers in the Cloud with SLAs, 2011.
their leisure time. An Employee of the institute thus become [5] A S Rumale and Dr. D N Chaudhari, “Post Login Authentication of
able to complete the work of institute while enjoying holidays. User for Service Usage Authorization in Cloud Computing,” paper
submitted to IEEE conference but yet not published
[6] Ivanka Menken and Gerard Blokdijk , Cloud Computing Certification
Kit Specialist : Software as a Service & Web Applications. The Art of
Service, 2010.
Authorized licensed use limited to: Uskudar Universitesi. Downloaded on October 07,2021 at 11:59:35 UTC from IEEE Xplore. Restrictions apply.
[7] R. Buyya, S. K. Garg, and R. N. Calheiros, “SLA-Oriented Resource [18] L. Aiken, “Scaling your saas business : Multi-tenancy is the key,”
Provisioning for Cloud Computing: Challenges, Architecture, and cloudbook Journal, Published by Active Book Press, 3000 San Hill
Solutions,” IEEE International Conference on Cloud and Service Road Suite 3-100, Menlo Park, CA 94402, vol. 2, no. 4, pp. 31–35,
Computing, pp. 1–10, 2011. 2011. [Online]. Available: cloudbook.net
[8] B. Daley and A. Rudolph, “Accurately monitoring cloud slas,” [19] P. Feresten, “Storage multi-tenancy forcloud computing.” Storage
cloudbook Journal, Published by Active Book Press, 3000 San Hill network industry association, Tech. Rep., 2011. [Online]. Available:
Road Suite 3-100, Menlo Park, CA 94402, vol. 1, no. 4, pp. 29–31, snia.org
2010. [Online]. Available: cloudbook.net [20] Ivanka Menken and Gerard Blokdijk , Cloud Computing Certification
[9] A S Rumale and Dr. D N Chaudhari, “Cloud Computing : Service Level Kit Specialist : Virtualization. The Art of Service, 2010.
Agreements(SLA),” INTERNATIONAL JOURNAL OF SCIENTIFIC [21] James E Smith and Ravi Nair, Virtual Machines Versatile Platforms for
& ENGINEERING RESEARCH, ISSN 2229-5518, vol. 4, no. 9, pp. 1– Systems and Processes . Morgan Kaufmann Publishers is an imprint of
5, SEPTEMBER 2013, First presented in Medha 2013 -National Level Elsevier. 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA,
Conference on Recent Trends in Computer Science, 24th September 2005.
2013, Held at JDIET Yavatmal.
[22] Cisco-team. (2011) Creating business value with effective, pervasive
[10] Michael P. McGrath, Understanding PaaS. OReilly Media, Inc., 1005 cloud security and cloud enablement services : Managing governance,
Gravenstein Highway North, Sebastopol, CA 95472., 2012. risk, and compliance for cloud information security. Cisco Systems,
[11] A S Rumale and Dr. D N Chaudhari, “Cloud Computing: Platform Inc. Cisco White Paper, pp. 1-11. [Online]. Available: www.cisco.com
as a Service,” International Journal of Advances in Computing and [23] R. Bhadauria, R. Chaki, N. Chaki, and S. Sanyal, “A survey on security
Communication Technologies (IJACCT), vol. 1, no. 1, pp. 46–49, 2014. issues in cloud computing,” pp. 1–15, 2012.
[12] Cloud-Security-Alliance, “Top Threats to Cloud Computing V1.0,” [24] A. Buecker, K. Lodewijkx, H. Moss, K. Skapinetz, and M. Waidner,
Cloud Secuirty Alliance, pp. pp. 1–14, Dec. 2010. “Cloud Security Guidance: IBM Recommendations for the
[13] C. Baun, M. K. J. Nimis, and S. Tai, Cloud Computing : Web-Based Implementation of Cloud Security,” IBM Corp, Tech. Rep., 2009, IBM
Dynamic IT Services, 2nd ed. Springer-Verlag Berlin Heidelberg, Redbooks:Redguides and Redpapers for Business Leaders, pp. 1-16.
Springer Heidelberg Dordrecht London New York, 2011, iSBN 978- [25] A S Rumale and Dr. D N Chaudhari, “Cloud Computing: Security Issues
3-642-20916-1, e-ISBN 978-3-642-20917-8, DOI 10.1007/978-3-642- and Measures,” CSEE 2014 International Conference on Advances in
20917-8. Computer Science and Electronics Engineering,The 2014 IRED
[14] cloud Security-Alliance, “Security Guidance for Critical Areas of Focus Malaysia Conferences,March 08-09 2014, Kuala Lumpur, Malaysia, pp.
in Cloud Computing V3.0,” Cloud Secuirty Alliance, pp. pp. 1–177, 75–80, March 08-09 2014.
Dec. 2011. [26] H. Baltazar, “The progression of cloud storage:Hybrid, QoS and
[15] A S Rumale and Dr. D N Chaudhari, “Cloud computing : Designing beyond,” Storage network industry association, Tech. Rep., 2011.
secure storage- cloud system,” International Journal Of Computer [Online]. Available: snia.org
Science And Applications, ISSN: 0974-1003, vol. 4, no. 3, pp. 120–124, [27] F. Etro, “The economic impact of cloud computing on business creation,
Oct-Dec 2011. employment and output in europe,” Ph.D. dissertation, University of
[16] L. Aiken, “Why multi-tenancy is key to successful and sustainable Milan, Bicocca, Department of Economics. Piazza dellAteneo Nuovo,
software-as-a-service (saas),” cloudbook Journal, Published by Active 2009, pp. 1-40.
Book Press, 3000 San Hill Road Suite 3-100, Menlo Park, CA 94402, [28] Bill Williams, The Economics of Cloud Computing. Cisco Press, 800
vol. 2, no. 1, pp. 17–21, 2011. [Online]. Available: cloudbook.net East 96th Street, Indianapolis, IN 46240 USA, 2012.
[17] Dominic Betts and Alex Homer and Alejandro Jezierski and Masashi
Narumoto and Hanz Zhang , Developing Multi-tenant applications for
the cloud on Microsoft Windows Azure, 3rd ed. Microsoft, 2012.
Authorized licensed use limited to: Uskudar Universitesi. Downloaded on October 07,2021 at 11:59:35 UTC from IEEE Xplore. Restrictions apply.