Software-as-a-Service Security Challenges and Best
Software-as-a-Service Security Challenges and Best
Software-as-a-Service Security Challenges and Best
sciences
Review
Software-as-a-Service Security Challenges and Best Practices:
A Multivocal Literature Review
Mamoona Humayun 1, * , Mahmood Niazi 2,3, *, Maram Fahhad Almufareh 1 , N. Z. Jhanjhi 4 ,
Sajjad Mahmood 2,3 and Mohammad Alshayeb 2,3
1 Department of Information Systems, College of Computer and Information Sciences, Jouf University,
Sakakah 72311, Saudi Arabia; [email protected]
2 Department of Information and Computer Science, King Fahd University of Petroleum and Minerals,
Dhahran 31261, Saudi Arabia; [email protected] (S.M.); [email protected] (M.A.)
3 Interdisciplinary Research Centre for Intelligent Secure Systems, King Fahd University of Petroleum and
Minerals, Dhahran 31261, Saudi Arabia
4 School of Computer Science and Engineering (SCE), Taylor’s University, Subang Jaya 47500, Malaysia;
[email protected]
* Correspondence: [email protected] (M.H.); [email protected] (M.N.)
Abstract: Cloud computing (CC) is the delivery of computing services on demand and is charged
using a “pay per you use” policy. Of the multiple services offered by CC, SaaS is the most popular
and widely adapted service platform and is used by billions of organizations due to its wide range of
benefits. However, security is a key challenge and obstacle in cloud adoption and therefore needs to
be addressed. Researchers and practitioners (R&P) have discussed various security challenges for
SaaS along with possible solutions. However, no research study exists that systematically accumulates
and analyzes the security challenges and solutions. To fill this gap and provide the state-of-the-art
(SOTA) picture of SaaS security, this study provides a comprehensive multivocal literature review
Citation: Humayun, M.; Niazi, M.;
(MVLR), including SaaS security issues/challenges and best practices for mitigating these security
Almufareh, M.F.; Jhanjhi, N.Z.;
issues. We identified SaaS security issues/challenges and best practices from the formal literature (FL)
Mahmood, S.; Alshayeb, M.
as well as the grey literature (GL) to evaluate whether R&P is on the same page or if controversies
Software-as-a-Service Security
exist. A total of 93 primary studies were identified, of which 58 are from the FL and 35 belong to the
Challenges and Best Practices: A
Multivocal Literature Review. Appl.
GL. The studies are from the last ten years, from 2010 to 2021. The selected studies were evaluated
Sci. 2022, 12, 3953. https://doi.org/ and analyzed to identify the key security issues faced by SaaS computing and to be aware of the best
10.3390/app12083953 practices suggested by R&P to improve SaaS security. This MVLR will assist SaaS users to identify the
many areas in which additional research and development in SaaS security is required. According
Academic Editor: Arcangelo
to our study findings, data breaches/leakage, identity and access management, governance and
Castiglione
regulatory compliance/SLA compliance, and malicious insiders are the key security challenges
Received: 18 March 2022 with the maximum frequency of occurrence in both FL and GL. On the other hand, R&P agree
Accepted: 8 April 2022 that up-to-date security controls/standards, the use of strong encryption techniques, regulatory
Published: 14 April 2022
compliance/SLA compliance, and multifactor authentication are the most important solutions.
Publisher’s Note: MDPI stays neutral
with regard to jurisdictional claims in Keywords: cloud computing; software-as-a-service (SaaS); multi-vocal literature review (MVLR); security
published maps and institutional affil-
iations.
1. Introduction
Cloud computing (CC) offers a consolidated pool of configurable computing tools and
Copyright: © 2022 by the authors.
computing outsourcing processes that enable various computing services to be offered to
Licensee MDPI, Basel, Switzerland.
This article is an open access article
individuals and organizations. Millions of organizations have adopted CC due to its poten-
distributed under the terms and
tial benefits, such as cost efficiency, improved collaboration, scalability, flexibility, automatic
conditions of the Creative Commons
software updates, business continuity, etc. [1,2] CC encompasses a wide range of services
Attribution (CC BY) license (https:// and implementation models, as shown in Figure 1. The three types of services provided by
creativecommons.org/licenses/by/ CC are platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS), and software-as-a-
4.0/). service (SaaS). IaaS provides options such as renting IT storage (virtual or physical) and
According
According to the statistics to the statistics
provided provided the
by Statista, by Statista,
PBC SaaS the PBC SaaS market
market is increasing
is increasing
rapidly with time (as shown in Figure 2). It is a model in which the CSP hosts applications
rapidly with time (asremotely
shownand in Figure 2). It is a model in which the CSP hosts applications
makes them accessible to consumers on-demand over the Internet. Customers
remotely and makes benefit
them from
accessible
the SaaSto consumers
model in a varietyon-demand overincreased
of ways, including the Internet. Custom-
operating performance
ers benefit from the SaaS model
and lower costs.inSaaS
a variety
is quicklyofgaining
ways,attention
including increased
as the operatingmodel
preferred distribution per- for
business IT services. Most businesses, however, are still wary
formance and lower costs. SaaS is quickly gaining attention as the preferred distribution of the SaaS model due to a
lack of insight into how their data are processed and protected. Thus, security is the top
model for business ITobstacle
services. Most
to SaaS businesses,
adoption however,
for enterprise are still wary
IT infrastructures [7,8]. of the SaaS model
due to a lack of insight into how their data are processed and protected. Thus, security is
the top obstacle to SaaS adoption for enterprise IT infrastructures [7,8].
Appl. Sci. 2022, 12, 3953 3 of 29
Appl. Sci. 2022, 12, x FOR PEER REVIEW 3 of 28
160
140
120
100
80
60
40
20
0
2015 2016 2017 2018 2019 2020 2021 2022
2. Background
This section provides a general overview of some key terms related to CC with a
special focus on SaaS security.
2.3. Types of CC
PRC, PBC, and HYC are the three major cloud storage solutions. Each has its own set
of benefits and drawbacks and which one a user (or company) selects will be determined
by the nature of the data as well as the level of protection and management needed. A PBC
is perhaps the most prominent form of CC. Both resources and supporting facilities are han-
dled and accessed among many users off-site via the Internet (or tenants). A subscription
service, such as Netflix or Hulu, is a clear example of a PBC at the individual user level.
Rather than providing IT services to the public, the PRC delivers them to a small group of
customers over the Internet or a private network. Various organizations adopt this option
because it combines cloud mobility with greater customization and protection. Private and
PBC elements are mixed in varying degrees in a HYC scheme. In relation to their freedom,
the clouds in a hybrid environment operate together through an encrypted network, allow-
ing data and applications to flow across them. This is a popular cloud solution because it
provides companies with greater flexibility in fulfilling their IT needs [15,16].
3. Literature Review
Before moving forward with the MVLR, it is essential to include a review of the
existing studies to understand the current state of research. This section provides a quick
rundown of some current research on SaaS security issues and mitigation strategies.
Hoener performed a systematic literature review (SLR) to gather SaaS security issues
and solution. This SLR identified CC security requirements from scientific publications
between January 2011 and March 2013. The identified requirements were categorized into
a framework to assess their frequency. This research study also identified challenges in
requirement assessment and proposed a solution for it [24].
Hashizume et al. presented the security issues of three cloud service models, IaaS,
PaaS, and SaaS. The main security issues in CC, as stated in this article, are storage, virtu-
alization, and networks. This paper also makes a distinction between vulnerabilities and
threats, emphasizing the importance of comprehending these problems and establishing a
connection between threats and vulnerabilities to determine which vulnerabilities lead to
the implementation of these threats to render the framework more resilient. To mitigate
these risks, several existing solutions were also identified. According to the findings of this
paper, traditional protection systems may not function well in cloud environments because
they constitute a dynamic architecture made up of a variety of technologies [25].
A systematic mapping study (SMPS) was performed by Juárez and Cedilloin in [26] to
find the security issues of mobile computing. Based on the interpretation and assessment of
83 primary studies, this mapping study breaks down the security sub-characteristics from
the ISO/IEC 25010 and compares them to the details contained in this study. The findings
of the study indicate that there are sufficient studies to address the issue of confidentiality
and integrity. However, accountability and non-repudiation need more attention.
A SMPS was performed by De Silva et al. to identify the security threats in CC. The aim
of this study was to compile a list of the most recent publications in the literature that
addressed security threats in CC. Centered on the Cloud Protection Alliance’s “Top Threats
to CC guide”, this analysis presents metrics regarding existing research publications that
deal with some of the seven security threats in CC. Furthermore, this research identified
the most researched challenges, spreading the findings through 15 security domains,
and identified the types of threats and solutions suggested. In view of these findings,
the research focuses on publications that deal with meeting a regulatory requirement [27].
According to Zhou et al., users’ use of CC technologies and applications is hampered
by security and privacy concerns. The security and privacy issues raised by several CC
system providers were investigated in this study. According to the results of the study,
these considerations are insufficient. To meet the five goals (confidentiality, data integrity,
availability, monitoring, and audit), more security techniques should be deployed in the
cloud world, and privacy acts should be updated to adapt a new partnership between CSPs
and CT in the cloud literature. According to the study, the CC literature needs to flourish
until the protection and privacy problems are addressed [28].
Shankarwar and Pawar conduct a study of security and privacy problems as well as
potential remedies. They discuss the benefits and disadvantages of the current methods
to fully resolve the protection and privacy issues in the cloud world, as well as the advan-
tages and drawbacks of existing methods to completely resolve the security and privacy
issues [29]. According to Hussein and Khalid, security is still a major concern in the CC
paradigm. User confidential data loss, data leakage, and the disclosure of confidential data
are a few of the major security concerns. This paper presents a thorough review of the
current literature on CC security issues and solutions [30].
A survey of the various security threats that pose a danger to the cloud is discussed
by Kumbhar et al. This paper presents a survey focused on the various security problems
that have arisen because of the nature of cloud infrastructure service distribution models.
The paper discusses the security issues of three service models of CC, namely IaaS, PaaS,
and SaaS in detail and provides recommendations to mitigate the mentioned threats.
This paper examines CC security problems and categorizes them into different groups
Appl. Sci. 2022, 12, 3953 7 of 29
4. Research Methodology
The SLR and MVLR guidelines reported in the work in [34] were used to help with the
framework for this MVLR. Our MVLR consists of three main phases (as shown in Figure 4).
In phase-1, we develop the MVLR protocol, data extraction and analysis were undertaken
in phase-2, and phase 3 provides the results, which are shown in a separate section. In the
following, we discuss each phase in detail.
on Google Scholar to obtain an overview of the most recent literature and to make sure
that enough literature exists in the area under research to conduct an MVLR. Further,
the aim of this initial search is to compile a list of primary studies that may be used for the
validation of the search string. We retrieved 10 primary studies that are closely related to
the posed research questions. This preliminary literature review reveals that SaaS security is
a major research issue, with numerous research studies in this field. However, the problem
persists, and security remains a major barrier. Further, to the best of our knowledge, there
is no existing MVLR on this topic. Therefore, there is a need to provide the current-SOTA
picture of the SaaS security issues/challenges and best practices. In the second phase,
an automated search was performed on six libraries: IEEE explorer, ACM, Science Direct,
Springer, Wiley Online, and Google Scholar to retrieve the peer-reviewed literature. In the
automated search, we used the advanced search option to match the search string with
the title, abstract and keywords of the papers published between Jan 2010 to Jan 2021.
For the GL search, we used the Google search engine similar to other MVLRs [35,36]. Since
the Google search engine’s algorithm retrieves and displays the most important results
in the first few pages [34,36], we found the first 10 pages to be adequate for finding the
most relevant literature. For example, the Google search retrieved 187, 000 records for the
term “SaaS security” in January 2021, however relevant content was found only in the first
10 pages.
Search String
To ensure a robust search through several databases, we generated a search string.
For the academic literature, we generated a search string focused on:
(a) The keywords gathered from the primary studies
(b) Synonym and alternative words used for the identified terms
(c) Using the logical operator AND or OR to combine these terms.
We ran several pilot searches and refined our search string to make sure that all
primary studies are retrieved by applying the search string. The search string was also
tailored for different libraries. In the following, we describe each part of the search string.
(“SaaS” OR “software as a service” OR “Software-as-a-Service”) AND (“security” OR
safety OR integrity OR confidentiality OR availability) AND (issues OR challenges OR prob-
lems OR limitations) AND (Practices OR guidelines OR recommendations OR checklist)).
We used “Software-as-a-service AND security” to find the GL and applied this string
on the Google search.
Exclusion
Exclusion Criteria
Criteria forfor
GLGL
TheThe exclusion
exclusion criteria
criteria forfor
GLGL were
were thethe same
same as as
forfor
FL.FL.
WeWediddid
notnot consider
consider literature
literature
that
that waswas
notnot written
written in English
in English or that
or that waswas
notnot related
related to SaaS
to SaaS security.
security.
4.1.4. Quality
4.1.4. Assessment
Quality Assessment (QA)
(QA)
To To
evaluate thethe
evaluate strength of FL
strength andand
of FL GL,GL,
wewedefined
definedthethe
separate quality
separate qualityassessment
assessment
criteria forfor
criteria both types
both of literature.
types WeWe
of literature. discuss these
discuss criteria
these separately
criteria in the
separately following.
in the following.
Quality Assessment
Quality Assessmentof FL
of FL
A QA checklist was prepared
A QA checklist was to ensure
prepared thethe
to ensure strength of the
strength extracted
of the FL.FL.
extracted This checklist
This checklist
includes the following points.
includes the following points.
Appl. Sci. 2022, 12, x FOR PEER REVIEW 11 of 28
Appl. Sci. 2022, 12, 3953 10 of 29
Figure6. 6.
Figure Details
Details of Scientific
of Scientific Literature
Literature retrieved.
retrieved.
Table
Table 1. 1. Distribution
Distribution of studies
of studies w.r.t.
w.r.t. venues.
venues.
Journal
Journal Conference Workshop
Conference Workshop Total Total
IEEE
IEEE 0 0 26 26 1 1 27 27
ACM
ACM 1 1 5 5 0 0 6 6
Google Scholar
Google Scholar 6 6 0 0 0 0 6 6
Science Direct
Science Direct 2
2 2
2 1
1 5
5
Wiley 5 0 0 5
Wiley 5 0 0 5
Springer 1 8 0 9
Springer 1 8 0 9
Total 15 41 2 58
Total 15 41 2 58
20
15
10
Figure7.7.Demographic
Figure Demographic analysis
analysis of scientific
of scientific studies.
studies.
ToTo classify
classify thethe existing
existing research
research patterns
patterns in the in theoffield
field SaaS of SaaS
cloud cloud the
security, security, the se-
selected
studies
lected studies were also classified according to the year of publication, as shown in 8.
were also classified according to the year of publication, as shown in Figure Figure
The maximum
8. The maximumretrieved studies
retrieved belongbelong
studies to the year 2012,
to the 2015,
year and2015,
2012, 2016 with
and a2016
frequency
with a fre-
ofquency
nine outofofnine
58 each. Eight
out of 58 out of 58
each. studies
Eight out were
of 58published in thepublished
studies were year 2014, in
while
the seven
year 2014,
out
while seven out of 58 studies were published in 2017. Six out of 58 studies were three
of 58 studies were published in 2017. Six out of 58 studies were published in 2018, published
out of 58 studies
in 2018, three outwere published
of 58 in thepublished
studies were year 2013 inand
the2019
yeareach,
2013while onlyeach,
and 2019 two out of only
while
58 studies were published in the years 2011 and 2020. The downfall in the curve of Figure 8
two out of 58 studies were published in the years 2011 and 2020. The downfall in the curve
of Figure 8 shows that SaaS security issues have been resolved to some extent with the
advancement of the latest technologies and suitable security measures. However, some
Appl. Sci. 2022, 12, 3953 13 of 29
Figure8.8.Retrieved
Figure Retrievedstudies
studiesfrequency
frequencyw.r.t.
w.r.t.year
yearofofpublication.
publication.
5.1.3.SaaS
5.1.3. SaaScloud
cloudSecurity
SecurityIssues
Issuesand
andChallenges
Challenges
Weselected
We selected5858scientific
scientificstudies
studiesasasprimary
primarystudies
studiesafter
afterapplying
applyingthe theI&E
I&Ecriteria.
criteria.
SaaS
SaaSsecurity
security issues
issues and challenges
challenges were
wereidentified
identifiedafter
aftera detailed
a detailed screening
screening of these
of these pri-
primary studies.
mary studies. According
According to studies’
to the the studies’ results,
results, data loss/leakage
data loss/leakage is the
is the key key
SaaS SaaS
security
security
challenge challenge with a frequency
with a frequency of 41.and
of 41. Identity Identity
accessand access management
management and a lack ofand a lack
user con-
oftrol
user control are the second most important challenges with a frequency
are the second most important challenges with a frequency of 39 each, after which is of 39 each,
after which
logical is logical
storage storage segregation
segregation and multi-tenancy/data
and multi-tenancy/data locality withlocality with a frequency
a frequency of 36. The
ofremaining
36. The remaining
issues and issues and challenges
challenges along with along
theirwith their frequency
frequency of occurrence
of occurrence and
and reference
reference of scientific
of scientific studies
studies are are detailed
detailed in Table in
2. Table 2.
Table2.2.SaaS
Table SaaSsecurity
securityissues
issuesand
andchallenges
challengesidentified
identifiedfrom FL.
from FL.
Challenges
Challenges FreqFreq Occurrence in FL Occurrence in FL
S1, S3, S4, S6, S7, S9,S1,
S11,
S3,S12, S13,
S4, S6, S7,S14, S15,S12,
S9, S11, S16,S13,
S17, S19,
S14, S22,
S15, S16,S24,
S17,S25,
S19,
Data security/data loss or leakage 41 S26, S27, S28, S30, S22,S32,
S31, S24,S33,
S25, S37,
S26, S27,
S38, S28,
S39,S30,
S40,S31, S32,
S41, S33,
S43, S37,S46,
S45, S38,S47,
Data security/data loss or leakage 41
S39,S55,
S48, S50, S52, S53, S54, S40,S56,
S41, S57
S43, S45, S46, S47, S48, S50, S52, S53, S54,
S55, S56, S57
S3, S4, S5, S6,S7, S9, S10, S11,S12,S13, S14, S15, S16, S18, S22, S25, S26, S27,
Identity and access management S3, S4, S5, S6,S7, S9, S10, S11,S12,S13, S14, S15, S16, S18,
39 S28, S29, S30, S33, S34, S36, S37, S38, S41, S43, S44, S46, S48, S49, S50, S51,
issues
Identity and access management issues 39 S22, S25, S26, S27, S28, S29, S30, S33, S34, S36, S37, S38,
S52, S53, S55, S56, S57S41, S43, S44, S46, S48, S49, S50, S51, S52, S53, S55, S56, S57
S1, S2, S4, S6, S9, S11, S12, S13, S14, S16, S17, S18, S19, S23, S24, S25, S26,
S1, S2, S4, S6, S9, S11, S12, S13, S14, S16, S17, S18, S19, S23,
Lack ofuser
Lack of usercontrol/visibility
control/visibility 39 S27, S28,
39 S29, S31, S32,S24,S35,
S25,S36,
S26, S38, S42,S29,
S27, S28, S43,S31,
S44,S32,
S45, S48,
S35, S49,
S36, S38,S50,
S42,S51,
S52, S53, S54, S55, S56,
S43,S58
S44, S45, S48, S49, S50, S51, S52, S53, S54, S55, S56, S58
S1, S4, S5, S6, S9, S11, S12, S13, S14, S16, S17, S19, S20, S21, S24, S25, S26,
Logical storage segregation &
36 S27, S28, S30, S31, S34, S38, S41, S42, S43, S45, S48, S49, S50, S51, S52, S54,
multi-tenancy/data locality
S56, S57, S58
Appl. Sci. 2022, 12, 3953 14 of 29
Table 2. Cont.
The issues or challenges with a frequency of one are combined under the heading
‘others’, including not incorporating security into SDLC, documentation, and different
service delivery/receiving models.
The aim of identifying these SaaS security challenges and issues is to address our
research question one (RQ1). This will help SaaS customers and service providers to gain
an in-depth overview of SaaS security issues. Addressing these challenges will help to
improve the security of the SaaS cloud.
5.2. GL Analysis
This section analyzes the GL to obtain the practitioners’ opinions about SaaS security
issues and solutions. The selected GL is discussed based on different criteria, such as venue
of publication, type of publication, year of publication, established SaaS security problems
and challenges, and security best practices.
papers.
Figure
Figure 9. Details
9. Details of GL retrieved.
of GL retrieved.
Table 4. Cont.
5.2.4. Best Practices for Improving SaaS Cloud Security (Practitioners’ Opinions)
The selected GL was evaluated to extract suitable solutions/best practices to mitigate
SaaS security issues and improve security. This will provide the practitioners’ opinions
regarding SaaS security. The extracted results are shown in Table 5. According to the results
in Table 5, 26 out of 35 practitioners emphasize data encryption to ensure the security
of SaaS cloud data, while governance and regulatory/standard compliance audits were
suggested by 22 out of 35 practitioners. The third commonly agreed solution for improving
SaaS security was the use of backups/recovery. The remaining best practices/solutions
are detailed in Table 5 along with their frequency of occurrence and the corresponding
GL reference.
Table 5. Cont.
Some best practices were only suggested by a single practitioner. Hence, we combined
all the practices with a frequency one into the category of ‘others’. The practices which
fall in the category of others include: watch for OWASP’s top security issues, being careful
with deadlines, and make security a priority.
6. Discussion
This MVLR has examined the pertinent factors that motivate the need to recognize SaaS
security problems/challenges and the best practices that can resolve these security issues.
We identified the current security challenges and best practices for improving SaaS cloud
security issues during this study. Security improvements are being more widely recognized
to accelerate SaaS cloud adoption. R&P from all over the world have been working for
years to identify SaaS cloud security problems and challenges, as well as practices that can
help solve these issues. However, the problem still persists, and challenges are reported
from time to time. Therefore, this area has significant potential for innovation and research.
Before proceeding to provide more solutions to existing security issues, there is a need to
synthesize R&P opinions at a single place to provide the complete and current picture of
the situation. To fill this gap, this MVLR has compiled a list of possible challenges from
the FL and GL to raise the awareness of the cloud tenants as well as CSPs. Further, we
also compiled practices for improving the security of the SaaS cloud both from the GL and
peer-reviewed literature. This will help R&P address these issues and improve their SaaS
cloud performance and adaption. In the following, we discuss these results in the light of
the posed research questions.
RQ1: What software security challenges are involved in SaaS as identified in the FL?
This research question aimed to identify the SaaS security issues and challenges dis-
cussed by researchers in this area. A total of 58 studies were selected as primary studies after
applying I&E criteria. When these studies were analyzed to find the SaaS security issues or
challenges, about 18 challenges were identified from 58 primary studies. The frequency of
the identified challenges was also calculated to understand the severity of each challenge.
According to our results, the challenges with a higher frequency were: data security/data
loss or leakage, identity and access management issues, lack of user control/visibility,
logical storage segregation & multi-tenancy/data locality, insecure interfaces and APIs, and
governance/regulatory compliance/SLA compliance with a frequency of 41, 39, 39, 36, 31,
and 30, respectively. Network security/shared technology, virtualization issues/cloud &
CSP migration issues, and malicious insiders were also key challenges with a frequency
of 29, 27, and 20, respectively. Other challenges are also detailed in Table 2. The data in
Appl. Sci. 2022, 12, 3953 19 of 29
Table 2 provide a detailed overview of the SaaS security issues and challenges. This study
will help R&P to obtain an overview of possible security issues and challenges. Based on
these identified challenges, organizations can evaluate their current security breaches and
can find timely solutions for these issues.
RQ2: What software security challenges are involved in SaaS as identified in the GL?
Many researchers have identified general SaaS security issues from the FL. However,
we did not find any study that has compiled R&P opinions together in a single study.
To fill this gap and to provide a detailed overview of possible SaaS security issues as
identified by academia and industry, this MVLR also extracted SaaS security issued from
the GL. A total of 35 studies were selected as the GL, which include white papers, blogs,
websites, and reports. According to our findings, the key security challenges identified
by practitioners include data breaches/leakage, identity and access management, loss of
control/visibility, inability to maintain regulatory/standard compliance and inability to
monitor data in transit to and from cloud applications with a frequency of 21, 17, 10, 10,
and 10 respectively. The detailed results are presented in Table 4. This will help SaaS
tenants and CSPs obtain an overview of the practitioners’ opinions on SaaS security issues
and challenges.
RQ3: Which practices are suggested by the FL for improving SaaS cloud security?
This research question aims to analyze the selected primary studies to find the best
practices that help in improving the security of the SaaS cloud. The mere identification of
SaaS issues or challenges is not enough. Therefore, we extracted the solutions/best practices
from these studies. Hence, 58 primary studies were also evaluated to find the security best
practices, with a total of 14 practices identified from the peer-reviewed FL which provides
a detailed overview of academia regarding SaaS security improvement. According to our
findings, the researchers consider up-to-date security controls/standards, the use of strong
encryption techniques, regulatory compliance/SLA compliance, multifactor authentication,
and better enterprise infrastructure/proper data isolation as key practices for improving
security with a frequency of 39, 38, 24, 24, and 23, respectively. A detailed list of these
practices is given in Table 3. The results in Table 3 will help SaaS tenants and CSPs in
relation to security analysis and improvement.
RQ4: Which practices are suggested by the GL for improving SaaS cloud security?
The experience of the people who are working in the industry is very useful in making
any decision. To improve SaaS security, we also collected the opinions of practitioners
who are actually working with SaaS and identified a list of practices mentioned by these
practitioners. A total of 35 studies from the GL were evaluated and about 14 practices were
identified from these studies that may help in improving SaaS security. According to practi-
tioners, the most useful practices (based on frequency of occurrence) are data protection
and encryption, governance and regulatory/standard compliance, and backups/recovery
with a frequency of 26, 22, and 20 respectively. The complete list of practices identified from
the GL is given in Table 5. The data in Table 5 will help SaaS tenants and CSPs to evaluate
their current security structure and will help them in relation to further improvement.
RQ5: Is there any similarity or discrepancy between R&P opinions regarding SaaS security
issues and solutions?
To compare academia and industry views regarding SaaS security issues and solutions,
we analyzed the data presented in Tables 2–5. The security issues identified by academia
and industry were almost same with a varying frequency of occurrence. Tables 6 and 7
provide the similarities and differences between R&P opinions regarding SaaS security
issues /challenges and best practices, respectively.
Appl. Sci. 2022, 12, 3953 20 of 29
The results of Table 6 shows that R&P are almost on the same pace regarding most of
the issues/challenges facing SaaS security, as shown by the data in column 3 of Table 6.
The results of Table 7 shows that R&P are on the same pace regarding the best practices
for SaaS security improvement. This shows that the provided MVLR is very helpful in
identifying SaaS security challenges and solutions. According to the results of Table 7, SaaS
security can be computed as
2 10
4
SS = ∑i=1 Xi + ∑ Yj + 2 ∑ Zk (1)
j =1 k =1
where SS denotes SaaS security, Xi refers to the security best practices mentioned in FL
only, Yj refers to the security best practices mentioned in GL only, and Zk refers to the
Appl. Sci. 2022, 12, 3953 21 of 29
security best practices mentioned both in FL and GL. The coefficient 2 with Zk shows the
dual weightage of these practices as both researchers and practitioners are in agreement
about them.
To calculate the security ∑4i=1 Xi , we need to assign individual weightage to each
practice according to its importance to the organization. The general calculation will be
computed as
4
∑ i = 1 Xi = w1 x 1 + w2 x 2 + w3 x 3 + w4 x 4 (2)
where w1 . . . w4 are weights assigned to different practices, in the same way
2
∑ j=1 Yj = w1 y1 + w2 y2 (3)
10
∑k=1 Zk = w1 z1 + w2 z2 + w3 z3 + w4 z4 + w5 z5 + w6 z6 + w7 z7 + w8 z8 + w9 z9 + w10 z10 (4)
The total security will be measured as
SS = ( w1 x 1 + w2 x 2 + w3 x 3 + w4 x 4 ) + ( w1 y 1 + w2 y 2 ) + 2 ( w1 z 1 + w2 z 2 + w3 z 3
(5)
+w4 z4 + w5 z5 + w6 z6 + w7 z7 + w8 z8 + w9 z9 + w10 z10 )
SaaS users. Further, SaaS vendors can evaluate their current security measures in the light
of the mentioned security challenges and best practices. In the future, we plan to extend our
research by proposing a standard solution to address SaaS security based on the issues and
challenges identified in this MVLR. Furthermore, we are planning to map the identified
challenges with best practices in order to provide deeper insights to the SaaS vendors so
that they can take appropriate measures when they encounter any security challenges.
Author Contributions: Conceptualization, M.H. and M.N.; methodology, M.H. and M.N.; software,
M.F.A.; validation, S.M. and M.A. and N.Z.J.; formal analysis, M.H. and M.N.; investigation, M.H.,
M.N., S.M. and M.A.; resources, M.H., M.F.A. and M.N.; data curation, M.H.; writing—original draft
preparation, M.H.; writing—review and editing, M.N., S.M., N.Z.J. and M.A.; visualization, M.H.;
supervision, M.N.; project administration, M.N.; funding acquisition, M.F.A. and S.M. All authors
have read and agreed to the published version of the manuscript.
Funding: The authors would like to acknowledge the support provided by the Deanship of Research
Oversight and coordination at King Fahd University of Petroleum and Minerals, Saudi Arabia,
under Research Grant DF191039.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Acknowledgments: The authors would like to acknowledge the support provided by the Deanship
of Research Oversight and coordination at King Fahd University of Petroleum and Minerals, Saudi
Arabia, under Research Grant DF191039.
Conflicts of Interest: The authors declare no conflict of interest.
S8 Yi, Leo, and Kai Miao. “One Solution to Improve the Confidentiality of Customer’s
Private Business Data in SaaS Model”. In 2012 International Conference on Cloud and
Service Computing, pp. 138–142. IEEE, 2012.
S9 Grover, Jitender, and Mohit Sharma. “Cloud computing and its security issues—A
review”. In Fifth International Conference on Computing, Communications and
Networking Technologies (ICCCNT), pp. 1–5. IEEE, 2014.
S10 Girma, Anteneh, Moses Garuba, and Jiang Li. “Analysis of security vulnerabili-
ties of cloud computing environment service models and its main characteristics”.
In 2015 12th International Conference on Information Technology-New Generations,
pp. 206–211. IEEE, 2015.
S11 Murray, Acklyn, Geremew Begna, Ebelechukwu Nwafor, Jeremy Blackstone, and Wayne
Patterson. “Cloud service security & application vulnerability”. In SoutheastCon
2015, pp. 1–8. IEEE, 2015.
S12 Tiwari, Pradeep Kumar, and Sandeep Joshi. “A review of data security and privacy is-
sues over SaaS”. In 2014 IEEE International Conference on Computational Intelligence
and Computing Research, pp. 1–6. IEEE, 2014.
S13 Shariati, S. Mahdi, and M. Hossein Ahmadzadegan. “Challenges and security issues
in cloud computing from two perspectives: Data security and privacy protection”.
In 2015 2nd International Conference on Knowledge-Based Engineering and Innova-
tion (KBEI), pp. 1078–1082. IEEE, 2015.
S14 Pandey, Subhash Chandra. “An efficient security solution for cloud environment”.
In 2016 International Conference on Signal Processing, Communication, Power and
Embedded System (SCOPES), pp. 950–959. IEEE, 2016.
S15 Jana, Bappaditya, Jayanta Poray, Tamoghna Mandal, and Malay Kule. “A multilevel
encryption technique in cloud security”. In 2017 7th International Conference on
Communication Systems and Network Technologies (CSNT), pp. 220–224. IEEE, 2017.
S16 Kaura, Wg Cdr Nimit, and Abhishek Lal. “Survey paper on cloud computing secu-
rity”. In 2017 International Conference on Innovations in Information, Embedded and
Communication Systems (ICIIECS), pp. 1–6. IEEE, 2017.
S17 Suraj, A.R., Sneha Janani Shekar, and G.S. Mamatha. “A robust security model for
cloud computing applications”. In 2018 International Conference on Computation of
Power, Energy, Information and Communication (ICCPEIC), pp. 018–022. IEEE, 2018.
S18 Akinrolabu, Olusola, Steve New, and Andrew Martin. “Assessing the security risks
of multicloud saas applications: A real-world case study”. In 2019 6th IEEE Inter-
national Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th
IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom),
pp. 81–88. IEEE, 2019.
S19 Narang, Ashima, and Deepali Gupta. “A Review on Different Security Issues and
Challenges in Cloud Computing”. In 2018 International Conference on Computing,
Power and Communication Technologies (GUCON), pp. 121–125. IEEE, 2018.
S20 Almorsy, Mohamed, John Grundy, and Amani S. Ibrahim. “Tossma: A tenant-oriented
saas security management architecture”. In 2012 IEEE fifth international conference
on cloud computing, pp. 981–988. IEEE, 2012.
S21 Saleh, Eyad, Johannes Sianipar, Ibrahim Takouna, and Christoph Meinel. “SecPlace:
A Security-Aware Placement Model for Multi-tenant SaaS Environments”. In 2014
IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th
Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on
Scalable Computing and Communications and Its Associated Workshops, pp. 596–602.
IEEE, 2014.
S22 Kim, Donghoon, and Mladen A. Vouk. “A survey of common security vulnerabilities
and corresponding countermeasures for SaaS”. In 2014 IEEE Globecom Workshops
(GC Wkshps), pp. 59–63. IEEE, 2014.
Appl. Sci. 2022, 12, 3953 24 of 29
S23 Saa, Pablo, Oswaldo Moscoso-Zea, Andrés Cueva Costales, and Sergio Luján-Mora.
“Data security issues in cloud-based Software-as-a-Service ERP”. In 2017 12th Iberian
Conference on Information Systems and Technologies (CISTI), pp. 1–7. IEEE, 2017.
S24 Patil, Sulabha, Raiiv Dharaskar, and Vilas Thakare. “Digital Forensic in Cloud: Critical
Analysis of Threats and Security in IaaS, SaaS and PaaS and Role of Cloud Service
Providers”. In 2017 International Conference on Computing, Communication, Control
and Automation (ICCUBEA), pp. 1–7. IEEE, 2017.
S25 Maheshwari, Ritu, Aayushi Toshniwal, and Avnish Dubey. “Software As A Service Ar-
chitecture and its Security Issues: A Review”. In 2020 Fourth International Conference
on Inventive Systems and Control (ICISC), pp. 766–770. IEEE, 2020.
S26 Moghaddam, Faraz Fatemi, Mohammad Ahmadi, Samira Sarvari, Mohammad Es-
lami, and Ali Golkar. “Cloud computing challenges and opportunities: A survey”.
In 2015 1st International Conference on Telematics and Future Generation Networks
(TAFGEN), pp. 34–38. IEEE, 2015.
S27 Bokhari, Mohammad Ubaidullah, Qahtan Makki, and Yahya Kord Tamandani. “A survey
on cloud computing.” In Big Data Analytics, pp. 149–164. Springer, Singapore, 2018.
S28 Tianfield, Huaglory. “Security issues in cloud computing”. In 2012 IEEE International
Conference on Systems, Man, and Cybernetics (SMC), pp. 1082–1089. IEEE, 2012.
S29 Banka, Ankit, Anshul Saravgi, Mangal Sain, and Hoon Jae Lee. “Exploration of
security parameters to evaluate SaaS”. In 2013 Fourth International Conference on
Computing, Communications and Networking Technologies (ICCCNT), pp. 1–6.
IEEE, 2013.
S30 Chouhan, Pushpinder Kaur, Feng Yao, and Sakir Sezer. “Software as a service:
Understanding security issues”. In 2015 science and information conference (sai),
pp. 162–170. IEEE, 2015.
S31 Ahmed, Iqbal. “A brief review: security issues in cloud computing and their solu-
tions.” Telkomnika 17, no. 6 (2019).
S32 Kanickam, S. Hendry Leo, L. Jayasimman, and A. Nisha Jebaseeli. “A survey on layer
wise issues and challenges in cloud security”. In 2017 World Congress on Computing
and Communication Technologies (WCCCT), pp. 168–171. IEEE, 2017.
S33 Nowrin, Itisha Nowrin, and Fahima Khanam Khanam. “Importance of Cloud Deploy-
ment Model and Security Issues of Software as a Service (SaaS) for Cloud Computing”.
In 2019 International Conference on Applied Machine Learning (ICAML), pp. 183–186.
IEEE, 2019.
S34 Ahmed, Hussam Alddin S., Mohammed Hasan Ali, Laith M. Kadhum, Mohamad
Fadli Zolkipli, and Yazan A. Alsariera. “A review of challenges and security risks of
cloud computing”. Journal of Telecommunication, Electronic and Computer Engineer-
ing (JTEC) 9, no. 1–2 (2017): 87–91.
S35 Aljawarneh, Shadi A., and Muneer O. Bani Yassein. “A conceptual security frame-
work for cloud computing issues”. International Journal of Intelligent Information
Technologies (IJIIT) 12, no. 2 (2016): 12–24.
S36 Díaz de León Guillén, Miguel Ángel, Víctor Morales-Rocha, and Luis Felipe Fernández
Martínez. “A systematic review of security threats and countermeasures in SaaS”.
Journal of Computer Security Preprint: 1–19.
S37 Srinivasu, N., O. Sree Priyanka, M. Prudhvi, and G. Meghana. “Multilevel classifica-
tion of security threats in cloud computing”. International Journal of Engineering and
Technology (UAE) 7, no. 1.5 (2018): 253–257.
S38 Sinjilawi, Yousef K., Mohammad Q. Al-Nabhan, and Emad A. Abu-Shanab. “Ad-
dressing Security and Privacy Issues in Cloud Computing”. Journal of Emerging
Technologies in Web Intelligence 6, no. 2 (2014).
S39 Kaur, S., and S. Khurmi. “A review on security issues in cloud computing”. IJCST Int.
J. Comput. Sci. Technol 7, no. 1 (2016).
Appl. Sci. 2022, 12, 3953 25 of 29
S58 Kaur, Puneet Jai, and Sakshi Kaushal. “Security concerns in cloud computing”.
In international conference on high performance architecture and grid computing,
pp. 103–112. Springer, Berlin, Heidelberg, 2011.
References
1. Kundu, A.; Banerjee, A.; Saha, P. Introducing new services in cloud computing environment. Int. J. Digit. Content Technol. Appl.
AICIT 2010, 4, 143–152.
2. Alshehri, M. An effective mechanism for selection of a cloud service provider using cosine maximization method. Arab. J. Sci.
Eng. 2019, 44, 9291–9300. [CrossRef]
3. Che, J.; Duan, Y.; Zhang, T.; Fan, J. Study on the security models and strategies of cloud computing. Procedia Eng. 2011, 23,
586–593. [CrossRef]
4. Nasr, A.A.; El-Bahnasawy, N.A.; Attiya, G.; El-Sayed, A. Cost-effective algorithm for workflow scheduling in cloud computing
under deadline constraint. Arab. J. Sci. Eng. 2019, 44, 3765–3780. [CrossRef]
5. Arunkumar, G.; Venkataraman, N. A novel approach to address interoperability concern in cloud computing. Procedia Comput.
Sci. 2015, 50, 554–559. [CrossRef]
6. Goumidi, H.; Aliouat, Z.; Harous, S. Vehicular cloud computing security: A survey. Arab. J. Sci. Eng. 2020, 45, 2473–2499.
[CrossRef]
Appl. Sci. 2022, 12, 3953 28 of 29
7. Chen, Y.-S.; Wu, C.; Chu, H.-H.; Lin, C.-K.; Chuang, H.-M. Analysis of performance measures in cloud-based ubiquitous SaaS
CRM project systems. J. Supercomput. 2018, 74, 1132–1156. [CrossRef]
8. Humayun, M. Role of emerging IoT big data and cloud computing for real time application. Int. J. Adv. Comput. Sci. Appl. 2020,
11, 494–506. [CrossRef]
9. Statista. Global Public Cloud Application Services (SaaS) Market Size 2015–2022. Available online: https://www.statista.com/sta
tistics/505243/worldwide-software-as-a-service-revenue/#:~{}:text=Global%20public%20cloud%20application%20services%
20(SaaS)%20market%20size%202015%2D2022&text=In%202021%2C%20the%20software%20as,approximately%20145.5%20bill
ion%20U.S.%20dollars (accessed on 6 April 2021).
10. Kumar, P.R.; Raj, P.H.; Jelciana, P. Exploring data security issues and solutions in cloud computing. Procedia Comput. Sci. 2018,
125, 691–697. [CrossRef]
11. C. Report. Cloud Traffic Projected to Represent 95% of Global Data Center Traffic by 2021: Study. CIO.com. The Economics Time.
2018. Available online: https://cio.economictimes.indiatimes.com/news/cloud-computing/cloud-traffic-projected-to-repres
ent-95-of-global-data-center-traffic-by-2021-study/62815965 (accessed on 6 April 2021).
12. Asadi, Z.; Abdekhoda, M.; Nadrian, H. Cloud computing services adoption among higher education faculties: Development of a
standardized questionnaire. Educ. Inf. Technol. 2020, 25, 175–191. [CrossRef]
13. Luo, X.; Zhang, W.; Li, H.; Bose, R.; Chung, Q.B. Cloud computing capability: Its technological root and business impact. J. Organ.
Comput. Electron. Commer. 2018, 28, 193–213. [CrossRef]
14. Freet, D.; Agrawal, R.; John, S.; Walker, J.J. Cloud forensics challenges from a service model standpoint: IaaS, PaaS and SaaS.
In Proceedings of the 7th International Conference on Management of Computational and Collective intElligence in Digital
EcoSystems, Caraguatatuba, Brazil, 25–29 October 2015; pp. 148–155.
15. Microsoft Azure. What are Public, Private, and Hybrid Clouds? An Intro to Cloud Service Deployment Options. Available online:
https://azure.microsoft.com/en-us/overview/what-are-private-public-hybrid-clouds/ (accessed on 6 April 2021).
16. Felter, B. The Different Types of Cloud Computing and How They Differ. 2021. Available online: https://prooncall.com/the-di
fferent-types-of-cloud-computing-and-how-they-differ/ (accessed on 6 April 2021).
17. Palos-Sanchez, P.R.; Arenas-Marquez, F.J.; Aguayo-Camacho, M. Cloud computing (SaaS) adoption as a strategic technology:
Results of an empirical study. Mob. Inf. Syst. 2017, 2017, 2536040. [CrossRef]
18. Top 5 Advantages of Software as a Service (SaaS). IBM Cloud Team. 2020. Available online: https://www.ibm.com/cloud/blog
/top-5-advantages-of-software-as-a-service (accessed on 6 April 2021).
19. Watts, M.R.S. SaaS vs. PaaS vs. IaaS: What’s The Difference & How To Choose. BMC. 2019. Available online: https://www.bmc.
com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/ (accessed on 6 April 2021).
20. Soofi, A.A.; Khan, M.I.; Talib, R.; Sarwar, U. Security issues in SaaS delivery model of cloud computing. Int. J. Comput. Sci. Mob.
Comput. 2014, 3, 15–21.
21. Popović, K.; Hocenski, Ž. Cloud computing security issues and challenges. In Proceedings of the 33rd International Convention
MIPRO, Opatija, Croatia, 24–28 May 2010; pp. 344–349.
22. Patel, N.S.; Rekha, B. Software as a Service (SaaS): Security issues and solutions. Int. J. Comput. Eng. Res. 2014, 4, 68–71.
23. Lau, W. A Comprehensive Introduction to Cloud Computing. RedGate Hub. 2011. Available online: https://www.red-gate.com
/simple-talk/cloud/platform-as-a-service/a-comprehensive-introduction-to-cloud-computing/ (accessed on 6 April 2021).
24. Hoener, P. Cloud Computing Security Requirements and Solutions: A Systematic Literature Review. Bachelor’s Thesis, University
of Twente, Enschede, The Netherlands, 2013.
25. Hashizume, K.; Rosado, D.G.; Fernández-Medina, E.; Fernandez, E.B. An analysis of security issues for cloud computing. J.
Internet Serv. Appl. 2013, 4, 5. [CrossRef]
26. Juárez, D.X.J.; Cedillo, P. Security of mobile cloud computing: A systematic mapping study. In Proceedings of the 2017 IEEE
Second Ecuador Technical Chapters Meeting (ETCM), Salinas, Ecuador, 16–20 October 2017; pp. 1–6.
27. da Silva, C.M.R.; da Silva, J.L.C.; Rodrigues, R.B.; do Nascimento, L.M.; Garcia, V.C. Systematic mapping study on security threats
in cloud computing. arXiv 2013, arXiv:1303.6782.
28. Zhou, M.; Zhang, R.; Xie, W.; Qian, W.; Zhou, A. Security and privacy in cloud computing: A survey. In Proceedings of the 2010
Sixth International Conference on Semantics, Knowledge and Grids, Beijing, China, 1–3 November 2010; pp. 105–112.
29. Shankarwar, M.U.; Pawar, A.V. Security and privacy in cloud computing: A survey. In Proceedings of the 3rd International
Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, Bhubaneswar, India, 14–15 November
2014; Springer: Cham, Switzerland, 2015; pp. 1–11.
30. Hussein, N.H.; Khalid, A. A survey of cloud computing security challenges and solutions. Int. J. Comput. Sci. Inf. Secur. 2016,
14, 52.
31. Kumbhar, N.N.; Chaudhari, V.V.; Badhe, M.A. The comprehensive approach for data security in cloud computing: A survey. Int.
J. Comput. Appl. 2012, 39, 23–29.
32. Tom, E.; Aurum, A.; Vidgen, R. An exploration of technical debt. J. Syst. Softw. 2013, 86, 1498–1516. [CrossRef]
33. Garousi, V.; Felderer, M.; Mäntylä, M.V. The need for multivocal literature reviews in software engineering: Complementing
systematic literature reviews with grey literature. In Proceedings of the 20th International Conference on Evaluation and
Assessment in Software Engineering, Limerick, Ireland, 1–3 June 2016; pp. 1–6.
Appl. Sci. 2022, 12, 3953 29 of 29
34. Kitchenham, B.; Brereton, O.P.; Budgen, D.; Turner, M.; Bailey, J.; Linkman, S. Systematic literature reviews in software
engineering–a systematic literature review. Inf. Softw. Technol. 2009, 51, 7–15. [CrossRef]
35. Garousi, V.; Mäntylä, M.V. When and what to automate in software testing? A multivocal literature review. Inf. Softw. Technol.
2016, 76, 92–117. [CrossRef]
36. Garousi, V.; Felderer, M.; Hacaloğlu, T. Software test maturity assessment and test process improvement: A multivocal literature
review. Inf. Softw. Technol. 2017, 85, 16–42. [CrossRef]
37. Bhatta, N. Emerging ethical challenges of leadership in the digital era: A Multivocal literature review. Electron. J. Bus. Ethics
Organ. Stud. 2021, 26, 30–46.