The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


A Contrivance to Encapsulate Virtual Scaffold with Comments and Notes

CLOUD is an elision of Common Location-independent Online Utility available on-Demand and is based on Service Oriented Architecture (SOA). Today a chunk of researchers were working towards contrivance based on multi-tenant aware Software as a Service (SaaS) application development and still a precise pragmatic solution remains a challenge among the researchers. The first step towards resolving solution is to enhance the virtual scaffold and propose it as a System under Test (SuT). The entire work is proposed as a Model View Controller (MVC) where the tenant login through the View and write their snippet code for encapsulation. The proposed VirScaff schema acts as Controller and provides authentication and authorization by role/session assignment for tenant and thus helps to access data from the dashboard (Viz., Create, Read, Update and Delete (CRUD)). The SuT supports and accommodates both SQL and Not only Structured Query Language (NoSQL) dataset. Finally, this paper construed that SuT behaves well for both SQL and NoSQL dataset in terms of time and space complexities. To sum-up, the entire work addresses the challenges towards multitenant aware SaaS application development and highly commendable while using NoSQL dataset.


[1] Balasubramanian N. and Suguna J., “A Virtual Scaffold for Storage Multi-Tenant SaaS Data Models,” International Journal of Applied Engineering Research, vol. 10, no. 20, pp. 40775-40780, 2015.

[2] Balasubramanian N. and Jayapal S., “Rumination on Scaffold Pattern Language for Multi-Tenant SaaS Application Development,” International Journal of Control Theory and Application, vol. 9, no. 16, pp. 8257-8265, 2016.

[3] Balasubramanian N. and Jayapal S., “Enhanced Scaffold Design Pattern for Seclude Multi-tenant SaaS Application,” in Proceedings of 1st International Conference on Computational Intelligence and Informatics, Hyderabad, pp. 671-680, 2016.

[4] Dede E., Govindaraju M., Gunter D., Canon R., and Ramakrishnan L., “Performance Evaluation of a mongo DB and Hadoop Platform for Scientific Data Analysis,” in Proceedings of 4th ACM Workshop on Scientific Cloud Computing, Tucson, pp. 13-20, 2013.

[5] Fehling C., Leymann F., Retter R., Schumm D., and Schupeck W., “An Architectural Pattern Language Of Cloud-Based Applications,” in Proceedings of 18th Conference on Pattern Languages of Programs, Portland Oregon USA, pp. 13-20, 2011.

[6] Ferraiolo D., Sandhu R., Gavrila S., Kuhn D., and Chandramouli R., “Proposed NIST Standard for Role-Based Access Control,” ACM A Contrivance to Encapsulate Virtual Scaffold with Comments and Notes 345 Transactions on Information and System Security, vol. 4, no. 3, pp. 224-274, 2001.

[7] Ferralolo D. and Richard K., “Role-Based Access Control,” in Proceedings of 15th National Computer Security Conference, Baltimore, pp. 554-563, 1992.

[8] Habiba M., Islam M., and Ali A., “Access Control Management for Cloud,” in Proceedings of 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, pp. 485-492, 2013.

[9] Hammes D., Medero H., and Mitchell H., “Comparison of NoSQL and SQL Databases in the Cloud,” in Proceedings of the Southern Association for Information Systems Conference, Macon, pp. 1-8, 2014.

[10] Han J., Song M., and Song J., “A Novel Solution of Distributed Memory NoSQL Database for Cloud Computing,” in Proceedings of 10th IEEE/ACIS International Conference on Computer and Information Science, Sanya, pp. 351-355, 2011.

[11] Hou D., Zhang S., and Kong L., “Placement of SaaS Cloud Data and Dynamically Access Scheduling Strategy,” in Proceedings of 8th International Conference on Computer Science and Education, Colombo, pp. 834-838, 2013.

[12] Hui M., Jiang D., Li G., and Zhou Y., “Supporting Database Applications As A Service,” in Proceedings of IEEE 25th International Conference on Data Engineering, Shanghai, pp. 832-843, 2009.

[13] Jacobs D. and Aulbach S., “Ruminations on Multi-Tenant Databases,” in Proceedings of Datenbanksysteme in Business, Technologie and Web, Aachen, pp. 514-521, 2007.

[14] Marinho T., Cidreira V., Claro D., and Mane B., “Midas: A middleware to Provide Interoperability between SaaS and DaaS,” in Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing, Brazilian, pp. 401-408, 2016.

[15] Mehar D., Vishwakarma G., and Jain Y., “Modified Fine-Grained Data Access Control Algorithms for File Storage Cloud,” International Journal of Computer Applications, vol. 116, no. 22, pp. 15-19, 2015.

[16] Ni J., Li G., Zhang J., Li L., and Feng J., Adapt: Adaptive Database Schema Design for Multi- Tenant Applications,” in Proceedings of 21st ACM International Conference on Information and Knowledge Management, pp. 2199-2203, 2012.

[17] Okman L., Gal-Oz N., Gonen Y., Gudes E., and Abramov J., “Security Issues in Nosql Databases,” in Proceedings of 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, pp. 541-547, 2011.

[18] Solomon M., Sunderam V., and Xiong L., “Towards Secure Cloud Database with Fine- Grained Access Control,” in Proceedings of IFIP Annual Conference on Data and Applications Security and Privacy, Vienna, pp. 324-338, 2013.

[19] Tang B., Sandhu R., and Li Q., “Multi‐Tenancy Authorization Models for Collaborative Cloud Services,” Concurrency and Computation: Practice and Experience, vol. 27, no. 11, pp. 2851-2868, 2015.

[20] Tang B., Li Q., and Sandhu R., “A Multi-Tenant RBAC Model for Collaborative Cloud Services,” in Proceedings of 11th Annual Conference on Privacy, Security and Trust, Tarragona, pp. 229- 238, 2013.

[21] Tudorica B. and Bucur C., “A Comparison between Several Nosql Databases with Comments and Notes,” in Proceedings of RoEduNet International Conference 10th Edition: Networking in Education and Research, Iasi, pp. 1-5, 2011.

[22] Xiaorong C. and Tianqi L., “A Trusted Virtual Network Construction Method Based on Data Source Dependencies,” The International Arab Journal of Information Technology, vol. 16, no. 5, pp. 889-893, 2019.

[23] Yu S., Wang C., Ren K., and Lou W., “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing,” in Proceedings IEEE INFOCOM, San Diego, pp. 1- 9, 2010. 346 The International Arab Journal of Information Technology, Vol. 17, No. 3, May 2020 Nagarajan Balasubramanian completed his bachelor’s of Science in Computer Science from Sri Sankara Arts and Sciece College, Kanchipuram, India in 1995. He has completed his Master of Computer Applications (MCA) from Arunai Engineering College, Tiruvannamalai, India in 1998 and his Master of Philosophy in Computer Science from Bharathiar university in 2006. He recently (on 09 December 2019) defended successfully his Phd., Thesis at R&D center, Department of Computer Science, Bharathiar University, Coimbatore, India. He has around 20 + years of teaching experience at Master degree. His research interest were Cloud storage and security. Suguna Jayapal received the Master’s degree in mathematics from Annamalai University, Chidambaram in 1988 and the Ph.D. degree in Computer Science from the Bharathiar University, Coimbatore in 2009. She is currently an Associate Professor with the Department of Computer Science, Vellalar College for Women (Autonomous), Erode, Tamil Nadu. Her research interests are AI, Data Mining, Text Mining and Image Processing. She is the author or co-author of over 30 publications in journals, conference proceedings and book chapters. She has presented a paper in an International Conference held at Cincinnati University, Cincinati, Ohio, USA. She has produced over 22 M.Phil. Scholars, 2 Ph.D. Scholars in Computer Science and guiding 6 Ph.D. Scholars at present. Completed one Mnor Research Project funded by UGC. Satheeshkumar Janakiraman is with the Department of Computer Applications, School of Computer Science and Engineering, Bharathiar University, Coimbatore, Tamil Nadu, India. He received his Masters in Computer Applications (MCA) during 1999 and Doctor of Philosophy during 2010. He is having 18 plus years of research and teaching experience. He has published more than 140 research articles in reputed journals and conference proceedings. He is the member of IEEE, IETE and CSI. He completed two research projects under university grants commission and one collaborative project for the funding of 60 lakhs under the Department of Science and Technology (DST). He acted as an organizing secretary for various international conferences and chaired sessions in international and national conferences. His area of specialization includes soft computing, networks, Image processing and medical imaging. He is an eminent speaker who visited and delivered speech in more than 125 institutions. He is an identifiable researcher in the area of Indian Music and its influence on human brain.