Vous êtes sur la page 1sur 13

Software-as-a-Service [Saas Applications]:

The Role of Software-as-a-Service in Cloud


Computing
Renuka Bathula
Department of Computer Science,
Virginia Commonwealth University (VCU),
Richmond, USA.
bathular@mymail.vcu.edu

Abstract— Cloud computing is informed by the act of sharing The hybrid cloud is more technical in operations as the
resources such as software, hardware, and network. It is a form of organization will give and manager few resources both
internet computing since it can run the program from and on many internal and externally [4]. These lead us to understate that
computers at the same time. In essence, cloud computing is divided software-as-a-service is a form of cloud service that provides
into three categories which include: platform as a service, software-
as-a-service as well as infrastructure as a service [3]. The concerns
software services over the internet. The essence of software-
on this paper are software-as-a-service (SaaS) which is a cloud as-a-service is to enhance operations between business and
computing service model that gives several benefits to the customers, between individuals as well as giving numerous
consumers. However, the three models meet different goals, but merits to the clients. However, for organizations to realize the
they complement each other. Hence they are applied or instead benefits of the SaaS, it is essential to generate the SaaS quality
used simultaneously. Software-as-a-service is one of the top paradigm shift. It is also important to look at the architecture
software distribution model used in is the cloud computing. The strategies as well as the data center challenges [4]. Software-
objective of this paper is to review the current state of the art of the as-a-service has occasionally been indicated as on-demand
cloud computing, discuss its challenges, the architecture strategies, software where the software, as well as related data, is put on
data models as well as the benefits, characteristics and challenges
architecture strategies of software-as-a-service [6] The paper also
the cloud. Users gain access by consuming a thin client via the
focused on performance evaluation of SaaS based models and website browser. Software-as-a-service over the time has
presented the results. The demand and real world implementations turned into a public form of a distributed prototype for many
of SaaS models are presented by looking through some case studies. enterprises applications [5]. Some of the notable business
application utilizing SaaS includes enterprise resource
Keywords: software-as-a-service, cloud computing, data model, planning, customer relationship management, human resource
features of SaaS, architecture, design. management as well as the association and accounting.
Through the SaaS applications, a business can achieve,
I. INTRODUCTION compatibility, there is the worldwide accessibility of
Cloud computing is a form of distributed computing information, less severe in administration among other
through the internet, and it involves the sharing of software, benefits. However, these benefits are not realized each of the
hardware as well as network. Ideally, cloud computing three categories of cloud computing complementing each
delivers hosted services by the service provider via the internet other. Therefore, there many importance of software-as-a-
to the consumers of that particular service. Cloud computing services in cloud computing [5].
as mentioned in the abstract has three essential functions such
as the platform as a service, infrastructure as a service and the Software-as-a-service play an integral role in cloud
platform as a service [1]. Through cloud computing capability, computing, and therefore, it is paramount importance. SaaS is
services provided are sold on demand either in hours or entirely turnkey application like the plant engineering
minutes and clients have the privilege to access the services management, the enterprise resource management and others
they want at any given time, or at their convenient time. These which can be accessed through a web browser regardless of
services are controlled, regulated and managed by service the location. SaaS is essential in cloud computing as it helps
providers [1].Excellent and reputable service provider on a organization managers to obtain data which enable them to
global scale includes organization such as Google, Amazon make critical decisions in critical areas such as finance, the
and the IBM among others. manufacturing cycle times, the plant engineering, human
resource capital planning as well as the vendor management
Cloud can either be private, hybrid or even public. As [6]. It is also essential to note that software-as-a-service in
the word suggests, the public cloud will sell everything cloud computing can be used as a business intelligence tool by
through the internet. On the contrary, private cloud involves a decision makers in a manufacturing firm. For instance, the
proprietary data center that offers service to specific clients. SaaS tools can have the ability to equip the decision maker
with information regarding the metric goals to be achieved And to approach that various technologies that are used to
about material handling time, the cycle time, as well as the cloud computing are discussed as well as a survey of the
change over time. Through SaaS, it is easy today for learners popular cloud computing products [7]. Some of the
to enjoy the services of cloud computing. This has led to technologies used include the data centers, distributed file
distance teach [6]. Higher learning institutions such as systems as well as the distributed application framework over
universities and colleges have embraced cloud computing, and clouds. The data center is central to the cloud as it is a home
the distance learning programs have been on the increase. for storage and computation power. Data center consist
Many students are accepting and preferring the platform as it thousands of devices like the servers, the routers as well as
is more flexible, less costly and convenient for those would switches. It is essential for an engineer to do proper planning
prefer working while learning. of the infrastructure when designing since it heavily influence
the performance in a distributed environment [7]. While
II. PROBLEM STATEMENT creating the data centers, things such as scalability as well as
There has been a continuous increase in the amount resiliency features need to be considered.
of data generated by a business enterprise which is occurring
due to the increased application of the information system to Currently, the basic approach to architecture design
the business. The increase in the information produced by the of the cloud computing network is the layered approach
company is making data storage and security a big problem foundation. This approach has been tested in some of the
for business firms. As the technology advanced, there has been world largest data centers. The underlying layers of the data
an emergence of a new technology known as cloud computing center include the core, the aggregation as well as the data
that provides a platform for sharing hardware, the software as access layer. The access point is the point where servers
well as the network over the internet [6]. Cloud computing is physically connect to the network and servers are arranged in
working on three platforms which complements each other. racks each consisting about 20 to 40 frames [9]. With those
These platforms include the software-as-a-service, the technologies applied more efficiently and effectively, it is now
platform as service and the infrastructure as a service. In this becoming easy and faster to extract any form of data from the
case, software as a function has been utilized in the business; cloud host. The software-as-a-services have revolutionized
it allows efficiency in industry in that an organization does not mobile computing since even with a simple device such as
have to purchase the program or instead develop it, but it can Google watch and glass; an individual can store data and
buy [7]. It is even more comfortable in the error of the internet retrieve it when the need to use arise. The current state of the
of things as an organization can browse over the World Wide art of cloud computing is making it possible for a business
Web. However, despite the cloud computing contributing executive to run the operations even from remote areas [9]. An
hugely to businesses in the form of ensuring data security, entire organization data can be stored in the phone in the form
massive data storage and high rate of computation, there is of an application program. Operations have been made it
less research which has been done on the software-as-a- easier by cloud computing technology through the SaaS
service [7]. This paper, therefore, focus on the importance of platform.
the software-as-a-service in cloud computing, as well as the
characteristics of the software-as-a-service. IV. CLOUD COMPUTING ARCHITECTURE.
This part of the paper explains the architectural, the
III. CLOUD COMPUTING CURRENT STATE-OF THE ART. business as well as other operations models of cloud
In recent time, cloud computing has emerged as the computing. The cloud computing technology can be divided to
new paradigm distributing and hosting services over the for essential layers that are the hardware/ data center, the
internet. It continues to be adopted and implemented by platform layer, the infrastructure layer as well as the
business as it facilitates an enterprise to start small and application layer [9].
increase the amount of the resources as the services demand
increases [7]. Even though cloud computing is offering many A. The hardware layer
benefits to enterprises; it has not fully penetrated the market as The critical function of this layer is to manage all
it is still in its infancy stage. However, from the words of John physical resources of the cloud such as the powers, the
McCarthy in 1960, we can claim that cloud computing is not switches, the cooling system as well as the routers and servers.
new a new phenomenon as he had envisioned that computing Practically, hardware can only be implemented in the data
facilities would be offered to the public as a utility and that is centers. In essence data center consist of many servers that are
what is happening today. Cloud has been used in different arranged in racks and connected to the switches and routers
context explain the huge automated teller machine networks in [9]. Some of the critical functions that occur at hardware layer
the 1990s. However, in the year 2006, the Google CEO Eric include the power and cooling resource management, the
Schmidt used the cloud as a business model used in providing hardware configuration, the traffic management as well as the
services over the internet [7]. fault tolerance. All these functions are necessary as they help
facilitate the software-as-a-service function effectively.
The state –of –the –art of cloud computing in this
paper is based on the implementations of cloud computing.
B. The infrastructure layer engines operate this layer to give API support such storage;
It is also referred to as the virtualization layer, and it database, as well as the business logic of the websites, can
a pool for storage as well as computing resources. It is very effectively be implemented.
critical and integral layer of cloud computing technology since
most of the features in cloud computing are made visible D. Application layer
through virtualization [1]. In the architectural designs of the cloud computing,
this is the highest layer in the hierarchy, and it hosts the actual
cloud applications. A cloud application is different from the
traditional form in that the former can leverage the automatic
–scaling feature to improve on the performance, reduce the
operation cost as well as making information available in real
time [1].

TABLE I
CLOUD ARCHITECTURE MODELS AND THEIR KEY AREAS OF
FOCUS.

Cloud architecture Key architectural focus areas


models
Amazon EC2 Simple storage and relational
database services for enterprises
Cloud security Enterprise security
alliance
Cisco IT data centers and networks
IBM Cloud service management
Storage networking IT cloud storage
Fig. 1. Cloud computing architecture industry association
Windows Azure Microsoft data center
applications
C. Platform layer.
This layer is built above the infrastructure layer and it
essential for complementing the cloud computing function as V. CLOUD COMPUTING- AS BUSINESS MODEL
it houses the operating systems as well as the application As mentioned in the previous section of this paper,
frameworks [1]. The reason for having platform layer is to cloud computing employs a business service driven model.
reduce the burden of direct deployment of the applications on That means the hardware and platform resources are offered as
to the VM containers. For instance, the Google application services on demand. It is evidence that cloud offer services
which can be grouped into three categories that is a platform
as service, software-as-a-service as well as the infrastructure
as a service [11]. However, in business practice, and
considering the multi-architecture design, it is possible for the
PaaS provider to manage its cloud on top or above the IaaS
provider’s cloud. In today corporate world, both the IaaS and
PaaS are part of the same organization, and a good example is
the Google and Salesforce, and that becomes the reason why
the IaaS and the PaaS are regarded as cloud providers (Mamta
Meena, 2016).

However, before moving the business application to


the cloud, it is essential to consider many factors and make it
clear what you want to achieve with the cloud computing. For
instance, most of the organization wants to lower the operation
cost, others want to reach a high customer service level, and
others are after a high level of reliability as well as the security
needs and concerns [11]. It is essential to be aware of the
different types of cloud, their benefits as well as drawbacks.
Fig. 2. Layer level diagram of Cloud computing architecture There exist three types of cloud namely: public cloud, private
cloud, and the hybrid cloud. Private cloud is used exclusively database [15]. However, in cloud computing technology, most
to house single organization operations as it provides a high of the data model a build by the SQL data model and therefore
level of reliability, performance as well as the security needs working on NoSQL will demand a complete re-writing of the
of the data [11]. In the public cloud, the service provider will codes so that other applications can run effectively [15].
provide their services to the general cloud. There are various
benefits attached to the public cloud in that no requirement VII. CHALLENGES OF CLOUD COMPUTING
initial capital for investment. But one major drawback of the Cloud computing has played a critical role in the
public cloud is that it lacks an excellent grained control over development and growth of the business. It has played an
the data, thus exposing the data to higher risk and integral role in ensuring data is efficiently stored and that its
vulnerabilities in which systems can easily tamper. The hybrid security is enhanced. However despite the many benefits, their
cloud takes into a combination of both the private and public many challenges on equal measures [15]. Some of the
model, and it sought to address the weakness of the two obstacles are explained as follows:
models [11].
A. The bandwidth and performance.
VI. THE LOGICAL DATA MODEL FOR CLOUD COMPUTING. Ideally, business firms will save a considerable
Ideally, Cloud computing creates a virtual working amount of money on the hardware but equally spend more on
environment when more than one computers can share the bandwidth. The cost will be low for small applications but
network making it easy for data exchange and computation. will be very high for data-intensive applications. It is a
Organization data is enormous, and there is a need for multiple common knowledge that delivering or instead of distributing a
data centers to collaborate since it becomes inevitable in the highly complex and intensive data will need a sufficient
current corporate world to transmit data on a single data center bandwidth [15]. The scenario explained is making business to
[14].The section, therefore, focuses on the data models which wait for reduced operating cost before adopting and
are anchored by the existing cloud base storage. These models implementing the cloud computing. However, the challenge
are used to address multiple challenges that occur in the cause should not be referred to as a roadblock but rather should be
of transmission and storage as well as during retrieval given a sound and serious considerations to find how issues
services. will be addressed out even before adopting the cloud
technology [16].
Entity relationship model- this is widely used in the
conceptual level data model. In other words, the entity-
relationship model is a visual representation of various data
using techniques that describe how data are related [14]. The
entity-relationship model is used during the development
process to determine the relationship that exists between the
three key elements which are an entity, the attribute as well as
the contact. A substance either represents the event, person or
object that is relevant to the particular system while the quality
is the characteristic of that entity whereas the relationship
describes the interaction of the substances [14].

Through the entity relationship diagram data model,


the designer can communicate the relationship effectively with
the customers, the software developers as well as the end users
who are end users regardless of their knowledge on the
information technology [14]. This model is efficient as it can
be used to translate data into tables which can be interpreted in
other software applications. This model is also essential in the
organization as it can be used to explain the relationship of
operations within the organizations. However, there is a need
for continuous improvement on the model used, and as a
result, there is a need for conceptual modeling which forces all
players, or rather the partners to review the current as well as
the future business requirements [15].

It is of vital importance to distinguish the cloud


databases that may be non-relational to those which are
relational. Some of the databases that can be run on cloud Fig. 3. Business model of Cloud computing
include the Microsoft SQL, the MySQL as well as the Oracle
B. The interoperability and portability challenges addition, there are several concerns about SaaS solutions as it
. At any time a business considers migrating to cloud is related to the security of enterprise data. Federal
computing, it should consider leveraging relocating in and out Information Security Management Act of NetworkWorld
of the cloud as well as switching providers when they want. It references regulations requires the sensitive data to be kept
is therefore essential for the business to ensure that cloud within the country by the customers. However the access of
technology has the capacity and capabilities to integrate data from anywhere is convenient and reduces the necessity of
smoothly with on-premise information technology. If there is carrying sensitive information by the enterprise employees, it
lacking portability and interoperability feature in the business, can be large risk of a non secure endpoint[7].
then the organization will be incurring the cost of buying new
systems [16]. With the deepening of the application on the Internet, more
and more SaaS service providers consider to build data
security solutions based on SaaS-based applications. SaaS is
C. Security and privacy of the data. very closely integrated with the needs of users. And SaaS has
Though cloud computing is considered as secure a wide variety of functions. Typical examples are Botnet
technology, it has not adequately addressed the security needs detection and monitoring cloud service, DDOS attack
and concerns, and this has been the biggest worry of firms protection cloud service, cloud page filtering, content security
which are thinking of adopting the technology. The managers cloud service, and anti-virus application, cloud spam filtering
worry that a sizeable amount of information will stay out of and prevention, security incident monitoring and warning
the corporate firewall where it may be more vulnerable to cloud service etc. Traditional network security technology has
attack from intruders such as hackers [17]. The cost the difficulty on response speed, defense capability, system
implication of security breach is high, and most organization size and other restrictions. It is complicated to meet the
are resistant to adopt and implement the technology. However, demand of complex security needs. But cloud computing
these risks may be mitigated through the deployment of technology is able to make up for the above shortcomings. The
security applications such as data loss software, use of the cloud computing provides massive storage capacity and large-
encrypted file systems as well as the buying of the security scale computing capacity. The cloud computing can be
hardware [17]. collected in the correlation analysis, security incident, virus
prevention and other aspects. It helps to achieve a significant
improvement in the performance. Ultra-large-scale security
VIII. CHALLENGES OF IMPLEMENTING SOFTWARE-AS- incident information processing platform can be constructed
A_SERVICE APPLICATIONS using cloud computing that increase the security stance in the
SaaS is a cloud computing model that provides entire network. There are various security policy factors that
software over the Internet. Users are not required to purchase affect SaaS cloud services.Some of the challenges for
software, instead need to lease Web-based software from implementing Saas include [17]:
providers. This approach can help to manage business
activities with ease. For example: Baidu cloud server, Ali
A. Multi-tenant Deployment
cloud server [17].
SaaS services typically serve hundreds of clients
SaaS model is based on cloud computing platform based on a standard set of software systems. This
application model. SaaS providers are responsible for building characteristic requires that the SaaS service could be able to
all the necessary information infrastructure, hardware an support the separation of data and configuration between
software platform for enterprises. And also SaaS providers are different tenants. This can ensure the privacy and security of
responsible for ensuring all pre-implementation, post- each tenant's data that makes this approach to can satisfy the
maintenance and a progression of services. Companies are not users' individual needs, such as business logic, interface, data
required to purchase software and hardware and also do not structures, etc. As multiple tenants are supported by the SaaS
need to build machine room and employ IT staff. Only thing at the same time and each tenant has many more users. This
that need to be done is to use the Internet information system. situation has a challenge to the performance, scalability and
Businesses can lease software services to SaaS providers stability of the infrastructure platform that supports the
based on actual needs just like tap water can be tapped. Cloud hardware and software[17].
service providers are responsible to take technical measures to
effectively ensure the security and confidentiality of every B. Network characteristics
enterprises data[17].
The users are provided with services in the form of Internet
browser or WebServices2 Web 2.0 program connection by
However the Saas solutions provide possible cost savings,
Saas services. This feature of network can make SaaS
deeper researchers concludes that while making such changes,
applications explicit typical characteristics of Internet
challenges can become more critical. Hurwtiz & Associates
technologies [17].
also concluded that there is a decrement in the cost savings of
a SaaS model as the number of employees increased [18]. In
C. Pay on-demand model in response time. Saas must guarantee to provide efficient
As SaaS (Software-as-a-service) is a service business model scalability to its customers[22].
for using and delivering software over the Internet. Therefore,
various problems must be considered, such as the, the H. Reliability
measurement of service usage, signing of service contracts,
Is it sensible to trust the cloud? The intended users
the guarantee of online service quality, the collection of
must be provided with a level of truthfulness and trust by the
service fees, etc. These problems are usually not considered by
SaaS application[22].
traditional software[17].

I. Usability
D. Access Control
A Saas application must assure support for ease of use by
Authorized service is the starting point of connecting
different types of users dynamically[22].
enterprises and Cloud SaaS to communicate smoothly. It is
equipped with SSL secure channel in the procedure of network
transmission. User information is obtained by using this J. Data Security
Secure Sockets Layer protocol. Base on user information, the It is ensuring that the user's data is safe from un-
access control record is queried to make a decision whether to authenticated access and it's controlled. An efficient Saas
grant access. This access control list ensures that information application must provide data integrity[22].
is official, and unauthorized users are prohibited to access the
system. However, cloud service providers and cloud tenants
use the same account as the current login cloud service role. K. Security
This approach could make it simple for criminals to access the Saas systems must protect against logical and physical
system [17]. unauthorized access[22].

E. Network Security and Physical Security L. Ownership of Data


The basic guarantees for SaaS service provision are SaaS providers should assure user's data protection
network security and physical security. The basis for without compromising the ownership details[22].
enterprise users is that they must have a good physical and
network infrastructure in order to connect with the cloud SaaS
platform. Among them, the physical management needs to be M. Integration
greatly considered. SaaS service provider staff for physical SaaS must take care about the combination of different
access qualifications should be controlled strictly. The best parts so they may work together to form a whole. In
method has some relevant audit measures, such as face technology integration, it is often referred as Service Oriented
recognition systems and fingerprinting systems. The network Architecture (SOA).This is the approach that is of wide choice
is also considered. After good physical equipment has been when it comes to many integration strategies[22].
provided, enterprises and SaaS service providers should pay
attention on the related security measures in the N. Application Updates
communication network and especially, when the data is
encrypted in the transmission process [17]. The deployment of application patches and updates can be
sometimes cumbersome and time consuming. SaaS must
assure them[22].
F. Redundant Backup
The data should be backed up in order to ensure the O. Support
sustainable operation of the system. Once the fault node is
found within a cluster consisting of multiple standby server Support is delivered in several setups, either electronically or
nodes, the other nodes can be automatically taken over the through human intervention in order to assist a service user in
fault node work.. The entire system services are not affected resolving a problematic issue[22].
by this mechanism. This approach can ensure highly
redundant hardware with double the amount of sample at least. To be aware of and mitigate the risks of such security
The hardware can automatically switch to realize online concerns, a venture who is taking an account for SaaS
replacement and hot-swappable [17]. solutions must inquire the correct questions when researching
about a provider. Messmer suggests some of such relevant
questions can be: Is data held encrypted? Which SaaS
G. Scalability employees have root database access? What security controls
It is the application's ability to service users to are in place? Is client data separated? What information is
support added requirements without giving way to slow down captured in audit logs ? What are the service level
agreements? Understanding the security policies of the vendor B. Availability.
plays a critical role in the decision making process[7]. Through cloud computing technology, the
consumers of services can easily access SaaS services from
An enterprise can expect many challenges and web browsing and through the internet. The service is owned
benefits while moving to a cloud based solution. Thorough and hosted in the service provider servers. The consumers of
research must be performed to make sure data security is service to not have to purchase the service but rather access
properly understood and addressed[7]. through the internet [12]. As such the competition has become
very stiff in the market and corporations which are vendors of
the service, try to compete by maintaining highly available
IX. CHARACTERISTICS/FEATURES OF SOFTWARE-AS-A-SERVICE. services. It is a two-way street form of business, in that if the
Software-as-a-service has many key features that consumers of the services are not available, then the SaaS
facilitate its function or rather which make it accomplish the functionality will not be available [12].
cloud computing tasks. Such features include the reusability,
the service customizability, the data managed by providing,
the quality of service, scalability, data security multi-tenant, C. Reusability.
availability as well as configurability[17]. Reusability is the ability of the software elements to
serve in the construction of other different applications. Cloud
computing is motivated by the various reuse of internet related
A. Service customizability and Configuration.
services. Many relationships are developed when developing
This phrase explains the ability and flexibility that SaaS [12]. For instance, taking a look at Google maps, the
exist for a service to be changed by the consumer to suit their service offered to provide other sets of operations that can be
taste and preferences. It is fundamental to the service provider shared. Such information includes the local location and
as it allows the company in meeting the needs of all directions which are mostly utilized by different customers.
consumers or rather clients [17]. The cloud services are
designed in such a way that even the potential clients can
become consumers of the cloud services. However, such a D. Scalability
In the field of software engineering, scalability is
related to the property in or within a system that allows it to
function well by handling the ever growing amount of work in
the system [13]. However, service consumers are denied the
control of the resources utilized by the service. It can rescale
the resources without seeking consumer consent. Therefore
scalability is a crucial feature or rather characteristics that
facilitate the organization to run its operations more
effectively and efficiently.

E. Quality of service.
Quality is essential to customers, and failure to meet
the quality organization may lose part of the client of all of
them. However in the software-as-a-service, quality is taken to
mean the level of service by providing as well as the capacity
and capabilities to provide those services [13]. Service quality
Fig. 4. SaaS (Software-as-a-service) Platform Architecture must go hand in hand with consistency, such that customers
are not disappointed at one point. There are crucial elements
that are used in measuring the quality of service which
includes the usability and reliability, the performance,
large number of consumer make it difficult for the service
availability as well as business service which includes the
provider to the customer the services to each consumer but
usability and reliability, the performance, availability as well
instead consumers are supposed to modify their services to
as business continuity needs and concerns [8]. Data security.
suit their purpose. In case the service provider does not
Information security has become the major concerns for the
provide customized service to the consumers, clients are
organization and managers are getting a lot of headache on the
supposed to us what is offered but this limit the usage of SaaS
problem. It is due to the data security issues that most of the
[12]. In addition to this, SaaS supports an individual service
organization is not interested in software-as-a-service. It has
use to be able to change the set of configuration selections that
become evident that addressing the organization security
can affect its working functionality along with its appearance
issues and concerns have become a significant problem
and ease of use [22].
towards adopting a sub-service in the cloud [8]. Data security
breach can be very costly to firms and many fear to take as it
may risk their company to both external and internal threats as without having a centralized location which in turn causes an
well as vulnerabilities. enterprise large burden and costs. In addition to this Balding
has stated that when it comes to forensics and incident
response, a centralized SaaS provider can be more
F. Pay per use
efficient.Other security benefits of SaaS include shared,
The cost incurred is dependent on the service increased ability to deploy secure logging, secure builds,
provided, the cost is estimated by using the list of service security testing costs and a more efficiently tuned system [7].
invocation as well as the time in hours, minutes or days that A brief explanation on the benefits of SaaS is as follows:
service has been utilized. It is essential in that a service
consumer will have the privilege to connect to the service and A. Cost saving
pay only what they have used. In other word, clients can take In an attempts to make operations and processes
action without consulting the service provider [8]. more efficient and effective, traditionally, business firms used
to deploy large-scale business vital software and systems such
G. Accelerated feature delivery
as the customer's relationship management as well as
SaaS applications updates very often. It may choose enterprise resource planning suites that were costly and
to check the user behavior while using a particular application, consumed most of the organization profits. It is true that when
fast testing is possible and only that specific provider can deploying the types of system in the organization can bring the
execute its updating but not the user[22]. unsustainable cost to the company. Besides, the skill and time
requirements for deployment of the vast and sophisticated
H. Open integration protocols system can be risky to the business hence small, and midsized
firms could not afford to use such software [12].
Any user's internals such as data base and services
cannot be accessed by SaaS, so the service providers offer However, contrary to the cost, the SaaS software
integration protocols and APIs (Application Programming
does not require a highly complicated information technology
Interfaces) to make this possible[22].
infrastructure at the customer's location. Such capabilities
eliminate or somewhat reduces the upfront commitments of
X. BENEFITS OF SOFTWARE-AS-A-SERVICE scarce resources. The software-as-a-service is fundamental to
the business in the sense that it gives customers or instead
Software-as-a-Service allows pay-per-use or consumer an ample time to try and test the systems or rather
subscribed users access to services or software that reside in the software [12]. The free test time is essential to the client
the cloud rather than on the user's device. Thin client software since it helps reduce the much risk that is associated with
such as web browser will be required by the SaaS application buying of a software. Also is a particular piece of software is a
consumer in order to access the cloud-hosted application. This need for a specific period, then it is paid for that time. The
helps in the reduction of the hardware requirements for end- customer or the client do not incur the cost of maintenance.
users and allows for deployment, maintenance and centralized Hence, the overall profits of the organization are not affected
control of the software. Gmail , and Google Apps, and in any way.
Hotmail are some examples of the popular SaaS
applications[7]. Similarly, the software-as-a-service application does
not require the company to add more hardware cost hence no
Software-as-a-service has several advantages as it extra cost of installing the hardware is incurred. This happens
pertains to budgeting and cost savings for an organization. because the cloud provider provides the processing power
Microsoft Corporation has mentioned in it’s report that one of needed to run the application. Besides, when implementing the
the largest advantage in deploying applications that use SaaS software-as-a-service application, there is no additional cost as
model is the low initial investment on hardware, software and the organizationbuys claim when it is ready for usage for the
staff. Hurwtiz & Associates have performed a study and subscribers or any other users [12]. Even when there is an
concluded that the solutions of SaaS have offered as huge as update for the software, it is readily available online, and
64% savings over a period of 4 years when compared to consumers can update for themselves, and it is mostly offered
premise solutions [7]. for free. That mean, there will be no new software
requirements but slightly updating the old one.
Another feature that makes software-as-a-service less
As the SaaS solution pertains to the security of data, costly is the fact it is licensed with usage-based transaction
it can provide several benefits to an organization. Balding models that make it easy user-friendly. For example, the
states “How many laptops do we need to lose before we get customers are only billed for the number of times services in
this ?[18]” while talking about lost enterprise data. The need which the transactions are used. However, the service provider
for employees to carry sensitive data along with them during may implement the time-based subscription model where
travel can be eliminated by the flexibility of using centralized clients are only required to pay a flat fee per user for a certain
data storage of a SaaS based application.It can be an period of example monthly, quarterly or even yearly [12].
impossible task to figure out all the possible locations of data
business needs are unique and people start a business with
different objectives. The service provider is aware of this facts
and therefore, the application is designed or instead developed
in such a way that users can modify them to suit their business
needs and help achieve the intended purpose. The
customization features are unique to every business, and they
are preserved through consistent and regular upgrades which
are done at lower adoption cost as well as fewer customers
risks [12].
C. Transform the IT department
The software-as-a-service has many capabilities in
the corporates, it transforms the information technology in the
organization as well as changing the way business thinks. For
instance, it re-engineers and restructures the entire role of
computing services to the rest of the organization departments.
One of the benefit of software-as-a-service is that activities
such as managing upgrades, monitoring of the performance,
ensuring high availability, keeping and maintaining the day to
day operations of the software, testing and installing the
patches are all functions handled by the service provider.
When all these functions are transferred to the provider, then
the IT team or department can focus on much more high-value
activities and have an equal opportunity to contribute to the
success of the business.

D. Ease of management
Some system is very sophisticated, and information
technology managers are having a hard time making them.
However, for the software-as-a-service applications, there are
entirely managed by the supplier or the hoster [13]. As a
matter of facts, the implementation of the management role is
opaque to the clients. There are service level agreements that
govern the relationship between the provider and the
subscriber. For instance, the customers have to produce
quality work, support the commitments and ensure service
agreed are always available.
E. Cross-device compatibility
In the world where there are as many devices as
people, and the coming of smartphones, the laptops, the tablets
as well as smart watches it is easy now to use SaaS. This
capability is made fact since most of the gadget and brilliant
gadget are internet enabled [13]. Any device that has access
to the internet can be able to install the software-as-a-service
and execute the operations. This platform is beneficial to
those who use the number of different devices, like the tablets,
the internet enabled phones, and it is suitable for people who
do not have computers.
Fig. 5. An example of software-as-a-service

During the time of subscription, a customer is allowed for the F. Facilitate better global access
unlimited use of the service upon which the expiry of time, Through the software-as-a-service application, an
they are supposed to re-subscribe to access the services. organization is well placed to use or instead access the internet
B. Easy customization from all parts of the world; business firms can obtain vital
information which it causes to improves on its operations. For
Business needs are specific and differ differently
instance, business firms will be able to manage the priorities,
from one to the other. It is essential to understand that
monitor and evaluate the data use, seeing to it that every user efficient and effective way than it used to be in the past. For
can access the same information at the same time and on a instance, the current corporate world is taking charge of the
real-time basis. The sharing of the same information is SaaS pricing as well as the question [13]. It is of paramount
achieved because all subscribers have the same information by importance for the company to understand the essence of
installing the same version of the software for ease of diversification and take advantage of the centralization
collaboration and access [13]. Similarly, the software-as-a- through a single instance. The companies are supposed to take
service can be accessed from any location because it is not advantage of the multitenant architecture so that they can
restricted for installation to a specific number of computers. provide as many features as possible which can be used by
By having an internet-enabled device, the SaaS application business to exploit other markets. The many features software-
can be obtained from anywhere in the globe. as-a-service application may be essential in that company can
be able to achieve a competitive advantage in the market.
Software-as-a-service can be offered directly by the supplier,
G. Multitenant architecture design.
or it can be accessed through an intermediary party who is
The multitenant design means that all the software referred to as the aggregator [13]. The aggregator will bundle
users share a single and common infrastructure as well as code the software-as-a-service from different suppliers and proceed
that is centrally maintained. The software-as-a-service vendors to offer them to consumers as part of a unified application.
is placed on the same infrastructure as well as the code base,
that makes it possible for the vendors to innovate fast as well XI. ARCHITECTURE STRATEGIES OF SOFTWARE-AS-A-SERVICE
as saving valuable time to for costly development that was A. Software as a Service Maturity Model
initially used in the maintenance of the numerous version of
outdated codes [13]. In this section, the maturity model of SaaS is presented.
Generally, the maturity model starts from separating and then
proceeding to sharing. Maturity model is used to describe four
stages of SaaS levels, where each level is diverse from the
previous stages. Scalability, multi-tenancy and configuration
are added to describe the SaaS maturity model shown in Fig. 7
[6].
• The first level of maturity is known as Ad
Hoc/Custom. In this level, each tenant has its own
customized instance and shares different instances
exclusively. This model dates back to traditional
application service provider (ASP) and its model
architecture is alike the single instance application.
With some extra development work,some
conversional client/server applications can be easily
transformed into this category.

• The second level of maturity is called to be


Configurable. In this level, unlike the first level each
tenant shares the same instance exclusively and has
its own customized instance. Each instance is left
isolated from all the others instances. The main
disadvantage of this level is the dependency on the
service providers in order to get sufficient hardware
and storage resources to support large-scale
instances.

• Multi-Tenant-Efficient is called as the third level of


maturity. In this level, all the tenants share the same
and only one instance. Configuration is supported in
order to satisfy customization. Reducing the number
instances to one is the added advantage of this model
Fig. 6. Software-as-a-service internal architecture , and the drawback is that it is impossible to be cost-
effective to add more power due to diminishing
returns.
H. Enabling business to diversify
The software-as-a-service is making business to be • The fourth level of maturity is Scalable and Multi-
dynamic and execute it operations and processes with the most Tenant-Efficient. In this level, each tenant gets
connected to the same tenant load balancing a lot of instances. In addition to this drawback, the cost of
middleware, and this middleware gets connected to backing up is inestimable.
various instances. The service provider hosts multiple (b) Shared Application and Separate Database
tenants. Scalability is the advantage of this level In this model, all the tenants share the same
because the middleware scales up without requiring application but the application uses different databases. All the
any additional re-architecting of the application [6]. databases are physically isolated. The application security of
this model prevents any tenant from invade its own logical
application instance.

(c) Shared Application and Shared Database


In this model, all the tenants share the same
application and database. This model is further divided into
two models known as separate schema and shared schema as
shon in Fig. 8 [6].
(i)In the separate schema model, the database houses
multiple schemas in the same database, where each tenant has
its own schema (tables, views, stored procedures and triggers).
The separate schema is comparatively easy to implement but
the drawback is the massive maintenance of schemas. The
database administrator must restore all the schemas, in order
Fig. 7. Four-level saas maturity model. to restore the database.
(ii)The second model, shared database and shared
B. Storage Strategies of Multi-Tenant Data schema, when compared with shared database and separate
There are three storage strategies existing for multi- schema, all the tenants' data are stored in the same schem and
tenant data from the balance between isolation and sharing. database.
Current SaaS data models are shown in Fig. 8.
The analysis on these two models has shown that the
shared schema approach has the lowest backup and hardware
costs, but has more development and maintenance work on
distinguishing the tenant data. This is due to the allowance to
serve the largest number of tenants per database server.
Generally, a multi-tenant data middleware is required to
convert the data and minimize the development work to the
greatest. But this approach may incur additional work
in case of unexpected bugs or attacks [6].
XII. SAAS PERFORMANCE EVALUATION AND
APPLICATION.
Cloud Computing (CC) is a trend of sharing pool of
configurable computing resources such as servers, storage,
networks, applications, and services that can be released and
provided by Cloud Services Provider (CSP) with the effort of
minimal management . CC is providing its services in three
models: Infrastructure-as-a-Service (IaaS), Platform-as-a-
Service (PaaS) or Software-as-a-Service (SaaS). SaaS is the
most usable and the top model in the CC models. In this
context, PRESENCE work focuses on the performance
evaluation of Web Services (WSs) deployed in the context of
the SaaS model [18].

Fig. 8. Current SaaS Solutions. PRESENCE framework was proposed to evaluate the
performance of SaaS model of different cloud service
(a) Separate Application and Separate Database providers. One of the mechanism of the PRESENCE
Separate application and separate database is just framework dedicated to the provision of stochastic models for
similar to single instance. Each tenant has its own database selected performance metrics that was presented. To be more
and application. In this simple model , they are isolated from precise, 11 generated models are depicted and analyzed. Out
each other. This model generates higher costs for maintaining of which 90, 91% accurately represent Web Service (WS)
performance metrics for four representatives SaaS components Cloud computing and SaaS (Software-as-a-service) are two
used for the validation of the PRESENCE approach [19]. emerging concepts. A comprehensive research conducted on
combining them together prove that SaaS can solve various
PRESENCE aims at quantifying in a fair and by problems such as bandwidth and insufficient hardware by
stealth way scalability and the performance of the delivered using cloud computing. And also cloud computing can create
WS. The paper refer to the capacity of evaluating a given its own powerful integrated resources in order perform
Cloud service through multiple workload patterns that makes adequately through the SaaS model. Thus all these structured
them indistinguishable from a regular user traffic from the the cloud computing SaaS delivery model for talents training
provider point of view. PRESENCE introduces a definition for at university[21].
the set of Common performance metrics for measuring the
behavior of cloud applications on top of a given CSP. This Another research on the application of SaaS-based
framework opens novel perspectives for SLA contraventions cloud computing in the university research and teaching
assessment, modeling, monitoring the performance metrics platform used SaaS model to deploy the related software on
for SaaS WSs [18]. the cloud platform in order to improve the computing of
scientific tasks quality and resource utilization [20]. Thus
The PRESENCE approach is useful to gather the data Software-as-a-service model of cloud computing is used in all
which represent the behavior of the CSP and reveal the the fields to achieve many benefits. SaaS is revolutionizing the
performance of the delivered services. In this context, the current trends of cloud computing.
PRESENCE agents are responsible for a set of performance
metrics measuring a specific aspect of the WS QoS. Those After the concept of SaaS application model emerged
metrics have been designed to reflect scalability and around year 2000, Salesforce has held the opportunity to
performance in a representative cloud environment [19]. become one of the most successful SaaS service providers.
There are a lot of success stories that give a way to look
On the PRESENCE client side, 8 agents are deployed towards SaaS application in the world of cloud computing
as KVM guests i.e. virtual machines running CentOS 7.3 over [21].
4 physical servers. Each agent of PRESENCE was running
one of the benchmarking tool to evaluate the WS performance XIII. CONCLUSION AND FUTURE WORK.
and gathering data about the CSP behavior. Each PRESENCE Initially, business firms haven’t taken the software-
agent thus measures a specific subset of performance metrics as-service as a serious consideration, and most of the
and attributes, also deal with a specific kinds of cloud servers. companies were reluctant to implement it. However, over the
Each measurement consists of an average over 100 runs last half of a decade, there has been a dramatic change in the
gathered by the PRESENCE agent to make the data perception of the software-as-a-service as companies have
statistically significant [19]. continued to adopt and implement it. It has been proved that
organizations can grow their revenue by increasing the
PRESENCE aims at evaluating the QoS and SLA customer base in extensive significant manner research [8].
compliance of a Web Services (WSs) by stealth way, i. e. by The customers of today are attracted to the affordability as
rendering the performance evaluation as close as possible well as the familiarity of the worldwide web-browsing like the
from a regular yet heavy usage of the considered service. To user interface which is offered by software-as-a-service.
enable it, the performance metrics should be accurately
modeled .11 such models were generated using the Beginning with the introduction to cloud computing
PRESENCE approach. Out of the 11 models, 10 of and the three cloud computing models, this paper has
them i.e. 90.1% of the analyzed models are proved to have discussed the Current-state-of-art, architecture, challenges,
accurately represent the performance metrics collected by the and various models of cloud computing. Then the discussion
PRESENCE agents, such as throughput and latency in various has proceeded focusing on the challenges of implementing
contexts depending on the considered WS[18]. Saas models, characteristics and benefits of SaaS. As the top
model of cloud computing, Software as a service (SaaS) has
The SaaS case study presented in [7], by implementing a assisted the industry to develop various multi-tenant
SaaS based data protection solution, this organization enjoyed applications. It has brought new challenges of software
many of the expected advantages such as cost savings, low architecture and data storage which have been presented in
initial capital costs, quick deployment, expanded features, and this paper. Some case studies are provided by presenting the
a quick method to implement the requirements of a project. In evaluation models to measure the performance of SaaS based
addition, the organization is well positioned to handle any applications and presented how the usage, implementation
amount of data growth by selecting a SaaS solution. This case and contribution of SaaS has lead to great benefits and
study was a great example of a successful real world cloud success.
based computing implementation which has clearly
demonstrated the potential of the SaaS solution. In today corporate world, task which is related to the
accounting department like invoicing, the sales and marketing
tasks such as an advertisement, the product design, and [3] A. Fox, D. A. Patterson, and S. Joseph, Engineering software-as-a-
service: an agile approach using cloud computing. India: Strawberry Canyon
planning as well as the pricing quote can be done through the
LLC,2014.
software-as-a-service application. It is the wish and the [4] N. Gupta and J. N. Varshapriya, Software-as-a-service, International
advantage of business to use one form of the software that can Journal of Innovative Research in Advanced Engineering (IJIRAE), 2014, vol
perform all of the business processes to help synchronize the 1(6), pp. 107-112.
[5] Goode Sigi, C. Chinho Lin, J. Tsai, and J. Jiang, Rethinking the role of
operations and cut on the cost research [8]. It is therefore of
security in client satisfaction with Software-as-a-Service (SaaS) providers.
paramount importance to conclude that software-as-a-service Decision Support Systems,2015,vol 70, pp.73-85.
offer great opportunities to the business and reduce the [6] Huixin Chen, ”Architecture strategies and data models of Software-as-a-
business risk exposure. it helps the company in transforming service: A review,” 2016 3rd International Conference on Informative and
Cybernetics for Computational Social Systems (ICCSS), Jinzhou, 2016, pp.
the IT department making it proactive as well as well as
382-385.
enhancing value production which becomes part of the [7] J. Gibson, R. Rondeau, D. Eveleigh and Q. Tan, ”Benefits and challenges
business. It is essential for a business to consider the value of three cloud computing service models,” 2012 Fourth International
implication, the SaaS flexibility as well as the risk Conference on Computational Aspects of Social Networks (CASoN), Sao
Carlos, 2012, pp. 198-205.
management.
[8] J. Yu and J. Lin, ”An Architecture for Cloud-Based Consumer Support
Software-as-a-Service,” 2014 International Symposium on Computer,
Software-as-a-service is an example of a cloud Consumer and Control, Taichung, 2014, pp. 5-8.
service which has emerged as useful reuse technology. It has [9] L. Kung, C. G. Cegielski, and H. J Kung, An integrated environmental
perspective on software-as-a-service adoption in manufacturing and retail
many benefits to consumers such as no initial investment, no
firms. Journal of Information Technology, 2016,vol 30(4), pp. 352-363.
software maintenance cost, the service can easily be accessed [10] M. Meena and V. A. Bharadi, ”Performance analysis of cloud based
through the internet, they are profoundly and readily available, software-as-a-service (SaaS) model on public and hybrid cloud,” 2016
and the cost is per usage [8]. It would, however, be essential Symposium on Colossal Data Analysis and Networking (CDAN), Indore,
2016, pp. 1-6.
to evaluate the quality of the SaaS for effective management.
[11] S. oh, J. Cha, M Ji, H. Kang, s. Kim, E. Heo, J.S. Han, H. Kang, H. Chae,
SaaS will continue to be adopted by the organization due to H. Hwang and S. Yoo. Architecture design of healthcare software-as-a-service
the benefits it makes an organization to achieve. platform for cloud-based clinical decision support service. Healthcare
informatics research, 2015,Vol 21(2), pp. 102- 110.
[12] T.C. Stickle, Patent and Trademark Office, U.S. Patent No. 9,122,562,
There are still many research questions on “Cloud
Washington, DC: U.S,2015.
computing” applications, such as: storage, resource [13] N. Sowatskey, N. Cam-Winget, S. E. Thomson, D. Jones, M. Ansari, K.
scheduling, service selection, cloud security issues, service Wierenga and J. Salowey, Patent and Trademark Office, U.S. Patent No.
composition issues and standards and so on [21]. In the future, 8,949,938. Washington, DC: U.S, 2015.
[14] F. Safari, N. Safari and A. Hasanzadeh, The adoption of softwareas-a-
more research needs to be done on the software-as-a-service to
service (SaaS): ranking the determinants, Journal of Enterprise Information
determine why firms are reluctant to adopt and implement this Management, 2015, vol 28(3), pp. 400-422.
form of cloud service research [8]. More research on the data [15] P. K. Tiwari and S. Joshi, Data security for software-as-a-service.
models that are used on SaaS should be done. SaaS, As one of WebBased Services: Concepts, Methodologies, Tools, and Applications, IGI
Global , 2016, pp. 864-880.
the main categories of cloud computing should be essentially
[16] S. Walraven, D. Van Landuyt, E. Truyen, K. Handekyn, and W. Joose,
focused further which would be more useful to the companies Efficient customization of multi-tenant software-as-a-service applications with
and determine which model can be best to use in which service lines. Journal of Systems and Software, 2014. vol 91, pp. 48-62.
scenarios. [17] S. Liu, K. Yue, H. Yang, L. Liu, X. Duan and T. Guo, ”The Research on
SaaS Model Based on Cloud Computing,” 2018 2nd IEEE Advanced
Information Management,Communicates,Electronic and Automation Control
Conference (IMCEC), Xi’an, 2018, pp. 1959- 1962.
XIV. RECOMMENDATIONS [18] A. A. Z. A. Ibrahim, ”PRESEnCE: A Framework for Monitoring,
Although Software-as-a-service has beenwidely Modelling and Evaluating the Performance of Cloud SaaS Web Services,”
2018 48th Annual IEEE/IFIP International Conference on Dependable
adopted through cloud computing, the research on software- Systems and Networks Workshops (DSN-W), Luxembourg City, 2018, pp.
as-a-service is still in the early stage. Many issues need to be 83-86.
addressed which have not adequately been discussed in the [19] A. A. Z. A. Ibrahim, M. U. Wasim, S. Varrette and P. Bouvry,
previous research [8]. Whereas many technologies continue to ”PRESEnCE: Performance Metrics Models for Cloud SaaS Web Services,”
2018 IEEE 11th International Conference on Cloud Computing (CLOUD),
emerge in the IT industry, it is essential for an organization to San Francisco, CA, 2018, pp. 936-940.
look seriously on how to address the issues related to data [20] G. Yang, F. Zhou and Z. Zhu, ”The Application of SaaS-Based Cloud
security since it is the great fear for much organization Computing in the University Research and Teaching Platform,” 2011
towards adopting software-as-a-service. International Conference on Intelligence Science and Information
Engineering, Wuhan, 2011, pp. 210-213.
[21] X. Sheng, G. Ren and Z. Wang, ”The Application of Cloud Computing
References SaaS Delivery Model in University Talents Training,” 2011 Second
[1] C. d. Silva, L. R. Correa, L. A. V. Dias and A. M. d. Cunha, ”A Case International Conference on Digital Manufacturing and Automation,
Study Using Testing Technique for Software-as-a-service (SaaS),” 2015 12th Zhangjiajie, Hunan, 2011, pp. 1203-1205.
International Conference on Information Technology - New Generations, Las [22] D. Jagli, S. Purohit and S. C. Nalla, "Implementation of K-means
Vegas, NV, 2015, pp. 761-762. clustering for evaluating SaaS on the cloud computing environment," 2016
[2] Chen SL, Chen YY, Hsu C, A new approach to integrate Internet-of-things International Conference on ICT in Business Industry & Government
and software-as-a-service model for logistic systems: a case study, Sensors (ICTBIG), Indore, 2016, pp. 1-5.
,Basel, Switzerland, March 28 ,2014 vol. 14,4 6144-64.

Vous aimerez peut-être aussi