Empirical Study of in-Cloud Enterprise Resource Planning System with Access Control Authentication

  • Bao Rong Chang
  • Hsiu-Fen Tsai
  • Ju-Chun Cheng
  • Yun-Che Tsai
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 293)

Abstract

This paper introduces in-cloud Enterprise Resources Planning (in-cloud ERP) with network security as well as access control authentication using biometrics, where the internal network is totally isolated from external network to enhance in-cloud ERP security Advantages of the cloud system implementation includes significant decrease of hardware cost, centralized monitoring, fast and convenient management, dynamic optimization, highly efficient backup, and excellent performance in operational speed. As a result, in term of operational speed, the proposed approach exclusively outperforms the two well-known benchmark ERP systems, in-house ECC 6.0 and in-cloud ByDesign. Therefore it is good choice to apply this in-cloud ERP system with access control authentication and high network security as information management system in a firm.

Keywords

In-cloud enterprise resources planning (in-cloud ERP) Access control authentication Biometrics Intrusion detection Network security 

Notes

Acknowledgments

This work is fully supported by the National Science Council, Taiwan, Republic of China, under grant number: NSC 100-2221-E-390-011-MY3.

References

  1. 1.
    Beloglazov, A., & Buyya, R. (2010). Energy efficient allocation of virtual machines in cloud data centers. In 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (pp. 577–578).Google Scholar
  2. 2.
    Laurikainen, R., Laitinen, J., Lehtovuori, P., & Nurminen, J. K. (2012). Improving the efficiency of deploying virtual machines in a cloud environment. In 2012 International Conference on Cloud and Service Computing (pp. 232–239).Google Scholar
  3. 3.
    Sotiriadis, S., Bessis, N., Xhafa, F., & Antonopoulos, N. (2012). Cloud virtual machine scheduling: modelling the cloud virtual machine instantiation. In 2012 Sixth International Conference on Complex, Intelligent and Software Intensive Systems (pp. 233–240).Google Scholar
  4. 4.
    Yang, T. S., Choi, J., Zheng, X., Sun, Y. H., Ouyang, C. S., & Huang, Y. X. (2006). Research of enterprise resource planning in a specific enterprise. In 2006 IEEE International Conference on Systems, Man, and Cybernetics (pp. 418–422).Google Scholar
  5. 5.
    Carvalho, R. A. de, Monnerat, R. M., Sun, Y. H., Ouyang, C. S., & Huang, Y. X. (2008). Development support tools for enterprise resource planning. IT Professional Magazine, 10(5), 39–45. Google Scholar
  6. 6.
    Wu, H. Q., Ding, Y., Winer, C., & Yao, L. (2010). Network security for virtual machine in cloud computing. In 2010 5th International Conference on Computer Sciences and Convergence Information Technology (pp. 18–21).Google Scholar
  7. 7.
    OpenERP. (2013). http://v6.openerp.com/
  8. 8.
    Zhao, J. G., Liu, J. C., Fan, J. J., & Di, J. X. (2010). The security research of network access control system. In 2010 First ACIS International Symposium on Cryptography and Network Security, Data Mining and Knowledge Discovery, E-Commerce & Its Applications and Embedded Systems (pp. 283–288). Google Scholar
  9. 9.
    Metz, C. (1999). AAA protocols: Authentication, authorization, and accounting for the Internet. IEEE Internet Computing, 3(6), 75–79.CrossRefGoogle Scholar
  10. 10.
    Zhang, L.-F., Persaud, A. G., Johnson, A., & Yong, G. (2006). Detection of stepping stone attack under delay and chaff perturbations. In 25th Annual International Performance, Computing, and Communications Conference (pp. 256–266).Google Scholar
  11. 11.
    Yang, H.-Y., Xie, L.-X., & Xie, F. (2008). A new approach to network anomaly attack detection. Fuzzy Systems and Knowledge Discovery, 4, 317–321.Google Scholar
  12. 12.
    VMware Virtualization. (2011). http://www.vmware.com/virtualization/
  13. 13.
  14. 14.
    Proxmox Server Solution GmbH. (2012). http://www.proxmox.com/
  15. 15.
    Wayman, J. L. (2008). Biometrics in identity management systems. IEEE Security and Privacy, 6(2), 30–37.CrossRefGoogle Scholar
  16. 16.
    Chang, B. R., Huang, C.-F., Tsai, H.-F., & Lin, Z.-Y. (2012). Rapid access control on Ubuntu Cloud computing with facial recognition and fingerprint identification. Journal of Information Hiding and Multimedia Signal Processing, 3(2), 176–190.Google Scholar
  17. 17.
    Hsiao, H. W., & Fan, W. C. (2009). Detecting step-stone with network traffic mining approach. In The Fourth International Conference on Innovative Computing, Information and Control (pp. 1176–1179).Google Scholar
  18. 18.
    Hsiao, H. W., Lin, C. S., & Chang, S. Y. (2009). Constructing an ARP attack detection system with SNMP traffic data mining. In The 11th International Conference on Electronic Commerce (pp. 341–345).Google Scholar
  19. 19.
    pfSense. (2013). http://www.pfsense.org/
  20. 20.
    Zentyal. (2013). http://www.zentyal.com/
  21. 21.
    Doedt, M., & Steffen, B. (2011). Requirement-driven evaluation of remote ERP-system solutions: A service-oriented perspective. In 34th IEEE Software Engineering Workshop (pp. 57–66).Google Scholar
  22. 22.
    Elragal, A., & El-Kommos, M. (2012). In-house versus in-cloud ERP systems: A comparative study. Journal of Enterprise Resource Planning Studies. DOI:  10.5171/2012.659957

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Bao Rong Chang
    • 1
  • Hsiu-Fen Tsai
    • 2
  • Ju-Chun Cheng
    • 1
  • Yun-Che Tsai
    • 1
  1. 1.Department of Computer Science and Information EngineeringNational University of KaohsiungKaohsiungTaiwan, Republic of China
  2. 2.Department of Marketing ManagementShu Te UniversityKaohsiungTaiwan, Republic of China

Personalised recommendations