Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy

  • Fidel IkundiEmail author
  • Rafiqul Islam
  • Peter White
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 198)


Cloud computing is geared towards the effective and efficient use of computational resources and it has been making a big revolution in the field of information technology by reducing capital investment. It delivers computing as a service, that enables effective utilization of computational resources, rather than, a product, for a fraction of the cost. This paper explores key security issues associated with PaaS and proposed mitigating strategies are provided. These security challenges slow down the adoption of PaaS. Mitigating these security issues could increase PaaS adoption. This paper focuses on the security issues associated with Platform as a Service (PaaS) offering on a public cloud platform and provides various mitigating techniques to address these security issues. If properly implemented, we could realize an increase in PaaS adoption.


PaaS Cloud computing Security 


  1. 1.
    Brunette, G.: Platform as a service offering. J. Cloud Comput. 10(3), 17–21 (2015)MathSciNetGoogle Scholar
  2. 2.
    Dijk, M., Juels, A.: Attributes of platform as a service offering. J. Cloud Comput. 17(4), 20–23 (2015)Google Scholar
  3. 3.
    Gallagher, M.: Understanding platform as a service models. J. Inf. Technol. 18(4), 33–37 (2015)Google Scholar
  4. 4.
    Kaufmann, M.: Data security in the world of cloud computing. J. Secur. Priv. 9(2), 54–63 (2015)Google Scholar
  5. 5.
    Mell, P., Grance, T.: The NIST definition of cloud computing. Accessed 25 Mar 2016
  6. 6.
    Momm, C.: The principle of minimizing TCB (2014). Accessed 21 Mar 2016
  7. 7.
    Natis, Y.: Research on platform as a service. J. Cloud Comput. Secur. 10(1), 11–16 (2015)Google Scholar
  8. 8.
    Osvik, D., Shamir, A.: The concept of cloud computing. J. Inf. Technol. 12(3), 26–29 (2015)Google Scholar
  9. 9.
    Percival, C.: Securing the transport layer. p. 25. The New York Times. Accessed 20 Jan 2015
  10. 10.
    Saltzer, J.: Protection and the control of information sharing. In: ACM Conference on Information Sharing and Protection, vol. 6, no. 2, pp. 11–15 (2014)Google Scholar
  11. 11.
    Shacham, H., Savage, S.: Exploring information leakage in third-party commute clouds. J. Cloud Comput. 9(1), 13–17 (2015)Google Scholar
  12. 12.
    Subashini, S., Kavitha, V.: Shared resources in the cloud. J. Netw. Comput. Appl. 14(2), 27–29 (2015)Google Scholar
  13. 13.
    Takabi, H., Joshi, D.: Security and privacy challenge in cloud computing environments. J. Cloud Comput. Secur. 23(1), 66–72 (2015)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017

Authors and Affiliations

  1. 1.School of Computing and MathematicsCharles Sturt UniversityBathurstAustralia

Personalised recommendations