SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 5, May 2015
Copyright to IJIRCEE www.ijircee.com 6
Cloud Based Enterprise Resource Planning
Using Software As A Service
Sujatha A1, Jayasudha R2, Prof Srinivasan. R3
M.Tech (IT) Student, Department of IT, PSV College of Engg & Tech, Krishnagiri, TN.India1
Assistant Professor, Department of IT, PSV College of Engg & Tech, Krishnagiri, TN,India2
Head of Department , Department of IT, PSV College of Engg & Tech, Krishnagiri, TN, India3
ABSTRACT: Decentralized access control is one of important schemes for secure data storage in clouds that supports
anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the
user’s identity before storing data. We have designed the complete enterprise resource planning using a SaaS based
Technology Workday. We have addressed the Core HR transactions from Hire to terminate using this SaaS technology.
Tailored the Business Process rules, Security and Compensation package as per the client requirement used this SaaS,
as Upgrade will not be a hassle for the client and it will be owned by the Software vendor. We can access the
application through mobile from wherever you are.
KEYWORDS: Cloud Computing, Access Control, Architecture, Services, Hardware Virtualization.
I. INTRODUCTION
Cloud computing is a computing model in which hardware, platform, infrastructure and software are
characterized and conveyed as an administration instead of an item. Cloud computing is rising up out of late
advances in innovations, for example, hardware virtualization, Web administrations, dispersed computing,
utility computing and framework automation. Cloud computing exploits hardware virtualization to securely and
powerfully distribute physical resources, for example, computational power, stockpiling, and systems to the
clients. Cloud resources are conveyed to the end-clients through Web administrations. This basic model brings
about alluring peculiarities like Elasticity, Cost Effectiveness, Pay-as-you-go Pricing model, Global-Scale
Accessibility and Usability and Easy Maintenance. Elasticity is accomplished by designating physical resources
rapidly to the consumers as per their needs and cloud administrations can scale on-demand. Resource imparting
enhances utilization of physical resources and along these lines decreases the associated expense, consequently
we can say it is expense adequacy. Cloud administrations have consumption-based metering and charging; this
property makes them more moderate for little organizations and new businesses which are called Pay-as-you-go
Pricing Model. Worldwide scale Accessibility and Usability is a good peculiarity; Cloud consumers have entry
to a basically boundless physical resource pool through Web. The an alternate gimmick of cloud is Easy
Maintenance, all non-functional prerequisites of IT, for example, upkeep of hardware and software, are tended
to by cloud providers, in this way consumers can concentrate on their functional business necessities. To better
comprehend the extent of cloud computing and related concepts and advances, in this section we exhibit
taxonomy of cloud. In a cloud-show there are four principle members they are cloud provider, cloud consumer,
Cloud broker and Cloud Broker
Cloud administration consumer is an individual or application who gets to a cloud administration. A cloud
broker is an element that intervenes between cloud providers and cloud consumers. The goal of an administration
broker is to give the cloud consumer an administration that is more suitable for its needs. This is possible by
streamlining and enhancing the administration and contract, amassing different cloud administrations or giving worth
included administrations. One can consider cloud brokers as a unique cloud provider. A cloud auditor is an autonomous
gathering who looks at a cloud administration stack to give an assessment on security, protection and
accessibility level of the corresponding cloud benefits and guarantees that the corresponding Slas (Service Level
Agreement) are satisfied. The subtle elements and extent of evaluating methodology is regularly pointed out in
the administration contract.
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 5, May 2015
Copyright to IJIRCEE www.ijircee.com 7
II. RELATED WORK
In [1] open systems such as cloud computing platforms, delegation transfers privileges among users across
different administrative domains and facilitates information sharing. We present an independently verifiable delegation
mechanism, where a delegation credential can be verified without the participation of domain administrators. Our
protocol, called role-based cascaded delegation (RBCD), supports simple and efficient cross-domain delegation of
authority. RBCD enables a role member to create delegations based on the dynamic needs of collaboration. In [2]
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications
without the burden of local hardware and software management. Though the benefits are clear, such a service is also
relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the
correctness of the data in cloud.In order to address this new problem and further achieve a secure and dependable cloud
storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the
homomorphic token and distributed erasure-coded data.
In [3] an important problem in public clouds is how to selectively share documents based on fine-grained
attribute-based access control policies (acps). An approach is to encrypt documents satisfying different policies with
different keys using a public key cryptosystem such as attribute-based encryption, and/or proxy re-encryption. A direct
application of a symmetric key cryptosystem, where users are grouped based on the policies they satisfy and unique
keys are assigned to each group, also has similar weaknesses. We observe that, without utilizing public key
cryptography and by allowing users to dynamically derive the symmetric keys at the time of decryption, one can
address the above weaknesses. In [4] File distribution and storage in a cloud storage environment is usually handled by
storage device providers or physical storage devices rented from third parties.Files can be integrated into useful
resources that users are then able to access via centralized management and virtualization. Nevertheless, when the
number of files continues to increase, the condition of every storage node cannot be guaranteed by the manager. High
volumes of files will result in wasted hardware resources, increased control complexity of the data center, and a less
efficient cloud storage system.
III. PROBLEM DEFINITION
We need to own the software and take care of maintenance. The data will be available in the service provider’s
premises and is prone to data hackers. Every year, the software provider can release a new version and it is our
responsibility to upgrade our system along with the data to cope up with the new version. Security is a big concern here
as the data is available to most of the developers who supports the system. Time and money involved in supporting and
enhancing will be very high, where we don’t have any other option.
We need to upgrade our application to the new version of the software provided else support will be stopped
by the vendor. We need to have frequent down times as maintenance will be undergoing. Amount of money and time
involved will be very high. Prone to data hackers. As all the data will be maintained in one place, there is a high risk of
data loss and need to have a mitigation plan for natural calamities etc.
We are providing the complete HR solution with the Cloud based SaaS solution – Workday. We will be
designing the organization structure and Locations or any other Organization types based on the clients requirement.
We will be setting the business process for all the client actions right from Hiring an employee to Terminating an
employee. So, the actions are fully controlled and the security will be imposed in two ways based on “Who sees what”
and “Who approves what”. Only the person assigned with a particular role will be able to act on the transaction…We
don’t have access to the database as it is handled at the centralized place. Setting up the Compensation for the new hires
is also done by the Eligibility rules, Compensation plan, Compensation grade and the Compensation Package. Once the
Business Process flows are setup, we can start with our day to day activities and also, the managers can see the reports
from their Home Page about all the activities like Performance, Team member details, Profit and Loss of the
organization.
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 5, May 2015
Copyright to IJIRCEE www.ijircee.com 8
IV.IMPLEMENTATION AND RESULT
A: Location Hierarchy and Locations
Locations are an attribute associated with a worker in a position, and can also be used for assets. Locations
reflect a worker's work location rather than an area of responsibility. Locations can be structured as a hierarchy
whereby Location A can be the superior of Location B. Location hierarchies have organizational roles and can include
locations for grouping purposes. Location hierarchies can also be structured as a hierarchy whereby Location Hierarchy
X can be the superior of Location Hierarchy Y.
B: Custom Organization
You can use custom organizations to group workers into logical constructs that are not defined by Workday-
provided organization types.Use the Maintain Organization Types task to define custom organization types. You can
configure a custom organization to be a worktag in financial transactions, and assign a worker to the custom
organization in organization assignment so that the custom organization defaults as a worktag into transactions that
involve the worker. You can mark up to 10 custom organization types as a financial worktag. In addition to their use in
business process routing, worktags can also be used as a dimension in reporting. If a custom organization is configured
to be allowed in Change Organization Assignment, then it cannot be assigned via membership or Assign Worker tasks.
Image: System architecture
C: Organization Roles, Members and Org Assignments
Roles enable security control for role-enabled objects, such as Organizations, Service Centers, and Spend
Categories. Roles include responsibilities such as Manager, Recruiter, and HR Partner. The Maintain Assignable Roles
task identifies the security groups that can assign each role. You can assign a role to any level in a hierarchy. If a role is
not assigned directly, the position assigned to the role is inherited from the superior. Workday's model of assigning a
role to a position, rather than to a specific worker, considerably simplifies role maintenance in the position management
staffing model, as roles do not have to be updated manually every time a worker moves out a position.
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 5, May 2015
Copyright to IJIRCEE www.ijircee.com 9
D: Security Group
The context type of each security group is determined automatically by the security group type with which it is
associated, and can’t be changed. The name of the security group type indicates different types of row-level access to
secured items. Example: A user-based security group is automatically unconstrained, but a role-based security group
(constrained) is constrained by organization access.
Unconstrained: All users in the security group have access to all data instances secured by the security group, similar to
having access to all rows in systems based on traditional relational database architecture.
Constrained: All users in the security group have contextual access to a subset of data instances (rows) which the
security group can access. Users' access to individual instances is governed by either:
 Individual Role
 Organization
Mixed: Users in the security group don't have uniform access to data instances. This applies to these security group
types:
 Intersection security groups (a subset of 2 or more security groups).
 Aggregation security groups (a superset of 2 or more security groups).
E: Business Process Setups
A business process in Workday is a set of tasks that people initiate, act upon, and complete in order to
accomplish a desired business objective. When a business process is initiated, Workday routes the tasks to the
responsible roles (users who are capable of completing the tasks based on their membership in security groups) and
enforces security and business rules throughout the business process.
Any user with the appropriate role can initiate a business process. Once initiated, the business process notifies
users in the responsible roles as it processes each step and receives feedback when each step is complete, so it can
move on to the next step.
All business processes are based on a business process definition; you can't create a business process in
Workday without first defining it. Workday's default business processes are delivered definitions and can be
customized to meet your needs. You can copy the business process to any supervisory organization and tailor it as
necessary, creating different versions of the same business process for different organizations. The business process
logic is inherited, so a subordinate organization uses the business process definition of the superior organization unless
you specify a custom definition for the subordinate organization.
V. CONCLUSION AND FUTURE WORK
We have designed the complete enterprise resource planning using a SaaS based Technology Workday. We
have addressed the Core HR transactions from Hire to terminate using this SaaS technology. Tailored the Business
Process rules, Security and Compensation package as per the requirement. Used this SaaS, as Upgrade will not be a
hassle for the client and it will be owned by the Software vendor. We can access the application through mobile from
wherever you are.
Future Enhancement – We can establish the HCM complete setup for multiple Countries
REFERENCES.
1 A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” in Proceedings of Advances in Cryptology - EUROCRYPT
’05, ser. LNCS, vol. 3494. Springer, 2005, pp. 457–473.
2 B. Wang, S. S. M. Chow, M. Li, and H. Li, “Storing Shared Data on the Cloud via Security-Mediator,” in International
Conference on Distributed Computing Systems - ICDCS 2013. IEEE, 2013.
3 B. Alomair and R. Poovendran, “Information Theoretically Secure Encryption with Almost Free Authentication,” J. UCS,
vol. 15, no. 15, pp. 2937–2956, 2009.
4 C.-K. Chu and W.-G. Tzeng, “Identity-Based Proxy Re-encryption Without Random Oracles,” in Information Security
Conference (ISC ’07), ser. LNCS, vol. 4779. Springer, 2007, pp. 189–202.
ISSN(Online): 2395-xxxx
International Journal of Innovative Research in Computer
and Electronics Engineering
Vol. 1, Issue 5, May 2015
Copyright to IJIRCEE www.ijircee.com 10
5 C.-K. Chu, J. Weng, S. S. M. Chow, J. Zhou, and R. H. Deng, “Conditional Proxy Broadcast Re-Encryption,” in
Australasian Conference on Information Security and Privacy (ACISP ’09), ser. LNCS, vol. 5594. Springer, 2009, pp.
327–342.
6 C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy- Preserving Public Auditing for Secure Cloud Storage,”
IEEE Trans. Computers, vol. 62, no. 2, pp. 362–375, 2013.
7 D. Boneh, X. Boyen, and E.-J. Goh, “Hierarchical Identity Based Encryption with Constant Size Ciphertext,” in
Proceedings of Ad- vances in Cryptology - EUROCRYPT ’05, ser. LNCS, vol. 3494. Springer, 2005, pp. 440–456.
8 D. Boneh, R. Canetti, S. Halevi, and J. Katz, “Chosen-Ciphertext Security from Identity-Based Encryption,” SIAM Journal
on Com- puting (SIAMCOMP), vol. 36, no. 5, pp. 1301–1328, 2007.
9 D. Naor, M. Naor, and J. Lotspiech, “Revocation and Tracing Schemes for Stateless Receivers,” in Proceedings of
Advances in Cryptology - CRYPTO ’01, ser. LNCS. Springer, 2001, pp. 41–62.
10 D. Boneh, C. Gentry, and B. Waters, “Collusion Resistant Broad- cast Encryption with Short Ciphertexts and Private
Keys,” in Proceedings of Advances in Cryptology - CRYPTO ’05, ser. LNCS, vol. 3621. Springer, 2005, pp. 258–275.
11 D. Boneh and M. K. Franklin, “Identity-Based Encryption from the Weil Pairing,” in Proceedings of Advances in
Cryptology - CRYPTO ’01, ser. LNCS, vol. 2139. Springer, 2001, pp. 213–229.
12 D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and Verifiably Encrypted Signatures from Bilinear Maps,” in
Proceedings of Advances in Cryptology - EUROCRYPT ’03, ser. LNCS, vol. 2656. Springer, 2003, pp. 416–432.
13 F. Guo, Y. Mu, and Z. Chen, “Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single
Decryption Key,” in Proceedings of Pairing-Based Cryptography (Pairing ’07), ser. LNCS, vol. 4575. Springer, 2007, pp.
392–406.
14 F. Guo, Y. Mu, Z. Chen, and L. Xu, “Multi-Identity Single-Key Decryption without Random Oracles,” in Proceedings of
Informa- tion Security and Cryptology (Inscrypt ’07), ser. LNCS, vol. 4990. Springer, 2007, pp. 384–398.

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Kürzlich hochgeladen (20)

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Cloud Based Enterprise Resource Planning Using Software As A Service

  • 1. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 5, May 2015 Copyright to IJIRCEE www.ijircee.com 6 Cloud Based Enterprise Resource Planning Using Software As A Service Sujatha A1, Jayasudha R2, Prof Srinivasan. R3 M.Tech (IT) Student, Department of IT, PSV College of Engg & Tech, Krishnagiri, TN.India1 Assistant Professor, Department of IT, PSV College of Engg & Tech, Krishnagiri, TN,India2 Head of Department , Department of IT, PSV College of Engg & Tech, Krishnagiri, TN, India3 ABSTRACT: Decentralized access control is one of important schemes for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. We have designed the complete enterprise resource planning using a SaaS based Technology Workday. We have addressed the Core HR transactions from Hire to terminate using this SaaS technology. Tailored the Business Process rules, Security and Compensation package as per the client requirement used this SaaS, as Upgrade will not be a hassle for the client and it will be owned by the Software vendor. We can access the application through mobile from wherever you are. KEYWORDS: Cloud Computing, Access Control, Architecture, Services, Hardware Virtualization. I. INTRODUCTION Cloud computing is a computing model in which hardware, platform, infrastructure and software are characterized and conveyed as an administration instead of an item. Cloud computing is rising up out of late advances in innovations, for example, hardware virtualization, Web administrations, dispersed computing, utility computing and framework automation. Cloud computing exploits hardware virtualization to securely and powerfully distribute physical resources, for example, computational power, stockpiling, and systems to the clients. Cloud resources are conveyed to the end-clients through Web administrations. This basic model brings about alluring peculiarities like Elasticity, Cost Effectiveness, Pay-as-you-go Pricing model, Global-Scale Accessibility and Usability and Easy Maintenance. Elasticity is accomplished by designating physical resources rapidly to the consumers as per their needs and cloud administrations can scale on-demand. Resource imparting enhances utilization of physical resources and along these lines decreases the associated expense, consequently we can say it is expense adequacy. Cloud administrations have consumption-based metering and charging; this property makes them more moderate for little organizations and new businesses which are called Pay-as-you-go Pricing Model. Worldwide scale Accessibility and Usability is a good peculiarity; Cloud consumers have entry to a basically boundless physical resource pool through Web. The an alternate gimmick of cloud is Easy Maintenance, all non-functional prerequisites of IT, for example, upkeep of hardware and software, are tended to by cloud providers, in this way consumers can concentrate on their functional business necessities. To better comprehend the extent of cloud computing and related concepts and advances, in this section we exhibit taxonomy of cloud. In a cloud-show there are four principle members they are cloud provider, cloud consumer, Cloud broker and Cloud Broker Cloud administration consumer is an individual or application who gets to a cloud administration. A cloud broker is an element that intervenes between cloud providers and cloud consumers. The goal of an administration broker is to give the cloud consumer an administration that is more suitable for its needs. This is possible by streamlining and enhancing the administration and contract, amassing different cloud administrations or giving worth included administrations. One can consider cloud brokers as a unique cloud provider. A cloud auditor is an autonomous gathering who looks at a cloud administration stack to give an assessment on security, protection and accessibility level of the corresponding cloud benefits and guarantees that the corresponding Slas (Service Level Agreement) are satisfied. The subtle elements and extent of evaluating methodology is regularly pointed out in the administration contract.
  • 2. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 5, May 2015 Copyright to IJIRCEE www.ijircee.com 7 II. RELATED WORK In [1] open systems such as cloud computing platforms, delegation transfers privileges among users across different administrative domains and facilitates information sharing. We present an independently verifiable delegation mechanism, where a delegation credential can be verified without the participation of domain administrators. Our protocol, called role-based cascaded delegation (RBCD), supports simple and efficient cross-domain delegation of authority. RBCD enables a role member to create delegations based on the dynamic needs of collaboration. In [2] Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud.In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. In [3] an important problem in public clouds is how to selectively share documents based on fine-grained attribute-based access control policies (acps). An approach is to encrypt documents satisfying different policies with different keys using a public key cryptosystem such as attribute-based encryption, and/or proxy re-encryption. A direct application of a symmetric key cryptosystem, where users are grouped based on the policies they satisfy and unique keys are assigned to each group, also has similar weaknesses. We observe that, without utilizing public key cryptography and by allowing users to dynamically derive the symmetric keys at the time of decryption, one can address the above weaknesses. In [4] File distribution and storage in a cloud storage environment is usually handled by storage device providers or physical storage devices rented from third parties.Files can be integrated into useful resources that users are then able to access via centralized management and virtualization. Nevertheless, when the number of files continues to increase, the condition of every storage node cannot be guaranteed by the manager. High volumes of files will result in wasted hardware resources, increased control complexity of the data center, and a less efficient cloud storage system. III. PROBLEM DEFINITION We need to own the software and take care of maintenance. The data will be available in the service provider’s premises and is prone to data hackers. Every year, the software provider can release a new version and it is our responsibility to upgrade our system along with the data to cope up with the new version. Security is a big concern here as the data is available to most of the developers who supports the system. Time and money involved in supporting and enhancing will be very high, where we don’t have any other option. We need to upgrade our application to the new version of the software provided else support will be stopped by the vendor. We need to have frequent down times as maintenance will be undergoing. Amount of money and time involved will be very high. Prone to data hackers. As all the data will be maintained in one place, there is a high risk of data loss and need to have a mitigation plan for natural calamities etc. We are providing the complete HR solution with the Cloud based SaaS solution – Workday. We will be designing the organization structure and Locations or any other Organization types based on the clients requirement. We will be setting the business process for all the client actions right from Hiring an employee to Terminating an employee. So, the actions are fully controlled and the security will be imposed in two ways based on “Who sees what” and “Who approves what”. Only the person assigned with a particular role will be able to act on the transaction…We don’t have access to the database as it is handled at the centralized place. Setting up the Compensation for the new hires is also done by the Eligibility rules, Compensation plan, Compensation grade and the Compensation Package. Once the Business Process flows are setup, we can start with our day to day activities and also, the managers can see the reports from their Home Page about all the activities like Performance, Team member details, Profit and Loss of the organization.
  • 3. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 5, May 2015 Copyright to IJIRCEE www.ijircee.com 8 IV.IMPLEMENTATION AND RESULT A: Location Hierarchy and Locations Locations are an attribute associated with a worker in a position, and can also be used for assets. Locations reflect a worker's work location rather than an area of responsibility. Locations can be structured as a hierarchy whereby Location A can be the superior of Location B. Location hierarchies have organizational roles and can include locations for grouping purposes. Location hierarchies can also be structured as a hierarchy whereby Location Hierarchy X can be the superior of Location Hierarchy Y. B: Custom Organization You can use custom organizations to group workers into logical constructs that are not defined by Workday- provided organization types.Use the Maintain Organization Types task to define custom organization types. You can configure a custom organization to be a worktag in financial transactions, and assign a worker to the custom organization in organization assignment so that the custom organization defaults as a worktag into transactions that involve the worker. You can mark up to 10 custom organization types as a financial worktag. In addition to their use in business process routing, worktags can also be used as a dimension in reporting. If a custom organization is configured to be allowed in Change Organization Assignment, then it cannot be assigned via membership or Assign Worker tasks. Image: System architecture C: Organization Roles, Members and Org Assignments Roles enable security control for role-enabled objects, such as Organizations, Service Centers, and Spend Categories. Roles include responsibilities such as Manager, Recruiter, and HR Partner. The Maintain Assignable Roles task identifies the security groups that can assign each role. You can assign a role to any level in a hierarchy. If a role is not assigned directly, the position assigned to the role is inherited from the superior. Workday's model of assigning a role to a position, rather than to a specific worker, considerably simplifies role maintenance in the position management staffing model, as roles do not have to be updated manually every time a worker moves out a position.
  • 4. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 5, May 2015 Copyright to IJIRCEE www.ijircee.com 9 D: Security Group The context type of each security group is determined automatically by the security group type with which it is associated, and can’t be changed. The name of the security group type indicates different types of row-level access to secured items. Example: A user-based security group is automatically unconstrained, but a role-based security group (constrained) is constrained by organization access. Unconstrained: All users in the security group have access to all data instances secured by the security group, similar to having access to all rows in systems based on traditional relational database architecture. Constrained: All users in the security group have contextual access to a subset of data instances (rows) which the security group can access. Users' access to individual instances is governed by either:  Individual Role  Organization Mixed: Users in the security group don't have uniform access to data instances. This applies to these security group types:  Intersection security groups (a subset of 2 or more security groups).  Aggregation security groups (a superset of 2 or more security groups). E: Business Process Setups A business process in Workday is a set of tasks that people initiate, act upon, and complete in order to accomplish a desired business objective. When a business process is initiated, Workday routes the tasks to the responsible roles (users who are capable of completing the tasks based on their membership in security groups) and enforces security and business rules throughout the business process. Any user with the appropriate role can initiate a business process. Once initiated, the business process notifies users in the responsible roles as it processes each step and receives feedback when each step is complete, so it can move on to the next step. All business processes are based on a business process definition; you can't create a business process in Workday without first defining it. Workday's default business processes are delivered definitions and can be customized to meet your needs. You can copy the business process to any supervisory organization and tailor it as necessary, creating different versions of the same business process for different organizations. The business process logic is inherited, so a subordinate organization uses the business process definition of the superior organization unless you specify a custom definition for the subordinate organization. V. CONCLUSION AND FUTURE WORK We have designed the complete enterprise resource planning using a SaaS based Technology Workday. We have addressed the Core HR transactions from Hire to terminate using this SaaS technology. Tailored the Business Process rules, Security and Compensation package as per the requirement. Used this SaaS, as Upgrade will not be a hassle for the client and it will be owned by the Software vendor. We can access the application through mobile from wherever you are. Future Enhancement – We can establish the HCM complete setup for multiple Countries REFERENCES. 1 A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” in Proceedings of Advances in Cryptology - EUROCRYPT ’05, ser. LNCS, vol. 3494. Springer, 2005, pp. 457–473. 2 B. Wang, S. S. M. Chow, M. Li, and H. Li, “Storing Shared Data on the Cloud via Security-Mediator,” in International Conference on Distributed Computing Systems - ICDCS 2013. IEEE, 2013. 3 B. Alomair and R. Poovendran, “Information Theoretically Secure Encryption with Almost Free Authentication,” J. UCS, vol. 15, no. 15, pp. 2937–2956, 2009. 4 C.-K. Chu and W.-G. Tzeng, “Identity-Based Proxy Re-encryption Without Random Oracles,” in Information Security Conference (ISC ’07), ser. LNCS, vol. 4779. Springer, 2007, pp. 189–202.
  • 5. ISSN(Online): 2395-xxxx International Journal of Innovative Research in Computer and Electronics Engineering Vol. 1, Issue 5, May 2015 Copyright to IJIRCEE www.ijircee.com 10 5 C.-K. Chu, J. Weng, S. S. M. Chow, J. Zhou, and R. H. Deng, “Conditional Proxy Broadcast Re-Encryption,” in Australasian Conference on Information Security and Privacy (ACISP ’09), ser. LNCS, vol. 5594. Springer, 2009, pp. 327–342. 6 C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy- Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, vol. 62, no. 2, pp. 362–375, 2013. 7 D. Boneh, X. Boyen, and E.-J. Goh, “Hierarchical Identity Based Encryption with Constant Size Ciphertext,” in Proceedings of Ad- vances in Cryptology - EUROCRYPT ’05, ser. LNCS, vol. 3494. Springer, 2005, pp. 440–456. 8 D. Boneh, R. Canetti, S. Halevi, and J. Katz, “Chosen-Ciphertext Security from Identity-Based Encryption,” SIAM Journal on Com- puting (SIAMCOMP), vol. 36, no. 5, pp. 1301–1328, 2007. 9 D. Naor, M. Naor, and J. Lotspiech, “Revocation and Tracing Schemes for Stateless Receivers,” in Proceedings of Advances in Cryptology - CRYPTO ’01, ser. LNCS. Springer, 2001, pp. 41–62. 10 D. Boneh, C. Gentry, and B. Waters, “Collusion Resistant Broad- cast Encryption with Short Ciphertexts and Private Keys,” in Proceedings of Advances in Cryptology - CRYPTO ’05, ser. LNCS, vol. 3621. Springer, 2005, pp. 258–275. 11 D. Boneh and M. K. Franklin, “Identity-Based Encryption from the Weil Pairing,” in Proceedings of Advances in Cryptology - CRYPTO ’01, ser. LNCS, vol. 2139. Springer, 2001, pp. 213–229. 12 D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and Verifiably Encrypted Signatures from Bilinear Maps,” in Proceedings of Advances in Cryptology - EUROCRYPT ’03, ser. LNCS, vol. 2656. Springer, 2003, pp. 416–432. 13 F. Guo, Y. Mu, and Z. Chen, “Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key,” in Proceedings of Pairing-Based Cryptography (Pairing ’07), ser. LNCS, vol. 4575. Springer, 2007, pp. 392–406. 14 F. Guo, Y. Mu, Z. Chen, and L. Xu, “Multi-Identity Single-Key Decryption without Random Oracles,” in Proceedings of Informa- tion Security and Cryptology (Inscrypt ’07), ser. LNCS, vol. 4990. Springer, 2007, pp. 384–398.