Literature Survey on Cyber Attacks on
SaaS Occupants
Smitha GV, Research Scholar, VTU
Email: [Your Email Here]
Abstract
With the growing adoption of Software as a Service (SaaS) in cloud computing, the security concerns
surrounding cyber attacks on SaaS occupants have become a critical area of research. This paper presents a
comprehensive literature survey of recent studies focusing on various cyber threats targeting SaaS
environments. Key attack vectors, mitigation strategies, and research gaps are identified. The paper also
includes an analysis of trends in cyber attacks, offering insights into future directions for enhancing SaaS
security.
Keywords
SaaS, Cyber Attacks, Cloud Security, Multi-tenancy, Threat Analysis
I. Introduction
Software as a Service (SaaS) is one of the most prominent service models in cloud computing, allowing
users to access software applications over the internet without managing the underlying infrastructure.
However, its multi-tenant architecture makes it susceptible to a variety of cyber threats. This paper explores
the current landscape of cyber attacks on SaaS platforms by conducting a detailed literature review.
II. Literature Survey
Multiple studies have examined security challenges in SaaS environments. For instance, Subashini and
Kavitha (2011) identified data breaches and service hijacking as key concerns. Takabi et al. (2010)
highlighted the necessity of identity management in multi-tenant platforms. Further, Jansen (2011)
emphasized access control and confidentiality in SaaS applications. More recent research by Zhang et al.
(2022) and Singh et al. (2023) explored AI-based threat detection and real-time monitoring as proactive
security strategies.
III. Analysis of Cyber Attacks on SaaS
A comparative analysis reveals that most cyber attacks exploit vulnerabilities in authentication mechanisms
and data isolation. Table 1 summarizes the types of attacks reported in literature along with their impacts
and defensive mechanisms. A notable trend is the increasing use of AI and machine learning in detecting
anomalies and mitigating threats in real time.
IV. Conclusion
The literature reveals that SaaS platforms continue to face numerous cyber threats, particularly due to their
shared infrastructure. While many mitigation techniques have been proposed, continuous advancements in
attack strategies necessitate robust, adaptive, and intelligent security solutions. Future work will focus on
predictive analytics and decentralized security mechanisms.
References
[1] Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud
computing. Journal of Network and Computer Applications.
[2] Takabi, H., Joshi, J. B. D., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing
environments. IEEE Security & Privacy.
[3] Jansen, W. (2011). Cloud hooks: Security and privacy issues in cloud computing. 44th Hawaii
International Conference on System Sciences.
[4] Zhang, L., Chen, Y., & Li, J. (2022). AI-driven security for SaaS: A survey. International Journal of
Cloud Computing.
[5] Singh, R., & Gupta, A. (2023). Real-time monitoring for SaaS security. ACM Computing Surveys.