{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:09:33Z","timestamp":1757542173377,"version":"3.40.5"},"reference-count":21,"publisher":"IGI Global","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,22]]},"abstract":"<p>At the enterprise level, cloud software as a service (SaaS) is in high demand. As software as a service (SaaS) can be easily provided in a multitenant way, its execution assessment, information inactivity, and authorization are critical issues related to the cloud supplier at the time of providing administrations to sellers. Netflix is a mixed media supplier that gives online streaming from a library of movies and TV arrangement. Netflix services are exclusively based on cloud SaaS. The highlight of the study is to analyze the finest hones over secure cloud environment in authorization perspective based on behavioral biometrics. A conceptual authorization is displayed in this paper to secure cloud services, especially SaaS, when unauthorized access is supported by legitimate users. The use case is taken as Netflix.<\/p>","DOI":"10.4018\/ijdst.307903","type":"journal-article","created":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T21:28:42Z","timestamp":1663882122000},"page":"1-13","source":"Crossref","is-referenced-by-count":1,"title":["Authorization Model for Securing Cloud SaaS Services (Netflix)"],"prefix":"10.4018","volume":"13","author":[{"given":"Tanveer","family":"Ahmad","sequence":"first","affiliation":[{"name":"Amity University Uttar Pradesh, Lucknow Campus, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3348-9888","authenticated-orcid":true,"given":"Rajiv","family":"Pandey","sequence":"additional","affiliation":[{"name":"Amity University Uttar Pradesh, Lucknow Campus, India"}]},{"given":"Mohammad","family":"Faisal","sequence":"additional","affiliation":[{"name":"Integral University Uttar Pradesh, Lucknow, India"}]}],"member":"2432","reference":[{"issue":"2320","key":"IJDST.307903-0","first-page":"3714","article-title":"Analyzing authentication and authorization schemes to secure Cloud Services in Multitenancy Environment","volume":"22","year":"2020","journal-title":"Airo International Research Journal"},{"key":"IJDST.307903-1","unstructured":"Ahmad. (2021). Authorizing SAAS cloud services in multi-tenancy environment. ICIC International, 15(1)."},{"key":"IJDST.307903-2","unstructured":"Alsaasi, I. M. (2021). Study On Most Popular behavioral biometrics advantages, disadvantages and recent applications: A review. International Journal of Scientific & Technology Research, 10(1)."},{"key":"IJDST.307903-3"},{"key":"IJDST.307903-4","unstructured":"Barabanov, A. (n.d.). Authentication and authorization in microservice-based systems: Survey of architecture patterns. https:\/\/arxiv.org\/ftp\/arxiv\/papers\/2009\/2009.02114.pdf"},{"key":"IJDST.307903-5","unstructured":"Chandra, Challa, & Pasupuletti. (2019). Authentication and Authorization Mechanism for Cloud Security. International Journal of Engineering and Advanced Technology, 8(6)."},{"key":"IJDST.307903-6"},{"key":"IJDST.307903-7"},{"key":"IJDST.307903-8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2020.05.005"},{"key":"IJDST.307903-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.08.008"},{"key":"IJDST.307903-10","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359828"},{"key":"IJDST.307903-11","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2016.047"},{"key":"IJDST.307903-12"},{"key":"IJDST.307903-13","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2010001"},{"key":"IJDST.307903-14","doi-asserted-by":"publisher","DOI":"10.5120\/2877-3744"},{"key":"IJDST.307903-15","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05245-4"},{"key":"IJDST.307903-16","unstructured":"Pause & Haritha. (2014). Multi Factor Authentication in Cloud Computing for Data storage Security. International Journal of Advanced Research in Computer Science and Engineering, 4(8), 14-18."},{"key":"IJDST.307903-17","unstructured":"Preet, H. (2013). Leveraging the Revolutionary Paradigm of Cloud Computing: The Case of Netflix. Mumukshu Journal of Humanities Referred Journal, 5(1)."},{"key":"IJDST.307903-18","unstructured":"Sheetal. (2020). Determining the factors influencing customer engagement while using the subscription-based media streaming service providers (OTT Platforms): Netflix vs Amazon Prime. JETIR, 7(6)."},{"key":"IJDST.307903-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.11.008"},{"key":"IJDST.307903-20","doi-asserted-by":"crossref","unstructured":"Wang, Z., Sun, D., Xue, G., Qian, S., Li, G., & Li, M. (2018). Ada-things: An adaptive virtual machine monitoring and migration strategy for internet of things applications. J. Parallel Distrib. Comput. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0743731518304404","DOI":"10.1016\/j.jpdc.2018.06.009"}],"container-title":["International Journal of Distributed Systems and Technologies"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=307903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T00:56:28Z","timestamp":1673916988000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDST.307903"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2022,9,22]]},"references-count":21,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdst.307903","relation":{},"ISSN":["1947-3532","1947-3540"],"issn-type":[{"type":"print","value":"1947-3532"},{"type":"electronic","value":"1947-3540"}],"subject":[],"published":{"date-parts":[[2022,9,22]]}}}