Security in Enterprise Resource Planning solution


  • Udita Malhotra Department of Computer Science and Engineering, Guru Jambheshwar University of Science & Technology, Hisar-Haryana
  • Ritu Department of Computer Science and Engineering, Guru Jambheshwar University of Science & Technology, Hisar-Haryana
  • Amandeep Department of Computer Science and Engineering, Guru Jambheshwar University of Science & Technology, Hisar-Haryana


ERP, Security, Role, Duty, Privilege


There is a need to propose an extensible framework to define and restrict access to the data and system by using security. As all the company's sensitive data is stored in an Enterprise Resource Planning (ERP) solution, therefore, ERP security is a pressing concern and needs to be paid attention to. There can be various dangerous repercussions if the company's data treasure is compromised with security. ERP security is very important to protect an organization's financial details and reputation. The backbone of any organization can be considered as ERP. Indeed, ERP systems are highly susceptible to security threats, given their central role as a prime target for those seeking to commit crimes involving sensitive data. In this research, security implementation has been considered for the AX portal. The proposed work has been implemented in two phases. In the first phase, limited access to the system has been considered by allowing users to access specific modules. In the second phase, the limited access to data has been considered by allowing users to access user-specific data.


Download data is not yet available.


Malhotra, U. ., Ritu, & Amandeep. (2023). Secure and Compatible Integration of Cloud-Based ERP Solution: A Review. International Journal of Intelligent Systems and Applications in Engineering, 11(9s), 695–707.

Udita Malhotra, Ritu, & Amandeep. (2023). Secure and Compatible Integration of Cloud-Based ERP Solution. Journal of Army Engineering University of PLA, Vol. 23 Issue 1, 183-189.

Udita Malhotra & Ritu. (2023). Incorporating E-invoincing in Cloud-based

ERP Solution. 8th International Conference on Research Developments in Applied Science, Engineering and Management (AEM-2023), 334-341.

Faccia, Alessio, and Pythagoras Petratos. (2021). Blockchain, Enterprise Resource Planning (ERP) and Accounting Information Systems (AIS): Research on e-Procurement and System Integration Applied Sciences 11, no. 15: 6792.

J. Shree, N. R. Kanimozhi, G. A. Dhanush, A. Haridas, A. Sravani and P. Kumar, (2020) To Design Smart and Secure Purchasing System integrated with ERP using Blockchain technology IEEE 5th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 2020, pp. 146-150

Mahmood F., Khan, A.Z. and Bokhari, R.H. (2020). ERP issues and challenges: a research synthesis, Kybernetes, Vol. 49 No. 3, pp. 629-659

Ahn, Byungchan, and Hyunchul Ahn. (2020). Factors Affecting Intention to Adopt CloudBased ERP from a Comprehensive Approach Sustainability 12, no. 16: 6426.

Baraa K. Muslmani, Saif Kazakzeh, Eyad Ayoubi, and Shadi Aljawarneh (2018) Reducing integration complexity of cloud-based ERP systems Proceedings of the First International Conference on Data Science, E-learning and Information Systems (DATA '18). Association for Computing Machinery, New York, USA, Article 37, 1–6.

Radoslav Hrischev (2020) ERP systems and data security Materials Science and Engineering, 9TH INTERNATIONAL SCIENTIFIC CONFERENCE

Salih, Sayeed, Mosab Hamdan, Abdelzahir Abdelmaboud, Ahmed Abdelaziz, Samah Abdelsalam, Maha M. Althobaiti, Omar Cheikhrouhou, Habib Hamam, and Faiz Alotaibi.2021. Prioritising Organisational Factors Impacting Cloud ERP Adoption and the Critical Issues Related to Security, Usability, and Vendors: A Systematic Literature Review Sensors 21, no. 24: 8391.

Mutuku Kaunda Morrisson,(2020). Best Practice Models for Enterprise Resource Planning Implementation and Security Challenges. Journal of Business and Management Sciences, vol. 8, no. 2: 55-60.

Kuyoro, S. O., Ibikunle, F., &Awodele, O. (2011), Cloud computing security issues and challenges, International Journal of Computer Networks (IJCN), Vol. 3 Issue 5, 247-255.

Gnatyuk, S., Kishchenko, V., Tolbatov, A., &Sotnichenko, Y. (2020), SECURE CLOUD COMPUTING INFORMATION SYSTEM FOR CRITICAL APPLICATIONS, Scientific and practical cyber security journal.

Mandal, S., & Khan, D. A. (2020). A Study of Security Threats in Cloud: Passive Impact of COVID-19 Pandemic. International Conference on Smart Electronics and Communication (ICOSEC) (pp. 837-842). IEEE.

Kumaraswamy, S., Latif, S., Mather, T. (2009), Chapter 7: Privacy, pp. 145, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (1st edition), O'Reilly Media.

Yee, G., Pearson, S. (2013), Chapter 1: Privacy, Security & Trust in Cloud Computing, pp. 3, Privacy and Security for Cloud Computing, Springer London.

Menon, G. (2013), Regulatory issues in cloud computing—an Indian perspective, J EngComput Applied Sciences, 2(7), 18-22.

Nayak, D., & Huawei, B. (2012), Understanding the security, privacy and trust challenges of cloud computing, Journal of Cyber Security and Mobility, 1(2), 277-288.

Srivastava, N. (2018), MeghRaj A Cloud Environment for e-governance in India, International Journal of Computer Sciences and Engineering, 6, 759-763.

U.S. Department of Justice-White Paper, (2019). The Purpose and Impact of the CLOUD Act Promoting Public Safety, Privacy, and the Rule of Law Around the World.

S. Chouhan (2019), GI Cloud-MEGHRAJ-key pillar of e-governance system in India, Advance and Innovative Research, Volume 6, Issue 1, pp 348 - 352

PRABHU, C. (2013), Appendix 3: Eucalypts Cloud to Remotely Provision e-Governance 26 Applications, pp. 254, E-GOVERNANCE: CONCEPTS AND CASE STUDIES (Second Edition), PHI Learning.

Edoardo Celeste and Federico Fabbrini, Chapter 3, Competing Jurisdictions: Data Privacy Across the Borders, Data Privacy and Trust in Cloud Computing, Palgrave Macmillan (ISSN 2662-1282)

Mr. Dharmesh Dhabliya, Ms. Ritika Dhabalia. (2014). Object Detection and Sorting using IoT. International Journal of New Practices in Management and Engineering, 3(04), 01 - 04. Retrieved from

Pise, D. P. . (2021). Bot Net Detection for Social Media Using Segmentation with Classification Using Deep Learning Architecture. Research Journal of Computer Systems and Engineering, 2(1), 11:15. Retrieved from




How to Cite

Malhotra, U. ., Ritu, R., & Amandeep, A. (2023). Security in Enterprise Resource Planning solution. International Journal of Intelligent Systems and Applications in Engineering, 12(4s), 702–709. Retrieved from



Research Article