Security in Enterprise Resource Planning solution
Keywords:ERP, Security, Role, Duty, Privilege
There is a need to propose an extensible framework to define and restrict access to the data and system by using security. As all the company's sensitive data is stored in an Enterprise Resource Planning (ERP) solution, therefore, ERP security is a pressing concern and needs to be paid attention to. There can be various dangerous repercussions if the company's data treasure is compromised with security. ERP security is very important to protect an organization's financial details and reputation. The backbone of any organization can be considered as ERP. Indeed, ERP systems are highly susceptible to security threats, given their central role as a prime target for those seeking to commit crimes involving sensitive data. In this research, security implementation has been considered for the AX portal. The proposed work has been implemented in two phases. In the first phase, limited access to the system has been considered by allowing users to access specific modules. In the second phase, the limited access to data has been considered by allowing users to access user-specific data.
Malhotra, U. ., Ritu, & Amandeep. (2023). Secure and Compatible Integration of Cloud-Based ERP Solution: A Review. International Journal of Intelligent Systems and Applications in Engineering, 11(9s), 695–707.
Udita Malhotra, Ritu, & Amandeep. (2023). Secure and Compatible Integration of Cloud-Based ERP Solution. Journal of Army Engineering University of PLA, Vol. 23 Issue 1, 183-189.
Udita Malhotra & Ritu. (2023). Incorporating E-invoincing in Cloud-based
ERP Solution. 8th International Conference on Research Developments in Applied Science, Engineering and Management (AEM-2023), 334-341.
Faccia, Alessio, and Pythagoras Petratos. (2021). Blockchain, Enterprise Resource Planning (ERP) and Accounting Information Systems (AIS): Research on e-Procurement and System Integration Applied Sciences 11, no. 15: 6792.
J. Shree, N. R. Kanimozhi, G. A. Dhanush, A. Haridas, A. Sravani and P. Kumar, (2020) To Design Smart and Secure Purchasing System integrated with ERP using Blockchain technology IEEE 5th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 2020, pp. 146-150
Mahmood F., Khan, A.Z. and Bokhari, R.H. (2020). ERP issues and challenges: a research synthesis, Kybernetes, Vol. 49 No. 3, pp. 629-659
Ahn, Byungchan, and Hyunchul Ahn. (2020). Factors Affecting Intention to Adopt CloudBased ERP from a Comprehensive Approach Sustainability 12, no. 16: 6426.
Baraa K. Muslmani, Saif Kazakzeh, Eyad Ayoubi, and Shadi Aljawarneh (2018) Reducing integration complexity of cloud-based ERP systems Proceedings of the First International Conference on Data Science, E-learning and Information Systems (DATA '18). Association for Computing Machinery, New York, USA, Article 37, 1–6.
Radoslav Hrischev (2020) ERP systems and data security Materials Science and Engineering, 9TH INTERNATIONAL SCIENTIFIC CONFERENCE
Salih, Sayeed, Mosab Hamdan, Abdelzahir Abdelmaboud, Ahmed Abdelaziz, Samah Abdelsalam, Maha M. Althobaiti, Omar Cheikhrouhou, Habib Hamam, and Faiz Alotaibi.2021. Prioritising Organisational Factors Impacting Cloud ERP Adoption and the Critical Issues Related to Security, Usability, and Vendors: A Systematic Literature Review Sensors 21, no. 24: 8391.
Mutuku Kaunda Morrisson,(2020). Best Practice Models for Enterprise Resource Planning Implementation and Security Challenges. Journal of Business and Management Sciences, vol. 8, no. 2: 55-60.
Kuyoro, S. O., Ibikunle, F., &Awodele, O. (2011), Cloud computing security issues and challenges, International Journal of Computer Networks (IJCN), Vol. 3 Issue 5, 247-255.
Gnatyuk, S., Kishchenko, V., Tolbatov, A., &Sotnichenko, Y. (2020), SECURE CLOUD COMPUTING INFORMATION SYSTEM FOR CRITICAL APPLICATIONS, Scientific and practical cyber security journal.
Mandal, S., & Khan, D. A. (2020). A Study of Security Threats in Cloud: Passive Impact of COVID-19 Pandemic. International Conference on Smart Electronics and Communication (ICOSEC) (pp. 837-842). IEEE.
Kumaraswamy, S., Latif, S., Mather, T. (2009), Chapter 7: Privacy, pp. 145, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (1st edition), O'Reilly Media.
Yee, G., Pearson, S. (2013), Chapter 1: Privacy, Security & Trust in Cloud Computing, pp. 3, Privacy and Security for Cloud Computing, Springer London.
Menon, G. (2013), Regulatory issues in cloud computing—an Indian perspective, J EngComput Applied Sciences, 2(7), 18-22.
Nayak, D., & Huawei, B. (2012), Understanding the security, privacy and trust challenges of cloud computing, Journal of Cyber Security and Mobility, 1(2), 277-288.
Srivastava, N. (2018), MeghRaj A Cloud Environment for e-governance in India, International Journal of Computer Sciences and Engineering, 6, 759-763.
U.S. Department of Justice-White Paper, (2019). The Purpose and Impact of the CLOUD Act Promoting Public Safety, Privacy, and the Rule of Law Around the World.
S. Chouhan (2019), GI Cloud-MEGHRAJ-key pillar of e-governance system in India, Advance and Innovative Research, Volume 6, Issue 1, pp 348 - 352
PRABHU, C. (2013), Appendix 3: Eucalypts Cloud to Remotely Provision e-Governance 26 Applications, pp. 254, E-GOVERNANCE: CONCEPTS AND CASE STUDIES (Second Edition), PHI Learning.
Edoardo Celeste and Federico Fabbrini, Chapter 3, Competing Jurisdictions: Data Privacy Across the Borders, Data Privacy and Trust in Cloud Computing, Palgrave Macmillan (ISSN 2662-1282)
Mr. Dharmesh Dhabliya, Ms. Ritika Dhabalia. (2014). Object Detection and Sorting using IoT. International Journal of New Practices in Management and Engineering, 3(04), 01 - 04. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/31
Pise, D. P. . (2021). Bot Net Detection for Social Media Using Segmentation with Classification Using Deep Learning Architecture. Research Journal of Computer Systems and Engineering, 2(1), 11:15. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/13
How to Cite
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.