title,doi,url,abstract,journal,publication_year,pmid,arxiv Cloud Computing and SaaS (ERP) Implementation, https://doi.org/10.32628/IJSRCSEIT, https://ijsrcseit.com/CSEIT1831163, During the last two decades the use of Internet has been changing every domain of technology. It has also led to the tremendous development and implementation of cloud computing from the last few years. But the shared nature of data in the cloud makes it prone to security attacks. Different security techniques should be implemented to prevent security breaches. Authentication is one such technique which plays a major role in Cloud Computing security. Various possible security attacks on the Cloud Service Providers (CSP) are prevented by applying different authentication mechanisms which verifies a user’s identity when a user demands services from cloud servers. There are multiple authentication technologies for verifying the identity of a user before granting access to resources. In this paper we have discussed services provided by cloud and its brief analysis. Our mainly focus is on SaaS service which includes security issues and its solutions. We have mentioned various security prevention techniques which need to be considered when we want to implement SaaS., International Journal of Scientific Research in Computer Science Engineering and Information Technology, 2018, CSEIT1831163