Analisis Trade-Off Arsitektur Multi-Tenant Sebagai Dasar Justifikasi Strategi Basis Data SaaS
Abstract
Designing a database architecture within a multi-tenant software as a service environment brings forth strategic challenges related to balancing cost efficiency, data separation, and scalability. The aim of this study is to provide a foundational framework for such systems by analyzing the trade-offs among three distinct database architecture models. By employing a case study that involves the deployment of a web-based system, the descriptive qualitative methodology utilizes data collection techniques such as document reviews, system observations, and artifact analyses. The evaluation results indicate that no single model stands out as the best, as each one presents its own set of competing advantages and disadvantages. The innovation in this research lies in the creation of a conceptual compromise model intended to enhance decision-making in database design. The choice of approach should be tailored to meet the specific requirements of the system and its operational context.
Keywords: SaaS; Multi-tenant; Trade-off analysis; Database architecture; Shared schema.
Abstrak
Merancang arsitektur basis data dalam lingkungan perangkat lunak sebagai layanan multi-tenant menghadirkan tantangan strategis terkait dengan keseimbangan antara efisiensi biaya, pemisahan data, dan skalabilitas. Tujuan dari penelitian ini adalah untuk menyediakan suatu rencana dasar untuk sistem tersebut dengan membandingkan pertukaran di antara tiga jenis arsitektur basis data yang berbeda. Dengan menggunakan studi kasus yang melibatkan penyebaran sistem berbasis web, metodologi kualitatif deskriptif menerapkan teknik pengumpulan data yang mencakup tinjauan dokumen, pengamatan sistem, dan analisis artefak. Hasil evaluasi menunjukkan bahwa tidak ada satu model yang benar-benar menonjol karena masing-masing memiliki kelebihan dan kekurangan yang saling bertentangan. Inovasi dalam penelitian ini terletak pada pengembangan model kompromi konseptual yang bertujuan untuk meningkatkan pengambilan keputusan dalam desain basis data. Pemilihan pendekatan harus disesuaikan dengan kebutuhan spesifik dari sistem dan lingkungan kerjanya.
Kata kunci: Perangkat lunak sebagai layanan; Multi-tenant; Analisis trade-off; Arsitektur basis data; Skema basis data
References
N. T. Muhammed, “Growth Performance of Eucalyptus Microtheca Seedlings in Response to Different Levels of Organic and Inorganic Fertilizer,” Qalaai Zanist Sci. J., vol. 7, no. 2, pp. 1135–1153, 2022, doi: 10.25212/lfu.qzj.7.2.44.
R. K. R. Kumar, “Multi-Tenant SaaS Architectures: Design Principles and Security Considerations,” J. Softw. Eng. Simul., vol. 6, no. 5, pp. 28–41, 2020, doi: 10.35629/3795-06052841.
O.C. Adeusi, Y.O. Adebayo, P.A. Ayodele, T.T. Onikoyi, K.B. Adebayo, and I.O. Adenekan, “IT standardization in cloud computing: Security challenges, benefits, and future directions,” World J. Adv. Res. Rev., vol. 22, no. 3, pp. 2050–2057, 2024, doi: 10.30574/wjarr.2024.22.3.1982.
S. K. Pippal, S. Kumar, and R. Rani, “Optimizing multi-tenant database architecture for efficient software as a service delivery,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 22, no. 5, pp. 1128–1137, 2024, doi: 10.12928/TELKOMNIKA.v22i5.26385.
S. Nugraha and D. W. Chandra, “Peningkatan Keamanan Database Pada Layanan Azure Melalui Metode Multi-Tenant Dengan Pendekatan Separate Database,” J. Pendidik. dan Teknol. Indones., vol. 3, no. 6, pp. 233–240, 2023, doi: 10.52436/1.jpti.293.
S. S. Boda, “A Structured Review of SaaS Security Architecture: Challenges, Models, and Research Gaps,” IJIRCT2506031 Int. J. Innov. Res. Creat. Technol., vol. 11, no. 3, p. 1, 2025, [Online]. Available: https://www.researchgate.net/publication/395767792
A. Krishna, “Systematic Literature Review of Software as a Service [SaaS] in view of Security and Multitenancy,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 9, no. 9, pp. 1742–1751, 2021, doi: 10.22214/ijraset.2021.38205.
A. D. Alexander, “Studi Perbandingan Model Keamanan Data pada Cloud Computing,” vol. 6, no. 2, pp. 105–114, 2026.
V. Singhania, “A Review of Cloud-Based Data Security Protocols,” vol. 2, no. 6, pp. 1–5, 2024.
S. Chippagiri, “A Study of Cloud Security Frameworks for Safeguarding Multi-Tenant Cloud Architectures,” Int. J. Comput. Appl., vol. 186, no. 60, pp. 50–57, 2025, doi: 10.5120/ijca2025924369.
R.K. Sharma, “Multi-Tenant Architectures in Modern Cloud Computing: A Technical Deep Dive,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 11, no. 1, pp. 307–317, 2025, doi: 10.32628/cseit25111236.
A. Rapaka, “Multi-Tenant System Design for Platform Scalability: Architectural Patterns and Implementation Strategies for Modern Cloud-Native Applications,” J. Inf. Syst. Eng. Manag., vol. 10, no. 63s, pp. 314–324, 2025, doi: 10.52783/jisem.v10i63s.13863.
V. Muniyandi, “Multi-Tenant SaaS Performance Isolation Using Container-Based Resource Sandboxing,” SSRN Electron. J., vol. 30, no. 2, pp. 677–695, 2025, doi: 10.2139/ssrn.5363393.
M. Pande, S. Patil, and P. Student, “Designing a Framework for Detection and Capturing of Network attacks in Cloud Computing: a Literature Review,” Int. J. Innov. Res. Sci. Eng. Technol. (An ISO, vol. 3297, pp. 4172–4178, 2007, doi: 10.15680/IJIRSET.2015.0406072.
A. Shah and N. Bhatt, “A systematic review of in-memory database over multi-tenancy,” Int. J. Electr. Comput. Eng., vol. 14, no. 2, pp. 1720–1729, 2024, doi: 10.11591/ijece.v14i2.pp1720-1729.
How To Cite This :
Refbacks
- There are currently no refbacks.









