Cloud Testing


Cloud Testing Overview

Internet-based per-use service models are bringing about radical changes in software development.  Not only does cloud computing bring new business opportunities; it also causes some major impacts on software testing and maintenance. Vmoksha provides testing and quality assurance activities on  applications deployed in cloud by leveraging cloud technologies and solutions. Our services assure quality of applications deployed in cloud, covering their functional services, business processes, security and system performance, as well as scalability based on a set of requirements for an application in cloud.


Vmoksha provides the following cloud testing services:

Functional testing of cloud based applications

Apart from the verification and validation of the application’s business functionality, cloud based applications need testing of the following critical aspects that are unique to cloud applications that can cause serious legal and financial implications if not thoroughly tested.

  • Multi-tenancy testing
  • Billing and metering.
Cloud performance testing

Performance testing, monitoring, and tuning of cloud are the key buzzwords nowadays. We provide expertise and use cloud based SaaS (Software-as-a-Service) performance test tools that analyze and monitor all aspects of the web infrastructure to identify current and potential performance issues. Our cloud performance testing includes:

  • Load testing
  • Stress testing
Cloud security testing

Security is of paramount importance in cloud based applications. Data from one organization should not be visible to another organization. Apart from this, data visibility should be controlled based on the user’s role in the organization. Implementing security in SaaS models is a challenge, especially when the database is shared by more than one subscriber.

Vmoksha’s cloud security testing comprises of validating the top ten OWASP threats, determining risks and severity. Some of the key areas we cover include:

  • Identity Management-Authorization
  • Identity Management-Authentication
  • Identity Management-Access Control
  • SQL injection
  • Cross-site scripting
  • Broken authentication and session management
  • Load balancing