Research Article

Security-as-a-Service from Clouds: A Comprehensive Analysis

by  Deepak H. Sharma, C A Dhote, Manish M. Potey
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Issue 3
Published: April 2013
Authors: Deepak H. Sharma, C A Dhote, Manish M. Potey
10.5120/11374-6642
PDF

Deepak H. Sharma, C A Dhote, Manish M. Potey . Security-as-a-Service from Clouds: A Comprehensive Analysis. International Journal of Computer Applications. 67, 3 (April 2013), 15-18. DOI=10.5120/11374-6642

                        @article{ 10.5120/11374-6642,
                        author  = { Deepak H. Sharma,C A Dhote,Manish M. Potey },
                        title   = { Security-as-a-Service from Clouds: A Comprehensive Analysis },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 67 },
                        number  = { 3 },
                        pages   = { 15-18 },
                        doi     = { 10.5120/11374-6642 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Deepak H. Sharma
                        %A C A Dhote
                        %A Manish M. Potey
                        %T Security-as-a-Service from Clouds: A Comprehensive Analysis%T 
                        %J International Journal of Computer Applications
                        %V 67
                        %N 3
                        %P 15-18
                        %R 10.5120/11374-6642
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In Security-as-a-service model the focus is on security provided as cloud services; i. e. security delivered through the cloud instead of on-premise security solutions. The security-as-a-service model can also enhance functionality of existing on-premise implementations by working as a hybrid solution. The paper provides the comprehensive analysis of security-as-a-service delivery model from various perspectives. The paper addresses various issues regarding security delivered as cloud service. This paper addresses various questions that may arise regarding security-as-a-service viz. definition of security-as-a-service, its need, different security services currently available, different providers of same, different users and likely users of this service, various evaluation criterions for security-as-a-service solutions and implementation methods of such solutions.

References
  • Vaquero, Luis M. , Luis Rodero-Merino, Juan Caceres, Maik Lindner, A Break in the Clouds: Towards a Cloud Definition, ACM SIGCOMM Computer Communication Review, Volume 39, Number 1, January 2009
  • Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2. 1, http://www. cloudsecurityalliance. org/, December 2009.
  • C. Wang, Forrester: A close look at cloud computing security issues. http://www. forrester. com/securityforum2009, 2009
  • Marios D, Dimitrios Katsaros, Pankaj Mehra, Athena Vakali, Cloud Computing: Distributed Internet Computing for IT and Scientific Research, IEEE Internet Computing 2009 IEEE.
  • Rich Maggini, Solari, Cloud Computing is changing how we communicate, IEEE 2009
  • Tim Mather, Subra Kumaraswamy, and Shahed Latif, 2009, Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance, O'Reilly Media, 336.
  • Jianfeng Yang, Zhibin Chen, Cloud Computing Research and Security Issues, IEEE 2010.
  • Tharam Dillon, Chen Wu, Elizabeth Chang, 2010, 24 th IEEE International Conference on Advanced Information Networking and Applications, Cloud Computing: Issues and Challenges
  • Bernd Grobauer, Thomas Schreck, Towards Incident Handling in the Cloud: Challenges and Approaches CCSW'10 ACM 2010
  • Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian, Aoying Zhou, Security and Privacy in Cloud Computing: A Survey, 2010 Sixth International Conference on Semantics, Knowledge and Grids IEEE 2010
  • Shuai Zhang, Shufen Zhang, Xuebin Chen, Xiuzhen Huo, Cloud Computing Research and Development Trend, 2010 Second International Conference on Future Networks, IEEE 2010
  • Kresimir Popovic, Zeljko Hocenski, Cloud Computing security issues and Chanllenges, MIPRO 2010
  • Security-as-a-service white papers from isheriff. Web page http://www. isheriff. com
  • Websense white paper, Seven Criteria for Evaluating Security-as-a- Service Solutions, 2010
  • Osterman Research whitepaper, The Advantages of a Hosted Security Model, July 2009
  • Cloud Security Alliance, Secaas Defined categories of service 2011
  • Forrester Research, Inc. , Saas Valuation Criteria, 2010
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cloud Computing Security issues Hosted Security model

Powered by PhDFocusTM