CFP last date
20 May 2024
Reseach Article

Security-as-a-Service from Clouds: A Comprehensive Analysis

by Deepak H. Sharma, C A Dhote, Manish M. Potey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 3
Year of Publication: 2013
Authors: Deepak H. Sharma, C A Dhote, Manish M. Potey
10.5120/11374-6642

Deepak H. Sharma, C A Dhote, Manish M. Potey . Security-as-a-Service from Clouds: A Comprehensive Analysis. International Journal of Computer Applications. 67, 3 ( April 2013), 15-18. DOI=10.5120/11374-6642

@article{ 10.5120/11374-6642,
author = { Deepak H. Sharma, C A Dhote, Manish M. Potey },
title = { Security-as-a-Service from Clouds: A Comprehensive Analysis },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 3 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 15-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number3/11374-6642/ },
doi = { 10.5120/11374-6642 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:23:41.524111+05:30
%A Deepak H. Sharma
%A C A Dhote
%A Manish M. Potey
%T Security-as-a-Service from Clouds: A Comprehensive Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 3
%P 15-18
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In Security-as-a-service model the focus is on security provided as cloud services; i. e. security delivered through the cloud instead of on-premise security solutions. The security-as-a-service model can also enhance functionality of existing on-premise implementations by working as a hybrid solution. The paper provides the comprehensive analysis of security-as-a-service delivery model from various perspectives. The paper addresses various issues regarding security delivered as cloud service. This paper addresses various questions that may arise regarding security-as-a-service viz. definition of security-as-a-service, its need, different security services currently available, different providers of same, different users and likely users of this service, various evaluation criterions for security-as-a-service solutions and implementation methods of such solutions.

References
  1. Vaquero, Luis M. , Luis Rodero-Merino, Juan Caceres, Maik Lindner, A Break in the Clouds: Towards a Cloud Definition, ACM SIGCOMM Computer Communication Review, Volume 39, Number 1, January 2009
  2. Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2. 1, http://www. cloudsecurityalliance. org/, December 2009.
  3. C. Wang, Forrester: A close look at cloud computing security issues. http://www. forrester. com/securityforum2009, 2009
  4. Marios D, Dimitrios Katsaros, Pankaj Mehra, Athena Vakali, Cloud Computing: Distributed Internet Computing for IT and Scientific Research, IEEE Internet Computing 2009 IEEE.
  5. Rich Maggini, Solari, Cloud Computing is changing how we communicate, IEEE 2009
  6. Tim Mather, Subra Kumaraswamy, and Shahed Latif, 2009, Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance, O'Reilly Media, 336.
  7. Jianfeng Yang, Zhibin Chen, Cloud Computing Research and Security Issues, IEEE 2010.
  8. Tharam Dillon, Chen Wu, Elizabeth Chang, 2010, 24 th IEEE International Conference on Advanced Information Networking and Applications, Cloud Computing: Issues and Challenges
  9. Bernd Grobauer, Thomas Schreck, Towards Incident Handling in the Cloud: Challenges and Approaches CCSW'10 ACM 2010
  10. Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian, Aoying Zhou, Security and Privacy in Cloud Computing: A Survey, 2010 Sixth International Conference on Semantics, Knowledge and Grids IEEE 2010
  11. Shuai Zhang, Shufen Zhang, Xuebin Chen, Xiuzhen Huo, Cloud Computing Research and Development Trend, 2010 Second International Conference on Future Networks, IEEE 2010
  12. Kresimir Popovic, Zeljko Hocenski, Cloud Computing security issues and Chanllenges, MIPRO 2010
  13. Security-as-a-service white papers from isheriff. Web page http://www. isheriff. com
  14. Websense white paper, Seven Criteria for Evaluating Security-as-a- Service Solutions, 2010
  15. Osterman Research whitepaper, The Advantages of a Hosted Security Model, July 2009
  16. Cloud Security Alliance, Secaas Defined categories of service 2011
  17. Forrester Research, Inc. , Saas Valuation Criteria, 2010
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security issues Hosted Security model