scispace - formally typeset
Search or ask a question
Topic

Security as a service

About: Security as a service is a research topic. Over the lifetime, 197 publications have been published within this topic receiving 2516 citations. The topic is also known as: SECaaS.


Papers
More filters
Journal ArticleDOI
27 Apr 2019-Sensors
TL;DR: An intelligent intrusion-detection system tailored to the IoT environment is developed that uses a deep-learning algorithm to detect malicious traffic in IoT networks and facilitates interoperability between various network communication protocols used in IoT.
Abstract: Cyber-attacks on the Internet of Things (IoT) are growing at an alarming rate as devices, applications, and communication networks are becoming increasingly connected and integrated. When attacks on IoT networks go undetected for longer periods, it affects availability of critical systems for end users, increases the number of data breaches and identity theft, drives up the costs and impacts the revenue. It is imperative to detect attacks on IoT systems in near real time to provide effective security and defense. In this paper, we develop an intelligent intrusion-detection system tailored to the IoT environment. Specifically, we use a deep-learning algorithm to detect malicious traffic in IoT networks. The detection solution provides security as a service and facilitates interoperability between various network communication protocols used in IoT. We evaluate our proposed detection framework using both real-network traces for providing a proof of concept, and using simulation for providing evidence of its scalability. Our experimental results confirm that the proposed intrusion-detection system can detect real-world intrusions effectively.

183 citations

Proceedings ArticleDOI
27 Jun 2015
TL;DR: The vast stream of the state of the art in Everything as a Service (XaaS) is investigated and an integrated view of XaaS is explored to help propose approaches for migrating applications to the cloud and exposing them as services.
Abstract: For several years now, scientists have been proposing numerous models for defining anything "as a service (aaS)", including discussions of products, processes, data a information management, and security as a service. In this paper, based on a thorough literature survey, we investigate the vast stream of the state of the art in Everything as a Service (XaaS). We then use this investigation to explore an integrated view of XaaS that will help propose approaches for migrating applications to the cloud and exposing them as services.

167 citations

Book
21 Apr 2011
TL;DR: This book details the strengths and weaknesses of securing your company's information with different cloud approaches, and offers a clear and concise framework to secure your business' assets while making the most of this new technology.
Abstract: As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, consideringalternate approaches such as private vs. public clouds, SaaS vs. IaaS,and loss of control and lack of trustDiscusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recoveryDetails the benefits of moving to the cloud-solving for limited availability of space, power and storage

149 citations

Journal ArticleDOI
TL;DR: A security architecture that provides a flexible security as a service model that a cloud provider can offer as part of its infrastructure to its customers (tenants) to counteract these attacks.
Abstract: Cloud computing is becoming increasingly important for provision of services and storage of data in the Internet. However there are several significant challenges in securing cloud infrastructures from different types of attacks. The focus of this paper is on the security services that a cloud provider can offer as part of its infrastructure to its customers (tenants) to counteract these attacks. Our main contribution is a security architecture that provides a flexible security as a service model that a cloud provider can offer to its tenants and customers of its tenants. Our security as a service model while offering a baseline security to the provider to protect its own cloud infrastructure also provides flexibility to tenants to have additional security functionalities that suit their security requirements. The paper describes the design of the security architecture and discusses how different types of attacks are counteracted by the proposed architecture. We have implemented the security architecture and the paper discusses analysis and performance evaluation results.

147 citations

Proceedings ArticleDOI
30 Nov 2010
TL;DR: A cloud computing framework to relieve mobile devices from executing heavier multimedia and security algorithms in delivering mobile health services is described, which intends to provide multimedia sensor signal processing & security as a service to mobile devices.
Abstract: Mobile devices are being considered as service platforms for mobile health information delivery, access and communication. However mobiles face challenges with regard to delivering secure multimedia based health services due to limitations in computation and power supply. Since mobile devices have limited computational capacity and run on small batteries, they are unable to run heavy multimedia & security algorithms. In this paper a cloud computing framework to relieve mobile devices from executing heavier multimedia and security algorithms in delivering mobile health services is described. The proposed framework uses a Cloud Computing protocol management model which intends to provide multimedia sensor signal processing & security as a service to mobile devices. Our approach suggests that multimedia and security operations can be performed in the cloud, allowing mobile health service providers to subscribe and extend the capabilities of their mobile health applications beyond the existing mobile device limitations.

141 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
73% related
Server
79.5K papers, 1.4M citations
73% related
Mobile computing
51.3K papers, 1M citations
72% related
Network packet
159.7K papers, 2.2M citations
71% related
Wireless ad hoc network
49K papers, 1.1M citations
71% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202116
20208
201915
201819
201719
201617