scispace - formally typeset
Search or ask a question

Showing papers on "Security as a service published in 2011"


Book
21 Apr 2011
TL;DR: This book details the strengths and weaknesses of securing your company's information with different cloud approaches, and offers a clear and concise framework to secure your business' assets while making the most of this new technology.
Abstract: As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, consideringalternate approaches such as private vs. public clouds, SaaS vs. IaaS,and loss of control and lack of trustDiscusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recoveryDetails the benefits of moving to the cloud-solving for limited availability of space, power and storage

149 citations


Patent
11 Apr 2011
TL;DR: In this paper, a method of providing security as a service in a cloud storage environment includes storing, through a cloud manager, a security level of access of a storage controller associated with a customer of SaaS, and receiving a request from the customer to access security information of the storage controllers associated therewith.
Abstract: A method of providing security as a service in a cloud storage environment includes storing, through a cloud manager of the cloud storage environment, a security level of access of a storage controller associated with a customer of the security as a service, and receiving a request from the customer to access security information of the storage controller associated therewith. The method also includes providing, through the cloud manager, security information of the storage controller associated with the customer in accordance with the request and the stored security level of access of the storage controller associated with the customer.

62 citations


Proceedings ArticleDOI
05 Apr 2011
TL;DR: A new architecture, namely Security as a Service (SECaaS), is introduced that addresses the security issues for cloud-based applications and provides security means for both cloud users and providers.
Abstract: Cloud computing is a great target for many applications since it provides the storage and computation needs for cloud users with relatively low-cost Although the area of cloud computing has grown rapidly in the last few years, the area still lacks appropriate security measures that protect the data and/or applications for cloud users We introduce a new architecture, namely Security as a Service (SECaaS) that addresses the security issues for cloud-based applications SECaaS deals with existing services of cloud computing on its different levels SECaaS takes a user-centric approach, in which cloud users have more control over their security It provides security means for both cloud users and providers

53 citations


Proceedings ArticleDOI
17 Aug 2011
TL;DR: An overview of the security and privacy challenges pertinent to public cloud computing is provided and considerations organizations should take when outsourcing data, applications, and infrastructure to a public cloud environment are pointed out.
Abstract: Cloud computing is a developing archetype with marvelous momentum, but its exceptional aspects worsening the security and privacy challenges. This article provides an overview of the security and privacy challenges pertinent to public cloud computing and points out considerations organizations should take when outsourcing data, applications, and infrastructure to a public cloud environment. We have also proposed a security mechanism “security as a service” for cloud computing. It also explores the roadblocks and solutions to providing a trustworthy cloud computing environment.

25 citations


Dissertation
01 Jan 2011
TL;DR: This project proposes a generic architecture for providing security services in the cloud for smartphones, and examines its feasibility by analysing it in terms of its security aspects, scalability and flexibility.
Abstract: Smartphone usage has been continuously growing in recent times. Smartphones offer Personal Computer (PC) functionality to the end user, hence they are vulnerable to the same sorts of security threats as desktop computers. Cloud computing is a new computing paradigm and a breakthrough technology of recent times. Its growing popularity can be attributed to its ability to transform computing to a utility, scalability, and cost effectiveness. More and more services are predicted to be offered in the cloud in the near future. Due to the resource constraints of smartphones, security services in the form of a cloud offering seems to be a natural fit (as the services could be provided in a very scalable form in the cloud while off-loading the smartphone). This project proposes a generic architecture for providing security services in the cloud for smartphones. To enable the design of this architecture, it is essential to analyze and identify possible security solutions that could be provided as a cloud service to the smartphone. Security requirements of smartphones have been analysed considering the various infection channels for smartphones, attacks and threats encountered in a smartphone environment, smartphone usage scenarios and the smartphone‟s limitations. Next, the security functions that must be implemented in the smartphone to overcome these threats are identified. Furthermore, a review of the existing architectures for mobile computing are presented and their security issues are examined. A detailed study of the analysed results has been used to build the architecture for offering security services to smartphones in the cloud, targeted use case scenario being the usage in a corporate environment. The functions to be handled by each of the components of the architecture have been specified. Furthermore, the proposed architecture has been examined to prove its feasibility by analysing it in terms of its security aspects, scalability and flexibility. Additionally, experiments to understand the performance enhancement by offering security services in the cloud for smartphones have been performed. This has been done by measuring the resource consumption of anti-virus software in a smartphone and performing the same measurement in an emulated smartphone in the cloud.

7 citations


Book ChapterDOI
27 Jun 2011
TL;DR: A framework is proposed that enables users to select the manner in which their sensitive information is protected, and a policy, which defines the type of information protection, is offered as a Security as a Service.
Abstract: Some of Internet services require users to provide their sensitive information such as credit card number, and an ID-password pair. In these services, the manner in which the provided information is used is solely determined by the service providers. As a result, even when the manner in which information is used by a service provider appears vulnerable, users have no choice but to allow such usage. In this paper, we propose a framework that enables users to select the manner in which their sensitive information is protected. In our framework, a policy, which defines the type of information protection, is offered as a Security as a Service. According to the policy, users can incorporate the type of information protection into a program. By allowing a service provider to use their sensitive information through this program, users can protect their sensitive information according to the manner chosen by them.

6 citations


23 Aug 2011
TL;DR: The proposed concept has the contribution to allow for SSAS (Software Security as a Service) providers to provide access to software services without requiring the customer to host this service within their local environment.
Abstract: The software architecture requires interoperable security mechanisms. This article focuses on applying security requirements to service-oriented solution design. SOA security is very much concerned with what the system is supposed to do and what can go wrong. This article presents the service-oriented approach -- security services that can be developed and tested and applied against many types of applications or scenarios. The proposed concept has the contribution to allow for SSAS (Software Security as a Service) providers to provide access to software services without requiring the customer to host this service within their local environment. In this model, the access control decision and (ideally) enforcement functionality is not embedded within an application. The split of enforcement and decision point has its advantages.

1 citations


Proceedings ArticleDOI
TL;DR: The paper discusses the unexpected advantages of the cloud framework providing a sophisticated environment for information sharing and data mining and its potential impact on the cloud architecture.
Abstract: The new corporate approach to efficient processing and storage is migrating from in-house service-center services to the newly coined approach of Cloud Computing. This approach advocates thin clients and providing services by the service provider over time-shared resources. The concept is not new, however the implementation approach presents a strategic shift in the way organizations provision and manage their IT resources. The requirements on some of the data sets targeted to be run on the cloud vary depending on the data type, originator, user, and confidentiality level. Additionally, the systems that fuse such data would have to deal with the classifying the product and clearing the computing resources prior to allowing new application to be executed. This indicates that we could end up with a multi-level security system that needs to follow specific rules and can send the output to a protected network and systems in order not to have data spill or contaminated resources. The paper discusses these requirements and potential impact on the cloud architecture. Additionally, the paper discusses the unexpected advantages of the cloud framework providing a sophisticated environment for information sharing and data mining.

1 citations