This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Using Cloud Computing to Implement a Security Overlay Network
Jan.-Feb. 2013 (vol. 11 no. 1)
pp. 44-53
Khaled Salah, Khalifa University of Science, Technology, and Research
Jose M. Alcaraz Calero, University of Valencia
Sherali Zeadally, University of the District of Columbia
Sameera Al-Mulla, Khalifa University of Science, Technology, and Research
Mohammed Alzaabi, Khalifa University of Science, Technology, and Research
This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.
Index Terms:
Cloud computing,Electronic mail,Intrusion detection,Computer architecture,Computer crime,Overlay networks,Computer security,antispam,cloud computing,overlay networks,security,denial of service,intrusion detection,antivirus
Citation:
Khaled Salah, Jose M. Alcaraz Calero, Sherali Zeadally, Sameera Al-Mulla, Mohammed Alzaabi, "Using Cloud Computing to Implement a Security Overlay Network," IEEE Security & Privacy, vol. 11, no. 1, pp. 44-53, Jan.-Feb. 2013, doi:10.1109/MSP.2012.88
Usage of this product signifies your acceptance of the Terms of Use.