Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 515))

  • 1162 Accesses

Abstract

In Security-as-a-service model the objective is to provide security as one of the cloud services. In this model the security is provided from the cloud in place of traditional on-premise implementation. The objective of this initiative is to provide Anti-Malware functionality as a cloud service. This paper provides implementation framework for Anti-Malware system from the cloud as a service. The framework uses several existing file scanning web-based anti-malware engines. The Anti-Malware SecaaS offers all the benefits provided by Security-as-a-Service (SecaaS) model. The proof-of-concept (POC) prototype of Anti-Malware AM-SecaaS is implemented and evaluated successfully. An innovative approach is used to integrate this POC with other SecaaS options so that various SecaaS options are provided to users intelligently and transparently.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chris Jarabek, David Barrera, and John Aycock. 2012. ThinAV: truly lightweight mobile cloud-based anti-malware. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC ‘12). ACM, New York, NY, USA, 209–218.

    Google Scholar 

  2. J. Xu, J. Yan, L. He, P. Su and D. Feng, “CloudSEC: A Cloud Architecture for Composing Collaborative Security Services,” Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, Indianapolis, IN, 2010, pp. 703–711.

    Google Scholar 

  3. W. Yan, “CAS: A framework of online detecting advance malware families for cloud-based security,” 2012 1st IEEE International Conference on Communications in China (ICCC), Beijing, 2012, pp. 220–225.

    Google Scholar 

  4. Mohammed Hussain and Hanady Abdulsalam. 2011. SECaaS: security as a service for cloud-based applications. In Proceedings of the Second Kuwait Conference on e-Services and e-Systems(KCESS ‘11). ACM, New York, NY, USA,, Article 8, 4 pages.

    Google Scholar 

  5. Yanfang Ye, Tao Li, Shenghuo Zhu, Weiwei Zhuang, Egemen Tas, Umesh Gupta, and Melih Abdulhayoglu. 2011. Combining file content and file relations for cloud based malware detection. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD ‘11). ACM, New York, NY, USA, 222–230.

    Google Scholar 

  6. Tim Mather, Subra Kumaraswamy, and Shahed Latif, 2009, Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance, O’Reilly Media, 336.

    Google Scholar 

  7. Websense white paper, Seven Criteria for Evaluating Security-as-a- Service Solutions, 2010.

    Google Scholar 

  8. Deepak Sharma, Dr. C A. Dhote, Manish Potey, ‘Security-as-a-Service from Clouds: A comprehensive Analysis’, IJCA Volume 67-Number 3, April 2013.

    Google Scholar 

  9. Deepak Sharma, Dr. C A. Dhote, Manish Potey, ‘Security-as-a-Service from Clouds : A survey’ IIJC Vol 1 Issue 4, October 2011.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepak H. Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Sharma, D.H., Dhote, C.A., Potey, M.M. (2017). Implementing Anti-Malware as Security-as-a-Service from Cloud. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 515. Springer, Singapore. https://doi.org/10.1007/978-981-10-3153-3_53

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3153-3_53

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3152-6

  • Online ISBN: 978-981-10-3153-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics