Security Verification Using Crowd Sourcing

Download Now
Provided by: IIT
Topic: Cloud
Format: PDF
X-as-a-service is gaining widespread attention in recent years. SECaaS (SECurity-as-a-Service) is no exception. In this paper, the authors propose a secure architecture using crowd sourcing for security verification as a service. This architecture relies on the collaboration and volunteer contribution of resources by various users, to reduce total cost of ownership for service provider. Service provider outsources the security verification to different users/nodes who have shared resources for computation. Proposed SECaaS architecture is user centric and user driven. This enables users to choose, control, configure and monitor the security services.
Download Now

Find By Topic