2011
DOI: 10.1002/sec.352
|View full text |Cite
|
Sign up to set email alerts
|

Anti‐virus in‐the‐cloud service: are we ready for the security evolution?

Abstract: The ever‐increasing malware variants pose serious challenges for traditional signature‐based anti‐virus (AV) scan engines. To effectively handle the scale and magnitude of new malware variants, AV functionality is being moved from the user desktop into the cloud. AV in‐the‐cloud service is becoming the next‐generation security infrastructure designed to defend against virus threats. It provides reliable protection service delivered through data centers worldwide, which are built on virtualization technologies.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Numerous researchers have proposed risk assessment methods in the cloud computing environment. Some of these studies focused on specific security problems, such as insider attacks, virtualization threats [], data transmission with cloud computing service‐level agreement , anti‐virus in the cloud service , denial of service attacks in cloud , and identity management . In addition, frameworks, which are used to assess security risks in cloud computing environments as a whole process, have also been proposed.…”
Section: Security Risk Assessment In Cloud Computingmentioning
confidence: 99%
“…Numerous researchers have proposed risk assessment methods in the cloud computing environment. Some of these studies focused on specific security problems, such as insider attacks, virtualization threats [], data transmission with cloud computing service‐level agreement , anti‐virus in the cloud service , denial of service attacks in cloud , and identity management . In addition, frameworks, which are used to assess security risks in cloud computing environments as a whole process, have also been proposed.…”
Section: Security Risk Assessment In Cloud Computingmentioning
confidence: 99%
“…According to the anti-virus operation policy, it is possible to check whether the anti-virus software is operating normally. Further, security auditing enables an update history review of the anti-virus engine and signature [6].…”
Section: ) Anti-virus Security Functionmentioning
confidence: 99%
“…The growth in complexity of pervasive software-intensive systems goes along the increased concern in the security of such systems, especially for mobile applications. Several recent proposals for testing in the cloud include approaches to virtualize, simulate and discover network attacks, protocols vulnerability and other security concerns [135], [147], [161], [66], [98].…”
Section: Testing In the Cloudmentioning
confidence: 99%
“…In turn, test case specification and generation [29], and the definition of the most appropriate configurations to be tested [156], [140], [39], are still crucial questions in the cloud context. Some authors target the issues related to frameworks for parallel tests execution [116], problems on effective and efficient allocation of the available resources [30], [52], [92], [42], specific testing aspects such as security [161], [66] or Android devices and applications [99].…”
Section: A Systematic Review On Cloud Testing 1:17mentioning
confidence: 99%