Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4737
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVerma, Rohiten_US
dc.contributor.authorRuj, Sushmitaen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:19Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:19Z-
dc.date.issued2014-
dc.identifier.citationVerma, R., & Ruj, S. (2014). Security services using crowdsourcing. Paper presented at the Procedia Computer Science, , 32 505-512. doi:10.1016/j.procs.2014.05.454en_US
dc.identifier.issn1877-0509-
dc.identifier.otherEID(2-s2.0-84902686906)-
dc.identifier.urihttps://doi.org/10.1016/j.procs.2014.05.454-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4737-
dc.description.abstractSecurity-as-a-service is an emerging area in cloud computing. Traditionally, security approaches are service provider-centric and provider-driven. In this paper, we propose a model for security-as-a-service using "crowdsourcing". Though crowdsourcing has been used to provide specific security services like browser security, detecting phishing attacks, detecting cybersecurity threats, there has been no work which provides a unified framework to provide different types of security verification. Dispersed computing power of devices is used to perform security verifications. This is done by subscribers in a collaborative way, using their idle resources, in exchange of certain incentives. Our architecture guarantees anonymity of users who request service and the crowd who contribute in verification by using virtualization concepts and virtual machines. Moreover, we propose an approach for managing these security verification jobs, subscribers in a fault tolerant manner. To the best of our knowledge, we are the first to propose a unified security-as-a-service framework using crowdsourcing, thus introducing a new research problem. We discuss a number of applications, challenges and problems of crowdsourcing in security verification. © 2014 Published by Elsevier B.V.en_US
dc.language.isoenen_US
dc.publisherElsevier B.V.en_US
dc.sourceProcedia Computer Scienceen_US
dc.subjectEnergy conservationen_US
dc.subjectVirtual realityen_US
dc.subjectVirtualizationen_US
dc.subjectBrowser securityen_US
dc.subjectResearch problemsen_US
dc.subjectSecurity approachen_US
dc.subjectSecurity as a servicesen_US
dc.subjectSecurity servicesen_US
dc.subjectSecurity verificationen_US
dc.subjectService provideren_US
dc.subjectUnified frameworken_US
dc.subjectCrowdsourcingen_US
dc.titleSecurity services using crowdsourcingen_US
dc.typeConference Paperen_US
dc.rights.licenseAll Open Access, Bronze-
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: