This paper introduces SecaaS framework, a solution that allows security vendors to move their business into the cloud. By doing so, it is possible for tenants of SecaaS framework to freely choose between various security products depending on their own business requirements. OpenFlow protocol is applied in our framework to control the data paths of tenants and forward those data to a chaining of subscribed services before going out to the Internet. This paper also proposes the OpenFlow Dynamic Packet Control (ODPC) system for optimizing network stability and performance of our system when a new service is added or existing service is removed. ODPC system, which works as an application, will calculate the cost of delay for data paths inside of our network and set-up the path that guarantees the minimum delay for each tenant. The contribution of this paper includes the solution to solve the vendor locked-in limitation in others’ SecaaS architecture. Moreover, this architecture is also considered as a solution for small scale security vendors to move their products into the cloud. In this paper, the proof-of-concept for SecaaS framework is also presented through demonstration. Furthermore, the ODPC system is considered as one of our efforts in order to improve the network performance in our system.
[1]
Nick Feamster,et al.
The case for separating routing from routers
,
2004,
FDNA '04.
[2]
Luke M. Leslie,et al.
The Tempest-a practical framework for network programmability
,
1998,
IEEE Netw..
[3]
Hanady M. Abdulsalam,et al.
SECaaS: security as a service for cloud-based applications
,
2011
.
[4]
Hani Jamjoom,et al.
Cementing high availability in openflow with RuleBricks
,
2013,
HotSDN '13.
[5]
Christian Senk.
Adoption of security as a service
,
2013,
Journal of Internet Services and Applications.
[6]
Marcos Rogério Salvador,et al.
Revisiting routing control platforms with the eyes and muscles of software-defined networking
,
2012,
HotSDN '12.
[7]
Nick McKeown,et al.
OpenFlow: enabling innovation in campus networks
,
2008,
CCRV.
[8]
Andrzej M. Goscinski,et al.
Toward a Framework for Cloud Security
,
2010,
ICA3PP.
[9]
G.J. Minden,et al.
A survey of active network research
,
1997,
IEEE Communications Magazine.