%0 Journal Article %T Realize a Secure Overlay Network through Cloud Computing %A K. Phalguna Rao %A Vinay Chavan %J International Journal of Social Networking and Virtual Communities %D 2013 %I Institute of Advanced Engineering and Science (IAES) %R 10.11591/socnetvircom.v1i2.2196 %X Cloud computing is mainly based on virtualization which enables multi-tenancy and scalable shared resources used on an On-demand basis by all tenants. Since overlay networks are also based on virtualized nodes for implementing network services, this fact allows combining both techniques to reap the benefits of each other together. This is particularly useful for the deployment of new transparent network security services over the current networks in order to enhance their protection. The primary contribution of this paper proposes and analyzes a cloud-based security overlay network that can be used to offer an integrated set of several security services. Cloud Computing and Overlay Networks have newly received a lot of attention in computing and networking areas. These technologies are being demoralized and implemented in the design of large network infrastructures. They are being widely deployed by organizations, and research interests keep growing. We explore the use of Cloud computing in implementing a security overlay network. In particular, we propose and analyze a general cloud-based security overlay network that can be used as a transparent overlay network to provide security services such as Intrusion Detection System (IDS), Anti-Virus software, Anti-Spam software and Denial of Service (DOS). Each of these in-cloud security services is analyzed in terms of its effectiveness, performance, flexibility, control, and cost. %U http://www.iaesjournal.com/online/index.php/VirCom/article/view/2196