International Journal of Advanced Technology and Engineering Exploration (IJATEE) ISSN (P): 2394-5443 ISSN (O): 2394-7454 Vol - 5, Issue - 48, November 2018
  1. 1
    Google Scholar
Modular responsibility distribution for vulnerability management process

Shaz Alam and Mohd Muqeem

Abstract

The world of computing rapidly changed from mainframe to client server architecture and towards the new world of cloud computing. This new generation of computing has tremendous advantages over traditional offerings. Irrespective of all, security is one of the biggest hurdles which hold the migration of business towards cloud. Main reason is client unawareness about the security counters and their roles. Security control can be normally implemented around three levels such as vulnerability, attack and threat. It is better to identify and pre analyse the concerns at earliest level. The purpose of research is to visualize the vulnerability management process in the modular form and make a transparent responsibility picture for each actor. In the end of the research a new term threshold limit was highlighted in vulnerability life cycle.

Keyword

Cloud security, Vulnerability, Vulnerability management.

Cite this article

Refference

[1][1]Zhang Q, Cheng L, Boutaba R. Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications. 2010; 1(1):7-18.

[2][2]Zhang X, Wuwong N, Li H, Zhang X. Information security risk management framework for the cloud computing environments. In international conference on computer and information technology 2010 (pp. 1328-34). IEEE.

[3][3]Zissis D, Lekkas D. Addressing cloud computing security issues. Future Generation Computer Systems. 2012; 28(3):583-92.

[4][4]Alam S, Muqeem M, Khan SA. Review on security aspects for cloud architecture. International Journal of Electrical and Computer Engineering. 2018; 8(5): 3129-39.

[5][5]Kandukuri BR, Rakshit A. Cloud security issues. In international conference on services computing 2009 (pp. 517-20). IEEE.

[6][6]https://www.first.org/cvss/userguide. Accessed 5 January 2018.

[7][7]https://www.bugzilla.org. Accessed 10 January 2018.

[8][8]https://www.exploit-db.com/. Accessed 15 January 2018.

[9][9]Torkura KA, Cheng F, Meinel C. A proposed framework for proactive vulnerability assessments in cloud deployments. In ICITST 2015 (pp. 51-7).