(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-5 Issue-48 November-2018
Full-Text PDF
Paper Title : Modular responsibility distribution for vulnerability management process
Author Name : Shaz Alam and Mohd Muqeem
Abstract :

The world of computing rapidly changed from mainframe to client server architecture and towards the new world of cloud computing. This new generation of computing has tremendous advantages over traditional offerings. Irrespective of all, security is one of the biggest hurdles which hold the migration of business towards cloud. Main reason is client unawareness about the security counters and their roles. Security control can be normally implemented around three levels such as vulnerability, attack and threat. It is better to identify and pre analyse the concerns at earliest level. The purpose of research is to visualize the vulnerability management process in the modular form and make a transparent responsibility picture for each actor. In the end of the research a new term threshold limit was highlighted in vulnerability life cycle.

Keywords : Cloud security, Vulnerability, Vulnerability management.
Cite this article : Shaz Alam and Mohd Muqeem, " Modular responsibility distribution for vulnerability management process " , International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-5, Issue-48, November-2018 ,pp.469-472.DOI:10.19101/IJATEE.2018.C02
References :
[1]Zhang Q, Cheng L, Boutaba R. Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications. 2010; 1(1):7-18.
[Crossref] [Google Scholar]
[2]Zhang X, Wuwong N, Li H, Zhang X. Information security risk management framework for the cloud computing environments. In international conference on computer and information technology 2010 (pp. 1328-34). IEEE.
[Crossref] [Google Scholar]
[3]Zissis D, Lekkas D. Addressing cloud computing security issues. Future Generation Computer Systems. 2012; 28(3):583-92.
[Crossref] [Google Scholar]
[4]Alam S, Muqeem M, Khan SA. Review on security aspects for cloud architecture. International Journal of Electrical and Computer Engineering. 2018; 8(5): 3129-39.
[Google Scholar]
[5]Kandukuri BR, Rakshit A. Cloud security issues. In international conference on services computing 2009 (pp. 517-20). IEEE.
[Crossref] [Google Scholar]
[6]https://www.first.org/cvss/userguide. Accessed 5 January 2018.
[7]https://www.bugzilla.org. Accessed 10 January 2018.
[8]https://www.exploit-db.com/. Accessed 15 January 2018.
[9]Torkura KA, Cheng F, Meinel C. A proposed framework for proactive vulnerability assessments in cloud deployments. In ICITST 2015 (pp. 51-7).
[Crossref] [Google Scholar]