Skip to main content

Analysis and Vulnerability Assessment of Various Models and Frameworks in Cloud Computing

  • Conference paper
  • First Online:
Advances in Data Sciences, Security and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 612))

  • 615 Accesses

Abstract

Cloud Computing is a technology which provides us a convenient way of an on-demand network-based access to available shared pools of pre configurable system resources and higher-level services. The increasing data breaches demand security assurance inside the cloud computing system. In this research work we have studied different types of tools/models available for cloud computing accordingly we proposed a vulnerability assessment framework/process for Cloud computing system based on the Common Vulnerability Scoring System, i.e., CVSS 2.0 or 3.0 which generated or published by the NVD at regular interval. Since the proposed model/process is built with the progressive security automation protocols for Cloud computing, it has the capability of automobilists and interoperability with the other existing applications and models and also has the capabilities to address all the prospective cloud vulnerabilities which are still not identified. The proposed model/process addresses the vulnerability issues on the basis of CVSS which provides the new dimensions for effective handling of unknown vulnerabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jomina J, Norman J (2019) Major vulnerabilities and their prevention methods in cloud computing. Advances in big data and cloud computing. Springer, Singapore, pp 11–26

    Google Scholar 

  2. Nabeel, K, Al-Yasiri A (2018) Cloud security threats and techniques to strengthen cloud computing adoption framework. In: Cyber security and threats: concepts, methodologies, tools, and applications. IGI Global, pp 268–285

    Google Scholar 

  3. Suryateja PS (2018) Threats and vulnerabilities of cloud computing: a review. Int J Comput Sci Eng 6(3):297–302

    Google Scholar 

  4. Aljawarneh Shadi A, Alawneh Ali, Jaradat Reem (2017) Cloud security engineering: early stages of SDLC. Future Gener Comput Syst 74:385–392

    Article  Google Scholar 

  5. Coppolino L et al (2017) Cloud security: emerging threats and current solutions. Comput Electr Eng 59:126–140

    Article  Google Scholar 

  6. National Vulnerability Database (2017) NIST. http://nvd.nist.gov/

  7. Su Z, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Inf Secur J Glob Perspect 24(4–6):194–206

    Google Scholar 

  8. Ab Rahman NH, Choo K-KR (2015) A survey of information security incident handling in the cloud. Comput Secur 49:45–69

    Article  Google Scholar 

  9. Haimes YY et al (2015) Assessing systemic risk to cloud? Computing technology as complex interconnected systems of systems. Syst Eng 18(3):284–299

    Article  Google Scholar 

  10. https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=cloud&search_type=all

  11. Patrick K et al (2013) Vulcan: vulnerability assessment framework for cloud computing. In: 2013 IEEE 7th international conference on software security and reliability (SERE). IEEE

    Google Scholar 

  12. Chou T-S (2013) Security threats on cloud computing vulnerabilities. Int J Comput Sci Inf Technol 5(3):79

    Google Scholar 

  13. Kotikela S, Kavi K, Gomathisankaran M (2012) Vulnerability assessment in cloud computing. In: Daimi K, Arabnia HR (eds) The 2012 international conference on security & management (SAM 2012). WORLDCOMP 2012, 16–19 July 2012. CSREA Press, Las Vegas, pp 67–73

    Google Scholar 

  14. von Laszewski G, Diaz J, Wang F, Fox G: Comparison of multiple cloud frameworks. In: 2012 IEEE 5th international conference on cloud computing (CLOUD), June 2012, pp 734–741

    Google Scholar 

  15. Mohamed A, Grundy J, Müller I (2016) An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107

  16. Joh HC, Malaiya YK (2011) Defining and assessing quantitative security risk measures using vulnerability lifecycle and CVSS metrics. In: The 2011 international conference on security and management (SAM)

    Google Scholar 

  17. Grobauer B, Walloschek T, Stocker E (2011) Understanding cloud computing vulnerabilities. IEEE Secur Priv 9(2):50–57

    Article  Google Scholar 

  18. Poolsappasit Nayot, Dewri Rinku, Ray Indrajit (2012) Dynamic security risk management using bayesian attack graphs. IEEE Trans Dependable Secure Comput 9(1):61–74

    Article  Google Scholar 

  19. Jianchun J et al (2012) VRank: a context-aware approach to vulnerability scoring and ranking in SOA. 2012 IEEE sixth international conference on software security and reliability (SERE). IEEE

    Google Scholar 

  20. Shubhashis S, Kaulgud V, Sharma VS (2011) Cloud computing security–trends and research directions. In: 2011 IEEE world congress on services. IEEE

    Google Scholar 

  21. Laurent G (2011) Vulnerability discrimination using CVSS framework. In: 2011 4th IFIP international conference on new technologies, mobility and security (NTMS). IEEE

    Google Scholar 

  22. Shaikh FB, Haider S (2011) Security threats in cloud computing. In: 2011 international conference for internet technology and secured transactions (ICITST). IEEE

    Google Scholar 

  23. Li HC, Liang PH, Yang JM, Chen SJ (2010) Analysis on cloud-based security vulnerability assessment. In: IEEE international conference on E-business engineering, pp 490–494, Nov 2010

    Google Scholar 

  24. Al-Mosry M et al (2010) An analysis of the cloud computing security problem. In: Applied security (Appsec) 2010 cloud workshop

    Google Scholar 

  25. Wang W, Chung WY, Rashid A, Chuang H-M (2011) Toward the trend of cloud computing. J Electron Commer Res 12(4):238

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Narendra Mishra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mishra, N., Singh, R.K., Yadav, S.K. (2020). Analysis and Vulnerability Assessment of Various Models and Frameworks in Cloud Computing. In: Jain, V., Chaudhary, G., Taplamacioglu, M., Agarwal, M. (eds) Advances in Data Sciences, Security and Applications. Lecture Notes in Electrical Engineering, vol 612. Springer, Singapore. https://doi.org/10.1007/978-981-15-0372-6_33

Download citation

Publish with us

Policies and ethics