Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/SERE.2013.31guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

VULCAN: Vulnerability Assessment Framework for Cloud Computing

Published: 18 June 2013 Publication History

Abstract

Assessing security of software services on Cloud is complex because the security depends on the vulnerability of infrastructure, platform and the software services. In many systems, the platform or the infrastructure on which the software will actually run may not be known or guaranteed. This implies that the security of the software service must be assured regardless of the underlying infrastructure or platform, requiring a large number of combinations. Another common trend in Cloud and Service oriented Architecture (SoA) environments is Service composition, whereby new services can be created rapidly by composing existing services. Once again, the component services must be tested for security levels on a large number of platform and infrastructure combinations. In this paper we propose a novel vulnerability assessment framework for cloud computing systems. We have designed and developed a prototype of our framework. We also present the design and development of our framework with some use cases.

Cited By

View all
  • (2024)Mitigating Data Imbalance for Software Vulnerability Assessment: Does Data Augmentation Help?Proceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement10.1145/3674805.3686674(119-130)Online publication date: 24-Oct-2024
  • (2022)An Empirical Study of Automation in Software Security Patch ManagementProceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering10.1145/3551349.3556969(1-13)Online publication date: 10-Oct-2022
  • (2022)Cloud computing securityComputers and Security10.1016/j.cose.2021.102580114:COnline publication date: 1-Mar-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SERE '13: Proceedings of the 2013 IEEE 7th International Conference on Software Security and Reliability
June 2013
245 pages
ISBN:9780769550213

Publisher

IEEE Computer Society

United States

Publication History

Published: 18 June 2013

Author Tags

  1. Cloud Computing
  2. Ontology
  3. Vulnerability Assessment

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Mitigating Data Imbalance for Software Vulnerability Assessment: Does Data Augmentation Help?Proceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement10.1145/3674805.3686674(119-130)Online publication date: 24-Oct-2024
  • (2022)An Empirical Study of Automation in Software Security Patch ManagementProceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering10.1145/3551349.3556969(1-13)Online publication date: 10-Oct-2022
  • (2022)Cloud computing securityComputers and Security10.1016/j.cose.2021.102580114:COnline publication date: 1-Mar-2022
  • (2020)CVE-assisted large-scale security bug report dataset construction methodJournal of Systems and Software10.1016/j.jss.2019.110456160:COnline publication date: 1-Feb-2020
  • (2019)Designing an efficient framework for vulnerability assessment and patching (VAP) in virtual environment of cloud computingThe Journal of Supercomputing10.1007/s11227-018-2698-675:5(2862-2889)Online publication date: 1-May-2019
  • (2015)PotassiumProceedings of the Sixth ACM Symposium on Cloud Computing10.1145/2806777.2806935(30-42)Online publication date: 27-Aug-2015
  • (2015)Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systemsProceedings of the 8th International Conference on Security of Information and Networks10.1145/2799979.2799995(142-149)Online publication date: 8-Sep-2015

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media