Skip to main content
Top
Published in: Cluster Computing 5/2019

22-09-2017

Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC

Authors: K. Vijayakumar, C. Arun

Published in: Cluster Computing | Special Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing is a very rapidly growing technology with more facilities but also with more issues in terms of vulnerabilities before and after deploying the applications into the cloud. The vulnerabilities are assessed before the applications are deployed into the cloud. However, after deploying the applications, periodical checking of systems for vulnerabilities is not carried out. This paper assesses the applications online for vulnerabilities at regular intervals and if any changes are made in the code, Webhook will trigger the vulnerability checking tool based on Hashing algorithm to check for vulnerabilities in the updated application. The main aim of this system is to constantly scan the applications that are deployed in the cloud and check for vulnerabilities as part of the continuous integration and continuous deployment process. This process of checking for vulnerabilities after every update in the application should be included in the software development lifecycle.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Torkura, K.A., Meinel, C.: Towards cloud-aware vulnerability assessments. In: 2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), pp. 746–751. IEEE (2015) Torkura, K.A., Meinel, C.: Towards cloud-aware vulnerability assessments. In: 2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), pp. 746–751. IEEE (2015)
2.
go back to reference Mohamed, B., Youness, K.I., Mohamed, M.: Taking account of trust when adopting cloud computing architecture. In: 2nd International Conference on Cloud Computing Technologies and Applications, pp. 101–106. IEEE (2016) Mohamed, B., Youness, K.I., Mohamed, M.: Taking account of trust when adopting cloud computing architecture. In: 2nd International Conference on Cloud Computing Technologies and Applications, pp. 101–106. IEEE (2016)
3.
go back to reference Alhamad, M., Dillon, T., Chang, E.: Sla-based trust model for cloud computing. In: International Conference on Network-Based Information Systems (NBiS), pp. 321–324. IEEE (2010) Alhamad, M., Dillon, T., Chang, E.: Sla-based trust model for cloud computing. In: International Conference on Network-Based Information Systems (NBiS), pp. 321–324. IEEE (2010)
4.
go back to reference Horvath, A.S., Agrawal, R.: Trust in cloud computing. In: SoutheastCon, pp. 1–8. IEEE (2015) Horvath, A.S., Agrawal, R.: Trust in cloud computing. In: SoutheastCon, pp. 1–8. IEEE (2015)
5.
go back to reference Maheshwari, V., Prasanna, M.: Integrating risk assessment and threat modeling within SDLC process. In: International Conference on Inventive Computation Technologies (ICICT), vol. 1, pp. 1–5. IEEE (2016) Maheshwari, V., Prasanna, M.: Integrating risk assessment and threat modeling within SDLC process. In: International Conference on Inventive Computation Technologies (ICICT), vol. 1, pp. 1–5. IEEE (2016)
6.
go back to reference Shenoy, S., Kuo, T.-T., Gabriel, R., McAuley, J., Hsu, C.-N.: Deduplication in a massive clinical note dataset, pp. 5–16. University of California, San Diego, La Jolla, CA (2017) Shenoy, S., Kuo, T.-T., Gabriel, R., McAuley, J., Hsu, C.-N.: Deduplication in a massive clinical note dataset, pp. 5–16. University of California, San Diego, La Jolla, CA (2017)
7.
go back to reference Vijayakumar, K., Arun, C.: Analysis and selection of risk assessment frameworks for cloud based enterprise applications. In: Special Issue on Biomed Research India - Artificial Intelligent Techniques for Bio-Medical Signal Processing. pp. 1-8 (2017) Vijayakumar, K., Arun, C.: Analysis and selection of risk assessment frameworks for cloud based enterprise applications. In: Special Issue on Biomed Research India - Artificial Intelligent Techniques for Bio-Medical Signal Processing. pp. 1-8 (2017)
8.
go back to reference Vijayakumar, K., Arun, C.: Automated risk identification using NLP in cloud based development environments. J. Ambient Intell. Humaniz. Comput (2017). doi:10.1007/s12652-017-0503-7 Vijayakumar, K., Arun, C.: Automated risk identification using NLP in cloud based development environments. J. Ambient Intell. Humaniz. Comput (2017). doi:10.​1007/​s12652-017-0503-7
9.
go back to reference Ali, M.M., Huda, S., Abawajy, J., Alyahya, S., Al-Dossari, H., Yearwood, J.: A parallel framework for software defect detection and metric selection on cloud computing. Cluster Comput. 1–15 (2017) Ali, M.M., Huda, S., Abawajy, J., Alyahya, S., Al-Dossari, H., Yearwood, J.: A parallel framework for software defect detection and metric selection on cloud computing. Cluster Comput. 1–15 (2017)
10.
go back to reference Xu, X., Chen, Y., Calero, J.M.A.: Distributed decentralized collaborative monitoring architecture for cloud infrastructures. Cluster Comput. 20(3), 2451–2463 (2017)CrossRef Xu, X., Chen, Y., Calero, J.M.A.: Distributed decentralized collaborative monitoring architecture for cloud infrastructures. Cluster Comput. 20(3), 2451–2463 (2017)CrossRef
Metadata
Title
Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC
Authors
K. Vijayakumar
C. Arun
Publication date
22-09-2017
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 5/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1176-x

Other articles of this Special Issue 5/2019

Cluster Computing 5/2019 Go to the issue

Premium Partner