A review of penetration testing and vulnerability assessment in cloud environment

I Yurtseven, S Bagriyanik - 2020 Turkish National Software …, 2020 - ieeexplore.ieee.org
Cloud computing continues to provide easy, flexible, and cost-effective solutions and
services to both enterprises and unprofessional users. Many small and large-scale …

Securing cloud application infrastructure: understanding the penetration testing challenges of IaaS, PaaS, and SaaS environments

AS George, S Sagayarajan - Partners Universal International Research …, 2023 - puirj.com
Cloud computing is rapidly becoming the go-to platform for businesses of all sizes, from
startups to large enterprises. With this shift comes a responsibility to ensure that cloud …

A methodology for automated penetration testing of cloud applications

V Casola, AD Benedictis, M Rak… - International Journal of …, 2020 - inderscienceonline.com
Security assessment is a very time-and money-consuming activity. It needs specialised
security skills and, furthermore, it is not fully integrated into the software development life …

Cloud computing vulnerabilities analysis

A Zamfiroiu, I Petre, R Boncea - … of the 2019 4th International Conference …, 2019 - dl.acm.org
Nowadays cloud computing technologies are the most widely used tools due to their great
flexibility and also to their lower maintenance costs. Many vendors of cloud computing have …

A novel framework to carry out cloud penetration test

J Hu, C Tang - International journal of computer network and …, 2011 - search.proquest.com
Abstract in current cloud services, users put their data and resources into the cloud so as to
enjoy the on-demand high quality applications and services. Different from the conventional …

Towards automated penetration testing for cloud applications

V Casola, A De Benedictis, M Rak… - 2018 IEEE 27th …, 2018 - ieeexplore.ieee.org
The development of cloud applications raises several security concerns due to the lack of
control over involved resources. Security testing is fundamental to identify the existing …

Vulnerability prioritization: An offensive security approach

MF Bulut, A Adebayo, D Sow, S Ocepek - arXiv preprint arXiv:2206.11182, 2022 - arxiv.org
Organizations struggle to handle sheer number of vulnerabilities in their cloud
environments. The de facto methodology used for prioritizing vulnerabilities is to use …

A comprehensive survey on security in cloud computing

A Lamba, S Singh, N Dutta, S Rela - International Conference on …, 2016 - papers.ssrn.com
According to a Forbes' report published in 2015, cloud-based security spending is expected
to increase by 42%. According to another research, the IT security expenditure had …

A comprehensive survey on security in cloud computing

G Ramachandra, M Iftikhar, FA Khan - Procedia Computer Science, 2017 - Elsevier
According to a Forbes' report published in 2015, cloud-based security spending is expected
to increase by 42%. According to another research, the IT security expenditure had …

Security as a service for public cloud tenants (SaaS)

M Hawedi, C Talhi, H Boucheneb - Procedia computer science, 2018 - Elsevier
Cloud computing is a novel paradigm that is known for its elasticity and diversity in terms of
the services provided to the end users. Although these services offer many benefits such as …