scispace - formally typeset
R

Rakesh Kumar

Researcher at Guru Gobind Singh Indraprastha University

Publications -  6
Citations -  191

Rakesh Kumar is an academic researcher from Guru Gobind Singh Indraprastha University. The author has contributed to research in topics: Cloud computing & Computer security model. The author has an hindex of 3, co-authored 6 publications receiving 91 citations.

Papers
More filters
Journal ArticleDOI

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

TL;DR: This study contributes towards identifying a unified taxonomy for security requirements, threats, vulnerabilities and countermeasures to carry out the proposed end-to-end mapping and highlights security challenges in other related areas like trust based security models, cloud-enabled applications of Big Data, Internet of Things, Software Defined Network (SDN) and Network Function Virtualization (NFV).
Journal ArticleDOI

Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC)

TL;DR: A conceptual security model, ADOC, is proposed to facilitate adopting DevSecOps for the business processes capitalizing OSS over the cloud, which enables businesses to deliver time-to-market security ready applications and services with accelerated velocity and sustainable agility in a cost-effective way.
Journal Article

Assurance of Data Security and Privacy in the Cloud: A Three-Dimensional Perspective

TL;DR: A three-dimensional conceptual model is presented that describes the relationships between factors contributing to increasing confidence in the cloud and the dimensions are: security solutions, security operations, and security compliance.
Book ChapterDOI

Top Threats to Cloud: A Three-Dimensional Model of Cloud Security Assurance

TL;DR: In this article, a three-dimensional model of cloud security assurance, namely Security Solution, Security Operation, and Security Compliance, is presented to address the top threats to cloud computing, which are identified and reported by the cloud security alliance research group in their latest and previous reports.
Book ChapterDOI

When Security Meets Velocity: Modeling Continuous Security for Cloud Applications using DevSecOps

TL;DR: In the quest of velocity in time-to-market for the cloud applications, often, the security requirements are overlooked It is mainly due to the preconceived notion that building security capabilities is very time-intensive and affects delivery timeline However, the lack of required security capabilities in the applications have cascading impact on business objectives.