R
Rakesh Kumar
Researcher at Guru Gobind Singh Indraprastha University
Publications - 6
Citations - 191
Rakesh Kumar is an academic researcher from Guru Gobind Singh Indraprastha University. The author has contributed to research in topics: Cloud computing & Computer security model. The author has an hindex of 3, co-authored 6 publications receiving 91 citations.
Papers
More filters
Journal ArticleDOI
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
Rakesh Kumar,Rinkaj Goyal +1 more
TL;DR: This study contributes towards identifying a unified taxonomy for security requirements, threats, vulnerabilities and countermeasures to carry out the proposed end-to-end mapping and highlights security challenges in other related areas like trust based security models, cloud-enabled applications of Big Data, Internet of Things, Software Defined Network (SDN) and Network Function Virtualization (NFV).
Journal ArticleDOI
Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC)
Rakesh Kumar,Rinkaj Goyal +1 more
TL;DR: A conceptual security model, ADOC, is proposed to facilitate adopting DevSecOps for the business processes capitalizing OSS over the cloud, which enables businesses to deliver time-to-market security ready applications and services with accelerated velocity and sustainable agility in a cost-effective way.
Journal Article
Assurance of Data Security and Privacy in the Cloud: A Three-Dimensional Perspective
Rakesh Kumar,Rinkaj Goyal +1 more
TL;DR: A three-dimensional conceptual model is presented that describes the relationships between factors contributing to increasing confidence in the cloud and the dimensions are: security solutions, security operations, and security compliance.
Book ChapterDOI
Top Threats to Cloud: A Three-Dimensional Model of Cloud Security Assurance
Rakesh Kumar,Rinkaj Goyal +1 more
TL;DR: In this article, a three-dimensional model of cloud security assurance, namely Security Solution, Security Operation, and Security Compliance, is presented to address the top threats to cloud computing, which are identified and reported by the cloud security alliance research group in their latest and previous reports.
Book ChapterDOI
When Security Meets Velocity: Modeling Continuous Security for Cloud Applications using DevSecOps
Rakesh Kumar,Rinkaj Goyal +1 more
TL;DR: In the quest of velocity in time-to-market for the cloud applications, often, the security requirements are overlooked It is mainly due to the preconceived notion that building security capabilities is very time-intensive and affects delivery timeline However, the lack of required security capabilities in the applications have cascading impact on business objectives.