Test case selection for penetration testing in mobile cloud computing applications: A proposed technique

The extensive use of mobile applications in terms of user’s number and size of diverse data has introduced additional security threats which make uncovering these vulnerabilities complex for testers. Testers use certain types of software security testing to detect software vulnerabilities, particula...

全面介绍

书目详细资料
发表在:Journal of Theoretical and Applied Information Technology
主要作者: 2-s2.0-85050111730
格式: Review
语言:English
出版: Little Lion Scientific 2018
在线阅读:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050111730&partnerID=40&md5=2676c505ff09a64283d98137198d48de
id Al-Ahmad A.S.; Kahtan H.
spelling Al-Ahmad A.S.; Kahtan H.
2-s2.0-85050111730
Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
2018
Journal of Theoretical and Applied Information Technology
96
13

https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050111730&partnerID=40&md5=2676c505ff09a64283d98137198d48de
The extensive use of mobile applications in terms of user’s number and size of diverse data has introduced additional security threats which make uncovering these vulnerabilities complex for testers. Testers use certain types of software security testing to detect software vulnerabilities, particularly penetration testing. Test case selection is an essential phase of penetration testing, especially when testing complex and large applications. Multiple techniques have been proposed for selecting test cases to be used in penetration testing. In general, the majority of such techniques select a set of test cases that cover the designated paths and fit well with the user requirements. This study reviews existing techniques and models that are used for test case selection. Methods, strengths and weaknesses are the main factors that are presented in this study. This study shows that offloading, that is, the technology used in mobile cloud computing applications, has been disregarded by existing techniques and models for test case selection. Therefore, this study proposes an enhanced test case selection technique for penetration testing. This proposed technique considers offloading parameters when selecting test cases to improve coverage paths and reflect user preferences in terms of cloud and mobile priority percentages. Moreover, test cases for both mobile and cloud in the mobile cloud computing applications are considered to be selected in list of test cases to be executed. Besides, user preferences feature is provided in the selection process to reflect the importance of each parties, cloud and mobile sides of the application under test. The proposed technique will improve the security of mobile cloud computing applications by exposing the possible vulnerabilities from both mobile and cloud sides application. © 2005 – ongoing JATIT & LLS.
Little Lion Scientific
19928645
English
Review

author 2-s2.0-85050111730
spellingShingle 2-s2.0-85050111730
Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
author_facet 2-s2.0-85050111730
author_sort 2-s2.0-85050111730
title Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
title_short Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
title_full Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
title_fullStr Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
title_full_unstemmed Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
title_sort Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
publishDate 2018
container_title Journal of Theoretical and Applied Information Technology
container_volume 96
container_issue 13
doi_str_mv
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050111730&partnerID=40&md5=2676c505ff09a64283d98137198d48de
description The extensive use of mobile applications in terms of user’s number and size of diverse data has introduced additional security threats which make uncovering these vulnerabilities complex for testers. Testers use certain types of software security testing to detect software vulnerabilities, particularly penetration testing. Test case selection is an essential phase of penetration testing, especially when testing complex and large applications. Multiple techniques have been proposed for selecting test cases to be used in penetration testing. In general, the majority of such techniques select a set of test cases that cover the designated paths and fit well with the user requirements. This study reviews existing techniques and models that are used for test case selection. Methods, strengths and weaknesses are the main factors that are presented in this study. This study shows that offloading, that is, the technology used in mobile cloud computing applications, has been disregarded by existing techniques and models for test case selection. Therefore, this study proposes an enhanced test case selection technique for penetration testing. This proposed technique considers offloading parameters when selecting test cases to improve coverage paths and reflect user preferences in terms of cloud and mobile priority percentages. Moreover, test cases for both mobile and cloud in the mobile cloud computing applications are considered to be selected in list of test cases to be executed. Besides, user preferences feature is provided in the selection process to reflect the importance of each parties, cloud and mobile sides of the application under test. The proposed technique will improve the security of mobile cloud computing applications by exposing the possible vulnerabilities from both mobile and cloud sides application. © 2005 – ongoing JATIT & LLS.
publisher Little Lion Scientific
issn 19928645
language English
format Review
accesstype
record_format scopus
collection Scopus
_version_ 1828987877576409088