Cloud Computing - Architecture, Platform and Security Issues: A Survey
Cloud Computing - Architecture, Platform and Security Issues: A Survey
com
ABSTRACT
Cloud computing system delivers computing resources as a service over the network. During
the last few years clod computing technology has gained attention due to its autonomous and cost
effective services. It is responsible for the growth of IT industry. But cloud computing has various
security challenges that hinder the rapid adoption of this computing paradigm. Efficient steps should
be taken to make cloud computing more secure and reliable. This paper works on overview of clod
computing as well as related security issues.
1. INTRODUCTION
security challenges. These security issues should be identified and analyzed in order to make
cloud computing services more secured and reliable. This paper describes cloud computing
architecture, platform, main security issues and their potential solutions.
2. CLOUD ARCHITECTURE
-254-
World Scientific News 86(3) (2017) 253-264
that have an effect on and are impacted by cloud computing, along with its security
implications.
Cloud Consumer: An individual or organization that keeps up a business association
with, and uses services from cloud provider.
Cloud Provider: An individual or organization for creating a service accessible to
interested parties.
Cloud Auditor: A party that can conduct autonomous appraisal of cloud
administrations, data framework operations, performance and security of the cloud
usage.
Cloud Broker: An entity that deals with utilization, performance and delivery of
cloud services and negotiates relationships between cloud consumers and providers.
Cloud Carrier: A medium that provides network and transport of cloud services from
cloud providers to cloud consumers.
Figure 1 shows the architecture of cloud computing. The figure represents an end-to-end
reference architecture that represents the layers of Open Systems Interconnection Model
(OSI). As it is apparent, cloud computing is a complex arrangements with numerous areas of
vulnerabilities.
-255-
World Scientific News 86(3) (2017) 253-264
As big data cloud computing and internet technology grow, they raise a new concept of
services. This services can interconnect huge number of online activities. As per a review
from Cisco, the Internet of Things (IoT) is dynamically expanding the abilities of the cloud
[4]. The major three service models are Software as a Service (SaaS), Platform as a Service
(PaaS), Infrastructure as a Service (IaaS).
A. Software as a Service (SaaS): A Software as a Service (SaaS) cloud framework enables
clients to access applications and settings that have been conveyed by the supplier. The
customers can access these cloud applications using a simple browser. In SaaS, the cloud
provider is only authorized to control the application level. The subscriber does not control or
manage middleware, hardware or operating system. Figure 2 shows the control
responsibilities of cloud provider and cloud subscriber in SaaS model. The SaaS model has
some unique characteristics [5]:
In spite of the fact that the consumers loses some level of control, the SaaS model
moves the burden of getting and keeping a venture application up and running from
the customer to the vendor. It allows users to use the software functionality without
the burden of managing the software themselves.
Generally rather than authorizing, installing and maintaining software on consumers’
personal computers or servers, the SaaS model gives users access to the software via
the internet on a pay-as-you-use basis.
The SaaS model enables every customers to benefit from the vendor’s most recent
technological elements without the disturbances and costs associated with software
updates and upgrades.
The SaaS model disposes of the additional expenses and complexities of conveying
extra hardware and software, to help an enterprise application on a continuous basis.
Every customer can pick either to share access to the software to different customers
(multi-tenancy), in this way empowering shared aggregate expenses and making
economies of scale, or choose to be a single tenant, accordingly giving more
prominent control and security.
-256-
World Scientific News 86(3) (2017) 253-264
-257-
World Scientific News 86(3) (2017) 253-264
Choosing the suitable type of cloud computing deployment model is very important for
an institution. Institutions must analyze their data precisely before deciding which type of
model to choose in order to avoid failure of implementation. There are four common cloud
deployment models, namely, private cloud, public cloud, hybrid cloud, community cloud.
A. Private Cloud: The cloud infrastructure is operated exclusively for an organization. It may
be controlled by the organization or a third party and might exist on premise or off premise
[5]. Cloud computing services is not accessible by the public but to use it within the
organization. A private cloud gives more security than public clouds, and cost saving in case
it makes use of unused capacities in an already existing data center. Making such un-used
capacities available through cloud interfaces allows to utilize the same tools as when working
with public clouds and to benefit the capabilities inherent in cloud management software, like
a self-service interface, automated control of computing resources, and the potential to sell
current over capacities to partner corporations [5]. Some characteristics of private cloud are
listed below [6]:
Enhanced security measures: In IT sector is one of the requirements. Almost all
institutions seek for security particularly financial institutions. Private cloud model
ensures security against illegal usage, such as hacking by providing strong security
tools.
Dedicated Resources: Like a supporter of private cloud, enterprises have their own
committed resources, for instance, the time of processor and the data buses that assure
ideal execution.
Better Customization: The private cloud model is customizable as it could be
constructed to outfit the perfect requests of a commercial enterprise. This in turns
permits the commercial enterprise to take additional manage over their own data to
ensure security.
-258-
World Scientific News 86(3) (2017) 253-264
B. Public Cloud: The public cloud model offers data storages, applications and other services
to its users and owned by the service provider. This is based on the characteristics of pay-per-
usage model. Users can scale their use on demand and do not have to buy hardware for the
service. Public clouds are available to the general public or organizations, and are owned by a
third party service provider that offers the cloud service [5]. Public cloud users are normally
residential users and connect to the general public internet through an internet service
provider’s network.
The advantages of public cloud include [5]:
On demand scalability.
Continuous uptime and data availability.
No dissipated resources.
Easy and flexible setup.
Public clouds have some drawbacks also including data security and privacy. Another
issue is that users don’t know where the data is stored.
Characteristics of public clouds are listed below [6]:
Flexible and elastic environment: Public cloud provides an elastic environment to its
users. It allows customers to share and store information on their demand.
Freedom of self-service: The public cloud conjures up it customers in making a cloud
all on my own exceptional of taking anybody's assistance. That is called because the
pre-configured clouds, which exist on the internet. The main factor is that
organizations that preference to select the public cloud need to do is to visit the portals
of the public cloud begin with it. They do not need to depend on any third-party
support in making or running kind of cloud.
Pay-Per-Use: This unique function empowers the era of cloud to be greater reachable
by organizations to operate in a synchronized manner. The further organization uses
the services of cloud, the well progressive the future business could be.
Availability and Reliability: The fact that the public cloud is out there to all and
believes in agility is one of the many other characteristics if the public cloud. The
users have the opportunity to time their work from anywhere in the glob and at any
time. No longer just consumers come to be being free to run simple assignments of the
business but they're additionally more productive in reinforcing purchaser
relationships over the globe.
C. Hybrid Cloud: Hybrid cloud is made from lots of both public or private cloud that is
shared among the institutions that have similar interests and necessities, it is can be internally
managed and it may also be managed by the third-party which is inner or outside hosted.
Hybrid cloud infrastructure is a composition of two or more clouds which can be unique
entities and are bound collectively by using standardized or proprietary technology that
permits data and application portability [5]. A hybrid cloud is normally supplied in considered
one of two methods: a vendor has a private cloud and makes a partnership with a public cloud
provider, or a public cloud provider makes a partnership with a vendor that provides private
cloud systems [5]. The characteristics of hybrid cloud include [6]:
-259-
World Scientific News 86(3) (2017) 253-264
Optimal Use: The typical centres of data in the server resources are used from 5 to
20%. The cause behind that is the crest masses, which are ten times higher than that of
the typical burden. On this manner, servers are generally sitting still - making
unnecessary costs. Hybrid cloud could expand server use with the aid of scaling out
the open assets to take care of the hosts.
Availability: The accessibility in the corporate server is troublesome in addition to
expensive, as it necessitates data reinforcements, data redundancy and geographical
scattering. Especially inside the corporations where information technology is not the
point of interest corporate, the ability round there is incredibly restrained. In a hybrid
cloud, the general public cloud would possibly scale up or completely overtake
operations if the organization's server is not available due to some failures.
Risk Transfer: Organizations personally are managing and running their server and
private cloud. The provider of the public cloud must ensures an intense uptime for
their service. Using the hybrid cloud, the danger of misestimating workload is
relocated to the cloud dealer from the service operator.
This section discusses the specific security issues and existing solutions to secure cloud
computing environment. Top seven security threats to cloud computing analyzed by Cloud
Security Alliance (CSA) [7] are described below:
-260-
World Scientific News 86(3) (2017) 253-264
(I) Abuse and Nefarious Use of Cloud Computing: Abuse and nefarious use of cloud
computing is one of the major threat identified by the CSA. An example of that is the usage of
botnets to spread spam and malware. Attackers can access a public cloud, for instance, and
discover a way to upload malware to thousands of computers and use the power of the cloud
infrastructure to assault other machines. Suggested remedies by the CSA:
Stricter initial registration and validation procedures
Enhanced credit score card fraud tracking and coordination.
Comprehensive introspection of customer network traffic.
Monitoring public blacklists for one’s own network blocks.
(II) Insecure Application Programming Interfaces: As software interfaces or APIs are
what customers use to have interaction with cloud services, those must have extraordinarily
secure authentication, access control, encryption and activity monitoring mechanisms -
specifically when third parties begin to construct on them. Suggested remedies by CSA:
Analyze the safety version of cloud provider interfaces.
Ensure best authentication and access controls are carried out in concert with
encrypted transmission.
Recognize the dependency chain associated with the API.
(III) Malicious Insiders: The malicious insider danger is one that is important as many
providers don't reveal how they hire people, how they provide them access to assets or how
they monitor them. Suggested remedies by CSA:
Enforce strict supply chain management and operate a comprehensive supplier
evaluation.
Specify human resource necessities as a part of legal contracts.
Require transparency into entire information security and management
practices, as well as compliance reporting.
Identify security breach notification techniques.
(IV) Shared Technology Vulnerabilities: IaaS providers usually share infrastructure.
Unfortunately, the components on which this infrastructure is primarily based were not
designed for that. To make sure that consumers do not thread on each different's "territory",
monitoring and robust compartmentalization is required. Suggested remedies by CSA:
Implement security best practices for installation/configuration.
Observe surroundings for unauthorized adjustments/activity.
Promote robust authentication access control for administrative access and
operations.
Enforce service level contracts for patching and vulnerability remediation.
Conduct vulnerability scanning and configuration audits.
(V) Data Loss/Leakage: Without a backup or by unauthorized access, data is always in
danger of being lost or stolen. This is one of the top threats for companies as the nay lose their
reputation. Suggested remedies by CSA:
Implement robust API access control.
Encrypt and protect integrity of data in transit.
-261-
World Scientific News 86(3) (2017) 253-264
6. CONCLUSION
This paper presents various aspects of cloud computing and its security issues. There
are several cloud platforms. How to recognize and use these platforms is a big issue. As cloud
computing is enhancing more and more it brings with it many problems and challenges which
include many security threads. Cloud computing has essential ability to protect these
challenges and grow to be a leader in resource sharing technologies.
-262-
World Scientific News 86(3) (2017) 253-264
References
[1] P. Mell and T. Grance, The NIST Definition of Cloud Computing: Recommendations of
the National Institute of Standards and Technology, Special Publication 800-145, 2011
[2] Jose Moura, David Hutchison, Review and Analysis of Networking Challenges in
Cloud Computing, Journal of Network and Computer Applications, 60, 2015
http://dx.doi.org/10.1016/j.jnca.2015.11.015
[3] Gururaj Ramachandra, Mohsin Iftikhar, Farrukh Aslam Khan, A Comprehensive
Survey on Security in Cloud Computing, Procedia Computer Science, Volume 110,
2017, 465-472, http://dx.doi.org/10.1016/j.procs.2017.06.124
[4] Saurabh Singh, Young-Sik Jeong and Jong Hyuk park, A Survey on Cloud Computing
Security: Issues, Threats, and Solutions, Journal of Network and Computer
Applications, http://dx.doi.org/10.1016/j.jnca.2016.09.002
[5] Sumit Goyal, Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical
Review. I. J. Computer Network and Information Security, 2014, 3, 20-29,
DOI:10.5815/ijcnis.2014.03.03
[6] Tinankoria Diaby, Babak Bashari Rad, Cloud Computing: A review of the Concepts
and Deployment Models, I.J. Information Technology and Computer Science, 2017, 6,
50-58, DOI:10.5815/ijitcs.2017.06.07
[7] Security Guidance for Critical Areas of Focus in Cloud Computing, April 2009. DOI:
http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
[8] Gurkok, Cem. (2017). Securing Cloud Computing Systems. Chapter 63.
http://dx.doi.org/10.1016/B978-0-12-803843-7.00063-6
[9] Yuhong Liu, Yan (Lindsay) Sun, Jungwoo Ryoo and Syed Rizvi, Athanasios V.
Vasilakos. A Survey of Security and Privacy Challenges in Cloud Computing: Solutions
and Future Directions. Journal of Computing Science and Engineering, Vol. 9, No. 3,
September 2015, pp. 119-133
[10] C. Prakash and S. Dasgupta. Cloud computing security analysis: Challenges and
possible solutions. 2016 International Conference on Electrical, Electronics, and
Optimization Techniques (ICEEOT), Chennai, 2016, pp. 54-57.
[11] Rajani Sharma, Rajender Kumar Trivedi, Literature review: Cloud Computing –
Security Issues, Solution and Technologies. International Journal of Engineering
Research, Volume No.3, Issue No.4, pp. 221-225
[12] Jose Moura and David Hutchison. Review and Analysis of Networking Challenges in
Cloud Computing. Journal of Network and Computer Applications,
http://dx.doi.org/10.1016/j.jnca.2015.11.015
[13] Himanshu Raj, Ripal Nathuji, Abhishek Singh, Paul England-Microsoft Corporation,
Resource Management for Isolation Enhanced Cloud Services, CCSW’09, November
13, 2009, Chicago, Illinois, USA. Available at:
http://www.cs.jhu.edu/~sdoshi/jhuisi650/papers/spimacs/SPIMACS_CD/ccsw/p77.pdf
-263-
World Scientific News 86(3) (2017) 253-264
[14] S. Pearson and A. Benameur, Privacy, Security and trust issues arising from cloud
computing, IEEE 2nd International Conference on Cloud Computing Technology and
Science (CloudCom), Indianapolis, IN, 2010, pp. 693-702
[15] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina,
Controlling data in the cloud: outsourcing computation without outsourcing control,
ACM Workshop on Cloud Computing Security, Chicago, IL, 2009, pp. 85-90.
[16] Lizhe Wang, Jie Tao, Kunze M., Castellanos A.C., Kramer D., Karl W., Scientific
Cloud Computing: Early Definition and Experience, 10th IEEE Int. Conference on High
Performance Computing and Communications, pp. 825-830, Dalian, China, Sep. 2008,
ISBN: 978-0-7695-3352-0
[17] Sanjoli Singla, Jasmeet Singh, Cloud Data Security using Authentication and
Encryption Technique. International Journal of Advanced Research in Computer
Engineering & Technology (IJARCET), Volume 2, Issue 7, July 2013
[18] Tehrani, S.R. and F. Shirazi, Factors influencing the adoption of cloud computing by
small and medium size enterprises (SMEs). International Conference on Human
Interface and the Management of Information. 2014. Springer
[19] Hashemi, S.M. and A.K. Bardsiri, Cloud computing Vs. grid computing. ARPN Journal
of Systems and Software, 2(5), 2012, 188-194
[20] Chiang Ku Fan, Chen-Mei Fan Chiang, Tong Liang Kao, Risk Management Strategies
for the Use of Cloud Computing, I. J. Computer Network and Information Security, 12
2012, 50-58
[21] M. Monsef, N. Gidado, Trust and privacy concern in the Cloud, 2011 European Cup, IT
Security for the Next Generation, 2011, p. 1-15
[22] D. Jamil, H. Zaki, Security Issues in Cloud Computing and Countermeasures,
International Journal of Engineering Science and Technology, Vol. 3, No. 4, 2011, pp.
2672-2676
-264-