Seminar On Security in Cloud Computing
Seminar On Security in Cloud Computing
MANAGEMENT
KABLANA, JHAJJAR
A
SEMINAR REPORT
On
“Security in Cloud Computing”
1 1. Introduction...........................................................................................................................................1
3 3. Cloud architecture.................................................................................................................................3
6 6. Conclusions..........................................................................................................................................25
References..................................................................................................................................................26
LIST OF FIGURES
1
2. EVOLUTION OF CLOUD COMPUTING
Cloud computing began to get both awareness and popularity in the early 2000s. When the
concept of cloud computing originally came to prominence most people did not fully understand
what role it fulfilled or how it helped an organization. In some cases people still do not fully
understand the concept of cloud computing. Cloud computing can refer to business intelligence
(BI), complex event processing (CEP), service-oriented architecture (SOA), Software as a Service
(SaaS), Web-oriented architecture (WOA), and even Enterprise 2.0. With the advent and growing
acceptance of cloud- based applications like Gmail, Google Calendar, Flickr, Google Docs, and
Delicious, more and more individuals are now open to using a cloud computing environment than
ever before. As this need has continued to grow so has the support and surrounding infrastructure
needed to support it. To meet those needs companies like Google, Microsoft, and Amazon have
started growing server farms in order to provide companies with the ability to store, process, and
retrieve data while generating income for themselves. To meet this need Google has brought on-
line more than a million servers in over 30 data centres across its global network. Microsoft is also
investing billions to grow its own cloud infrastructure. Microsoft is currently adding an estimated
20,000 servers a month. With this amount of process, storage and computing power coming online,
the concept of cloud computing is more of a reality than ever before. The growth of cloud
computing had the net effect of businesses migrating to a new way of managing their data
infrastructure. This growth of cloud computing capabilities has been described as driving massive
centralization at its deep centre to take advantage of economies of scale in computing power,
energy consumption, cooling, and administration.
3. CLOUD ARCHITECTURE
The architecture of cloud involves multiple cloud components communicating with each other over
the application programming interfaces (APIs), usually web services. The two most significant
components of cloud computing architecture are known as the front end and the back end. The
front end is the part seen by the client, i.e. the customer. This includes the client’s network or
computer, and the applications used to access the cloud via a user interface such as a web browser.
The back end of the cloud computing architecture is the cloud itself, which comprises of various
computers, servers and data storage devices.
The general architecture of cloud platform is also known as cloud stack given in
figure 3.1. Cloud services may be offered in various forms from the bottom layer to
top layer in which each layer represent one service model. The three key cloud
delivery models are software as a service (SaaS), platform as a service (PaaS), and
infrastructure as a service (IaaS). Infrastructure-as-a-Service (IaaS) is offered in the
bottom layer, where resources are aggregated and managed physically (e.g.,
Emulab) or virtually (e.g., Amazon EC2), and services are delivered in forms of
storage (e.g., GoogleFS), network (e.g., Openflow), or computational capability (e.g.,
Hadoop MapReduce). The middle layer delivers Platform-as a-Service (PaaS), in
which services are provided as an environment for programming (e.g., Django) or
software execution (e.g., Google App Engine). Software- as-a Service (SaaS) locates
in the top layer, in which a cloud provider further confines client flexibility by
merely offering software applications as a service. Apart from the service
provisioning, the cloud provider maintains a suite of management tools and
facilities (e.g., service instance life-cycle management, metering and billing,
dynamic configuration) in order to manage a large cloud system.
Cloud deployment models include public, private, community, and hybrid clouds
which is shown in figure 3.2. Public clouds are external or publicly available cloud
environments that are accessible to multiple tenants, whereas private clouds are
typically tailored environments with dedicated virtualized resources for particular
organizations. Similarly, community clouds are tailored for particular groups of
customers.
3
Figure 3.1: Cloud delivery model
The world of computation has changed from centralized to distributed systems and now we are
getting back to the virtual centralization which is the Cloud Computing. Location of data and
processes makes the difference in the realm of computation. We have the cloud computing
wherein, the service and data maintenance is provided by some vendor which leaves the
client/customer unaware of where the processes are running or where the data is stored. So,
logically speaking, the client has no control over it. The cloud computing uses the internet as the
communication media. When we look at the security of data in the cloud computing, the vendor
has to provide some assurance in service level agreements (SLA) to convince the customer on
security issues. Organizations use cloud computing as a service infrastructure, critically like to
examine the security and confidentiality issues for their business critical insensitive applications.
What are the security concerns that are preventing companies from taking advantage of the
cloud? This section deals with the taxonomy of the security concerns.
Traditional security issues are still present in cloud computing environments. But as enterprise
boundaries have been extended to the cloud, traditional security mechanisms are no longer
suitable for applications and data in cloud. Traditional concerns involve computer and network
intrusions or attacks that will be made possible or at least easier by moving to the cloud. Cloud
providers respond to these concerns by arguing that their security measures and processes are
more mature and tested than those of the average company. It could be easier to lock down
information if it’s administered by a third party rather than in-house, if companies are worried
about insider threats In addition, it may be easier to enforce security via contracts with online
services providers than via internal controls. Due to the openness and multitenant characteristic
of the cloud, cloud computing is bringing tremendous impact on information security field.
Availability concerns centre on critical applications and data being available. Well publicized
incidents of cloud outages include Gmail. As with the Traditional Security concerns, cloud
providers argue that their server uptime compares well with the availability of the cloud users
own data centres. Cloud services are thought of as providing more availability, but perhaps not
there are more single points of failure and attack. Third-party data control the legal implications
of data and applications being held by a third party are complex and not well understood. There is
also a potential lack of control and transparency when a third party holds the data. Part of the
hype of cloud computing is that the cloud can be implementation independent, but in reality
regulatory compliance requires transparency into the cloud.
5
4.1 CHARACTERISTICS OF CLOUD COMPUTING
Cloud services exhibit five essential characteristics that demonstrate their relation to, and
differences from, traditional computing approaches:
• Broad network access - Capabilities are available over the network and accessed through
standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g.,
mobile phones, laptops, and PDAs) as well as other traditional or cloud based software
services.
• Resource pooling - The providers computing resources are pooled to serve multiple
consumers using a multi-tenant model, with different physical and virtual resources
dynamically assigned and reassigned according to consumer demand. There is a degree of
location independence in that the customer generally has no control or knowledge over the
exact location of the provided resources, but may be able to specify location at a higher level of
abstraction (e.g., country, state, or datacentre). Examples of resources include storage,
processing, memory, network bandwidth, and virtual machines. Even private clouds tend to
pool resources between different parts of the same organization.
• Rapid elasticity - Capabilities can be rapidly and elastically provisioned in some cases
automatically to quickly scale out; and rapidly released to quickly scale in. To the consumer, the
capabilities available for provisioning often appear to be unlimited and can be purchased in any
quantity at any time.
• Measured service - Cloud systems automatically control and optimize resource usage by
leveraging a metering capability at some level of abstraction appropriate to the type of service
(e.g., storage, processing, bandwidth, or active user accounts). Resource usage can be
monitored, controlled, and reported providing transparency for both the provider and
consumer of the service.
Cloud computing becomes a successful and popular business model due to its charming
features. In addition to the benefits at hand, the former features also result in serious cloud-
specific security issues. The people whose concern is the cloud security continue to hesitate
to transfer their business to cloud. Security issues have been the dominate barrier of the
development and widespread use of cloud computing. Understanding the security and
privacy risks in cloud computing and developing efficient and effective solutions are critical
for its success. Although clouds allow customers to avoid start-up costs, reduce operating
costs, and increase their agility by immediately acquiring services and infrastructural
resources when needed, their unique architectural features also raise various security and
privacy concerns. There are three main challenges for building a secure and trustworthy
cloud system:
• Data security It focuses on protecting the software and hardware associated with the
cloud. It deals with choosing an apt location for data centres so as to protect it from internal
threats, different types of weather conditions, fire and even physical attacks that might
destroy the centre physically and external threats avoiding unauthorized access and break
ins.
• Network security Protecting the network over which cloud is running from various attacks
DOS, DDOS, IP Spoofing, ARP Spoofing and any novel attacks that intruders may device.
Attack on data affects a single user whereas a successful attack on Network has the
potential to affect multiple users. Therefore network security is of foremost importance.
Five most representative security and privacy attributes are confidentiality, integrity,
availability, accountability, and privacy-preservability, which is shown in figure 5.1. Within
the enterprise boundaries, data transmission usually does not require encryption, or just
have a simple data encryption measure. For data transmission across enterprise
boundaries, both data confidentiality and integrity should be ensured in order to prevent
data from being tapped and tampered with by unauthorized users. In other words, only the
data encryption is not enough. Data integrity is also needed to be ensured .Therefore it
should ensure that transport protocols provide both confidentiality and integrity.
Confidentiality and integrity of data transmission need to
11
Figure 5.1: Security and privacy attributes
ensure not only between enterprise storage and cloud storage but also between
different cloud storage services.
Threats to these attributes and Defence strategies are discussing below.
• The service provider knows where the user’s confidential data is located in
the cloud computing systems.
• The service provider has privilege to access and collect the user’s confidential
data in cloud.
• The service provider can understand the meaning of the user’s data.
• Malicious sysAdmin: The Cross-VM attack discusses how others may violate
confidentiality cloud customers that co-residing with the victim, although it is
not the only threat. Privileged sysadmin of the cloud provider can perform
attacks by accessing the memory of a customer’s VMs. For instance, Xenaccess
enables a sysadmin to directly access the VM memory at run time by running
a user level process in Domain0.
Defence strategies
15
accessed on rare occasions. The cloud servers are distrusted in terms of both
security and reliability, which means that data may be lost or modified
maliciously or accidentally. Administration errors may cause data loss (e.g.,
backup and restore, data migration, and changing memberships in P2P
systems). Additionally, adversaries may initiate attacks by taking advantage of
data owner’s loss of control over their own data.
Defence strategies
• Third party auditor (TPA): Instead of letting customers verify data integrity, it
is also possible to offload task of integrity checking to a third party which can
be trusted by both cloud provider and customers. It is propose to adopt a TPA
to check the integrity of outsourced data in cloud environments. TPA ensures
the following: 1) cloud data can be efficiently audited without a local data
copy, and cloud clients suffer no on-line overhead for auditing; 2) no new
vulnerabilities will be introduced to jeopardize data privacy. The key
technique is a public based homomorphic authenticator, which has been
utilized in
existing literatures. When combining a homomorphic authenticator with
random masking, TPA becomes unable to access the data content while it is
performing auditing.
• Flooding attack via bandwidth starvation: In a flooding attack, which can cause
Deny of Service (DoS), a huge amount of nonsensical requests are sent to a
particular service to hinder it from working properly. In cloud computing,
there are two basic types of flooding attacks:
Direct DOS the attacking target is determined, and the availability of the
targeting cloud service will be fully lost.
Indirect DOS the meaning is twofold: 1) all services hosted in the same
physical machine with the target victim will be affected; 2) the attack is
initiated without a specific target.
Defence strategies
• Defending the new DOS attack: This new type of DOS attack differs from the
traditional DOS or DDOS attacks in that traditional DOS sends traffic to the
targeting application/host directly while the new DOS attack does not;
therefore, some techniques and counter-measures for handling traditional
DOSs are no longer applicable. A DOS avoidance strategy called service
migration has been developed to deal with the new flooding attack. A
monitoring agent located outside the cloud is set up to detect whether there
may be bandwidth starvation by constantly probing the cloud applications.
When bandwidth degradation is detected, the monitoring agent will perform
application migration, which may stop the service temporarily, with it
resuming later. The migration will move the current application to another
subnet of which the attacker is unaware.
• FRC attack detection: The key of FRC detection is to distinguish FRC traffic
from normal activity traffic. Idziorek et al. propose to exploit the consistency
and selfsimilarity of aggregate web activity. To achieve this goal, three
detection metrics are used: i) Zipf s law are adopted to measure relative
frequency and self-similarity of web page popularity; ii) Spearmans footrule is
used to find the proximity between two ranked lists, which determines the
similarity score; iii) overlap between the reference list and the comparator list
measures the similarity between the training data and the test data.
Combining the three metrics yields a reliable way of FRC detection.
• SLA violation: the loss of data control is problematic when something goes
awry. For instance, the following problems may possibly arise: 1) The
machines
19
in the cloud can be mis-configured or defective and can consequently corrupt
the customers data or cause his computation to return incorrect results; 2)
The cloud provider can accidentally allocate insufficient resources for the
customer, an act which can degrade the performance of the customers
services and then violate the SLA; 3) An attacker can embed a bug into the
customers software in order to steal valuable data or to take over the
customers machines for spamming or DoS attacks; 4) The customer may not
have access to his data either because the cloud loses it or simply because the
data is unavailable at an inconvenient time.
Defence strategies
21
• Accountable MapReduce (AMR): This problem has been addressed with
SecureMR, which adopts full task duplication to double check the processing
result. SecureMR requires that twice two different machines, which will
double the total processing time, execute a task. Additionally, SecureMR
suffers false positive when an identical faulty program processes the
duplicated tasks.
Privacy is yet another critical concern with regards to cloud computing due to the
fact that customer’s data and business logic reside among distrusted cloud servers,
which are owned and maintained by the cloud provider. Therefore, there are
potential risks that the confidential data (e.g., financial data, health record) or
personal information (e.g., personal profile) is disclosed to public or business
competitors. Privacy has been an issue of the highest priority. Throughout this text,
we regard privacy- preservability as the core attribute of privacy. A few security
attributes directly or indirectly influence privacy preservability, including
confidentiality, integrity, accountability, etc. Evidently, in order to keep private data
from being disclosed, confidentiality becomes indispensable, and integrity ensures
that data/computation is not corrupted, which somehow preserves privacy.
Accountability, on the contrary, may undermine TABLE 5.1: Approaches of privacy
enforcement
Approach Description
Information centric Data objects have access-control
security policies with them.
Trusted computing The system will consistently behave in
expected ways with hardware or
software enforcement.
Cryptographic protocols Cryptographic techniques and tools
are employed to preserve privacy.
privacy due to the fact that the methods of achieving the two attributes usually
conflict [5].
Defence strategies
The privacy-preserving classified into three categories, which are shown in Table
5.1. It is proposed that Fully Homomorphic Encryption (FHE) to preserve privacy in
cloud computing. FHE enables computation on encrypted data, which is stored in
the distrusted servers of the cloud provider. Data may be processed without
decryption. The cloud servers have little to no knowledge concerning the input
data, the processing function, the result, and any intermediate result values.
Therefore, the outsourced computation occurs under the covers in a fully privacy-
preserving way.
23
FHE has become a powerful tool to enforce privacy preserving in cloud computing.
However, all known FHE schemes are too inefficient for use in practice. While
researchers are trying to reduce the complexity of FHE, it is worthwhile to consider
alleviating the power of FHE to regain efficiency. Somewhat homomorphic
encryption, which only supports a number of homomorphic operations, which may
be much faster and more compact than FHE.
6. CONCLUSIONS
Every new technology has its pros and cons, similar is the case with cloud computing. Although
cloud computing provides easy data storage and access. But there are several issues related to
storing and managing data, which is not controlled by owner of the data. This paper discussed
security issues for cloud. These issues include cloud integrity, cloud confidentiality, cloud
availability, cloud privacy. There are several threats to cloud confidentiality including cross-VM
attack and Malicious sysadmin. On the other hand integrity of cloud is compromised due to data
loss and dishonest computation in remote servers. Denial of Service attack (Dos) is the most
common attack which is also possible in cloud computing network. This attack attempts to
prevent the data available to its intended users. The last issue is cloud privacy and it is similar to
cloud confidentiality. If cloud confidentiality is at risk, cloud privacy will also be at risk.
25
REFERENCES
[1] C. Wang, Q, Wan, K. Ren nd Wenjing Lou, ”Privacy-Preserving Public Auditing for Data StorageSecurity
in Cloud Computing”, Infocom, Proceedings IEEE, 2010, pp.1-9.
[2] D. Chen and H. Zhao, ”Data Security and Privacy Protection Issues in Cloud Computing”, in
International Conference on Computer Science and Electronics Engineering(ICCSEE), 2012, vol.1,
pp.647-651.
[3] H. Takabi, J. B. D. Joshi and G. J. Ahn, ”Security and Privacy Challenges in Cloud Computing
Environments” , Security and Privacy, IEEE, vol.8 , no.6, pp.24-31, Nov/Dec 2010.
[4] K. Ren, C. Wang and Q. Wang, ”Security Challenges for the Public Cloud”, Internet Computing, IEEE ,
vol.16, no.1, pp.69-73, Jan/Feb 2012.
[5] Z. Xiao and Y. Xiao, ”Security and Privacy in Cloud Computing ”,IEEE Commun. Surveys and Tutorials,
vol. 15, no.2, pp.843 - 859, Second quarter 2013.
[6] Cloud Security Alliance (CSA). Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,
(Released December 17, 2009).
(http://www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf. Accessed Jan. 13, 2011.)