A Survey on Security issues in cloud computing
|
|
|
- Coral Ball
- 10 years ago
- Views:
Transcription
1 A Survey on Security issues in cloud computing D. Anil Kumar, Y. Manasa 1 Assistant Professor, Dept of CSE, Qis Institute of Technology, Ongole, 2 Dept of IT, NRI Institute of Technology, Vijayawada. [email protected], [email protected] Abstract: The cloud computing ensures remarkable potential strength to provide elastic, cost effective, easy to manage, and powerful resource management through the internet. The cloud computing, upsurges the capabilities of the hardware resources by optimal and shared utilization. The above feature enables or encourages the individuals and industries to collaborate applications and services with cloud environment. Because of cloud simplicity, it ensures plenty of potential security threats to cloud data storage and applications. This survey provides the details of security issues that arise due to the very nature of cloud computing in very recent years. 1. Introduction Since its inception, the cloud computing paradigm has gained the widespread popularity in the industry and academia [1]. The economical, scalable, expedient, ubiquitous, and on-demand access to shared resources are some of the characteristics of the cloud that have resulted in shifting the business processes to the cloud [2]. The cloud computing attracts the attention of research community due to its potential to provide tremendous benefits to the industry and the community [9]. The resources are provided to the users and released based on demands from the pool of shared resources [4]. The ondemand resource provisioning ensures the optimal resource allocation and is also cost effective. The consumers (individuals and business organizations) no longer need to invest heavily in the information technology (IT) infrastructure [4]. Customers use resources provided by the cloud and pay according to the use. On the other hand, cloud providers can re-use resources as soon as they are released by a particular user resulting in improved resource utilization. Ease of use is yet another advantage being offered by the cloud computing because it does not require the customers to possess extraordinary expertise pertaining to the cloud specific technologies [5]. The management of the technology and services has moved from user to the service provider s end [5].There are various studies in the literature discussing the security issues of the cloud computing. The authors in [5,10] presented reviews on the security issues of the cloud computing. However, the aforesaid studies are limited to the discussion of security issues only and the security solutions are not discussed. Ref. [11] reviewed the security issues at different levels of cloud computing. The security solutions have also been presented in [11]. However, the future discussion has not been discussed comprehensively and overview of the cloud technology is missing. The authors in [1] presented a comprehensive study of privacy preservation in the cloud with focus only on e-health clouds. Moreover, the study in [1] is limited in scope to the privacy only. 74
2 2. CLOUD COMPUTING ARCHITECTURAL FRAMEWORK Cloud computing integrates various computing technologies to provide services to the end users. To understand the security issues pertaining to the cloud computing, it is important to briefly introduce the concepts that contribute to the cloud computing. The National Institute of Standards and Technology s (NIST) definition [69] of cloud computing is widely accepted [2]. The NIST definition considers the cloud computing as a threefold model of service provisioning (Fig. 1), comprising of: (a) essential characteristics, (b) service models, and (c) deployment models. The cloud computing concepts in the light of NIST definition are presented below CHARACTERISTICS On-demand self-service Customers can request and manage the services from the cloud without any human interaction with the CSP. The provision of the services and the associated resources is accomplished as and when required. This is usually done through Web services and management interfaces [2] Broad network access The services and the customer s applications and data present on the cloud must be accessible to the customers using the standard mechanisms and protocols. The characteristic further demands that the availability of services should support heterogeneous thin or thick environment (for example, mobile phones, laptops, workstations, tablets). Broad network access is sometimes referred to as ubiquitous network access in the literature [2] Resource pooling The cloud s resources are shared among multiple customers by pooling in a multi-tenant environment. The customers are transparent about the location of the resources. There is a mapping between physical and virtual resources provided to the customers Rapid elasticity The resources can be rapidly and elastically scaled as per customer s demands. The customer has a view of unlimited resources that can be purchased as needed in a pay-as-you-go manner Measured service The scaling of resources up and down is performed dynamically and the usage of services is metered and reported to the customer and CSP. The metering also helps the optimization of resource usage automatically while the users are charged in a pay-asyou-use manner Multi-tenancy The NIST defines the above mentioned five characteristics of the cloud computing. However, the Cloud Security Alliance (CSA) adds multi-tenancy as an important characteristic of the cloud computing (although not an essential characteristic)
3 distribute the software through Web. The customers pay for the usage and do not own the software [6] PaaS Fig. 1 NIST definition of cloud computing. Multi-tenancy is the property that enables the use of a single resource by multiple customers that may or may not belong to the same organization. Multitenancy results in optimal use of resources and different customers are segregated logically SERVICE MODELS The NIST divides the services provided by the cloud computing into three categories, namely: (a) software as a service (SaaS), (b) platform as a service (PaaS), and (c) infrastructure as a service (IaaS). The cloud service model is referred to as SPI (software, platform, and infrastructure) SaaS The SaaS enables the customers to use CSP s applications, running on the cloud infrastructure, through the Internet. The thin client interface can be used to access the applications such as web browser. The SaaS does not provide the facility to create an application or software. The SaaS only provides software through Internet making it a model to The applications that are owned by the customer need a frame work where they can be executed and managed. This includes integrated development environments (IDE), operating systems, and platform layer resources (run time engine that executes the applications). The aforementioned services are provided as PaaS. The PaaS does not provide customers with the control over the underlying cloud infrastructure but only on the applications that are moved to the cloud IaaS The IaaS refers to the hardware infrastructure provided by the CSP including the network, storage, memory, processor, and various other computing resources. The resources are provided in the form of virtualized systems accessible through Internet. The CSP has a control over the underlying resources [9] DEPLOYMENT MODELS There are four models that can be used to deploy a cloud computing infrastructure, namely: (a) private cloud, (b) public cloud, (c) community cloud, and (d) hybrid cloud Private cloud The cloud that is run and managed only for a single organization is the private cloud. The organization may or may not own the physical infrastructure and can be managed by the organization itself or by a third party. Similarly, private cloud may or may not 76
4 be located at organization s geographical site. However, whatever the case may be, private cloud is for the use of only single organization and the resources are not utilized by any other customer Public cloud The cloud s physical infrastructure is owned by the CSP and is open to general public and organizations. The resources are shared among all the customers. The customers pay the cloud owner according to the services and resources they use. The physical infrastructure is located off-site to the customers and is managed by the CSP Community cloud The community cloud is shared by a number of organizations and/or customers forming a community. Generally, the community shares common interests, such as the mission, security requirements, policy, and compliance considerations. The community cloud may be managed by any of the organizations in the community or a third party. Similarly, it may be located on premise or offpremise Hybrid cloud The hybrid cloud is the mix of two or more clouds (public, private, or community). All of the participating clouds retain their status of a unique entity, but share standardized or proprietary technology. 3. CLOUD SECURITY CHALLENGES 3.1 VIRTUALIZATION ISSUES Virtualization is one of the strategic components of the cloud. Virtualization allows the use of same physical resources by multiple customers. A separate VM is instantiated for each user that virtually provides a complete operating machine to the user [7]. Several VMs can be mapped to the same physical resources allowing the resource pooling in multitenant environment. A VM monitor (VMM) or hypervisor is the module that manages the VMs and permits various operating systems to run simultaneously on the same physical system [7]. Nevertheless, virtualization also introduces security challenges to the cloud users and infrastructure [8]. We discuss the security issues related to virtualization below VM image sharing. A VM image is used to instantiate VMs. A user can create his/her own VM image or can use an image from the shared image repository [9]. The users are allowed to upload and download images from the repository (for example Amazons image repository) [9]. Sharing of VM images in the image repositories is a common practice and can evolve as a serious threat if it is used in malicious manner [4]. A malicious user can investigate the code of the image to look for probable attack point. On the other hand, a malicious user can upload an image that contains a malware [7]. The VM instantiated through the infected VM image will become source of introducing malware in the cloud computing system. Moreover, an infected VM can be used to monitor the activities and data of other users resulting in privacy breach. Likewise, if the image is not properly cleaned, it can expose some confidential information of the user [3]. 77
5 VM isolation. VMs running on the same physical hardware need to be isolated from each other. Although logical isolation is present between different VMS, the access to same physical resources can lead to data breach and cross-vm attacks. Isolation is not only needed on storage devices but memory and computational hardware also needs fine grained isolation of VMs [1] VM escape. VM escape is a situation in which a malicious user or VM escapes from the control of VMM or hypervisor [7]. A VMM is a software component that manages all the VMs and their access to the hardware. The VM escape situation can provide attacker access to other VMs or can bring the VMM down [4]. A successful VM escape attack can provide access to the computing and storage hardware. The IaaS service model is affected that can in turn effect other service models [3] VM migration. The VM migration is the process of relocating a VM to another physical machine without shutting down the VM [8]. The VM migration is carried out for a number of reasons, such as load balancing, fault tolerance, and maintenance [3]. During the migration phase, the contents of the VM are exposed to the network that might lead to data privacy and integrity concerns. Besides data, the code of VM also becomes vulnerable to attackers during migration [4]. The migration module can be compromised by an attacker to relocate the VM to a compromised server or under the control of compromised VMM. The VM 78 migration is a crucial phase and needs to be carried out in a secured manner [9] VM rollback. Virtualization allows the rollback of a VM to some previous state whenever it is needed. The rollback feature provides flexibility to the user. However, rollback also raises security concerns [9]. For example, the rollback can enable the security credentials that were previously disabled [9]. Moreover, the rollback can also render the VM to a vulnerability that was previously patched [16]. Furthermore, the rollback can revert the VM to previous security policies and configuration errors [9] Hypervisor issues. The key module of virtualization is hypervisor or VMM. The VMs management and isolation is the responsibility of the VMM. Generating and managing virtual resources, is yet another function performed by the VMM. A VMM may affect the execution of VMs running on the host system [10]. A compromised VMM can put all the VMs that are managed by the victim VMM under attacker s control [1]. The metadata of the VMs, kept by the VMM, may also be exposed to an attacker if the attacker takes control of a VMM [1,10]. A VMM can provide larger attack vector due to more entry points and interconnection complexities [10]. There are many reported bugs in the VMM that let the attacker to take control of the VMM or bypass security restrictions. For example, vulnerabilities in the Xen, Microsoft Virtual PC, and Microsoft Virtual Server can be abused by attackers to gain privileged rights [12].
6 VM sprawl. VM sprawl is a situation where a number of VMs on the host system is continuously increasing and most of the already instantiated VMs are in idle state [8]. The VM sprawl causes the resources of the host machine to be wasted on large scale [9] DATA/STORAGE ISSUES The cloud computing model does not deliver users with full control over data. Distinct to conventional computing model, the cloud computing permits the service providers to exercise control to manage servers and data. The user enjoys certain level of control only on the VMs [14]. The lack of control over the data results in greater data security risks than the conventional computing model. Moreover, the characteristics of cloud computing like multi-tenancy and virtualization also come up with the possibilities of attacks different than the conventional computing model. Below we provide an overview of the security challenges faced by the data in cloud computing environment Data privacy and integrity. Although the cloud computing ensures the cost economy and also relieves the users from infrastructure management activities, it also entails security issues. The data in the cloud is much more vulnerable to risks in terms of confidentiality, integrity, and availability in comparison to the conventional computing model [11]. The ever increasing number of users and applications leads to enhanced security risks. In a shared environment, the security strength of the cloud equals the security strength of its weakest entity [3]. Not only the malicious entity collocated with the victim data, but also any non-malicious but unsecure entity can result in breach of data. A successful attack on a single entity will result in unauthorized access to the data of all the users. Violation of integrity may also result from multi-tenant nature of the cloud. Employee of SaaS providers, having access to information may also act as a potential risk [39]. Besides the data at rest, the data being processed also comes across security risks [9]. Due to virtualization physical resources are shared among multiple tenants. This eventually may allow malicious users (sharing computing resources) to launch attacks on the data of other users while in processing phase [5]. Moreover, if the data backup process is outsourced to a third party by the CSP, risks boundary is also broadened. The cryptographic key generation and management for cloud computing paradigm is also not standardized. Absence of secure and standard key management techniques for the cloud does not allow the standard cryptographic mechanisms to scale well to the cloud computing model [7]. Therefore, domain of cryptography also enhances the potential risks to the data Data recovery vulnerability. Due to resource pooling and elasticity characteristics, the cloud ensures dynamic and on demand resource provisioning to the users. The resource allocated to a particular user may be assigned to the other user at some later point of time. In case of memory and storage resources, a malicious user can employ data recovery techniques to obtain the data of previous users [10]. The authors in [10] were able to recover Amazon machine images files 98 % of the times. The 79
7 data recovery vulnerability can pose major threats to the sensitive user data [7] Improper media sanitization. The issue is related to the destruction of physical storage media due to a number of reasons, for example, (a) the disk needs to be changed, (b) the data no longer needs to be there, and (c) termination of service [7]. If the CSP does not sanitize the devices properly, the data can be exposed to risks [7]. Sometimes, the multi-tenancy also contributes to the risk of device sanitization. At the end of the device life cycle, it may not be possible to destroy it as it is in use of some tenants [8] Data backup. The data backup is also an important issue that needs to be dealt carefully. A regular data backup is needed at the CSP side to ensure the availability and recovery of data in case of intentional and accidental disasters. Moreover, the backup storage also needs to be protected against unauthorized access and tampering [11] WEB APPLICATION AND APPLICATION PROGRAMMING INTERFACE (API) SECURITY As discussed in Section 1, services and applications to the cloud users are provided through the Internet [16]. In fact, it is one of the essential requirements for a cloud application to be utilized and managed over the Web [11]. The application provided by the CSP is always located at the cloud with users accessing it ubiquitously. One of the important characteristics of cloud applications is that they are not bonded with specific users [10]. Different users may access the 80 same application possibly at the same time. The cloud applications inherit the same vulnerabilities as traditional Web applications and technology. However, the traditional security solutions are not adequate for the cloud computing environment because the vulnerabilities in web application in cloud can prove to be far more devastating than the traditional Web applications. Co-location of multiple users, their data, and other resources makes it much greater issue. The top ten risks in the web applications have been identified by Open Web Application Security Project in 2013 to be the following [7]. Injection (SQL, OS, and LDAP) Broken Authentication and Session Management Cross-Site Scripting (XSS) Insecure Direct Object References Security Misconfiguration Sensitive Data Exposure Missing Function Level Access Control Cross-Site Request Forgery (CSRF) Using Known Vulnerable Components Invalidated Redirects and Forwards The development, management, and use of Web applications must take into consideration the above given risks to safeguard the web applications and users resources. The user and the services in the cloud are bridged by the APIs. The security of APIs highly influences the security and availability of the cloud services [10]. The secure APIs ensure the protected and non-malicious use of the cloud services [11]. An API can be thought of a user guide that describes the details about the CSPs cloud architecture and features. The users build or extend the services using the APIs [11]. The CSPs usually publish their APIs to market the features of their cloud. At one hand, the publishing of APIs helps the users to know the details about the components and functions of the cloud. On the other hand, the cloud architecture to some extent is exposed to the attackers
8 [10]. Therefore, insecure APIs can be troublesome for both the cloud and the users. The vulnerabilities of APIs include weak credentials, insufficient authorization and input-data validation. Moreover, the frequent updates of APIs may introduce security holes in the applications [14] IDENTITY MANAGEMENT AND ACCESS CONTROL In a cloud environment, the confidentiality and integrity of data and services is also linked with the identity management and access control. It is exceptionally important to keep track of the user s identity and controlling unauthorized access to the information [16]. The issue of identity management and access control becomes more complex in a cloud environment due to the fact that the owner and resources are in different administrative domains and organization s authentication and authorization may not be exported to the cloud in the existing. 4. CONCLUSION This survey presented the security issues that arise due to the shared, virtualized, and public nature of the cloud computing paradigm. Subsequently, the counter measures presented in the literature are presented. The tabulated analysis of the presented techniques highlighted the scope of security services provided by the reviewed techniques. Tabulated analysis will greatly help the readers to compare and analyze the pros and cons of the research endeavors. Due to increased use of smart phones and mobile devices, the MCC has also taken off. We briefly discuss the security concerns of the MCC. The discussion of the presented technique has led ways to highlight some open issues to motivate the research community and academia to focus on the subject. 5. REFERENCES [1] A. Abbas, S.U. Khan, A review on the state-ofthe-art privacy preserving approaches in e-health clouds, IEEE J. Biomed. Health Inform. (2014). [2] M. Aslam, C. Gehrmann, M. Bjorkman, Security and trust preserving VM migrations in public clouds, in: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp [3] A. Andrieux, K. Czajkowski, A. Dan, K. Keahey, H. Ludwig, T. Nakata, J. Pruyne, J. Rofrano, S. Tuecke, M. Xu, Web services agreement specification (WSagreement), [4] M. Balduzzi, J. Zaddach, D. Balzarotti, E. Kirda, S. Loureiro, A security analysis of amazon s elastic compute cloud service, in: Proceedings of the 27 th Annual ACM Symposium on Applied Computing, 2012, pp [5] S. Carlin, K. Curran, Cloud computing security, Int. J. Ambient Comput. Intell. 3 (1) (2011) [6] R. Chandramouli, M. Iorga, S. Chokhani, Cryptographic key management issues and challenges in cloud services, in: Secure Cloud Computing, Springer, New York, 2014, pp doi: / _1. [7] S. Chaisiri, B. Lee, D. Niyato, Optimization of resource provisioning cost in cloud computing, IEEE Trans. Services Comput. 5 (2) (2012) [8] D. Chen, H. Zhao, Data security and privacy protection issues in cloud computing, in: International Conference on Computer Science and Electronics Engineering (ICCSEE, IEEE), vol. 1, 2012, pp
9 [9] R. Bobba, H. Khurana, M. Prabhakaran, Attribute-sets: a practically motivated enhancement to attribute-based encryption, in: Computer Security ESORICS, Springer, Berlin, Heidelberg, 2009, pp [10] J. Che, Y. Duan, T. Zhang, J. Fan, Study on the security models and strategies of cloud computing, Proc. Eng. 23 (2011) [11] A. Corradi, M. Fanelli, L. Foschini, VM consolidation: a real case based on openstack cloud, Future Gener. Comput. Syst. 32 (2014) [12] Y. Fu, Z. Lin, Exterior: using a dual-vm based external shell for guest-os introspection, configuration, and recovery, in: Proceedings of the 9th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2013, pp [13] J. Groth, Amit Sahai, Efficient non-interactive proof systems for bilinear groups, in: Advances in Cryptology EUROCRYPT, Springer, Berlin, Heidelberg, 2008, pp [14] N. Gonzalez, C. Miers, F. Redgolo, M. Simplcio, T. Carvalho, M. Nslund, M. Pourzandi, A quantitative analysis of current security concerns and solutions for cloud computing, J. Cloud Comput. 1 (1) (2012) [15] M. Ficco, M. Rak, Stealthy denial of service strategy in cloud computing, IEEE Trans. Cloud Comput. (2014). [16] C. Wang et al., Privacy-Preserving Public Auditing for Storage Security in Cloud Computing, Proc. IEEE INFOCOM 10, Mar
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Parametric Analysis of Various Cloud Computing Security Models
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1499-1506 International Research Publications House http://www. irphouse.com Parametric Analysis
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING 1. K.SURIYA Assistant professor Department of Computer Applications Dhanalakshmi Srinivasan College of Arts and Science for Womren Perambalur Mail: [email protected]
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Data Security in Cloud
Data Security in Cloud Mr. Pankaj Sareen Assistant Professor, Department of Computer Applications SPN College, Mukerian, Punjab [email protected] Dr. Tripat Deep Singh Assistant Professor, Department
Security Aspects of Cloud Computing
Security Aspects of Cloud Computing Kunal Chadha Scholar, CSE Department University of Southern California, USA Anvita Bajpai X-Scholar, CSE Department Marist College, NY, USA ABSTRACT Cloud Computing
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
Security Threats in Cloud Computing Environments 1
Security Threats in Cloud Computing Environments 1 Kangchan Lee Electronics and Telecommunications Research Institute [email protected] Abstract Cloud computing is a model for enabling service user s ubiquitous,
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST
Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service
Security in cloud computing: Opportunities and challenges
Mazhar Ali, Samee U. Khan, Athanasios V. Vasilakos Security in cloud computing: Opportunities and challenges HanJung Youn Seoultech 2015 Table of Contents 1. Introduction 2. Cloud computing architectural
FACING SECURITY CHALLENGES
24 July 2013 TimeTec Cloud Security FACING SECURITY CHALLENGES HEAD-ON - by Mr. Daryl Choo, Chief Information Officer, FingerTec HQ Cloud usage and trend Cloud Computing is getting more common nowadays
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) Introduction to Cloud Security. Taniya
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 6464(Print)
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
REVIEW ARTICLE. Received 21 February 2015 / Accepted 16 March 2015 1. INTRODUCTION
International Journal of Advances in Engineering, 2015, 1(3), 141-145 ISSN: 2394-9260 (printed version); ISSN: 2394-9279 (online version); url:http://www.ijae.in Security Models and Issues in Cloud Computing
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012
Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind
Module 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014
An Overview on Cloud Computing Services And Related Threats Bipasha Mallick Assistant Professor, Haldia Institute Of Technology [email protected] Abstract. Cloud computing promises to increase the velocity
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Data Security In The Cloud
Data Security In The Cloud LOGO Presented by: Gary Dischner TxMQ Enterprise Architect What Is The Cloud? NIST 800-145 Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
Mobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk
About PaaS Security Donghoon Kim Henry E. Schaffer Mladen A. Vouk North Carolina State University, USA May 21, 2015 @ ICACON 2015 Outline Introduction Background Contribution PaaS Vulnerabilities and Countermeasures
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Data Security Issues in Cloud Computing
12. SECURITY As promising as it is, cloud computing also faces various security issues, which include access of sensitive data, data segregation, privacy, authentication, identity management, policy integration,
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Public Cloud Security: Surviving in a Hostile Multitenant Environment
Public Cloud Security: Surviving in a Hostile Multitenant Environment SESSION ID: EXP-R01 Mark Russinovich Technical Fellow Windows Azure, Microsoft @markrussinovich The Third Computing Era Security Could
http://www.cisjournal.org Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir
Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir Department of Computer Science Lahore College for Women University, Lahore, Pakistan. [email protected],
How To Design A Cloud Data Storage Service For A Cloud Computer System
Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College
OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP
SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson
AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING
AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING Mrs. J. Pavithra 1 Mr. A. Naveen 2 1 (MRIT, Hyderabad, India, [email protected]) 2 (Asst. Professor, MRIT, Hyderabad, India, [email protected])
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
Survey about Cloud Computing Threats
Survey about Cloud Computing Threats Raju M #1, Lanitha B *2 PG Scholar, Department of CSE, CMS College of Engineering, Namakkal, Tamilnadu, India #1 Assistant Professor, Department of CSE, KGiSL Institute
Customer Security Issues in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
Secure Data Sharing in Cloud Computing using Hybrid cloud
International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh
Cloud Security Framework (CSF): Gap Analysis & Roadmap
Cloud Security Framework (CSF): Gap Analysis & Roadmap Contributors: Suren Karavettil, Bhumip Khasnabish Ning So, Gene Golovinsky, Meng Yu & Wei Yinxing Please send comments & suggestions to Suren Karavettil
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment
Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment Chandra Sekhar Murakonda M.Tech Student, Department of Computer Science Engineering, NRI Institute
A Review on Cloud Computing Vulnerabilities
A Review on Cloud Computing Vulnerabilities Ms. Sugandha Nandedkar, Ms.Sangeeta Kakarwal Asst.Prof., Department of Computer Science and Engineering, DIEMS /Dr. BAMU, Aurangabad, MH, India. Prof. and HOD,
CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST
CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires
RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
Secure Virtualization Technology
Secure Virtualization Technology Farzad Sabahi Abstract Cloud is one of today s most interesting technologies because of it can reduce cost and make flexibility and scalability. Hence, cloud computing
Cloud Security Framework (CSF): Gap Analysis & Roadmap
Cloud Security Framework (CSF): Gap Analysis & Roadmap Contributors: Suren Karavettil, Bhumip Khasnabish Ning So, Gene Golovinsky, Meng Yu & Wei Yinxing Please send comments & suggestions to Suren Karavettil
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may
Security of Cloud Computing
Security of Cloud Computing Fabrizio Baiardi [email protected] 1 Syllabus Cloud Computing Introduction Definitions Economic Reasons Service Model Deployment Model Supporting Technologies Virtualization
Cloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 ISSN 2229-5518 1299
1299 TITLE Virtualization security in Data Centres & cloud Prof Sarita Dhawale. Ashoka Center for Business & Computer Studies,Nashik Head of Department of Computer Science University of Pune, Maharashtra.
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
Network Access Control and Cloud Security
Network Access Control and Cloud Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
