Paper Id: IJRDTM COMPREHENSIVE ANALYSIS OF SECURITY ISSUES AND CHALLENGES IN CLOUD COMPUTING AND THEIR COUNTER MEASURES
|
|
- Alfred Brooks
- 8 years ago
- Views:
Transcription
1 COMPREHENSIVE ANALYSIS OF SECURITY ISSUES AND CHALLENGES IN CLOUD COMPUTING AND THEIR COUNTER MEASURES by Pankaj Sareen Computer Applications Department Baddi University of Emerging Sciences & Technology ABSTRACT Cloud Computing is a recent technology paradigm that enables organizations or individuals to share various services in a seamless, flexible and costeffective manner. Cloud Computing has proven delivery platform for providing business or consumer IT services over the Internet. There are different vulnerabilities and threats to cloud computing. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it Organizations which consider adopting cloud based services must also understand the many major problems of information policy including issues of privacy, security, reliability, access and regulation. Due to the many security threats that many organizations have faced at present, this has become an active area of research. Addressing these issues require getting confidence from users for cloud applications and services. In this paper, a comprehensive study of technical components, security and privacy concerns of cloud computing will be made. I will also propose some countermeasures to mitigate these concerns.this paper would help the readers to know about the various attacks that are possible on the Cloud Computing. Set of recommendations for organizations to follow when planning, reviewing, negotiating, or initiating a public cloud service are also suggested by me in the Paper. KEYWORDS: Cloud Computing, Security Issues and Attacks, Countermeasures, Set of Recommendations INTRODUCTION Cloud Computing [1] is a term used to describe both a platform and type of application. A Cloud computing platform dynamically provisions, configures, reconfigures, and deprovisions servers as needed. Cloud Computing [2] also describes applications that are extended to be accessible through the Internet. These applications use large data centers and powerful servers that host Web applications and Web services.
2 RESEARCH METHODOLOGY A. Objectives of the Study To know Characteristics, Architecture and different types of Cloud Service Delivery Models like SaaS, PaaS, and IaaS To identify the various areas of concerns, attacks and threats to Cloud Computing and their countermeasures. To provide the suggestive measures for organizations to follow when planning, reviewing, and initiating a public cloud service outsourcing arrangement. B. Research Design The research is Literature Based research. This paper involves a comprehensive study of the earlier work done in this area by reviewers. The major purpose of this research is to analyze the Security Issues, Threats, Attacks and Challenges in Cloud Computing and to find out various Countermeasures to mitigate these Concerns. C. Data Collection Secondary data is used for the study. Data will be collected from the secondary sources like National Institute of Standards and Technology (NIST) Cloud Computing, Cloud Security Alliance (CSA), and various Research Papers based upon the Security of Cloud Computing. CLOUD COMPUTING SECURITY AND PRIVACY ISSUES Security of the Cloud Computing system [3] can be thought in two dimensions: physical security and cyber security. Physical security concerns the physical properties of the system. For example, a data center, which is owned by provider infrastructure, has to realize security standards; supervision and manageability on security preventions, uninterrupted power supplies, precautions for natural disasters (earthquake, flood, fire etc.) are indispensable. Cyber security defines the prevention of system from cyber attacks. These attack can use huge amounts of computing resources, disables their usage by consumer efficiently A. Areas of Concerns Cloud computing has many areas of concern. Some of the more fundamental concerns [4] include the following: 1) System Complexity: A public cloud computing environment is extremely complex. Complexity typically relates inversely to security, with greater complexity giving rise to vulnerabilities 2) Shared Multi-tenant Environment:
3 Subscribing organizations typically share components and resources with other subscribers that are unknown to them. Having to share an infrastructure with unknown outside parties can be a major drawback for some applications and requires a high level of assurance for the strength of the security mechanisms used for logical separation. 3) Internet-facing Services Public cloud services are delivered over the Internet. Applications and data that were previously accessed from the confines an organization s intranet, but moved to the cloud, must now face increased risk from network threats B. Top Threats for Cloud Computing Users Cloud Security Alliance has proposed the biggest security threats [5] of cloud systems. These threats are as follow: 1) Abuse and immoral Use of Cloud Computing IaaS providers offer services to their customers through a registration process where anyone with a valid credit card can register and immediately begin using cloud services. By abusing the relative anonymity behind these registration and usage models, spammers and other criminals have been able to conduct their activities with relative freedom. 2) Insecure Interfaces and APIs: The security and availability of general cloud services is dependent upon the security of APIs. These interfaces must be designed to protect against both accidental and malicious attempts 3) Data Loss or Leakage: There are many ways to compromise data. Deletion or alteration of records without a backup of the original content is an obvious example. Unauthorized parties must be prevented from gaining access to sensitive data. 4) Malicious Insiders: The malicious insider threat is one that gains in importance as many providers still don't reveal how they hire people, how they grant them access to assets or how they monitor them. Models affected by these threats are shown in the Table 1. Type of Threat by CSA Models affected Abuse Use of Cloud Computing IaaS, PaaS Insecure Interfaces and APIs IaaS, PaaS, SaaS
4 Data Loss or Leakage IaaS, PaaS, SaaS Malicious Insiders IaaS, PaaS, SaaS C. Countermeasures [5] to these threats Table 1 Service Models Affected 1) Confronting Abuse and immoral Use of Cloud Computing: Stricter initial registration and validation processes. Enhanced credit card fraud monitoring and coordination. Comprehensive introspection of customer network traffic. Monitoring blacklists for one s own network blocks. 2) Confronting Insecure Interfaces and APIs Analyze the security model of cloud provider interfaces. Ensure strong authentication and access controls are implemented in concert with encrypted transmission. 3) Confronting Data loss or Leakage Implement strong API access control. Encrypt and protect integrity of data in transit. Analyzes data protection at both design and run time. Implement strong key generation 4) Confronting Malicious Insiders Specify HR requirements as part of legal contracts. Require transparency into overall information security and management practices. ATTACKS ON CLOUD COMPUTING A.XML Signature Wrapping Attack Wrapping attacks [6,7] aim at injecting a faked element into the message structure so that a valid signature covers the unmodified element while the faked one is processed by the application logic. So, an attacker can perform an arbitrary Web Service request while authenticating as a legitimate user. In 2011, researchers lead by Dr. JorgSchwenk found a cryptographic hole in Amazon s EC2 and S3 services [8]. The attackers hijacked control interfaces used to manage cloud computing resources, which would allow attackers to create, modify, and delete machine images, and change administrative passwords. B. SQL injection attacks [9]
5 In this type of attack a malicious code is inserted into a standard SQL code. Thus the attackers gain unauthorized access to a database and are able to access sensitive. C. Sniffer Attacks [9] These types of attacks are launched by applications which can capture packets flowing in a network and if the data that is being transferred through these packets is not encrypted, it can be read. D. Account Hijacking [10] It is usually carried out with stolen credentials. Examples of such attacks include: eavesdropping on transactions, manipulation of data, and redirection to illegitimate sites [8]. Attack Name Consequences Category Theft-ofservice Cloud service usage without billing Cloud resource stealing with no cost Cloud Infrastructure Denial Service Malware Injection of Service/hardware unavailability Wrapping a malicious code in Xml to gain unauthorized access Accessing any other private information User data/information leakage Cloud resources/infrastructure information leakage Table 2 Known Attacks on Cloud Computing Network, Cloud Infrastructure Cloud Infrastructure SOME MORE ATTACKS ON CLOUD Issa M. Khalil, Abdallah Khreishah and Muhammad Azeem highlighted Known attacks [11] on the Cloud. These are: 1) Theft of Service Attacks [12] This attack is realized when the hypervisor fails to detect and account of Central Processing Unit (CPU) usage by poorly behaved virtual machines. The common incidents include: using Cloud Computing services for (1) long period of time while hiding it from the vendor and (2) without representing it in a billing cycle 2) Malware Injection In a malware-injection attack an adversary attempts to inject malicious code into a system. This attack can appear in the form of code, scripts, active content, and/or other software. 3) Traffic Flooding Traffic flooding attacks occur when a network or service becomes so weighed down with packets initiating incomplete connection requests it cannot process genuine connection
6 requests. Eventually, the host s memory buffer becomes full and no further connections can be made, and the result is a Denial of Service. 4) Distributed Denial of Service Attacks This attack is relayed from different dynamic networks which have already been compromised unlike the DoS attack. COUNTERMEASURES TO THESE ATTACKS 1) Countermeasure to XML Signature Wrapping Attack Solution is to use the SOAP message during message passing from the web server to the web browser. A STAMP bit will be added onto the signature value when it is appended in the SOAP header. This bit will be transmitted when the message is interfered with by a third party during the transfer. When the message reaches its destination the STAMP bit is checked. If it has been changed, then a new signature value is generated by the browser and the new value is sent back to the server as recorded to modify the authenticity checking 2) Countermeasure to SQL injection attacks Filtering techniques to sanitize the user input etc. are used to check the SQL injection attacks [13] 3) Countermeasure to Sniffing Attacks A malicious sniffing detection platform based on ARP and RTT can be used to detect a sniffing system running on a network [14] 4) Countermeasure to Account Hijacking In order to prevent this attack, Dropbox has implemented two-factor authentication into the company s security controls in which user has to enter two of the following three properties: something the user knows (e.g., password, PIN), something the user has (e.g., ATM card) and/or something the user is (e.g., biometric characteristic, such as a fingerprint) [15]. 5) Countermeasure to Theft of Service Attacks Gruschkaet al. in has suggested using a new instance of cloud-to-user surface in victim machine to monitor the scheduling of parallel instances. Then, the outputs of both the attacker and the legitimate instances are compared. A significant difference in results is reported to the responsible authorities as an attack. There are other solutions provided for hypervisor scheduling such as [16, 17, 18] but they are only limited to CPU-bound issues. 6) Countermeasure to Denial of Service Attack Karnwal [20] in provides a framework called cloud defender that is based on following stages: Sensor: It monitors the incoming request messages. If there is hypothetical increase in number of messages coming from same consumer, it marks it as suspicious.
7 HOP Count filter: It will count the hop count value (total nodes, does message traverse from source to destination) and compare it with pre-defined HOP count. If a difference is found, it means that the header or the message has been modified and thus is marked suspicious. IP Frequency Divergence: Marks a message suspicious, if there is same frequency of IP messages. SET OF RECOMMENDATIONS FOR ORGANIZATIONS Set of recommendations for organizations [4] are: Governance Extend organizational practices pertaining to the policies, procedures and standards used for application development. Compliance Understand the various types of laws and regulations that impose security and privacy obligations on the organization. Trust Incorporate mechanisms into the contract that allow visibility into the security and privacy controls. Identity and Access Management Ensure that adequate safeguards are in place to secure authentication, authorization and other identity and access management functions. Software Isolation Understand virtualization and other software isolation techniques that the cloud provider employs. Availability Ensure that during an intermediate or prolonged disruption or a serious disaster, critical operations can be immediately resumed in a timely and organized manner. CONCLUSION In today s global competitive market, companies must innovate and get the most from its resources to succeed. This requires enabling its employees, business partners, and users with the platforms and collaboration tools that promote innovation. Cloud computing infrastructures are next generation platforms that can provide tremendous value to companies of any size. Cloud computing helps IT enterprises use various techniques to optimize and secure application performance in a cost-effective manner.
8 Apart from advantages it has some disadvantages on security and privacy concerns, which are seen as the primary obstacles to wide adoption. At the same time, because of the distributed nature of the system, there is a risk of security attacks on services and resources in cloud computing. These attacks can be both outside and inside the cloud provider s network. The idea of handling over important data to another company worries some people. These issues are the main reasons that cause many enterprises which have a plane to migrate to cloud prefer using cloud for less sensitive data and store important data in their own local machines. Cloud computing has the potential to become a frontrunner in promoting a secure, virtual and economically viable IT solution in the future. REFERENCES 1. Definition of Cloud Computing from < retrieved on G. Gruman and E. Knorr, What cloud computing really means by in InfoWorld, April Electronic Magazine, available at < reality 1.html> 3. U. Oktay and O.K. Sahingoz, Attack Types and Intrusion Detection Systems in Cloud Computing, 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE 4. Wayne Jansen, Guidelines on Security and Privacy in Public Cloud Computing in NIST Draft Special Publication Top Threats to Cloud Computing V1.0 Prepared by the Cloud Security Alliance, March S. Gajek, M. Jense Analysis of signature wrapping attacks, IEEE International Conference on Web Services, M. Jensen, C. Meyer, J. Somorovsky, and J. Schwenk, On the effectiveness of XML schema validation for countering XML signature wrapping attacks, International Workshop on Securing Services on the Cloud IWSSC, A. Hickey, Researchers uncover 'massive security flaws' in Amazon Cloud, Available at < 9. V. Ashktorab and S.R. Taghizadeh, Security Threats and Countermeasures in Cloud Computing, International Journal of Application or Innovation in Engineering &Management (IJAIEM), Volume 1, Issue Chimere Barron and Justin Zhan, Cloud Computing Security Case Studies and Research, Proceedings of the World Congress on Engineering 2013 Vol II, WCE 2013, July 3-5, 2013, London, U.K 11. I.M. Khalil, Muhammad Azeem, Cloud Computing Security: A Survey, doi: /computers Z. Fangfei and R. Sundaram, Scheduler vulnerabilities and coordinated attacks, Proceedings of the th IEEE International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, August 2011; pp
9 13. Y. Yuan and A Stavrou, SQLProb: A Proxybased Architecture towards Preventing SQL Injection Attacks, SAC March 8-12, Zouheir Trabelsi, Mounir Frikha, Malicious Sniffing System Detection Platform, Proceedings of the 2004 International Symposium on Applications and the Internet, pp , M. Rouse, Two-factor authentication, Available at N. Gruschka and M. Jensen, Attack surfaces: taxonomy for attacks on cloud services, proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), Miami, FL, USA, 17. L. Cherkasova and D. Gupta, Comparison of the three CPU schedulers in Xen. ACM SIGMETERICS Perform. Eval. Rev. 2007, Kim, H.; Lim, H.; Jeong, J.; Jo, H.; Lee, J. Taskaware virtual machine scheduling for I/O Performance. In Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Washington, DC, March 11-13, 2009; pp L. Cherkasova and D. Gupta, A. When virtual is harder than real: Resource allocation challenges in virtual machine based IT environments. Technical Report HPL , HP Laboratories Palo. Alto, Feb L. Martignoni and R. Paleari, A framework for behavior-based malware analysis in the cloud, proceedings of the 5th International Conference on Information Systems Security (ICISS 09), Kolkata, India, December 2009;Springer-Verlag: Berlin, Heidelberg, 2009; pp T. Karnwal and T.Sivakumar, A comberapproach to protect cloud computing against XML DDoS and HTTP DDoS attack, proceedings of the 2012 IEEE Students Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India, 1 2 March 2012; pp. 1 5.
Indexed Terms: attacks, challenges, cloud computing, countermeasures, hacker, security
Reviewing the Security Challenges and their Countermeasures in Cloud Computing Kamayani Assistant Professor, PG Dept of Computer Science, BBK DAV College for Women, Amritsar Email id: kamayani_anand@yahoo.com
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationINVESTIGATIVE ANALYSIS OF SECURITY ISSUES AND CHALLENGES IN CLOUD COMPUTING AND THEIR COUNTER MEASURES
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) ISSN 0976 6367(Print) ISSN 0976
More informationFACING SECURITY CHALLENGES
24 July 2013 TimeTec Cloud Security FACING SECURITY CHALLENGES HEAD-ON - by Mr. Daryl Choo, Chief Information Officer, FingerTec HQ Cloud usage and trend Cloud Computing is getting more common nowadays
More informationCloud Computing Security Case Studies and Research
, July 3-5, 2013, London, U.K. Cloud Computing Security Case Studies and Research Chimere Barron, Huiming Yu and Justin Zhan Abstract-Cloud computing is an emerging technological paradigm that provides
More informationD. L. Corbet & Assoc., LLC
Demystifying the Cloud OR Cloudy with a Chance of Data D. L. Corbet & Assoc., LLC thelinuxguy@donet.com Why 'The Cloud' Common Clouds Considerations and Risk Why 'The Cloud' Distributed Very Large / Very
More informationAnalysis of Cloud Computing Vulnerabilities
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 2 No. 2 Jun. 2014, pp. 308-312 2014 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
More informationCLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
More informationSecurity Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
More informationCloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More informationNETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
More informationWhere every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 11, November 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationCS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
More informationCloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
More informationSECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING
SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING Amina AIT OUAHMAN Royal Moroccan Armed Forces Today, cloud computing is defi ned and talked about across the ICT industry under different contexts and with
More informationSurvey on Security Attacks and Solutions in Cloud Infrastructure
Survey on Security Attacks and Solutions in Cloud Infrastructure Shilpa D 1, Nagashree C 2, Divya C 3, Spurthi G S 4 Assistant Professor, Department of Computer Science and Engineering, SVIT, Bangalore,
More informationPublic Cloud Security: Surviving in a Hostile Multitenant Environment
Public Cloud Security: Surviving in a Hostile Multitenant Environment SESSION ID: EXP-R01 Mark Russinovich Technical Fellow Windows Azure, Microsoft @markrussinovich The Third Computing Era Security Could
More informationWEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer info@fvc.com www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
More informationKeyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
More informationHow To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
More informationSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 4 (Mar. - Apr. 2013), PP 33-37 Security and Privacy Issues of Cloud Computing; Solutions and Secure
More informationA PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, chandram@houston.rr.com Meledath Damodaran, University of Houston-Victoria, damodaranm@uhv.edu
More informationA Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com
More informationCLOUD COMPUTING SECURITY CONCERNS
CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.
More informationCloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
More informationTable of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
More informationManaging Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationCloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
More informationSTORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
More informationCloud Computing Security: A Survey
Computers 2014, 3, 1-35; doi:10.3390/computers3010001 Article OPEN ACCESS computers ISSN 2073-431X www.mdpi.com/journal/computers Cloud Computing Security: A Survey Issa M. Khalil 1, *, Abdallah Khreishah
More information"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: aparnagulhane@gmail.com Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
More informationChapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
More informationSurvey on DDoS Attack in Cloud Environment
Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-issn: 2394-3343 p-issn: 2394-5494 Survey on DDoS in Cloud Environment Kirtesh Agrawal and Nikita
More informationHypervisor Security - A Major Concern
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 533-538 International Research Publications House http://www. irphouse.com /ijict.htm Hypervisor
More informationSecure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
More informationWireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
More informationCloud Computing and Attacks
Cloud Computing and Attacks Joseph Spring School of Computer Science 7COM1027 - Distributed Systems Security 1 Areas for Discussion Cloud Computing Attacks Firewalls 2 Cloud Computing A Cloud is a large
More informationSECURITY THREATS TO CLOUD COMPUTING
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD
More informationComplete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
More informationHacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
More informationSecurity Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
More informationSecurity Threats in Cloud Computing Environments 1
Security Threats in Cloud Computing Environments 1 Kangchan Lee Electronics and Telecommunications Research Institute chan@etr.re.kr Abstract Cloud computing is a model for enabling service user s ubiquitous,
More informationIs it Time to Trust the Cloud? Unpacking the Notorious Nine
Is it Time to Trust the Cloud? Unpacking the Notorious Nine Jonathan C. Trull, CISO, Qualys Cloud Security Alliance Agenda Cloud Security Model Background on the Notorious Nine Unpacking the Notorious
More informationSurvey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
More informationMONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
More informationA SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,KathagarhUmeshsehgalind@gmail.com
More informationSecurity Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
More informationWEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
More informationAN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING
AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING Mrs. J. Pavithra 1 Mr. A. Naveen 2 1 (MRIT, Hyderabad, India, jpav23@gmail.com) 2 (Asst. Professor, MRIT, Hyderabad, India, a.naveen21@gmail.com)
More informationSix Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
More informationSecurity of Cloud Computing
Security of Cloud Computing Fabrizio Baiardi f.baiardi@unipi.it 1 Syllabus Cloud Computing Introduction Definitions Economic Reasons Service Model Deployment Model Supporting Technologies Virtualization
More informationExternal Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
More informationCLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
More informationThe Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
More informationPractical Threat Intelligence. with Bromium LAVA
Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful
More informationWHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
More informationTop 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
More informationBrainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
More informationIntrusion Detection from Simple to Cloud
Intrusion Detection from Simple to Cloud ICTN 6865 601 December 7, 2015 Abstract Intrusion detection was used to detect security vulnerabilities for a long time. The methods used in intrusion detection
More informationCloud Security. DLT Solutions LLC June 2011. #DLTCloud
Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) cloud@dlt.com www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions
More informationData Security in Cloud
Data Security in Cloud Mr. Pankaj Sareen Assistant Professor, Department of Computer Applications SPN College, Mukerian, Punjab pankaj.sareen1480@gmail.com Dr. Tripat Deep Singh Assistant Professor, Department
More informationInternational Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014
An Overview on Cloud Computing Services And Related Threats Bipasha Mallick Assistant Professor, Haldia Institute Of Technology bipasm@gmail.com Abstract. Cloud computing promises to increase the velocity
More informationSecurity Issues In Cloud Computing And Their Solutions
Security Issues In Cloud Computing And Their Solutions Mr. Vinod K. Lalbeg Lecturer (Management), NWIMSR, Pune-1 & Ms. Anjali S. Mulik Lecturer (Management), NWIMSR, Pune-1 ABSTRACT Cloud Computing offers
More informationCloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
More informationJohn Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
More informationSkoot Secure File Transfer
Page 1 Skoot Secure File Transfer Sharing information has become fundamental to organizational success. And as the value of that information whether expressed as mission critical or in monetary terms increases,
More informationWhite paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
More informationSecurity Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
More informationBarracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
More informationCSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks
CSE 3482 Introduction to Computer Security Denial of Service (DoS) Attacks Instructor: N. Vlajic, Winter 2015 Learning Objectives Upon completion of this material, you should be able to: Explain the basic
More informationNetwork Access Control and Cloud Security
Network Access Control and Cloud Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More informationRisks and Challenges
Cloud and Mobile Security: Risks and Challenges Chong Sau Wei (CISM) chong@scan associates.net General Manager Managed Security Services SCAN Associates Berhad Seminar e Kerajaan Negeri Pulau Pinang 14
More informationOverview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
More informationHow To Secure Cloud Computing
Next Generation Cloud Computing Issues and Solutions Jeon SeungHwan 1, Yvette E. Gelogo 1 and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon,
More informationCloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
More informationClouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
More informationSecuring SaaS Applications: A Cloud Security Perspective for Application Providers
P a g e 2 Securing SaaS Applications: A Cloud Security Perspective for Application Providers Software as a Service [SaaS] is rapidly emerging as the dominant delivery model for meeting the needs of enterprise
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015
RESEARCH ARTICLE OPEN ACCESS A Survey on Cloud Computing Security and Solutions N. Sugavaneswaran, D.Saravanan Assistant Professor Department of Computer Science Srimad Andavan Arts and Science College
More informationWeb Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
More informationCloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5. www.kc-class.eu
Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5 www.kc-class.eu 1 1 Outline Cloud computing General overview Deployment and service models Security issues Threats
More informationWeb Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
More informationSECURITY AND PRIVACY ISSUES OF CLOUD COMPUTING; SOLUTIONS AND SECURE FRAMEWORK
182 ABSTRACT SECURITY AND PRIVACY ISSUES OF CLOUD COMPUTING; SOLUTIONS AND SECURE FRAMEWORK PROF: ASHA MATHEW* *Assistant Professor (Research), Welingkar Institute of Management Development and Research,
More informationSecurity Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )
23.11.2015 Jan Philipp Manager, Cyber Risk Services Enterprise Architect Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken ) Purpose today Introduction» Who I am
More informationA Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
, pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.
More informationTHE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
More informationKeywords: Cloud; Security; privacy; multi-cloud; Application Partitioning; Tier Partitioning; Data Partitioning; Multi-party Computation.
An Secure Data Storage Multi Cloud Architecture Mr. Gajendrasing Chandel, Mr.Rajkumar R. Yadav Assistant Professor, Student M.Tech 2 nd Year Computer Science & Engineering, SSSIST, Sehor ABSTRACT In recent
More informationGuidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
More informationData Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: prashantpatil11@rediffmail.com ABSTRACT
More information10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
More informationCLOUD COMPUTING AND SECURITY: VULNERABILITY ANALYSIS AND PREVENTIVE SOLUTIONS
CLOUD COMPUTING AND SECURITY: VULNERABILITY ANALYSIS AND PREVENTIVE SOLUTIONS Musa Ahmed Zayyad Department of Computer Studies, Hassan Usman Katsina Polytechnic, Katsina E-mail: zayyad19@yahoo.com +2348063440008(Nigeria)
More informationWeb Application Security 101
dotdefender Web Application Security Web Application Security 101 1 Web Application Security 101 As the Internet has evolved over the years, it has become an integral part of virtually every aspect in
More informationStudying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More informationSECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING 1. K.SURIYA Assistant professor Department of Computer Applications Dhanalakshmi Srinivasan College of Arts and Science for Womren Perambalur Mail: Surik.mca@gmail.com
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More information