International Journal of Computer Science Trends and Technology (IJCS T) Volume 4 Issue 3, May - Jun 2016

Similar documents
Computing. Jaydip Sen Innovation Labs, Tata Consultancy Services Ltd., Kolkata, INDIA

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer

Digital Forensics. Lab 10: Cloud Computing & the Future of Digital Forensics

CLOUD COMPUTING An Overview

Keyword: Cloud computing, service model, deployment model, network layer security.

Security Considerations for Public Mobile Cloud Computing

IJRSET 2015 SPL Volume 2, Issue 11 Pages: 29-33

NCTA Cloud Architecture

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

SECURITY THREATS TO CLOUD COMPUTING

In the Cloud Storage Market How Users are Using it without Hesitation (Report 2016)

Security Issues in Cloud Computing

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

Security Model for VM in Cloud

Cloud Computing. What is Cloud Computing?

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

CLOUD COMPUTING SECURITY ISSUES

21/09/11. Introduction to Cloud Computing. First: do not be scared! Request for contributors. ToDO list. Revision history

A Survey on Cloud Security Issues and Techniques

ISSN: (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

[Sudhagar*, 5(5): May, 2016] ISSN: Impact Factor: 3.785

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING

Cloud Computing for SCADA

Dynamic Query Updation for User Authentication in cloud Environment

Addressing Cloud Computing Security Concerns

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Information Technology: This Year s Hot Issue - Cloud Computing

Managing Cloud Computing Risk

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

Cloud Courses Description

FACING SECURITY CHALLENGES

Emerging Technologies and Protecting Methods in Cloud Computing Environments

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing, and REST-based Architectures Reid Holmes

Cloud Courses Description

SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING

A Study of Infrastructure Clouds

1.1.1 Introduction to Cloud Computing

External Supplier Control Requirements

White Paper on CLOUD COMPUTING

E-LEARNING DEVELOPMENT AS PUBLIC INFRASTRUCTURE OF CLOUD COMPUTING

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

CLOUD COMPUTING. A Primer

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Information Auditing and Governance of Cloud Computing IT Capstone Spring 2013 Sona Aryal Laura Webb Cameron University.

CHAPTER 8 CLOUD COMPUTING

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud Security Introduction and Overview


NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Customer Security Issues in Cloud Computing

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Security Who do you trust?

The Magazine for IT Security. May issue 3. sör alex / photocase.com

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

Orchestrating the New Paradigm Cloud Assurance

Risks and Challenges

Cloud Computing Architecture: A Survey

An Intelligent Approach for Data Fortification in Cloud Computing

Security Issues in Cloud Computing

6 Cloud computing overview

Security Issues In Cloud Computing and Countermeasures

Information Security: Cloud Computing

Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015

International Journal of Engineering Research & Management Technology

Security Aspects of Cloud Computing

Secure Cloud Computing through IT Auditing

A Review: Data Security Approach in Cloud computing by using RSA Algorithm

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Top 10 Cloud Risks That Will Keep You Awake at Night

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas

Privacy Preserving Public Auditing for Data in Cloud Storage

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

BUSINESS MANAGEMENT SUPPORT

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: , Volume-1, Issue-5, February 2014

Cloud Security Who do you trust?

Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop

Cloud Based Distributed Databases: The Future Ahead

A Review on Cloud Computing Vulnerabilities

How To Understand Cloud Usability

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

A Secure Authenticate Framework for Cloud Computing Environment

CLOUD COMPUTING AND ITS SECURITY ASPECTS

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Data Integrity Check using Hash Functions in Cloud environment

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Transcription:

RESEARCH ARTICLE Cloud Computing: Security Concerns Jitendra Nath Shrivastava [1], Uvaish Khan [2] Professor [1], Computer Science and Engineering Master of Computer Applications [2] Invertis University Bareilly (UP) - India OPEN ACCESS ABSTRACT The current increased utilization of cloud services need advanced insights into necessary security requirements and its solutions. It is really tough to identify which kinds of necessities have been researched most and which are still under- researched. The objective of this study was to provide a broad and structured overview of the types of security requirements researched in the area of in cloud computing and the proposed solutions to deal with these requirements. This study thus advise fellow researchers about security requirements in cloud computing and indicate to those types of security requirements that have attained much research effort and those that have been under-researched. Keywords:- Cloud Computing, Security Issues, Saas, Paas, Iaas. I. INTRODUCTION National Institute for Standards and Technology (NIST) (Badger etal., 2011) defines the cloud computing as, cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing is sharing of resources on a larger scale which is cost effective and location independent. Prime goal of the cloud computing is to provide scalable and inexpensive on-demand computing infrastructures with good quality of service levels. As for as service delivery, is concerned,nist has identified three basic types of cloud service offerings. These models are: Software as a service (SaaS), Platform as a service (PaaS) and Infrastructure as a service (IaaS). These three individual models are often referred to as the SPI MODEL [1], where SPI refers to Software, Platform and Infrastructure (as a service) respectively (CSA Security Guidance, 2009). NIST has identified three basic types of cloud service offerings. In this model, a layer of software is encapsulated and offered as a service, upon which other higher levels of service are built. The customer has the freedom to build their own applications, which run on the provider s infrastructure. Although the customer does not manage or control the underlying infrastructure, network, servers, operating systems, or storage, but they control over the deployed applications. Some examples of PaaS are: Google s App Engine, Force.com, etc. C. Infrastructure as a Service (IaaS) Servers, storage systems, networking devices, data centre space etc. are pooled and made available to handle workloads. The capability provided to the customer is to rent processing, storage, networks, and other computing resources where the customer is able to deploy and run software. Some examples of IaaS are: Amazon, Go Grid, 3 Tera etc. A. Software as a Service (SaaS) In SaaS, a complete application is provided to the customer as a service on demand. A single instance of the service runs on the cloud and multiple end users are served. On the customers side, there is no need to invest in servers or software licenses, while for the provider, the costs are lowered, since only a single application needs to be hosted and maintained. Currently, SaaS is offered by companies such as Google, Salesforce, Microsoft, Zoho etc. B. Platform as a Service (PaaS) Figure 1: A Typical Cloud Architecture[1] Figure 1 Shows a typical cloud based scenario that includes the cloud service provider and the cloud users in a cloud computing architecture. ISSN: 2347-8578 www.ijcstjournal.org Page 194

All the above three stages of cloud computing are severely prone to security breach. II. CLOUD COMPUTING SECURITY ISSUES There are several security issues for cloud computing. It encompasses many technologies including networks, databases, operating systems, virtualization, resource scheduling, transaction management, load balancing, concurrency control and memory management. Data security involves encrypting the data as well as ensuring that appropriate policies are enforced for data sharing. Data mining techniques may be applicable for malware detection. As shown in Figure 2, there are six particular areas of the cloud computing environment where equipment and software require appropriate security attention (Trusted Computing Group s White Paper,2010). These six areas are: (1) security of data at rest, (2) security of data in transit, (3) authentication of users/applications/ processes, (4) robust separation between data belonging to different customers, (5) cloud legal and regulatory issues, and (6) incident response. Private, Public and Hybrid Cloud. The security challenges with respect to network is also shown as for any internet based service, network is considered as the backbone for cloud computing. The cloud service providers ensure that the customer does not face any problem such as loss of data or data theft. There is also a possibility where a malicious user can penetrate the cloud by impersonating a legitimate user. This leads to affects several customers who are sharing the infected cloud. There are four types of issues [3] raise while discussing security of a cloud. 1. Data Issues 2. Privacy issues 3. Infected Application 4. Security issues Fig 4: Cloud Security Issues[3] 1. Data Issues Fig 2: Areas of security concerns in cloud computing[5] Fig 3: Classification of Security Challenge[2] Figure 3 represents the hierarchy of the cloud computing, with security challenges. The Deployment model is classified as Sensitive data in a cloud computing environment emerge as important issues with regard to security in a cloud based system. Firstly, whenever a data is on a cloud, anyone from anywhere anytime can access data. Many cloud computing service consumer and provider accesses and modify data. At the same time, thus there is a need of some data integrity method in cloud computing. Secondly, data stealing is a one of serious problem in a cloud computing environment. Thirdly, Data loss is a common problem in cloud computing. If the cloud computing service provider shut down his services due some financial or legal problem then there will be a loss of data for the user. Fourthly, data location is one of the issues what needs focus in a cloud computing environment. Physical location of data storage is important and crucial. It should be transparent to user and customer both. Vendor does not reveal where all the data s are stored. 2. Private Issues Service provider must ensure that the customer personal information is well secured from other providers, customer and user. Cloud service provider should ensure who is accessing the data and who is maintaining to protect the customer s personal information. ISSN: 2347-8578 www.ijcstjournal.org Page 195

3. Infected Application Cloud service provider must have the complete access to the server with all rights of monitoring and maintenance of server. This will prevent any malicious user from uploading any infected application onto the cloud which will severely affect the customer and cloud computing service. 4. Security issues Cloud computing security is considered on two levels. One is on provider level and another is on user level. Cloud provider should ensure that the server is well secured from all threats. Even though the cloud service provider has provided a good security layer for the customer and user, the user should ensure that there should not be any loss of data or stealing or tampering of data for other users who are using the same cloud due to its action. A cloud is good only when there is a good security provided by the service provide to the user. III. CLOUD SECURITY THREATS There are several types of security threats to which cloud is vulnerable. Following table provides an overview of the threats for cloud customers categorized according to the confidentiality, integrity and availability (CIA) security model and their relevance to each of the cloud service delivery model. TABLE I A LIST OF CLOUD SECURITY THREATS [5] Threat Confidentiality Insider user threats: Malicious cloud provider user Malicious cloud customer user Malicious third party user (Supporting either the cloud provider or customer organizations) Description The threat of insiders accessing customer data held within the cloud is greater as each of the delivery models can introduce the need for multiple internal users: SaaS cloud customer and provider administrators PaaS- application developers and test environment managers IaaS- third party platform consultants External attacker threats: Remote software attack of cloud infrastructure Remote software attack of cloud applications Remote hardware attack against the cloud Remote software and hardware attack against cloud user organizations end point software and hardware Social engineering of cloud provider users, and cloud customer users. Data leakage: Failure of security access rights across multiple domains Failure of electronic and physical transport systems for cloud data and backups. Integrity Data segregation: Incorrectly defined security perimeters Incorrect configuration The threat from external attackers may be perceived to apply more to public Internet facing clouds, however all types of cloud delivery models are affected by external attackers, particularly in private clouds where user endpoints can be targeted. Cloud providers with large data stores holding credit card details, personal information and sensitive government or intellectual property, will be subjected to attacks from groups, with significant resources, attempting to retrieve data. This includes the threat of hardware attack, social engineering and supply chain attacks by dedicated attackers. A threat from wide spread data leakage amongst many, potentially competitor organizations, using the same cloud provider could be caused by human error or faulty hardware that will lead to information compromise. The integrity of data within complex cloud hosting environments such as SaaS configured to share computing resource amongst customers could provide a threat against data integrity if system resources are effectively segregated. ISSN: 2347-8578 www.ijcstjournal.org Page 196

User access: Poor identity and access management Procedures Data quality: Introduction of faulty application or infrastructure components Availability Change management: Customer penetration testing impacting other cloud customers Infrastructure changes upon cloud provider, customer and third party systems impacting cloud customers. Denial of service threat: Network bandwidth distributed denial of service Network DNS denial of service Application and data denial of service Implementation of poor access control procedures creates many threat opportunities, for example that disgruntled exemployees of cloud provider organizations maintain remote access to administer customer cloud services, and can cause intentional damage to their data sources. The threat of impact of data quality is increased as cloud providers host many customers data. The introduction of a faulty or mis-configured component required by another cloud user could potentially impact the integrity of data for other cloud users sharing infrastructure. As the cloud provider has increasing responsibility for change management within all cloud delivery models, there is a threat that changes could introduce negative effects. These could be caused by software or hardware changes to existing cloud services. The threat of denial of service against available cloud computing resource is generally an external threat against public cloud services. However, the threat can impact all cloud service models as external and internal threat agents could introduce application or hardware components that Physical disruption: Disruption of cloud provider IT services through physical access Disruption of cloud customer IT services through physical access Disruption of third party WAN providers Services Exploiting weak recovery procedures: Invocation of inadequate disaster recovery or business continuity processes cause a denial of service. The threat of disruption to cloud services caused by physical access is different between large cloud service providers and their customers. These providers should be experienced in securing large data centre facilities and have considered resilience among other availability strategies. There is a threat that cloud user infrastructure can be physically disrupted more easily whether by insiders or externally where less secure office environments or remote working is standard practice. The threat of inadequate recovery and incident management procedures being initiated is heightened when cloud users consider recovery of their own in house systems in parallel with those managed by third party cloud service providers. If these procedures are not tested then the impact upon recovery time may be significant. IV. TYPES OF ATTACKERS IN CLOUD COMPUTING Many of the security threats, attacks and challenges of cloud computing are considered by organizations. TABLE II A LIST OF ATTACKS ON CLOUD COMPUTING ENVIRONMENTS [5] ISSN: 2347-8578 www.ijcstjournal.org Page 197

Internal Attackers External Attackers V. CLOUD SECURITY RISKS An internal attacker has the following characteristics: Is employed by the cloud service provider, customer or other third party provider organization supporting the operation of a cloud service May have existing authorized access to cloud services, customer data or supporting infrastructure and applications, depending on their organizational role Uses existing privileges to gain further access or support third parties in executing attacks against the confidentiality integrity and availability of information within the cloud service. An external attacker has the following characteristics: Is not employed by the cloud service provider, customer or other third party provider organization supporting the operation of a cloud service Has no authorized access to cloud services, customer data or supporting infrastructure and applications Exploits technical, operational, process and social engineering vulnerabilities to attack a cloud service provider, customer or third party supporting organization to gain further access to propagate attacks against the confidentiality, integrity and availability of information within the cloud service. The security risks related with each cloud delivery vary and are dependent on a wide range of factors including the sensitivity of information, cloud architectures and security control involved in a particular cloud environment. Table III summarizes the security risks relevant in the cloud computing paradigm. This table will help us in implementing the appropriate security measures. TABLE III A LIST OF SECURITY RISKS IN CLOUD COMPUTING ENVIRONMENTS [5] Risk Privileged user access Data location and segregation Description Cloud providers generally have unlimited access to user data, controls are needed to address the risk of privileged user access leading to compromised customer data. Customers may not know where their data is being stored and there may be a risk of data being stored along with other customers information. Data disposal Cloud data deletion and disposal is a risk, particularly where hardware is dynamically issued to customers based on their needs. The risk of data not being deleted from data stores, backups and physical media during decommissioning is enhanced within the cloud. e-investigations and Protective monitoring The ability for cloud customers to invoke their own electronic investigations procedures within the cloud can be limited by the delivery model in use, and the access and complexity of the cloud architecture. Customers cannot effectively deploy monitoring systems on infrastructure they do not own; they must rely on the ISSN: 2347-8578 www.ijcstjournal.org Page 198

systems in use by the cloud service provider to support investigations. Assuring cloud security Customers cannot easily assure the security of systems that they do not directly control without using SLAs and having the right to audit security controls within their agreements. VI. CONCLUSIONS This paper gives the detailed description of cloud computing. Many organizations have shifted their business on cloud from traditional systems. Many people are accessing the cloud individually for different purposes. During these access people are concerned about the security. They need a high level of security for their data on cloud. This paper will help us to understand cloud computing concepts and will open the new window to implement security measures. REFERENCES [1] Monjur Ahmed and Mohammad Ashraf Hossain, Cloud Computing And Security Issues In The Cloud International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.1, January 2014. [2] Ms. Disha H. Parekh and Dr. R. Sridaran An Analysis of Security Challenges in Cloud Computing International Journal of Advanced Computer Science and Applications, Vol. 4, No.1, 2013. [3] Prince Jain Security Issues and their Solution in Cloud Computing International Journal of Computing & Business Research ISSN (Online): 2229-6166 [4] Petre, R. (2012). Data mining in Cloud Computing. Database Systems Journal, 3(3), 67-71. [5] Jaydip Sen Security and Privacy Issues in Cloud Computing Innovation Labs, Tata Consultancy Services Ltd., Kolkata, INDIA. [6] Amit Sangroya, Saurabh Kumar, Jaideep Dhok, and Vasudeva Varma, Towards Analyzing Data Security Risks in Cloud Co mputing Environments, Springer- Verlag Berlin Heidelberg 2010, pp. 255-265. [7] Open Cloud Computing Interface. Homepage URL: http://occi-wg.org. [8] Perez R, van Doorn L, Sailer R. Virtualization and hardware-based security. IEEE Security and Privacy 2008;6(5):24 31 [9] Jamil, D., Zaki, H. Security issues in cloud computing and counter measures, International Journal of Engineering Science and Technology (IJEST), Vol. 3 No. 4, pp: 2672-2676. [10] Mingi Zhou et al., Security and Privacy in Cloud Computing: A Survey, Proc. 6th Int l Conf. Semantics, Knowledge and Grids, IEEE Press, 2010, pp. 105 112. AUTHORS Prof. Jitendra N. Shrivastava Uvaish Khan Presently he is working at Invertis University. His research interests are Data Mining and Artificial Intelligence. He has published three books and many research papers. He is member of board of studies, academic council and University Court of many organizations. He can be contacted by email: jitendranathshrivastava@yahoo.com Presently he is student at Invertis University. His research interests are in the area of cloud computing and Artificial Intelligence. He can be contacted by email: owaiskhan04@hotmail.co.uk ISSN: 2347-8578 www.ijcstjournal.org Page 199