Ugcm 12019
Ugcm 12019
Ugcm 12019
net/publication/350545879
CITATION READS
1 816
2 authors, including:
Dr. kavita
Jagannath University
141 PUBLICATIONS 98 CITATIONS
SEE PROFILE
All content following this page was uploaded by Dr. kavita on 01 April 2021.
Manoj Kumar
Research Scholar, Jayoti Vidyapeeth Women’s University, Jaipur
Dr. Kavita
Assistant Professor, Jayoti Vidyapeeth Women’s University, Jaipur
INTRODUCTION
The term cloud computing means many things to many people and the
definitions will no doubt continue to evolve as new technologies and services
enabling this model of computing are developed. For the purpose of this
paper, the scope will be limited to IaaS cloud computing: a model in which
units of computation and/or storage are allocated to consumers, who then
access their assigned resources via some Wide Area Network. The cloud
system consumers are granted complete control of any resources assigned to
them, but have no control of the underlying virtualisation or partitioning
layer, the physical host on which it executes, or the mapping of virtual
resources to physical devices. While the security concerns for this realm are
largely applicable to any external handling and processing of an individual
556
ISSN: 0374-8588
BACKGROUND
The rapid evolution of technology coupled with our increased dependence on
the same has melded together to make securing our digital assets an
challenging problem. Originally computer systems were physically isolated
and a data-centric approach to securing systems was accomplished largely
through perimeter security. Physical security generally provided a means to
isolate and secure the systems from malicious outsiders.
As technologies continued to evolve, and connectivity and mobility
increased, it became difficult to secure an increasingly fluid perimeter. The
focus of security began to shift from physical security and securing the data
centres to protecting the endpoints themselves. This was accomplished
through many mechanisms including firewalls, confining the end point
services, changing configurations to restrict access, and similar measures.
As connectivity increased, the security focus again had to shift, to protect
the plethora of applications that depended on the network. These included
applications that request and provide data, distributed components, and
other virtual workgroups. This focus shift required that protection at the
application layer become a concern.
The new evolution towards cloud computing, both IaaS-based and (as
data and services are “outsourced” to the cloud) Software as a Service
(SaaS)-based, again demands a reconsideration of methods used to provide
security. The new critical point is that the changing perimeter that extends
further into realms that are controlled by others. The concern is how to data
in transit, in storage, and also from the service providers. The roles of the
traditional stakeholders in such a system are changing and the distinction
between insider and outsider has become increasingly blurred. In some
cases, the degree of “insider ness” associated with an stakeholder needs to
557
ISSN: 0374-8588
TECHNICAL CHALLENGES
While IaaS-based cloud computing brings many advantages, this model also
raises significant technical security considerations and questions. Among
these issues are operational trust modes, resource sharing, new attack
strategies, and digital forensics. These are important areas of concern and
are further complicated by the issues associated with giving up control in
any environment. As you increasingly rely on others to provide you with
functionality, you Correspondingly give them control. Further this control is
given to someone who most likely does not share your vested interest in
your mission. As you relinquish control, you lose access to information and
as a result, give up the ability to answer some of the important questions
regarding technical and jurisdictional issues. In some cases, the information
required to make informed security decisions is no longer available, and that
data which is available, may no longer be as trustworthy as it would be in a
system over which you have complete control. As a result it is vital that the
security implications of cloud computing be carefully considered and
factored into a decision about the appropriateness of a cloud-based solution
to a given set of IT requirements.
Operational Trust Modes
A primary technical challenge that results from the decision to use IaaS-
based cloud computing is the level of trust accorded the resource provider.
These providers are part of your system and their roles as stakeholders in
your business are complicated by the blurring of the insider/outsider line.
Thus, there are two aspects here. The first is to determine what operational
levels of trust are needed to capture the trust in the resource providers. The
second is to use those levels in the risk assessment.
In our cloud computing scenario above, the cloud resource provider
maintains sole access to the underlying physical components of the system,
558
ISSN: 0374-8588
and provides the cloud consumer with full control over some portion of it. In
practice this means that the provider has access to all of the consumer’s
operations and data in the cloud environment. Much of this may be
business sensitive, and the security plan must take this into consideration.
Among the approaches that can be used are:
If the cloud is used only to store data, well- established
cryptographic algorithms allow a cloud storage consumer to encrypt
the data prior to insertion in the cloud, and decrypt it after moving
it back to her own systems. It should be noted, however, that such
algorithms are not effective if the data is encrypted for use within
the cloud (as the computation device in the cloud would require
access to the decryption key, which would then also make the key,
and consequently the data, available to the cloud resource
provider.
In some cases it may be possible for a computational engine to
perform operations on encrypted data, producing results without
exposing the input data or the result in plaintext form. Such schemes
are known as homomorphic encryption. While this is an area of active
research, current results tend to be applicable to fairly narrow
operations. However, even in this mode of operation, a malicious cloud
provider may be able to infer useful information from the operations
being performed, and the characteristics of the results.
We must also consider the extension of the network in the cloud
environment, because that portion of the network provides the connection
between the consumers and the cloud resources. In a more traditional
environment, it may be reasonable for a corporation to control that entire
pathway, or at least have some well-understood pathway between their
offices and the corporate data centre. In the cloud model, the WAN
connections are likely to be far more complicated and dynamic. While
encryption of network traffic on such links can provide some level of
protection, we must again consider that even encrypted content can
provide interesting information that might be exploitable.
559
ISSN: 0374-8588
Can we run in a mode in which we do run not need to trust the cloud
providers and hosts? Do we need to trust the networks and the network
providers? Not trusting the latter may be simpler than not trusting the
former, but is non-trivial if attacks against the core network infrastructure
and routing algorithms are considered.
Resource Sharing
In the current corporate computing model, resources such as storage and
hosts tend to be used exclusively by a single corporate entity. However, in
the cloud model it is entirely reasonable that a resource allocated to one
corporation may be instantiated on some physical infrastructure that also
hosts resources allocated to other corporate users. For example, a virtual
machine may be instantiated on a physical server hosting several virtual
machines, each allocated to a different corporation. In this case, it is quite
possible that two competitors may be allocated resources on the same
physical infrastructure. Then security policies and procedures must
consider the possibility that data may leak between competing corporations,
or that the actions of one corporation could impact the ability of a
competitor to conduct business. Some work has already demonstrated this
potential.
Given this concern, we should consider whether a cloud provider can
provide some minimal level of assurance that such conflict will not arise.
Obviously the easiest way to do this is to allocate any physical component
in the cloud to a single consumer, but this would significantly impact the
flexibility of the cloud. A more practical approach may be to implement an
analog of the Brewer and Nash model, in which corporate cloud consumers
are grouped into conflict of interest classes. The cloud provider would then
be free to allocate resources in the cloud with the limitation that no two
corporations in the same conflict of interest class can share the same
physical resources.
560
ISSN: 0374-8588
561
ISSN: 0374-8588
562
ISSN: 0374-8588
563
ISSN: 0374-8588
564
ISSN: 0374-8588
FUTURE CONSIDERATIONS
While not insurmountable, the challenges associated with IaaS-based cloud
computing need to investigated in order to protect our digital assets. An
increased understanding of cloud computing and the roles of various
stakeholders in this realm are important, as is more research into the
technical and legal issues that resource-based cloud computing introduce to
the threat horizon. This requires cloud-oriented research into identification
of technological issues including trust modes, resource sharing, attack
strategies, and digital forensics implications. Also, legal issues such as
jurisdictional issues, cloud stakeholder roles and rights, and technological
approaches to solving these problems should be paramount in resource-
based cloud computing research and development.
REFERENCES
1. Change, C, and S. Tsu. Arithmetic operations on encrypted data. International
Journal of Computer Mathematics. International Journal of Computer
Mathematics, Volume 56, Issue 1 &21995,pages1-10
2. Micciancio, D. 2010. A first glimpse of cryptography's Holy Grail. Commun. ACM 53,
3 (Mar. 2010), 96-96. DOI= http://doi.acm.org/10.1145/1666420.1666445
3. Brewer, D.F.C., and M. Nash. "The Chinese Wall Security Policy," pp. 206, 1989
IEEE Symposium on Security and Privacy, 1989.
565