Cloud Security Content
Cloud Security Content
Cloud Security Content
INTRODUCTION
1
Security concerns relate to risk areas such as external data storage, dependency on the
“public” internet, lack of control, multi-tenancy and integration with internal security. Compared
to traditional technologies, the cloud has many specific features, such as its large scale and the fact
that resources belonging to cloud providers are completely distributed, heterogeneous and totally
virtualized. Traditional security mechanisms such as identity, authentication, and authorization are
no longer enough for clouds in their current form (Li W, Ping L, 2009). Security controls in Cloud
Computing are, for the most part, no different than security controls in any IT environment.
However, because of the cloud service models employed, the operational models, and the
technologies used to enable cloud services, Cloud Computing may present different risks to an
organization than traditional IT solutions. Unfortunately, integrating security into these solutions
is often perceived as making them more rigid (Cloud Security Alliance, 2012).
Moving critical applications and sensitive data to public cloud environments is of great concern
for those corporations that are moving beyond their data center’s network under their control. To
alleviate these concerns, a cloud solution provider must ensure that customers will continue to
have the same security and privacy controls over their applications and services, provide evidence
to customers that their organization are secure and they can meet their service-level agreements,
and that they can prove compliance to auditors (Rittinghouse JW, 2009).
Key Chalenges
Data Breaches: Unauthorized access to sensitive information stored in the cloud can lead to
significant financial and reputational damage.
Insider Threats: Malicious actions by employees or other insiders with access to cloud resources
can compromise data security.
2
Advanced Persistent Threats (APTs): Sophisticated and prolonged cyber-attacks targeting
specific organizations to steal data or disrupt services.
Data Loss and Leakage: Accidental or intentional loss of data during storage, processing, or
transmission in the cloud.
Insecure APIs and Interfaces: Vulnerabilities in cloud service APIs and interfaces can be
exploited to gain unauthorized access to cloud resources.
Account Hijacking: Compromise of user credentials, leading to unauthorized access and control
of cloud accounts.
Lack of Visibility and Control: Limited visibility into cloud operations and insufficient control
over data and applications hosted in the cloud.
The research objectives of this seminar on cloud security are designed to systematically
address the key challenges and threats associated with cloud environments. By focusing on
specific, measurable, achievable, relevant, and time-bound (SMART) goals, this seminar aims to
develop a comprehensive understanding of cloud security issues and propose effective solutions.
Primary Objectives
1. Identify Key Threats and Vulnerabilities: Pinpoint primary security threats and vulnerabilities
in cloud environments.
2. Evaluate Existing Security Measures: Assess the effectiveness of current cloud security
protocols, frameworks, and compliance standards.
3. Develop Innovative Security Solutions: Create new technologies and strategies to enhance cloud
security, including the use of AI, ML, and blockchain.
4. Improve Threat Detection and Response: Design and implement proactive methods for early
threat detection and rapid response.
5. Enhance Data Protection Mechanisms: Strengthen data encryption, access control, and identity
management systems to safeguard cloud-stored data.
6. Promote Regulatory Compliance: Develop best practices and guidelines to help organizations
comply with relevant regulatory and legal requirements.
3
1.4 KEY TERMS
Cloud Computing: Cloud computing refers to the delivery of computing services over the
internet, including storage, processing power, and software applications. Instead of owning and
maintaining physical servers and data centers, users can access and utilize resources provided by
cloud service providers on a pay-as-you-go basis. Cloud computing offers scalability, flexibility,
and cost efficiency.
Cloud Service Models
There are three primary cloud service models, each providing different levels of control
and management:
Infrastructure as a Service (IaaS): Provides virtualized computing resources over the internet,
such as virtual machines, storage, and networks. Users have control over the operating systems
and applications.
Platform as a Service (PaaS): Offers a platform allowing users to develop, run, and manage
applications without dealing with the underlying infrastructure. PaaS includes development tools,
databases, and middleware.
Software as a Service (SaaS): Delivers software applications over the internet on a subscription
basis. Users access the applications through web browsers without managing the underlying
infrastructure.
Multi-Tenancy: Multi-tenancy is an architecture where multiple customers (tenants) share the
same computing resources, such as servers and storage, while keeping their data isolated from each
other. This approach optimizes resource utilization but also introduces security challenges related
to data separation and isolation.
Virtualization: Virtualization is a technology that allows multiple virtual instances (virtual
machines or VMs) to run on a single physical server. It enables efficient resource utilization and
isolation between different workloads. However, vulnerabilities in the hypervisor (the software
layer that manages VMs) can pose security risks.
Encryption: Encryption is the process of converting data into a coded form to prevent
unauthorized access. In the context of cloud security, encryption can be applied to data at rest
(stored data) and data in transit (data being transferred over networks) to protect it from
interception and breaches.
4
CHAPTER TWO
LITERATURE REVIEW
The concept of Cloud Computing was introduced back in 1960s by John McCarthy.
According to him “computation may someday be organized as a public utility”. The characteristics
of cloud computing were explored first time in 1966 by Douglas Parkhill in his book, “The
challenge of the Computer Utility” history of term “Cloud” is originated from telecommunications
world, where telecom companies started offering Virtual Private Network (VPN) services along
with comparable quality of service at a much lower cost. Before invention of VPN, they provided
dedicated point-to-point data circuits which are nothing but wastage of bandwidth. But by using
VPN services them able to switch traffic to balance utilization of overall network. Cloud
computing now extends this to cover servers and network infrastructure. Many players in
industries have jumped into cloud computing and implemented it. For example Amazon has played
a important role and launched the Amazon Web Service (AWS) in 2006. Along with this Google
and IBM also started research projects in Cloud Computing. Eucalyptus become the first open
source platform for deploying the private clouds. (Lee et al, 2009).
Cloud services exhibit five essential characteristics that demonstrate their relation to, and
differences from, traditional computing approaches: (Laszewski et al, 2012)
5
Rapid elasticity - Capabilities can be rapidly and elastically provisioned in some cases
automatically to quickly scale out; and rapidly released to quickly scale in. To the consumer, the
capabilities available for provisioning often appear to be unlimited and can be purchased in any
quantity at any time.
Measured service - Cloud systems automatically control and optimize resource usage by
leveraging a metering capability at some level of abstraction appropriate to the type of service
(e.g., storage, processing, bandwidth, or active user accounts). Resource usage can be monitored,
controlled, and reported providing transparency for both the provider and consumer of the service.
SOFTWARE AS A SERVICE (SAAS): The capability provided to the consumer is to use the
provider’s applications running on a cloud infrastructure. The applications are accessible from
various client devices through a thin client interface such as a web browser (e.g., web-based email).
6
the other way around. (Takabi, et al, 2019). However, we have to take into account that PaaS offers
a platform to build and deploy SaaS applications, which increases the security dependency
between them. As a consequence of these deep dependencies, any attack to any cloud service layer
can compromise the upper layers. Each cloud service model comprises its own inherent security
flaws; however, they also share some challenges that affect all of them. These relationships and
dependencies between cloud models may also be a source of security risks. A SaaS provider may
rent a development environment from a PaaS provider, which might also rent an infrastructure
from an IaaS provider. Each provider is responsible for securing his own services, which may
result in an inconsistent combination of security models. It also creates confusion over which
service provider is responsible once an attack happens. (Shweta Dinesh and Bijweet, 2015)
SaaS provides application services on demand such as email, conferencing software, and
business applications such as ERP, CRM, and SCM. SaaS users have less control over security
among the three fundamental delivery models in the cloud. The adoption of SaaS applications may
raise some security concerns.
These applications are typically delivered via the Internet through a Web browser. However,
flaws in web applications may create vulnerabilities for the SaaS applications. Attackers have been
using the web to compromise user’s computers and perform malicious activities such as steal
sensitive data. Security challenges in SaaS applications are not different from any web application
7
technology, but traditional security solutions do not effectively protect it from attacks, so new
approaches are necessary. The Open Web Application Security Project (OWASP) has identified
the ten most critical web applications security threats. There are more security issues, but it is a
good start for securing web applications. (M. Armbrust, 2010).
2.4.2 MULTI-TENANCY
SaaS applications can be grouped into maturity models that are determined by the
following characteristics: scalability, configurability via metadata, and multi-tenancy. In the first
maturity model, each customer has his own customized instance of the software (Ferrari, 2009).
This model has drawbacks, but security issues are not so bad compared with the other models. In
the second model, the vendor also provides different instances of the applications for each
customer, but all instances use the same application code. In this model, customers can change
some configuration options to meet their needs. In the third maturity model multi-tenancy is added,
so a single instance serves all customers. This approach enables more efficient use of the resources
but scalability is limited. Since data from multiple tenants is likely to be stored in the same
database, the risk of data leakage between these tenants is high. Security policies are needed to
ensure that customer’s data are kept separate from other customers. For the final model,
applications can be scaled up by moving the application to a more powerful server if needed.
Data security is a common concern for any technology, but it becomes a major challenge
when SaaS users have to rely on their providers for proper security. In SaaS, organizational data
is often processed in plaintext and stored in the cloud. The SaaS provider is the one responsible
for the security of the data while is being processed and stored. Also, data backup is a critical
aspect in order to facilitate recovery in case of disaster, but it introduces security concerns as well.
Also cloud providers can subcontract other services such as backup from third-party service
providers, which may raise concerns. Moreover, most compliance standards do not envision
compliance with regulations in a world of Cloud Computing. In the world of SaaS, the process of
compliance is complex because data is located in the provider’s data centers, which may introduce
regulatory compliance issues such as data privacy, segregation, and security, that must be enforced
by the provider. (Prodan and Ostermann, 2009)
8
2.4.4 ACCESSIBILITY
Accessing applications over the internet via web browser makes access from any network
device easier, including public computers and mobile devices. However, it also exposes the service
to additional security risks. The Cloud Security Alliance has released a document that describes
the current state of mobile computing and the top threats in this area such as information stealing
mobile malware, insecure networks (WiFi), vulnerabilities found in the device OS and official
applications, insecure marketplaces, and proximity-based hacking.
PaaS facilitates deployment of cloud-based applications without the cost of buying and
maintaining the underlying hardware and software layers. As with SaaS and IaaS, PaaS depends
on a secure and reliable network and secure web browser. PaaS application security comprises two
software layers: Security of the PaaS platform itself (i.e., runtime engine), and Security of
customer applications deployed on a PaaS platform. PaaS providers are responsible for securing
the platform software stack that includes the runtime engine that runs the customer applications.
Same as SaaS, PaaS also brings data security issues and other challenges that are described as
follows: (Mahjoub et al, 2011)
Moreover, PaaS does not only provide traditional programming languages, but also does it
offer third-party web services components such as mashups. Mashups combine more than one
source element into a single integrated unit. Thus, PaaS models also inherit security issues related
to mashups such as data and network security. Also, PaaS users have to depend on both the security
of web-hosted development tools and third-party services.
From the perspective of the application development, developers face the complexity of
building secure applications that may be hosted in the cloud. The speed at which applications will
change in the cloud will affect both the System Development Life Cycle (SDLC) and security.
Developers have to keep in mind that PaaS applications should be upgraded frequently, so they
have to ensure that their application development processes are flexible enough to keep up with
9
changes (Beloglazov et al, 2012) However, developers also have to understand that any changes
in PaaS components can compromise the security of their applications. Besides secure
development techniques, developers need to be educated about data legal issues as well, so that
data is not stored in inappropriate locations. Data may be stored on different places with different
legal regimes that can compromise its privacy and security.
In PaaS, developers do not usually have access to the underlying layers, so providers are
responsible for securing the underlying infrastructure as well as the applications services. Even
when developers are in control of the security of their applications, they do not have the assurance
that the development environment tools provided by a PaaS provider are secure. However, both of
them may use multi-tenant architecture so multiple concurrent users utilize the same software.
Also, PaaS applications and user’s data are also stored in cloud servers which can be a security
concern as discussed on the previous section. In both SaaS and PaaS, data is associated with an
application running in the cloud. The security of this data while it is being processed, transferred,
and stored depends on the provider. (Laszewski et al, 2012)
IaaS provides a pool of resources such as servers, storage, networks, and other computing
resources in the form of virtualized systems, which are accessed through the Internet. Users are
entitled to run any software with full control and management on the resources allocated to them.
With IaaS, cloud users have better control over the security compared to the other models as long
there is no security hole in the virtual machine monitor. They control the software running in their
virtual machines, and they are responsible to configure security policies correctly. However, the
underlying compute, network, and storage infrastructure is controlled by cloud providers. IaaS
providers must undertake a substantial effort to secure their systems in order to minimize these
threats that result from creation, communication, monitoring, modification, and mobility. Here are
some of the security issues associated to IaaS. (Peng et al, 2009).
10
CHAPTER THREE
DISCUSSION
Cloud computing becomes a successful and popular business model due to its charming
features. In addition to the benefits at hand, the former features also result in serious cloud-specific
security issues. The people whose concern is the cloud security continue to hesitate to transfer their
business to cloud. Security issues have been the dominate barrier of the development and
widespread use of cloud computing. Understanding the security and privacy risks in cloud
computing and developing efficient and effective solutions are critical for its success. Although
clouds allow customers to avoid start-up costs, reduce operating costs, and increase their agility
by immediately acquiring services and infrastructural resources when needed, their unique
architectural features also raise various security and privacy concerns. There are three main
challenges for building a secure and trustworthy cloud system: • Outsourcing - Outsourcing brings
down both capital expenditure (CapEx) and operational expenditure for cloud customers.
However, outsourcing also means that customers physically lose control on their data and tasks.
The loss of control problem has become one of the root causes of cloud insecurity. To address
outsourcing security issues, first, the cloud provider shall be trustworthy by providing trust and
secure computing and data storage; second, outsourced data and computation shall be verifiable to
customers in terms of confidentiality, integrity, and other security services. In addition,
outsourcing will potentially incur privacy violations, due to the fact that sensitive/classified data
is out of the owners control (Shweta Dinesh and Bijweet, 2015).
11
important and elicited topic among the IT professionals. Security in cloud computing is of two
types:
Data security: It focuses on protecting the software and hardware associated with the cloud. It
deals with choosing an apt location for data centres so as to protect it from internal threats, different
types of weather conditions, fire and even physical attacks that might destroy the centre physically
and external threats avoiding unauthorized access and break ins.
Network security: Protecting the network over which cloud is running from various attacks DOS,
DDOS, IP Spoofing, ARP Spoofing and any novel attacks that intruders may device. Attack on
data affects a single user whereas a successful attack on Network has the potential to affect multiple
users. Therefore network security is of foremost importance.
Five most representative security and privacy attributes are confidentiality, integrity,
availability, accountability, and privacy-preservability, which is shown in figure 3.1. Within the
enterprise boundaries, data transmission usually does not require encryption, or just have a simple
data encryption measure. For data transmission across enterprise boundaries, both data
confidentiality and integrity should be ensured in order to prevent data from being tapped and
tampered with by unauthorized users. In other words, only the data encryption is not enough. Data
integrity is also needed to be ensured .Therefore it should ensure that transport protocols provide
both confidentiality and integrity (Gartner 2011).
12
3.4 CLOUD CONFIDENTIALITY
13
Malicious sysAdmin: The Cross-VM attack discusses how others may violate confidentiality
cloud customers that co-residing with the victim, although it is not the only threat. Privileged
sysadmin of the cloud provider can perform attacks by accessing the memory of a customers VMs.
For instance, Xenaccess enables a sysadmin to directly access the VM memory at run time by
running a user level process in Domain0.
Similar to confidentiality, the notion of integrity in cloud computing concerns both data
integrity and computation integrity. Data integrity implies that data should be honestly stored on
cloud servers, and any violations (e.g., data is lost, altered, or compromised) are to be detected.
Computation integrity implies the notion that programs are executed without being distorted by
malware, cloud providers, or other malicious users, and that any incorrect computing will be
detected. Cloud security encompasses a multifaceted approach to safeguarding data, applications, and
infrastructure within cloud computing environments. Alongside confidentiality (ensuring only authorized
users access information), another critical pillar is cloud integrity. This principle focuses on guaranteeing
that data stored or processed in the cloud remains unaltered and trustworthy.
Data Tampering: Malicious actors might attempt to modify cloud-based data for various reasons,
such as fraud, disruption, or gaining an advantage. Maintaining data integrity ensures that
information remains accurate and reliable for its intended use.
Accidental Modifications: Even unintentional data modifications due to human error or software
glitches can have significant consequences. Cloud integrity measures help detect and prevent such
alterations.
Compliance Requirements: Many regulations mandate organizations maintain data integrity to
ensure the accuracy and reliability of records. Cloud integrity solutions play a crucial role in
achieving compliance.
14
Logging and Auditing: Maintaining comprehensive logs of all data access and modification
activities within the cloud environment is essential. These logs enable organizations to track user
actions and identify any suspicious modifications.
Version Control: Implementing version control mechanisms allows organizations to track
changes made to data over time and revert to previous versions if necessary. This ensures the
ability to recover from accidental data alterations.
Data Validation: Regularly validating data against predefined criteria can help identify
inconsistencies or anomalies that might indicate unauthorized modifications. Automated data
validation tools can streamline this process.
Shared Responsibility Model: Similar to confidentiality, the cloud security shared responsibility
model applies to integrity as well. While cloud providers are responsible for securing their
infrastructure, organizations remain responsible for implementing controls to protect the integrity
of their data.
Vendor Lock-in: Some cloud providers might offer proprietary data integrity solutions,
potentially locking organizations into their platform. Choosing cloud providers with open
standards-based solutions promotes flexibility and simplifies data portability.
Insider Threats: Unfortunately, even with robust technical controls, insider threats can pose a
significant risk to data integrity. Implementing strong access controls and monitoring user activity
can help mitigate these risks.
Cloud integrity is fundamental for building trust and confidence in cloud-based systems. By
utilizing data hashing, logging and auditing, version control, and data validation techniques,
organizations can ensure the accuracy and reliability of their data in the cloud. However,
addressing shared responsibility, vendor lock-in, and insider threats remains crucial for achieving
comprehensive cloud integrity.
Cloud integrity is intricately linked to other aspects of cloud security. For instance, strong
access controls contribute to both confidentiality and integrity by restricting unauthorized access
15
that could lead to data modification. Similarly, effective incident response procedures are essential
for restoring data integrity after a security breach. A holistic cloud security strategy must
encompass measures for all three pillars (confidentiality, integrity, and availability) to effectively
protect data and systems in the cloud.
16
CHAPTER FOUR
4.1 CONCLUSION
However, cloud security remains an ongoing process demanding continuous vigilance and
adaptation. New threats and vulnerabilities emerge regularly, and security best practices must
evolve to address them. Cloud providers and organizations share responsibility for securing the
cloud environment. Collaboration between these parties is crucial for achieving robust security
posture. Every new technology has its pros and cons, similar is the case with cloud computing.
Although cloud computing provides easy data storage and access. But there are several issues
related to storing and managing data that is not controlled by owner of the data. This paper
discussed security issues for cloud. These issues include cloud integrity, cloud confidentiality,
cloud availability, cloud privacy.
The field of cloud security is dynamic and constantly evolving. Here are some key areas for
future exploration:
Integration with emerging technologies: Investigate how to effectively integrate cloud security
solutions with cutting-edge technologies like artificial intelligence (AI) and machine learning
(ML) to automate threat detection, incident response, and workload security.
Standardization and interoperability: Further development of standardized security frameworks
and protocols is crucial to facilitate interoperability between different cloud providers and security
solutions. This will enable organizations to adopt a multi-cloud strategy with consistent security
controls across different platforms.
17
Security for the next-generation cloud: Explore security considerations for emerging cloud
deployment models like serverless computing and containerization.
Focus on user behavior and training: Invest in developing comprehensive security awareness
programs to educate cloud users on best practices for data protection and phishing avoidance.
Human behavior remains a significant factor in cloud security breaches.
The evolving threat landscape: Continuous research and development are needed to stay ahead
of ever-evolving cybersecurity threats targeting cloud environments. Collaboration between
security researchers, cloud providers, and organizations is vital for proactive threat mitigation
strategies.
18