Security in Cloud Computing
Security in Cloud Computing
Security in Cloud Computing
24
International Journal of Computer Applications (0975 – 8887)
Volume 96– No.15, June 2014
Cloud computing refers to an promising model of computing o Cost Effectiveness – Centralize infrastructure enables
technology where machines with large data centers can be sharing of costs in between large number of users from
dynamically provisioned, configured, controlled and same or variant locations, such as real estate, electricity
reconfigured to deliver services in a scalable manner. It is an (e.g. deployment of cloud services near to the cheap
innovative IS (Information System) architecture; where power stations).
visualization as what may be the future of computing “[4]”. o Sustainability – Appropriate resource utilizations for
As being refers to cloud computing, it delivers computing as a efficient system.
service rather than as a product; in which share resources, o Security – Due to centralize data center it is possible to
application software and information to provide computers or improve the level of data security. In present time
other electronic devices as a utility over the Internet in real security is better than the traditional systems, as service
time. There is a logical diagram of the cloud computing providers are able to offer some kind of services to
technologies as shown in “Fig 1”. resolve security issues that may not be able to afford by
a consumer or a company individually. However,
complexity of the security is increased when
decentralization of data over the wide area of network
and various devices are used to get services. But private
deployment model of cloud computing service provides
an organization to control information or data security.
“[4]”
25
International Journal of Computer Applications (0975 – 8887)
Volume 96– No.15, June 2014
C. Cloud Computing Deployment Models customers by technical sophistication “[6]”. New risks and
There are three fundamental deployment models for cloud possible threats are exploited in cloud computing services. It
computing environment but NIST (National Institute of is necessary to analysis and understand cloud computing risks
Standards and Technology) proposed four set of deployment and threats in order to protect systems and data from
models, all are listed in “Table 2” “[5]”. vulnerabilities. Improvement of cloud computing security
mechanisms are primary step towards to ensure secure cloud
o Public Cloud – In this model of cloud infrastructure computing environment. Consumer only can rely on cloud
represents a cloud environment which is publicly computing if their services are secure enough to use. There
accessible and manageable by an organization or a third some security challenges are needed to concern such as:
party cloud service providers. application security, data transmission security, storage
o Private Cloud – This model of infrastructure is security and security related to use third party resources.
managed and operated only by private organization. The
primary goal of this type of cloud model is to sustain 4. BENEFITS OF USING CLOUD
consistent level of security and privacy. COMPUTING
o Community Cloud – This type of model shares Cloud computing provides highly scalable computing
infrastructure between organizations or communities environment for an assortment of IT services. It provides
have common mission and vision such as: security, services to client individual, to big organizations or
jurisdiction. Services are managed by organizations or companies. As a result, IT departments and individuals are
third parties. saved application developments, deployments, securities,
o Hybrid Cloud – This type of deployment model is purchasing new hardware and software and maintenance time
composition of two or more cloud models; they are and cost effectively. Cloud service helps to reduce power
bound together but each of them remains unique consumption, cooling, storage and uses space for cloud users
entities. or consumers in cloud environment. There are two key factors
“[4]” for an organization to concern: Going green and saving
Table 2. Cloud Computing Development Models charge. In general, most of the benefits are shown based on
Models Managed Infrastructure Accessible bar chart in ‘Fig 2’ from most significant to lest significant
By and according to the numbers from 1to13.
Owned Located Consumed
By By Note:
Public TPP TPP Off-P Un-trusted 1 Cost efficiency 8 Deployments & change
Org Org On-P management
Private Trusted 2 Scalability 9 Performance
TPP TPP Off-P
3 Flexibility 10 Mobility
Community TPP TPP On-P
Trusted & 4 Agility 11 Automation &
Org & TPP Org & Off-P &
Hybrid Un-trusted supported management
TPP On-P
Note: Org: Organization, TPP: Third Party Provider, Off-P: 5 IT Resource 12 Security
Off Premise, On-P: On Premise. management and
business
6 Efficiency 13 Green-IT data center
3. MOTIVATION OF CLOUD 7 Reliability and
COMPUTING Availability
Cloud computing is the Internet based computing technology,
which is empowered by virtualization. It describes a new 90
model of IT services based on user consumption and delivery
80
services. Virtualization is the creation of virtual or logical
version rather than physical such as: hardware, platform, 70
operating system and storage or network resources.
Virtualization in cloud computing achieves high level of 60
resource utilization by allowing one server to compute several
50
task concurrently. The main motive of cloud computing is to
offer robustness and ease traffic congestion for IT services 40
over the network. In business environment cloud computing
concept is growing fast to increase facilities. Gradually more 30
and more individuals and companies are placed information
20
and data in cloud environment, thus arise a number of serious
issues, such as: how much secure their services, how service 10
providers are providing data and application safety in cloud
environment. Despite of all beneficial services enterprise 0
customers are still unwilling to deploy their business in cloud. 1 2 3 4 5 6 7 8 9 10 11 12 13
In where, security is the major issue to reduce the growth of
cloud computing adaption. According to E-Crime study Fig 2: Benefits of cloud computing
conducted by E-Crime congress collaboration with KPMG in
2009, stated that 63% of respondents mentioned that their From this chart, it is comprehensible that the main key
customers were predominately affected by poisoned websites features to adapt cloud computing to minimize cost
in cloud. In addition, around 40% of total respondents said efficiently. Other benefits are arranged according to their
that there had been an increased attacked against their significant features such as: scalability, flexibility, agility,
better IT resource management and business focus, efficiency,
26
International Journal of Computer Applications (0975 – 8887)
Volume 96– No.15, June 2014
higher reliability and availability, rapid development, and other. Cloud services are shared infrastructure to increase
deployment and change management, better performance and potential vulnerabilities in terms of unauthorized data access,
greater mobility. However it is prominent that, automation which concern about data privacy, identity management,
improvement, support and management, security and green-IT authentication, compliance, confidentiality, integrity,
data centers are the lowest considerable facilities from the availability, encryption, internet protocol (IP) vulnerabilities
survey . “[2]” (most of the cases IP is un-trusted which allows man in the
middle attack) “[7]”, network security and physical security.
Some other matters are also need to distress apart from
5. RELATED WORKS security such as: SLA (service contract between service
For advance technology based services in IT industry provides
provider and consumer) and third party management,
various types of web services either secure or non-secure way.
performance, virtualization risks, lack of standards and
Cloud computing is one of the service model that required
auditing procedures and compliance laws and regulations.
adequate security to adapt in business environment. It needs
There are some major risks related to cloud security shown in
secure web services that is rarely available. Various security
‘Fig 3’. The numbers represent priority according to their
measurements are discussed in few papers deeply and
occurrences form 1 to 10.
recommended some possible way to resolve and mitigate
those problems. Introduced some trusted third parties they can 80
Critical
Somewhat
Important
Important
27
International Journal of Computer Applications (0975 – 8887)
Volume 96– No.15, June 2014
28
International Journal of Computer Applications (0975 – 8887)
Volume 96– No.15, June 2014
models in IaaS. Private cloud environment creates fewer o Access Control: Service providers should prove that
security risks compared to public cloud. The cloud they have adequate security mechanism to protect
concept implemented just over the Internet, so whatever unauthorized access. All access or changes in cloud
security issues and threats are facing in the Internet, for services (resources and data) ought to provide auditable
cloud services need to consider as well. Infrastructure is report whether it is success or fail and review along with
not only appropriate for hardware resources, where data monitoring to be performed regular basis. To generate
is being reside or processed, but also the way data are trusted user profiles based on their definitions and roles.
being transmitted over the media from source to Identity management and access security mechanism
destination over the open network. There are some should be implemented and monitored according to their
possibilities that data can be routed through intruder’s regular schedule.
network or infrastructure. 9. RECOMMENDATION
“[3][4]” Cloud computing technologies are implemented various way
based on their different service and deployment models. It is
8. MITIGATION OF SECURITY RISKS constant development process, when the field will be matured
In network, there is no complete security solution to protect there are various aspect of security risk will reduce and
data and applications or services, but satisfactory risk certainly will emerge new issues. For proper security service,
management can reduce the level of risks. In this part of the all issues arising from all direction (vendors and consumers)
paper, explained some policies, procedures and some tools to are need to analyze clearly. However, after reviewing some
mitigate risk of data and applications whether it is in public or papers notice that, there are several indispensable key points
private cloud and combination of both (hybrid). need to be considered for security in cloud computing
o Data Security and Control: Data in cloud environment environment.
should be identified and classified according to their
types. The service providers should have enough skills i. Every element in cloud environment should be analyzed
to prevent, detect and react according to various security at micro and macro level.
breach. Service logs and service agreement terms ii. An application runs in virtual machine (such as: JVM –
inspections are performed regularly. However, there are Java Virtual Machine) does not it means this application
some validity tests also required for companies to avoid will perform in cloud environment. Therefore, before
security breach because of malicious data are in cloud deployment in cloud environment the application need
such as: cross-sire scripting, insecure configuration, to be tested with proper test methods and dataset.
SQL injection flaws and weakness in access control iii. Consumers are need to evaluate cloud service
inside companies policies. Service providers should providers/vendors as they are proving same types of
provide transparent services (controls, security and services based on their service cost, efficiency and
operations) for clients. security mechanisms and some other issues.
o Network Security: For a secure system to prevent iv. All service providers should provide a standard risks list
unauthorized modification and access to data by using and protection mechanism and evaluation against it.
adequate set up or configuration of firewall and v. SLAs (Service Level Agreements) should endow with
auditable access rights. Service providers also need to continuous security review and protection against
do some tests and validate network security by using serious threats.
some prominence security tools such as: SSL, session vi. To secure data and application based on their values, not
management and packet analysis to avoid hijacking all data in cloud need to be secured such as: government
active session and access clients’ credential data. To and organizational data needed to more secure compare
secure data traffic, some policies should be to public or individual data. It is note that security
implemented in router and layer three switch. always affects the performance of data delivery and
Additionally, interaction between mobile users and efficiency.
cloud services providers are also need to be controlled. vii. DDoS (Distributed denial of service) is a major issue in
o Data Confidentiality and Integrity: Proper network; some researchers are need to conduct how to
authentication and authorization mechanism should mitigate that risk.
implement to protect illegal disclose and modification of viii. For cloud computing security models there is no global
data. Service development and deployment models must standard or framework for service providers and
be clear for a developer to protect and restrict use of consumers. To establish a common security tools,
data. Security parameters are appropriately defined for mechanism and standard that all vendors and consumers
data segregation and secure cryptographic methods and must follow. Additionally, if vendors are want to add
properties should be implemented in control manner supplementary security policies then allow them to
such as: for secure key transfer can be used RAS and for impose in their own services.
encryption key size should be consider according to ix. It is recommended that, all parties require to follow
their priority of data security or uses. some guidelines and standards for secure cloud
o Data and Service Availability: Internet speed environment such as: NIST published a guidelines for
(bandwidth) and connectivity should be considered security and privacy in public cloud computing by W.,
during data and applications transmission over the Jansen and T., Grance in early 2011 “[10]”.
network. Network service providers must be able to Without any appropriate security model for the cloud
monitor network load or traffic for proper load environment, potential users will not be able to influence to
balancing and data distribution over network. Data take advantages of cloud computing technologies completely.
replication and backup policies are also need to be In future to work on mutual authentication mechanism and
standard and provided auditable proof for data restore secure data transfer process in cloud services.
procedures, which includes accuracy and completeness
over time.
29
International Journal of Computer Applications (0975 – 8887)
Volume 96– No.15, June 2014
Throughout this paper clearly discussed about security risks [5] National Institute of Standards and Technology, NIST
and issues in various aspects, such as CIAA (Confidentiality, Cloud Computing Program, 2010
Integrity, Availability and Authenticity) and issues related to <http://www.nist.gov/itl/cloud/> [Accessed on: 18
various service delivery models such as: DoS, network October 2011].
security, data security and locality in SaaS models, network [6] Chonka, Y. Xiang, W. Zhou, A. Bonti, Cloud security
and host intrusion in PaaS and IaaS not only considered where defence to protect cloud computing against HTTP-DOS
data is being stored and process but also concerned the media and XML-Dos attacks, Journal o Network and Computer
of data transfer is being used over the Internet. Mitigation of Applications, vol. 34, pp. 1097-1107, 2010.
risks and issues are the important part of this paper where
described the possible way to reduce risks such as: to [7] Grobauer, T. Walloschek, E. Stocker, Understanding
implement proper access control, monitoring, auditing and Cloud Computing Vulnerabilities, Security & Privacy,
some standard data security mechanism. Finally, provide IEEE, vol. 9, Issue 2, pp. 50-57, March 2011.
some recommendations based on literature review on a
[8] B.,Thuraisingham, V., Khadilkar, A., Gupta, M.,
number of papers in recent years. Thus cloud computing is not
mature enough, therefore many academic researches and Kantarcioglu, L., Khan, Secure data storage and retrival
industries are moving toward to cloud computing in the clod, Collaborative Computing: Networking,
Applications and Worksharing (CollaborateCom), 2010
environment. Cloud technology is still now in cloud for users.
6th International Conference on, pp. 1-8, May 2011.
11. REFERENCES [9] Z., Chen, J., Yoon, IT Auditing to Assure a Secure Cloud
[1] S. Subashini, V. Kavitha, A survey on security issues in Computing, Services (SERVICES-1), 2010 6th World
service delivery models of cloud computing, Journal of Congress on, pp. 253-259, September 2010.
Network and Computer Applications, vol. 34, Issue 1, [10] J., Wayne, T., Grance, Guidelines on Security and
pp. 1-11, 2011. Privacy in Public Cloud Computing, U.S. Department of
[2] M.Carroll, A.Van der Merwe, P.Kotze, Secure cloud Commerce, January 2011.
computing: Benefits, risks and controls, Information http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-
Security South Africa (ISSA), pp. 1-9, September 2011. 800-144_cloud-computing.pdf [Accessed on: 23 October
2011].
IJCATM : www.ijcaonline.org 30