Security Challenges in Cloud Computing
Security Challenges in Cloud Computing
net/publication/267697749
CITATIONS READS
79 10,961
3 authors, including:
Levent Ertaul
California State University, East Bay
31 PUBLICATIONS 310 CITATIONS
SEE PROFILE
All content following this page was uploaded by Levent Ertaul on 22 December 2014.
4.4 General Security Issues The Open Cloud Consortium (OCC) is organized into
several different working groups [8]. For example, the
In addition to the above mentioned issues there are few working group on Standards and Interoperability for Clouds.
other general security issues that are delaying cloud The purpose of the OCC is to support the development of
computing adoption and needs to be taken care of. standards for cloud computing and to develop framework for
interoperability among various clouds [19]. There is also a
Data Location: When user uses the cloud, user working group on wide area clouds and the impact of
probably won’t know exactly where his data is hosted, what network protocols on clouds. The focus of this working group
country it will be stored in [3][4][8]? Amazon does not even is on developing technology for wide area clouds, including
disclose where their data centers are located. They simply creation of methodologies and benchmarks to be used for
clam that ach data center is hosted in a nondescript building evaluating wide area clouds. This working group is tasked to
with a military-grade perimeter. Even if customer know that study the applicability of variants of TCP and the use of other
their database server is in the us-east-1a availability zone, network protocols for clouds.
customer do not know where that data center9s0 behind that
availability zone is located, or even which of he three East The working group on information sharing, security and
Coast availability zones us-east-1a represents [4]. clouds has a primary focus on standards and standard-based
architectures for sharing information between clouds. This is
Data Sanitization: Sanitization is the process of especially true for clouds belonging to different organizations
removing sensitive information from a storage device. In and subject to possibly different authorities and policies. This
cloud computing users are always concerned about, what group is also concerned with security architectures for clouds.
happens to data stored in a cloud computing environment Finally, there is an Open Cloud Test-bed working group that
once it has passed its user’s “use by date” [18]. When a manages and operates the open cloud test-bed [19].
storage device has reached the end of its useful life, AWS
procedures include a decommissioning process that ensures Another very active group in the field of cloud
customer data are not exposed to unauthorized individuals. computing is Distributed management Task Force (DMTF)
AWS uses the technique DoD 5220.22-M as per National [8]. According to their web site, the distributed management
Industrial Security Program Operating manual to destroy task force enables more effective management of millions of
data, as part of the decommissioning process [9][13]. When IT systems worldwide by bringing the IT industry together to
item and attribute data are deleted within a domain, removal collaborate on the development, validation and promotion of
of the mapping within the domain starts immediately, and is systems management standards [24][25].
also generally complete within seconds. Once the mapping is
removed, there is no remote access to the deleted data. The This group spans the industry with 160 member
storage area is then made available only for write operations companies and organizations, and more than 4,000 active
and the data are overwritten by newly stored data [9]. participants crossing 43 countries. The DMTF board of
directors id led by 16 innovative, industry- leading sometimes called the asserting party, is a platform or
technology companies. application that can relay security information. The relying
party or assertion consumer or requesting party is a partner
The DMTF started the Virtualization Management site that receives the security information. The exchanged
Initiative (VMAN). The VMAN unleashes the power of information deals with a subject’s authentication status,
virtualization by delivering broadly supported interoperability access authorization, and attribute information. A subject is
and portability standards to virtual computing environments. an entity in a particular domain by an email address is a
VMAN enables IT managers to deploy preinstalled, pre subject, as might be a printer [8]. SAML is built on a number
configured solutions across heterogeneous computing of existing standards, namely, SOAP, HTTP and XML.
networks and to manage those applications through their SAML relies on HTTP as its communications protocol and
entire life cycle [20][25]. specifies the use of SOAP.
In the next section we discuss about the major security Open Authentication (OAuth): OAuth is an open
standards for cloud computing and their application in cloud protocol, initiated by Blaine Cook and Chris Messina, to
computing environment. allow secure API authorization in a simple, standardized
method for various types of web applications. OAuth is a
6 Standards for Security in Cloud method for publishing and interacting with protected data.
For developers, OAuth provides users access to their data
Computing while protecting account credentials. It also allows users to
Security standards define the processes, procedures, and grant access to their information, which is shared by the
practices necessary for implementing a security program. service provider and consumers without sharing all of their
These standards also apply to cloud related IT activities and identity. OAuth is the baseline, and other extensions and
include specific steps that should be taken to ensure a secure protocols can be built on it. By design, OAuth Core 1.0 does
environment is maintained that provides privacy and security not provide many desired features, like automated discovery
of confidential information in a cloud environment. Security of endpoints, language support, support for XML-RPC and
standards are based on a set of key principles intended to SOAP, standard definition of resource access, OpenID
protect this type of trusted environment. A basic philosophy integration, signing algorithms, etc [8]. The core deals with
of security is to have layers of defense, a concept known as fundamental aspects of the protocol, namely, to establish a
defense in depth. This means having overlapping systems mechanism for exchanging a user name and password for a
designed to provide security even if one system fails. An token with defined rights and to provide tools to protect the
example is s firewall working in conjunction with intrusion- token. It is important to understand that security and privacy
detection system (IDS). Defense in depth provides security are not guaranteed by the protocol. In fact, OAuth by itself
because there is no single point of failure and no single entry provides no privacy at all and depends on other protocols
vector at which an attack can occur. For this reason, a choice such as SSL to accomplish that.
between implementing network security in the middle part of
a network (i.e., in the cloud) or at the endpoints is a false OpenID: It is an open, decentralized standard for user
dichotomy [8]. No single security system is a solution by authentication and access control. It allows users to log onto
itself, so it is far better to secure all systems. This type of many services using the same digital identity. It is a single-
layered security is precisely what we are seeing develop in sign-on (SSO) method of access control. OpenID replaces the
cloud computing. Traditionally, security was implemented at common log-in process, i.e. a log-in name and a password, by
the endpoints, where the user controlled access. An allowing users to log in once and gain access to resources
organization had no choice except to put firewalls, IDSs, and across participating systems. An OpenID is in the form of a
antivirus software inside its own network. Today, with the unique URL and is authenticated by the entity hosting the
advent of managed security services offered by cloud OpenID URL [9]. The OpenID protocol does not rely on a
providers, additional security can be provided inside the central authority to authenticate a user’s identity. Neither the
cloud [8][9]. OpenID protocol nor any websites requiring identification
can mandate that a specific type of authentication be used;
Security Assertion Markup Language (SAML): nonstandard forms of authentication such as smart cards,
SAML is an XML-based standard for communicating biometrics, or ordinary password are allowed [8].
authentication, authorization, and attribute information
among online partners. It allows businesses to securely send SSL/TLS: Transport Layer Security (TLS) and its
assertions between partner organizations regarding the predecessor, Secure Sockets Layer (SSL), are
identity and entitlements of a principal. SAML standardizes cryptographically secure protocols designed to provide
queries for, and responses that contain, user authentication, security and data integrity for communications over TCP/IP.
entitlements, and attribute information in an XML format. TLS and SSL encrypt the segments of network connections at
This format can then be used to request security information the transport layer. The TLS protocol allows client/server
about a principal from a SAML authority. A SMAL authority, applications to communicate across a network in a way
specifically designed to prevent eavesdropping, tampering, [6] http://communication.howstuffworks.com/cloud
and message forgery [21]. TLS provides endpoint computing1.htm.
authentication and data confidentiality by using cryptography. [7] John Harauz, Lori M. Kaufman, Bruce Potter, “Data Security in
TLS authentication is one way- the server is authenticated, the World of Cloud Computing,” published on the IEEE Journal
on Cloud Computing Security, July/August 2009, Vol. 7, No.4,
because the client already knows the server’s identity. In this pp. 61-64.
case, the client remains unauthenticated [12] . TLS also [8] John W. Rittinghouse, James F. Ransome, “Cloud Computing
supports a more secure bilateral connection mode whereby Implementation, Management, and Security”, CRC Press,
both ends of the connection can be assured that they are August 17, 2009, ISBN 9781439806807, pp. 147-158, 183-212.
communicating with whom they believe they are connected. [9] Amazon White Paper, http://aws.amazon.com/about-aws/whats-
This is known as mutual (assured) authentication. TLS new/2009/06/08/new-aws-security-center-and-security-
involves three basic steps. The first step deals with peer whitepaper/ , published June 2009.
negotiation for algorithm support. During this phase, the [10] Marco Descher, Philip Masser, Thomas Feilhauer, A Min Tjoa,
client and server negotiate cipher suites, which determines David Huemer, “ Retaining Data Control to the Client
Infrastructure Clouds”, published on the IEEE, 2009
which ciphers are used. In the next step, key exchange and
International Conference on Availability, Reliability and
authentication is decided. During this phase, a decision is Security, pp. 9-15.
made about the key exchange and authentication algorithm to [11] David Bernstein, Erik Ludvigson, Krishna Sankar, Steve
be used, and determine the message authentication codes. The Diamond, Monique Morrow, “Blueprint for the Intercloud –
key exchange and authentication algorithms are typically Protocols and Formats for Cloud Computing Interoperability,
public key algorithms. The finals step is about the symmetric submitted to IEEE, 2009 Fourth International Conference on
cipher encryption and message encryption. The message Internet and Web Applications and Services, pp. 328-335.
authentication codes are made up from cryptographic hash [12] Liang-Jie Zhang, Qun Zhou, “CCOA: Cloud Computing Open
functions. Once these decisions are made, data transfer may Architecture”, published on IEEE, 2009 IEEE International
Conference on Web Services, pp. 607-615.
begin [9][12].
[13] Amazon White Paper, “Introduction to Amazon Virtual Private
Cloud”, Available: http://aws.amazon.com/about-aws/whats-
7 Conclusions new/2009/08/26/introducing-amazon-virtual-private-cloud/ ,
published Aug 26, 2009, pp. 6-8.
The cloud computing phenomenon is generating a lot of [14] Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal,
interest worldwide because of its lower total cost of “Market-Oriented Cloud Computing: Vision, Hype, and Reality
ownership, scalability, competitive differentiation, reduced for Delivering IT Services as Computing Utilities”, grid
complexity for customers, and faster and easier acquisition of Computing and Distributed Systems and Software Engineering,
services. While cloud offers several advantages, people come The University of Melbourne, Australia.
to the cloud computing topic from different points of view. [15] Jinesh Varia, Amazon Web Services, “Building GrepTheWeb in
the Cloud, Part 1: Cloud Architectures”, Available:
Some believe that cloud to be an unsafe place. But few
http://developer.amazonwebservices.com/connect, July 2008,
people find it safer then their own security provisioning, pp. 1-7.
especially small businesses that do not have resources to [16] Jon Brodkin, “ Gartner: Seven Cloud-Computing Security
ensure the necessary security themselves. Several large Risks”, Available: http://www.infoworld.com, published July
financial organizations and some government agencies are 2008, pp. 1-3.
still holding back. They indicate that they will not consider [17] IBM CIO White Paper, “ Staying aloft in tough times”, April
moving to cloud anytime soon because they have no good 2009, pp. 3-19.
way to quantify their risks. To gain total acceptance from all [18] Steve Hanna, Juniper Networks, “Cloud Computing: Finding
potential users, including individuals, small businesses to the Silver Lining”, published 2009, pp. 2-30.
[19] Manifesto, “Open Cloud Manifesto, Dedicated to the belief that
Fortune 500 firms and government, cloud computing require
the cloud should be open”, Available:
some standardization in the security environment and third- www.opencloudmanifesto.org, published Spring 2009, pp-1-7.
party certification to ensure that standards are met. [20] Peter Fingar, “ Dot.Cloud: the 21st century business platform
built on cloud computing”, First edition, Meghan-Kiffer Press,
8 References February 18, 2009, ISBN 9780929652498, pp. 81-99.
[21] William Stallings, “Network Security essentials”, Third edition,
[1] http://csrc.nist.gov/groups/SNS/cloud-computing/index.html. Prentice Hall, July 29,2006, ISBN 9780132380331, pp-2.
[2] Cisco White Paper, [22] http://en.wikipedia.org/wiki/Network_security
http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/n [23] http://searchservervirtualization.techtarget.com/news/column/0,
s537/white_paper_c11-532553.html, published 2009, pp. 1-6. 294698,sid94_gci1217705,00.html
[3] John Viega, McAffee, Cloud Computing and the Common [24] http://www.service-
Man,” published on the IEEE Journal ON Cloud Computing architecture.com/xml/articles/distributed_management_task_for
Security, pp. 106-108, August 2009. ce_dmtf.html.
[4] George Reese, “Cloud Application Architectures”, First edition, [25] http://www.dmtf.org/about/cloud-
O’Reilly Media, April 2009, ISBN 9780596156367, pp. 2-4, incubator/CloudIncubatorCharter2009-04-16.pdf
99-118.
[5] http://en.wikipedia.org/wiki/Cloud_computing.