The Management of Security in Cloud Computing: September 2010
The Management of Security in Cloud Computing: September 2010
net/publication/224178604
CITATIONS READS
357 6,958
3 authors, including:
S. Ramgovind Mm Eloff
University of South Africa University of South Africa
1 PUBLICATION 357 CITATIONS 63 PUBLICATIONS 1,284 CITATIONS
All content following this page was uploaded by S. Ramgovind on 15 September 2014.
Abstract—Cloud computing has elevated IT to newer limits Cloud computing can be seen as a service-oriented
by offering the market environment data storage and capacity architecture (SOA) exploring almost every computing
with flexible scalable computing processing power to match component including, but not limited to distributed computing,
elastic demand and supply, whilst reducing capital expenditure. grid computing, utility computing, on-demand, open source,
However the opportunity cost of the successful implementation of Peer-to-Peer and Web 2.0 [2]. It is a natural next step from the
Cloud computing is to effectively manage the security in the grid model to a supply and demand utility model. In
cloud applications. Security consciousness and concerns arise as minimizing potential security trust issues as well as adhering to
soon as one begins to run applications beyond the designated
governance issues facing Cloud computing, a prerequisite
firewall and move closer towards the public domain. The purpose
control measure is to ensure that a concrete Cloud computing
of the paper is to provide an overall security perspective of Cloud
computing with the aim to highlight the security concerns that
Service Level Agreement (SLA) is put in place and maintained
should be properly addressed and managed to realize the full when dealing with outsourced cloud service providers and
potential of Cloud computing. Gartner’s list on cloud security specialised cloud vendors. Due to the nature and demand of
issues, as well the findings from the International Data emerging cloud technologies, there is a certain degree of
Corporation enterprise panel survey based on cloud threats, will inexperience when dealing with cloud security. Currently
be discussed in this paper. Cloud computing clients have to trust 3rd party cloud providers
on many fronts, especially on the availability of cloud service
Keywords- Cloud computing; Security; Public cloud, Private as well as data security. Therefore the SLA forms an integral
cloud, Hybrid Cloud, policies, cloud transparency part of a client’s first line of defense. The SLA thus becomes
I. INTRODUCTION the solitary legal agreement between the service provider and
client. The SLA together with other key Cloud considerations
The success of modern day technologies highly depends on will be unpacked further on in this paper.
its effectiveness of the world’s norms, its ease of use by end
users and most importantly its degree of information security The remainder of this paper is structured as follows:
and control. Cloud computing is a new and emerging Section II introduces the different types of Cloud models also
information technology that changes the way IT architectural known as deployment models together with its security
solutions are put forward by means of moving towards the implications, Section III explains Cloud computing
theme of virtualisation: of data storage, of local networks architectural delivery models with a security insight, followed
(infrastructure) as well as software [1-2]. by Section IV that discusses Cloud computing concerns,
particularly focusing on Gartner’s list on cloud security issues.
In a survey undertaken by the International Data Section V pertains to the information security requirements that
Corporation (IDC) group between 2008 and 2009, the majority are applied to Cloud computing. Section VI unpacks the
of results point to employing Cloud computing as a low-cost findings from the IDC enterprise panel survey based on cloud
viable option to users [3]. The results also show that Cloud shortfalls and finally Section VII highlights how Cloud
computing is best suited for individuals who are seeking a computing security can be managed.
quick solution for startups, such as developers or research
projects and even e-commerce entrepreneurs. Using Cloud II. TYPES OF CLOUDS
computing can help in keeping one’s IT budget to a bare In providing a secure Cloud computing solution, a major
minimum. It is also ideally suited for development and testing decision is to decide on the type of cloud to be implemented.
scenarios. It is the easiest solution to test potential proof of Currently there are three types of cloud deployment models
concepts without investing too much capital. Cloud computing offered, namely, a public, private and hybrid cloud. These,
can deliver a vast array of IT capabilities in real time using together with their security implications will be discussed
many different types of resources such as hardware, software, below. Within this paper vendors are referred to as cloud
virtual storage once logged onto a cloud. Cloud computing can providers, or companies specialising in providing a tailor made
also be part of a broader business solution whereby prioritised cloud solution. These entities have established cloud
applications utilise Cloud computing functionality whilst other infrastructure including virtual servers for storage matching
critical applications maintain organisational resources as per required processing power. Organisations are entities,
normal. This allows for cost saving whilst maintaining a secure including business managers, executives and end-users,
degree of control within an orgainsation. entering into an agreement with cloud vendors to utilise their
cloud capabilities for personal and/or private use.