Cloud Network Security and Privacy
Cloud Network Security and Privacy
I. I NTRODUCTION
Cloud computing is a new computing paradigm in which the III. C LOUD SECURITY ISSUES
Internet is used to connect to provider network services [1].
According to the definition of the National Institute of Stan- Despite the advantages of Cloud Computing offered for the
dards and Technology (NIST), cloud computing is access via user, its adaptation as a storage medium is a major issue with
a telecommunications network, on demand and in self-service, regard to the security of valuable data in the cloud. Several
to configurable shared computing resources. Cloud computing problems [3] within cloud computing are:
provides three main services: Software as a Service (SaaS), • Data integrity
Platform as a Service (PaaS), and Infrastructure as a Service • Privacy and confidentiality
(IaaS). Additionally, cloud providers implement various types • Availability of data
of cloud models, such as public cloud, private cloud, and
hybrid cloud. Cloud computing deals with computing, storage,
software, network and storage equipment. The main benefit A. Data integrity
that cloud computing offers to the tenant is reduced cost
and increased scalability. The paper is organized as follows: Integrity Consists of protection against improper modifica-
in Section two, we give a detailed description of the cloud tion or destruction of information and includes a guarantee
storage. After introducing you=the security in cloud computing of non-repudiation and authenticity of information. That is to
we give same intrusions in cloud computing. In section five, say, the data must not be deformed or modified by use or
briefly presents a some preliminaries about firewalls. In section time. The user undertakes not to voluntarily disturb the proper
six, we described the intrusion detection and prevention. We functioning of computer systems and networks (internal or
validate our approach by a suggestion of some work to be external), whether by abnormal handling of the equipment, or
done to improve IT security at the cloud level and we end by the introduction of parasitic software known as generic of
with a conclusion. viruses, Trojans, logic bombs.
2
B. Denial of service attack Firewall and Intrusion detection and prevention system in
Cloud could be the common solution to prevent some of the
A DoS attack is an attempt to render services assigned to attacks listed above. Several intrusion detection techniques are
authorized users unusable. In such an attack, the attacker tries discussed in next section.
to flood the victim by sending a large number of packets
from the innocent host (zombie) into the network. The Cloud V. F IREWALLS
is more vulnerable to DoS attacks, because it is shared by The firewall is considered a control and monitoring
many users, which makes DoS attacks much more damaging. choke point. It can be a single computer system or a set
When the cloud computing operating system notices a heavy of cooperating systems. The firewall allows only authorized
workload on the flooded service, it will start providing more traffic, as defined by the security policy, to pass. Firewalls [18]
computing power to deal with the additional workload. The are used to deny or allow protocols, ports or IP addresses...
attacker does not need to flood all servers that provide a It diverts incoming traffic according to a predefined policy.
certain target service, but only can flood a single Cloud address Several types of firewalls are discussed in [5].
in order to achieve a complete loss of availability on the
scheduled service. Using an intrusion detection system (IDS) Several researches [6], [7] et [8] have been carried out to
is the most common method of defense against this type of define the types of firewalls such as depicted in table I.
attack.
3
Proxy firewalls
• Can isolate internal network within Internet. VIII. C ONCLUSION
• Analyze the protocol syntax by breaking up
client/server connection. Cloud internet is a very valuable technological facility with
• Require lots of network resources. excellent service for its users. The security of the cloud
computing model must be an essential issue for its success. In
this mini paper, we have described various intrusions that can
lead to the loss or modification or unavailability of data and
VI. I NTRUSION D ETECTION AND P REVENTION S YSTEM resources. Then, we illustrated according to research carried
out by researchers the various types of firewalls and the IDS
A. IDS/IPS techniques in a cloud environment. We have provided the summary in
In the cloud, the detection method used by IDS can be the form of tables which are helpful in understanding the
signature-based or anomaly-based. The IDS can be installed various types easily. The analysis of several articles shows
in different places either at the edge of a network or on a that although the various IDS techniques in the cloud, they
host or on a virtual machine/hypervisor, or distributed in do not offer complete security. Cloud security can be greatly
all regions of the cloud. A summary of existing IDS/IPS improved by using soft computing techniques. However, there
techniques with their strengths and limitations is given in the are still several challenges and open questions to consider. In
table II. Table III, we have provided the limitations of each technique.
These security challenges must therefore be resolved before a
standard framework for cloud security can be recommended.
B. Types of IDS/IPS unsed in Cloud Computing
A bref of various IDSs are shown in Table III. We R EFERENCES
summarize the approaches presented with their type, [1] P. Mell and T. Grance. (2011) The nist definition of cloud computing
technique, positioning in the Cloud, advantages and (draft). [Online]. Available: http://csrc.nist.gov/publications/drafts/800-
disadvantages. This gives the cloud security research 145/Draft-SP-800-145-cloud-definition.pdf
[2] A. W. Services. (2022) Cloud storage. [Online]. Available:
community several challenges to address before a standard https://aws.amazon.com/what-is-cloud-storage/
cloud security framework can be proposed [12]. [3] W. Stallings. (2007) Network security essentials applications
and standards. [Online]. Available: http://www.ctan.org/tex-
archive/macros/latex/contrib/IEEEtran/
[4] D. Kusnetzky. (2014, Sep.) Layer virtualization model. [Online].
VII. P ROPOSED S OLUTION Available: https://virtualizationreview.com/articles/2014/10/14/7-layer-
virtualization-model.aspx
The proposed solution should provide a reliable cloud- [5] D. Sequeira. (2021) Intrusion prevention systems- security’s silver
based security solution for organizations where they can bullet? ANS Institute InfoSec Reading Room . [Online]. Available:
have their own management and monitoring. We proposed https://sansorg.egnyte.com/dl/ShxFE4Pwsl
[6] S. S. Naghmeh Dezhabad. (2018) Learning-based dynamic scalable load-
a distributed firewall architecture as a solution. Agents run balanced firewall as a service in network function-virtualized cloud
on each node in the system to manage firewall rules on computing environments. Springer Science+Business Media, LLC, part
those nodes. These agents communicate with a central Cloud of Springer Nature.
[7] A. Pathak. (2021) Différence entre les pare-feu matériels, logiciels
Firewall Management Server which is the central store of et cloud. [Online]. Available: https://geekflare.com/fr/hardware-vs-
knowledge and management before sending the packets software-cloud-firewall/
4
TABLE II
SUMMARY OF IDS/IPS TECHNIQUES
TABLE III
SUMMARY OF EXISTING IDS APPROACHES IN CLOUD