Data Security
Data Security
Why Security?
Cyberspace (internet, work environment, intranet) is becoming a dangerous place for all
organizations and individuals to protect their sensitive data or reputation. This is because of the
numerous people and machines accessing it. Another internal threat is that information material
can be easy accessible over the intranet.
One important indicator is the IT skills of a person that wants to hack or to breach your security
has decreased but the success rate of it has increased, this is because of three main factors −
Hacking tools that can be found very easily by everyone just by googling and they are
endless.
Technology with the end-users has increased rapidly within these years, like internet
bandwidth and computer processing speeds.
Access to hacking information manuals.
Cloud Computing
Cloud Computing provides us means of accessing the applications as utilities over the Internet.
It allows us to create, configure, and customize the applications online.
What is Cloud?
The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is
something, which is present at remote location. Cloud can provide services over public and
private networks, i.e., WAN, LAN or VPN.
Applications such as e-mail, web conferencing, customer relationship management (CRM)
execute on cloud.
What is Cloud Computing?
Cloud Computing refers to manipulating, configuring, and accessing the hardware and
software resources remotely. It offers online data storage, infrastructure, and application.
Cloud computing offers platform independency, as the software is not required to be installed
locally on the PC. Hence, the Cloud Computing is making our business
applications mobile and collaborative.
Basic Concepts
There are certain services and models working behind the scene making the cloud computing
feasible and accessible to end users. Following are the working models for cloud computing:
Deployment Models
Service Models
Deployment Models
Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud
can have any of the four types of access: Public, Private, Hybrid, and Community.
Public Cloud
The public cloud allows systems and services to be easily accessible to the general public.
Public cloud may be less secure because of its openness.
Private Cloud
The private cloud allows systems and services to be accessible within an organization. It is
more secured because of its private nature.
Community Cloud
The community cloud allows systems and services to be accessible by a group of
organizations.
Hybrid Cloud
The hybrid cloud is a mixture of public and private cloud, in which the critical activities are
performed using private cloud while the non-critical activities are performed using public cloud.
Service Models
Cloud computing is based on service models. These are categorized into three basic service
models which are -
Infrastructure-as–a-Service (IaaS)
Platform-as-a-Service (PaaS)
Software-as-a-Service (SaaS)
Anything-as-a-Service (XaaS) is yet another service model, which includes Network-as-a-
Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or Strategy-as-a-
Service.
The Infrastructure-as-a-Service (IaaS) is the most basic level of service. Each of the service
models inherit the security and management mechanism from the underlying model, as shown
in the following diagram:
Infrastructure-as-a-Service (IaaS)
IaaS provides access to fundamental resources such as physical machines, virtual machines,
virtual storage, etc.
Platform-as-a-Service (PaaS)
PaaS provides the runtime environment for applications, development and deployment tools,
etc.
Software-as-a-Service (SaaS)
SaaS model allows to use software applications as a service to end-users.
What is Cloud?
The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is
something which is present at remote location. Cloud can provide services over network i.e. on
public networks or on private networks i.e. WAN, LAN or VPN.
Applications such as e-mail, web conferencing, customer relationship management (CRM), all run in
cloud.
What is Cloud Computing?
Cloud Computing refers to manipulating, configuring, and accessing the applications online.
It offers online data storage, infrastructure and application.
Benefits
Here are the benefits of deploying cloud as community cloud model:
Cost effective
Sharing Between Organizations
Security
Issues
Since all data is housed at one location, therefore one must be careful in storing data in
community cloud because it might be accessible by others.
It is also challenging to allocate responsibilities of governance, security and cost.
OpenID
It offers users to login multiple websites with single account. Google, Yahoo!, Flickr, MySpace,
WordPress.com are some of the companies that support OpenID.
Benefits
Increased site conversation rates.
Access to greater user profile content.
Fewer problems with lost passwords.
Ease of content integration into social networking sites.
Network as a Service(NaaS)
Overview
Networks as a Service allows us to access to network infrastructure directly and securely.
NaaS makes it possible to deploy custom routing protocols.
NaaS uses virtualized network infrastructure to provide network services to the consumer. It
is the responsibility of NaaS provider to maintain and manage the network resources, which
decreases the workload from the consumer. Moreover, NaaS offers network as a utility.
Mobile NaaS
Mobile NaaS offers more efficient and flexible control over mobile devices. It uses
virtualization to simplify the architecture to create more efficient processes.
NaaS Benefits
NaaS offers a number of benefits, some of the are discussed below:
Independence
Analytics
Resilience
Ease of Adding new Service Elements
Isolation of customer traffic
Support Models
Challenges
Storing the data in cloud is not that simple task. Apart from its flexibility and convenience, it
also has several challenges faced by the consumers. The consumers require ability to:
Provision additional storage on demand.
Know and restrict the physical location of the stored data.
Verify how data was erased?
Have access to a documented process for surely disposing of data storage hardware.
Administrator access control over data.
Virtualization Concept
Creating a virtual machine over existing operating system and hardware is referred as Hardware
Virtualization. Virtual Machines provide an environment that is logically separated from the
underlying hardware.
Types of Hardware Virtualization
Here are the three types of hardware virtualization:
1. Full Virtualization
2. Emulation Virtualization
3. Paravirtualization
Full Virtualization
In Full Virtualization, the underlying hardware is completely simulated. Guest software do not
require any modification to run.
Emulation Virtualization
In Emulation, the virtual machine simulates the hardware and hence become independent of the
it. In this, the guest operating system does not require modification.
Securing the Cloud
Security in cloud computing is a major concern. Data in cloud should be stored in encrypted
form. To restrict client from direct accessing the shared data, proxy and brokerage services
should be employed.
Encryption
Encryption helps to protect data from being compromised. It protects data that is being
transferred as well as data stored in the cloud. Although encryption helps to protect data from
any unauthorized access, it does not prevent from data loss.
Cloud Computing Operations
Overview
Cloud computing operation refers to delivering superior cloud service. Today cloud computing
operations have become very popular and widely employed by many of the organizations just
because, it allows to perform all business operations over the internet.
These operations can be performed using a web application or mobile based applications. There
are a number of operations that are performed in cloud, some of them are shown in the
following diagram:
Cloud Applications
Cloud Computing has its applications in almost all the fields such as business, entertainment,
data storage, social networking, management, entertainment, education, art and global
positioning system etc. Some of the widely famous cloud computing applications are discusses
here in this tutorial:
Business Applications
Cloud computing has made business more collaborative and easy by incorporating various apps
such as MailChimp, Chatter, Google Apps for business, and Quickbooks.
Social Applications
There are several social networking services providing websites such as Facebook, Twitter etc.
SN Application Description
Facebook
1
Facebook offer social networking service. One can share photos, videos, files, status and much more.
Twitter
2 Twitter helps to interact directly with the public. Once can follow any celebrity, organization and any person
who is on twitter and can have latest updates regarding the same.
Entertainment Applications
Cloud Computing Challenges
Cloud computing, an emergence technology, have placed many challenges in different aspects.
Some of these are shown in the following diagram:
Security & Privacy
Security and Privacy of information is the biggest challenge to cloud computing. To get out of
security and privacy issues can be over come by employing encryption, security hardware and
security applications.
Portability
This is another challenge to cloud computing that applications should easily be migrated form
one cloud provider to another. There should not be vendor-lock in. However, it is not yet made
possible because each of the cloud provider use different standard languages for their platforms.
Interoperability
Application on one platform should be able to incorporate services from other platfrom. It is
made possible via web services. But this writing such web services is very complex.
Computing Performance
To deliver data intensive applications on cloud requires high network bandwidth which result in
high cost. If done at low bandwidth, then it does not meet the required computing performance
of cloud application.
Reliability and Availability
It is necessary for cloud systems to be reliable and robust because most of the business are now
becoming dependent on services provided by third party.
Mobile Cloud Computing
Cloud Computing offers such smartphones that have rich internet media experience and require
less processing, less power. In term of Mobile Cloud Computing, processing is done in cloud,
data is stored in cloud. And the mobile devices serve as a media for display.
Today smartphones are employed with rich cloud services by integrating applications that
consume web services. These web services are deployed in cloud.
There are several Smartphone operating systems available such as Google's Android, Apple's
iOS, RIM BlackBerry, Symbian, and Windows Mobile Phone. Each of these platform
support third party applications that are deployed in cloud.
Architecture
MCC includes four types of cloud resources:
Distant mobile cloud
Distant immobile cloud
Proximate mobile computing entities
Proximate immobile computing entities
Hybrid
Issues
Despite of having significant development in field of mobile computing, there still exists many
issues:
Emergency efficient transmission
There should be a frequent transmission of information between cloud and the mobile devices.
Architectural Issues
Mobile cloud computing is required to make architectural neutral because of heterogeneous
environment.
Live VM migration
It is challenging to migrate an application which is resource-intensive to cloud and to execute it
via. Virtual Machine .
Mobile Communication Congestion
Due to continuous increase demand for mobile cloud services, the workload to enable smooth
communication between cloud and mobile devices has been increased.
Security and Privacy
This is one of the major issue because mobile users share their personal information over the
cloud.
Automobile
Many in the automotive industry envision a future for cars in which IoT technology makes cars
“smart,” attractive options equal to MRT. IoT offers few significant improvements to personal
vehicles. Most benefits come from better control over related infrastructure and the inherent
flaws in automobile transport; however, IoT does improve personal vehicles as personal spaces.
IoT brings the same improvements and customization to a vehicle as those in the home.
Commercial Transportation
Transportation benefits extend to business and manufacturing by optimizing the transport arm
of organizations. It reduces and eliminates problems related to poor fleet management through
better analytics and control such as monitoring idling, fuel consumption, travel conditions, and
travel time between points. This results in product transportation operating more like an aligned
service and less like a collection of contracted services.
Security Spectrum
The definition of a secured device spans from the most simple measures to sophisticated
designs. Security should be thought of as a spectrum of vulnerability which changes over time
as threats evolve.
Security must be assessed based on user needs and implementation. Users must recognize the
impact of security measures because poorly designed security creates more problems than it
solves.
Cyber Attacks
IoT devices expose an entire network and anything directly impacted to the risk of attacks.
Though those connections deliver powerful integration and productivity, they also create the
perfect opportunity for mayhem like a hacked stove or fire safety sprinkler system. The best
measures against this address the most vulnerable points, and provide custom protections such
as monitoring and access privileges.
Some of the most effective measures against attacks prove simple −
Built-in Security − Individuals and organizations should seek hardened devices,
meaning those with security integrated in the hardware and firmware.
Encryption − This must be implemented by the manufacturer and through user systems.
Risk Analysis − Organizations and individuals must analyze possible threats in
designing their systems or choosing them.
Authorization − Devices, whenever possible, must be subject to privilege policies and
access methods.
Data Theft
Data, IoT's strength and weakness, proves irresistible to many. These individuals have a number
of reasons for their interest − the value of personal data to marketing/advertising, identity theft,
framing individuals for crimes, stalking, and a bizarre sense of satisfaction. Measures used to
fight attacks are also effective in managing this threat.