Cloud Computing - II Unit - III
Cloud Computing - II Unit - III
1. Data Loss –
Data Loss is one of the issues faced in Cloud Computing. This is also known as Data
Leakage. As we know that our sensitive data is in the hands of Somebody else, and we
don’t have full control over our database. So if the security of cloud service is to break by
hackers then it may be possible that hackers will get access to our sensitive data or
personal files.
5. Lack of Skill –
While working, shifting o another service provider, need an extra feature, how to use a
feature, etc. are the main problems caused in IT Company who doesn’t have skilled
Employee. So it requires a skilled person to work with cloud Computing.
Some most common Security Risks of Cloud Computing are given below-
Data Loss
Data loss is the most common cloud security risks of cloud computing. It is also known as data
leakage. Data loss is the process in which data is being deleted, corrupted, and unreadable by a
user, software, or application. In a cloud computing environment, data loss occurs when our
sensitive data is somebody else's hands, one or more data elements can not be utilized by the data
owner, hard disk is not working properly, and software is not updated.
Data Breach
Data Breach is the process in which the confidential data is viewed, accessed, or stolen by the
third party without any authorization, so organization's data is hacked by the hackers.
Vendor lock-in
Vendor lock-in is the of the biggest security risks in cloud computing. Organizations may face
problems when transferring their services from one vendor to another. As different vendors
provide different platforms, that can cause difficulty moving one cloud to another.
Account hijacking
Account hijacking is a serious security risk in cloud computing. It is the process in which
individual user's or organization's cloud account (bank account, e-mail account, and social media
account) is stolen by hackers. The hackers use the stolen account to perform unauthorized
activities.
Traffic Eavesdropping:
Traffic eavesdropping occurs when data being transferred to or within a cloud (usually from
the cloud consumer to the cloud provider) is passively intercepted by a malicious service
agent for illegitimate information gathering purposes The aim of this attack is to directly
compromise the confidentiality of the data and, possibly, the confidentiality of the
relationship between the cloud consumer and cloud provider. Because of the passive nature
of the attack, it can more easily go undetected for extended periods of time.
Malicious Intermediary:
The malicious intermediary threat arises when messages are intercepted and altered by a
malicious service agent, thereby potentially compromising the message’s confidentiality
and/or integrity. It may also insert harmful data into the message before forwarding it to its
destination.
Denial of Service:
The objective of the denial of service (DoS) attack is to overload IT resources to the point
where they cannot function properly. This form of attack is commonly launched in one of the
following ways:
• The workload on cloud services is artificially increased with imitation messages or
repeated communication requests.
• The network is overloaded with traffic to reduce its responsiveness and cripple its
performance.
• Multiple cloud service requests are sent, each of which is designed to consume excessive
memory and processing resources. Successful DoS attacks produce server degradation
and/or failure.
Insufficient Authorization:
The insufficient authorization attack occurs when access is granted to an attacker
erroneously or too broadly, resulting in the attacker getting access to IT resources that are
normally protected. This is often a result of the attacker gaining direct access to IT resources
that were implemented under the assumption that they would only be accessed by trusted
consumer programs. A variation of this attack, known as weak authentication, can result
when weak passwords or shared accounts are used to protect IT resources. Within cloud
environments, these types of attacks can lead to significant impacts depending on the range
of IT resources and the range of access to those IT resources the attacker gains.
Virtualization Attack:
Virtualization provides multiple cloud consumers with access to IT resources that share
underlying hardware but are logically isolated from each other. Because cloud providers
grant cloud consumers administrative access to virtualized IT resources (such as virtual
servers), there is an inherent risk that cloud consumers could abuse this access to attack the
underlying physical IT resources. A virtualization attack exploits vulnerabilities in the
virtualization platform to jeopardize its confidentiality, integrity, and/or availability.
Threat Agents:
A threat agent is an entity that poses a threat because it is capable of carrying out an attack.
Cloud security threats can originate either internally or externally, from humans or software
programs.
Anonymous Attacker:
An anonymous attacker is a non-trusted cloud service consumer without permissions in the
cloud It typically exists as an external software program that launches network-level attacks
through public networks. When anonymous attackers have limited information on security
policies and defenses, it can inhibit their ability to formulate effective attacks. Therefore,
anonymous attackers often resort to committing acts like bypassing user accounts or stealing user
credentials, while using methods that either ensure anonymity or require substantial resources for
prosecution.
Trusted Attacker:
A trusted attacker shares IT resources in the same cloud environment as the cloud consumer and
attempts to exploit legitimate credentials to target cloud providers and the cloud tenants with
whom they share IT resources. Unlike anonymous attackers (which are non trusted), trusted
attackers usually launch their attacks from within a cloud’s trust boundaries by abusing
legitimate credentials or via the appropriation of sensitive and confidential information.
Trusted attackers (also known as malicious tenants) can use cloud-based IT resources for a wide
range of exploitations, including the hacking of weak authentication processes, the breaking of
encryption, the spamming of e-mail accounts, or to launch common attacks, such as denial of
service campaigns. Malicious Insider Malicious insiders are human threat agents acting on behalf
of or in relation to the cloud provider. They are typically current or former employees or third
parties with access to the cloud provider’s premises. This type of threat agent carries tremendous
damage potential, as the malicious insider may have administrative privileges for accessing
cloud consumer IT resources.
• A trusted attacker exists as an authorized cloud service consumer with legitimate credentials that it uses
to exploit access to cloud-based IT resources.
Additional Considerations:-
This section provides a diverse checklist of issues and guidelines that relate to cloud security.
The listed considerations are in no particular order.
Flawed Implementations:
The substandard design, implementation, or configuration of cloud service deployments can have
undesirable consequences, beyond runtime exceptions and failures. If the cloud provider’s
software and/or hardware have inherent security flaws or operational weaknesses, attackers can
exploit these vulnerabilities to impair the integrity, confidentiality, and/or availability of cloud
provider IT resources and cloud consumer IT resources hosted by the cloud provider.
Contracts:
Cloud consumers need to carefully examine contracts and SLAs put forth by cloud providers to
ensure that security policies, and other relevant guarantees, are satisfactory when it comes to
asset security. There needs to be clear language that indicates the amount of liability assumed by
the cloud provider and/or the level of indemnity the cloud provider may ask for. The greater the
assumed liability by the cloud provider, the lower the risk to the cloud consumer. Another aspect
to contractual obligations is where the lines are drawn between cloud consumer and cloud
provider assets. A cloud consumer that deploys its own solution upon infrastructure supplied by
the cloud provider will produce a technology architecture comprised of artifacts owned by both
the cloud consumer and cloud provider.
Risk Management:
When assessing the potential impacts and challenges pertaining to cloud adoption, cloud
consumers are encouraged to perform a formal risk assessment as part of a risk management
strategy. A cyclically executed process used to enhance strategic and tactical security, risk
management is comprised of a set of coordinated activities for overseeing and controlling risks.
The main activities are generally defined as risk assessment, risk treatment, and risk control.
• Risk Assessment – In the risk assessment stage, the cloud environment is analyzed to identify
potential vulnerabilities and shortcomings that threats can exploit. The cloud provider can be
asked to produce statistics and other information about past attacks (successful and unsuccessful)
carried out in its cloud. The identified risks are quantified and qualified according to the
probability of occurrence and the degree of impact in relation to how the cloud consumer plans
to utilize cloud-based IT resources.
• Risk Treatment – Mitigation policies and plans are designed during the risk treatment stage
with the intent of successfully treating the risks that were discovered during risk assessment.
Some risks can be eliminated, others can be mitigated, while others can be dealt with via
outsourcing or even incorporated into the insurance and/or operating loss budgets. The cloud
provider itself may agree to assume responsibility as part of its contractual obligations.
• Risk Control – The risk control stage is related to risk monitoring, a three-step process that is
comprised of surveying related events, reviewing these events to determine the effectiveness of
previous assessments and treatments, and identifying any policy adjustment needs. Depending on
the nature of the monitoring required, this stage may be carried out or shared by the cloud
provider.
1. Encryption:
The data, by default, is coded in a readable form known as plaintext. When transmitted
over a network, the risk is unauthorized and potentially dangerous access.
Asymmetric Encryption
A malicious service provider cannot retrieve data from encrypted messages. Refund
attempt may also reveal to the cloud service customer.
2. Hashing:
Hashing is the conversion of a string of characters into a limited number of short lengths
or a key that reflects the original string. Hashing is used to identify and retrieve items
from the database because it is faster to find an object using the shorter hashed key than
to find it using the original value. It is also used in many encryption algorithms.
There are many well-known hash functions used in cryptography. These include
message-digest hash works MD2, MD4, and MD5, which is used to incorporate digital
signatures into a short form called message-digest, and the Secure Hash Algorithm
(SHA), a standard algorithm, which makes it large (60- bit) digestion message and
similar to MD4. An effective hash function for storing and retrieving, however, may not
work for cryptographic detection purposes or errors.
Malware hashes are used by anti-virus programs to identify viruses. They contain the
numerical values of the code that differs from this virus. Anti-virus software compares
malware hashes and software-hardware hashes within a computer program to detect
malware.
The diagram shows the creation of a malware hash by creating a cryptographic hash of
malware code to create a path that can be used by anti-virus software to identify the virus.
The authors of Malware have learned to customize viruses on each infected machine,
creating unique hashes for each copy submitted challenging the anti-virus programs.
3. Digital Signatures:
The digital signature mechanism is a means of providing data integrity, data authenticity
through authentication, and non-repudiation. A message is assigned a digital signature
prior to transmission, and if the message experiences any subsequent, unauthorized
modifications then it is rendered as invalid. A digital signature provides evidence that the
message received is the same as the original message sent by the rightful sender.
Both hashing and asymmetrical encryption are involved in the creation of a digital
signature, which exists as a message digest that was encrypted by a private key and
appended to the original message. To decrypt the digital signature’s encrypted hash, the
recipient verifies the signature validity by using the corresponding public key, which
produces the message digest. To produce the message digest hashing mechanism is
applied to the original message. Identical results from the two different processes is an
indication that the message maintained its integrity.
4. Single Sign-On:
The single sign-on (SSO) mechanism enables one cloud service consumer to be
authenticated by a security broker, which establishes a security context while the cloud
service consumer accesses cloud-based IT resources. Otherwise, with every subsequent
request, the service consumer would need to re-authenticate itself.
The advantage to the SSO machine is how it enables independent IT resources to
generate and distribute operational authorization and validation signals. The information
originally provided by the cloud client remains active during the user’s session, while its
security information is shared with other IT resources. SSO Security Vendor assists when
a cloud buyer needs access to cloud-based cloud services.
5. Public Key Infrastructure:
A common approach for managing the issuance of asymmetric keys is based on the PKI
(public key infrastructure) mechanism, which exists as a system of protocols, practices,
rules, and data formats that enable large-scale systems to securely use public-key
cryptography. This system is used to associate public keys with their corresponding key
owners (known as public-key identification) while enabling the verification of key
validity. PKIs have digitally signed data structures that rely on the use of digital
certificates, that bind public keys to certificate owner identities, as well as to related
information, such as validity periods. A third-party certificate authority (CA) digitally
signs the Digital certificates.
The components of a PKI include a CA that issues the certificates, a registration authority
(RA) to approve the issuance of the certificates, a public directory containing the issued
certificates, and the certificate revocation list (CRL).
Cloud Identity and Access Management typically include the following features:
Single Access Control Interface: Cloud IAM solutions provide a clean and consistent
access control interface for all cloud platform services. All cloud services can use the
same interface.
Enhanced Security: You can define increased security for critical applications.
Resource-level Access Control. You can define roles and grant permissions to users for
allowing them to access resources at different granularity levels.
Hardened Virtual Server Image
A virtual server is created from a template configuration called a virtual server image or virtual
image machine. Hardening is the process of stripping unnecessary software from a system to
limit potential vulnerabilities that can be exploited by attackers. Removing redundant programs,
closing unnecessary server ports, and disabling unused services, internal root accounts, and guest
access are all examples of hardening.
A hardened virtual server image is a template for virtual service instance creation that has been
subjected to a hardening process (Figure 1). This generally results in a virtual server template
that is significantly more secure than the original standard image.
Hardened virtual server images help counter the denial of service, insufficient authorization, and
overlapping trust boundaries threats.
Figure 1 – A cloud provider applies its security policies to harden its standard virtual server
images. The hardened image template is saved in the VM images repository as part of a resource
management system.
CLOUD COMPUTING ISSUES:
The delivery of computing services from a remote location. Cloud Computing is Internet-based
computing, where shared resources, software, and information are provided to computers and
other devices on demand.
These are major issues in Cloud Computing:
1. Privacy:
The user data can be accessed by the host company with or without permission. The service
provider may access the data that is on the cloud at any point in time. They could accidentally
or deliberately alter or even delete information.
2. Compliance:
There are many regulations in places related to data and hosting. To comply with regulations
(Federal Information Security Management Act, Health Insurance Portability and
Accountability Act, etc.) the user may have to adopt deployment modes that are expensive.
3. Security:
Cloud-based services involve third-party for storage and security. Can one assume that a
cloud-based company will protect and secure one’s data if one is using their services at a very
low or for free? They may share users’ information with others. Security presents a real threat
to the cloud.
4. Sustainability:
This issue refers to minimizing the effect of cloud computing on the environment. Citing the
server’s effects on the environmental effects of cloud computing, in areas where climate favors
natural cooling and renewable electricity is readily available, the countries with favorable
conditions, such as Finland, Sweden, and Switzerland are trying to attract cloud computing
data centers. But other than nature’s favors, would these countries have enough technical
infrastructure to sustain the high-end clouds?
5. Abuse:
While providing cloud services, it should be ascertained that the client is not purchasing the
services of cloud computing for a nefarious purpose. In 2009, a banking Trojan illegally used
the popular Amazon service as a command and control channel that issued software updates
and malicious instructions to PCs that were infected by the malware So the hosting companies
and the servers should have proper measures to address these issues.
6, Higher Cost:
If you want to use cloud services uninterruptedly then you need to have a powerful network
with higher bandwidth than ordinary internet networks, and also if your organization is broad
and large so ordinary cloud service subscription won’t suit your organization. Otherwise, you
might face hassle in utilizing an ordinary cloud service while working on complex projects and
applications. This is a major problem before small organizations, that restricts them from
diving into cloud technology for their business.
Before subscribing any cloud service provider goes through all norms and documentations and
check whether their services match your requirements and sufficient well-maintained resource
infrastructure with proper upkeeping. Once you subscribed to the service you almost hand over
your data into the hands of a third party. If you are able to choose proper cloud service then in
the future you don’t need to worry about the recovery of lost data in any contingency.
8. Upkeeping(management) of Cloud:
Maintaining a cloud is a herculin task because a cloud architecture contains a large resources
infrastructure and other challenges and risks as well, user satisfaction, etc. As users usually pay
for how much they have consumed the resources. So, sometimes it becomes hard to decide
how much should be charged in case the user wants scalability and extend the services.
One of the major issues that companies and enterprises are going through today is the lack of
resources and skilled employees. Every second organization is seeming interested or has
already been moved to cloud services. That’s why the workload in the cloud is increasing so
the cloud service hosting companies need continuous rapid advancement. Due to these factors,
organizations are having a tough time keeping up to date with the tools. As new tools and
technologies are emerging every day so more skilled/trained employees need to grow. These
challenges can only be minimized through additional training of IT and development staff.
Cloud computing services are on-demand services a user can extend or compress the volume
of the resource as per needs. so you paid for how much you have consumed the resources. It is
difficult to define a certain pre-defined cost for a particular quantity of services. Such types of
ups and downs and price variations make the implementation of cloud computing very difficult
and intricate. It is not easy for a firm’s owner to study consistent demand and fluctuations with
the seasons and various events. So it is hard to build a budget for a service that could consume
several months of the budget in a few days of heavy use.
*******