Data Security in Cloud Computing
Data Security in Cloud Computing
net/publication/309321387
CITATIONS READS
99 62,668
4 authors:
All content following this page was uploaded by Madini O. Alassafi on 10 October 2017.
Abstract— This paper discusses the security of data in cloud using internal organizational cloud. This approach can help in
computing. It is a study of data in the cloud and aspects related securing data by enforcing on-premises data usage policy.
to it concerning security. The paper will go in to details of data However, it still does not ensure full data security and privacy,
protection methods and approaches used throughout the world to since many organizations are not qualified enough to add all
ensure maximum data protection by reducing risks and threats. layers of protection to the sensitive data.
Availability of data in the cloud is beneficial for many
applications but it poses risks by exposing data to applications This paper is the study of data security techniques used for
which might already have security loopholes in them. Similarly, protecting and securing data in cloud throughout the world. It
use of virtualization for cloud computing might risk data when a discusses the potential threats to data in the cloud and their
guest OS is run over a hypervisor without knowing the reliability solutions adopted by various service providers to safeguard
of the guest OS which might have a security loophole in it. The data.
paper will also provide an insight on data security aspects for
The remainder of the paper is organized as follows. Section
Data-in-Transit and Data-at-Rest. The study is based on all the
levels of SaaS (Software as a Service), PaaS (Platform as a 2 is the review of literature that provides an insight into the
Service) and IaaS (Infrastructure as a Service). work already done in this area. Section 3 discusses the types of
threats to data in cloud. Section 4 examines some efficient data
Keywords— Data Security, Cloud Computing, Data Protection, security techniques adopted throughout the world. The final
Privacy, Risks and threats section is the conclusion which provides summary for this
study.
I. INTRODUCTION
The term word Cloud Computing has emerged recently and II. LITERATURE REVIEW
is not is widespread use. Of the several definitions which are
available, one of the simplest is, “a network solution for In order to understand the basics of cloud computing and
providing inexpensive, reliable, easy and simple access to IT storing data securing on the cloud, several resources have been
resources” [1]. Cloud Computing is not considered as consulted. This section provides a review of literature to set a
application oriented but service oriented. This service oriented foundation of discussing various data security aspects.
nature of Cloud Computing not only reduces the overhead of Srinivas, Venkata and Moiz provide an excellent insight
infrastructure and cost of ownership but also provides into the basic concepts of cloud computing. Several key
flexibility and improved performance to the end user [2, 3]. concepts are explored in this paper by providing examples of
A major concern in adaptation of cloud for data is security applications that can be developed using cloud computing and
and privacy [4]. It is very important for the cloud service to how they can help the developing world in getting benefit from
ensure the data integrity, privacy and protection. For this this emerging technology [1].
purpose, several service providers are using different policies On other hand, Chen and Zhao have discussed the
and mechanism that depend upon the nature, type and size of consumers concern regarding moving the data to the cloud.
data. According to Chen and Zhao, one of the foremost reasons of
One of the advantages of Cloud Computing is that data can why large enterprises still would not move their data to cloud is
be shared among various organizations. However, this security issues. Authors have provided outstanding analysis on
advantage itself poses a risk to data. In order to avoid potential data security and privacy protection issues related to cloud.
risk to the data, it is necessary to protect data repositories. Furthermore, they have also discussed some of the available
solutions to these issues [5,6].
One of the key questions while using cloud for storing data
is whether to use a third party cloud service or create an However, Hu and A. Klein provided a standard to secure
internal organizational cloud. Sometimes, the data is too data-in-transit in the cloud. A benchmark for encryption has
sensitive to be stored on a public cloud, for example, national been discussed for guarding data during migration. Additional
security data or highly confidential future product details etc. encryption is required for robust security but it involves extra
This type of data can be extremely sensitive and the computation. The benchmark discussed in their study presents
consequences of exposing this data on a public cloud can be equilibrium for the security and encryption overhead [7].
serious. In such cases, it is highly recommended to store data
C. Multienancy
Shared access or multitenancy is also considered as one of
the major risks to data in cloud computing [14]. Since multiple
users are using the same shared computing resources like CPU,
56
of separate storage can be deadly to businesses. Other concerns
involving guest hopping attacks and their problems are
considered to be a great hurdle in the use and implementation
of cloud computing applications [20].
57
can be short-lived, whereas for data at rest, keys can be
retained for longer periods of time.
As illustrated in Fig 3, the plain text is divided in to blocks This hash function can be a very simple mathematical
of data, often 64 bits. These blocks of data are then encrypted function like the one shown in equation (1) or very complex.
using an encryption key to produce a cipher text. F(x) = x mod 10 (1)
58
VII. CONCLUSION [13] Cloud Security Alliance, “The Notorious Nine. Cloud
Increased use of cloud computing for storing data is Computing Top Threats in 2013,” Security, no.
certainly increasing the trend of improving the ways of storing February, pp. 1–14, 2013.
data in the cloud. Data available in the cloud can be at risk if [14] L. Rodero-Merino, L. M. Vaquero, E. Caron, A.
not protected in a rightful manner. This paper discussed the Muresan, and F. Desprez, “Building safe PaaS clouds:
risks and security threats to data in the cloud and given an A survey on security in multitenant software
overview of three types of security concerns. Virtualization is platforms,” Comput. Secur., vol. 31, no. 1, pp. 96–108,
examined to find out the threats caused by the hypervisor. 2012.
Similarly, threats caused by Public cloud and multitenancy [15] A. U. Khan, M. Oriol, M. Kiran, M. Jiang, and K.
have been discussed. One of the major concerns of this paper Djemame, “Security risks and their management in
was data security and its threats and solutions in cloud cloud computing,” 4th IEEE Int. Conf. Cloud Comput.
computing. Data in different states has been discussed along Technol. Sci. Proc., pp. 121–128, 2012.
with the techniques which are efficient for encrypting the data [16] T. Mather, S. Kumaraswamy, and S. Latif, “Cloud
in the cloud. The study provided an overview of block cipher, Security and Privacy,” p. 299, 2009.
stream cipher and hash function which are used for encrypting [17] F. Yahya, V. Chang, J. Walters, and B. Wills,
the data in the cloud whether it is at rest or in transit. “Security Challenges in Cloud Storage,” pp. 1–6,
2014.
REFERENCES [18] Ion, I., Sachdeva, N., Kumaraguru, P., & Čapkun, S.
[1] J. Srinivas, K. Reddy, and A. Qyser, “Cloud (2011, July). Home is safer than the cloud!: privacy
Computing Basics,” Build. Infrastruct. Cloud Secur., concerns for consumer cloud storage. In Proceedings
vol. 1, no. September 2011, pp. 3–22, 2014. of the Seventh Symposium on Usable Privacy and
[2] M. A. Vouk, “Cloud computing - Issues, research and Security (p. 13). ACM
implementations,” Proc. Int. Conf. Inf. Technol. [19] Lipinski, T. A. (2013, September). Click Here to
Interfaces, ITI, pp. 31–40, 2008. Cloud: End User Issues in Cloud Computing Terms of
[3] P. S. Wooley, “Identifying Cloud Computing Security Service Agreements. In International Symposium on
Risks,” Contin. Educ., vol. 1277, no. February, 2011. Information Management in a Changing World (pp.
[4] A. Alharthi, F. Yahya, R. J. Walters, and G. B. Wills, 92-111). Springer Berlin Heidelberg.
“An Overview of Cloud Services Adoption Challenges [20] Ransome, J. F., Rittinghouse, J. W., & Books24x7, I.
in Higher Education Institutions,” 2015. 2009).
[5] S. Subashini and V. Kavitha, “A survey on security [21] Wang, Y., Chandrasekhar, S., Singhal, M., & Ma, J.
issues in service delivery models of cloud computing,” (2016). A limited-trust capacity model for mitigating
J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, Jan. threats of internal malicious services in cloud
2011. computing. Cluster Computing,19(2), 647-662.
[6] F. Zhang and H. Chen, “Security-Preserving Live doi:10.1007/s10586-016-0560-2
Migration of Virtual Machines in the Cloud,” J. Netw. [22] Wang, L., Ranjan, R., Chen, J., & Benatallah, B.
Syst. Manag., pp. 562–587, 2012. 2011).
[7] J. Hu and A. Klein, “A benchmark of transparent data [23] Shah, H. and Anandane, S.S., 2013. Security Issues on
encryption for migration of web applications in the Cloud Computing. arXiv preprint arXiv:1308.5996.
cloud,” 8th IEEE Int. Symp. Dependable, Auton. [24] Jensen, M., Schwenk, J., Gruschka, N. and Iacono,
Secur. Comput. DASC 2009, pp. 735–740, 2009. L.L., 2009, September. On technical security issues in
[8] D. Descher, M., Masser, P., Feilhauer, T., Tjoa, A.M. cloud computing. In 2009 IEEE International
and Huemer, “Retaining data control to the client in Conference on Cloud Computing (pp. 109-116). Ieee.
infrastructure clouds,” Int. Conf. Availability, Reliab. [25] Winkler, V. (. R. )., & Books24x7, I. (2011). Securing
Secur. (pp. 9-16). IEEE., pp. pp. 9–16, 2009. the cloud: Cloud computer security techniques and
[9] E. Mohamed, “Enhanced data security model for tactics. NL: Syngress Media Incorporated.
cloud computing,” Informatics Syst. (INFOS), 2012 [26] Catteddu, D., & Hogben, G. (2009). Cloud computing
8th Int. Conf., pp. 12–17, 2012. risk assessment. European Network and Information
[10] C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Security Agency (ENISA), 583-592.
Rajarajan, “A survey on security issues and solutions [27] H. Qian, J. He, Y. Zhou, and Z. Li, “Cryptanalysis and
at different layers of Cloud computing,” J. improvement of a block cipher based on multiple
Supercomput., vol. 63, no. 2, pp. 561–592, 2013. chaotic systems,” Math. Probl. Eng., vol. 2010, pp. 7–
[11] V. J. Winkler, “Securing the Cloud,” Cloud Comput. 9, 2010.
Secur. Tech. tactics. Elsevier., 2011. [28] P. Gope and T. Hwang, “Untraceable Sensor
[12] F. Sabahi, “Virtualization-level security in cloud Movement in Distributed IoT Infrastructure,” IEEE
computing,” 2011 IEEE 3rd Int. Conf. Commun. Sens. J., vol. 15, no. 9, pp. 5340–5348, 2015.
Softw. Networks, pp. 250–254, 2011.
59