A Review On Cloud Security Challenges and Issues
A Review On Cloud Security Challenges and Issues
Indian Journal of Science and Technology, Vol 9(43), DOI: 10.17485/ijst/2016/v9i44/104390, November 2016 ISSN (Online) : 0974-5645
Abstract
Background/Objectives: Cloud computing offers various services with minimum management effort while provisioning
resources via internet. Cloud clients are allowed to store their personal data at data centers, it will minimize storage
maintenance in local systems. Methods/Statistical Analysis: Cloud computing environment facing huge issues with
hardware and software vulnerabilities in maintenance and resources provisioning process. These vulnerabilities pose
huge loss of data, confidentiality, privacy and availability. Findings: In this paper, we studied and concentrated on various
attacks in Virtualization environment and the possible attack scenarios in each platform. Application/Improvements: In
the final section, we studied and described all types of attacks.
2 Vol 9 (43) | November 2016 | www.indjst.org Indian Journal of Science and Technology
K.Balaji and P. Sai Kiran
least privileged clients on their locations using parallel while communication with local system. This allows
execution of resources on cloud infrastructure. All the cloud user to launch a denial of service attacks. These two
security codes, hardware failure, reasons & loses are more methods pose unintended threats to linux machine:
mentioned in below Table 1. PTRACE_SETREGSET and PTRACE_GETREGSET.
This attack impacts on confidentiality, integrity, access
Table 1. Hardware vulnerabilities
complexity and availability of data storage system and
Code Hardware Reasons Impact Loses
authentication is never required to exploit a vulnerabilities
failure (10)
of system12.
CVE- Confused Assigning of 7.8 Confi-
2007-5633 Deputy root access dentiality,
rights to Integrity, 3.3. Xen Hypervisor Vulnerability
cloud client Availability Xen hypervisor 4.1 has much vulnerability as specified in10
to pooled and it has a lot of security aspects of a guest user (Domain
resources U). When Domain U using PCI based pass-through on
CVE- Reflected Hardware 8.1 Integrity, VT-d chipset that doesn’t remains interrupts remapping
2010-4530 Injection failure that as- Availability technique, it leads guest OS users to gain privileges by
signs root level
raising Message Signalled Interrupts (MSIs) that leads
access other
to write interrupt injection registers. Once domain U
clients
CVE- Parallel Unautho- 9.8 Confi-
obtains a privilege that provides an evidence of losing
2005-0109 execution rized access dentiality, confidentiality, authentication and availability of other
threat of resource Integrity domain user data in cloud environment13.
while blocking
resource for 3.4. Sparc Hypervisor Vulnerability
specified client A sun micro system’s Sparc hypervisor firmware 6.6.3
3. Software Based Security to 7.1.3 on ultra-sparc processors T1 to T2+ system
processors allows guest users to access the memory via
Attacks unknown vectors with any need of authentication bypass
on root level system. This attack leads to severe problem
3.1 Allow User to Access Root Level to cloud computing when it is configured with sparc
SVGAlib zgv 3.0 allows user gain root level access via hypervisor system. This attack makes the loss of data
a privileged leak of the iopl privileges to child process availability and confidentiality14.
[CVE-1999-1482]. This allows cloud client to access root
level resources without any barriers from security group.
This attack leads to failure of complete confidentiality, 3.5. VMM Vulnerability
integrity and availability. This attack doesn’t require any In Microsoft virtual machine server 2005 Release 2 SP1
authentication and access complexity is very low11. doesn’t maintain root level privileges for all host level
machine instruction execution. This allows guest VM to
execute malware code in kernel level and obtain other
3.2 Denial of Service Attack VM privileges within the virtual environment via special
In Linux kernel 3.2.10 and earlier, the regset method software like aka. This poses great issue to the entire
doesn’t manage .set and .get methods in case absence
Vol 9 (43) | November 2016 | www.indjst.org Indian Journal of Science and Technology 3
A Review on Cloud Security Challenges and Issues
virtual environment such data breaches, data loss, data message contains authentication tokens those used for
confidentiality and privacy15.Software vulnerabilities earlier communication and it sniffed by the intruder or
with different parameters are mentioned in Table 2. attacker to launch a replay attack. These attacks can be
mitigated through the nonce values in authentication
messages and continues changing of message content. It
Table 2. Software vulnerabilities takes an intruder to analyze message content from the
Code Attack Reasons Im- Loses original data format but random generation of nonce
pact(10) values provide more secure for replay attack. In cloud
CVE- SVGAlib Allows cloud 7.4 Confi- environment, cloud user and cloud service provider
1999-1482 client to dentiality,
has authenticated the user before start the session and
access root Integrity
the session will be established by synchronizing with
level resources
each other. It is highly difficult to implement timestamp
without any
barriers concept in distributed cloud computing environment
CVE- Denial of Allows cloud 6.8 Integrity, and it poses huge risk in terms of replay attacks. In live
2012-1097 service user to launch Availabil- VM migration, control messages are sent in unprotected
attack a denial of ity mode and attacker can access the credentials and reply
service attacks to live migration process by sending its VM to actual or
CVE- Xen MSI inter- 8.3 Confi- host OS. Possible platforms to implement an attack are
2011-1898 injection rupts that dentiality, Xen hypervisor and Micro soft Hyper-v17.
attack leads to write Integrity,
interrupt Availabil-
injection ity 4.3.Masquerading
registers A masquerader attack refers to a way to obtain legitimate
CVE- Sparc Authentica- 7.8 Integrity, credentials from actual user with fake identity. Detection
2008-4992 vulnera- tion bypass Availabil- of these attacks made by analyzing the masquerader
bility on root level ity activities on victim resource in cloud paradigm. After
system obtaining the credential of host OS, an attacker simply
CVE- VMM obtain other 7.6 Confi- launch an attack on VM migration module to stop or
2009-1542 host VM privileges dentiality, suspend current migrating VM process and attacker
access within the Integrity VM acts like an original source of a system18. Possible
virtual envi- platforms to implement an attack are Xen hypervisor and
ronment
Oracle Virtual box17.
5. Conclusion
4. Possible Attacks on VM
Migration Cloud computing provides an effective way of delivering
services over an internet with various service models and
4.1Software vulnerabilities different infrastructure resources those are configured
An intruder can use several software vulnerabilities in and pooled. In this paper, we investigated and studied
VM migration like integer overflow, stack overflow and various practical attacks on cloud infrastructure with
heap overflow to launch several attacks in migration code possible attack vectors. We identified hardware level and
module. Possible platforms to implement an attack are software level threats and possibility of attack nature in
Xen hypervisor and Oracle virtual box16. cloud infrastructure.
4 Vol 9 (43) | November 2016 | www.indjst.org Indian Journal of Science and Technology
K.Balaji and P. Sai Kiran
preserving approaches in e-health clouds, 12. Balduzzi M, Zaddach J, Balzarotti D, Kirda E, Loureiro S. A
2. IEEE Journal Biomedical Health Information. 2014 July; security analysis of amazon’s elastic compute cloud service.
18(4):1431–41. Proceedings of the 27th Annual ACM Symposium on Ap-
3. Abbas A, Bilal K, Zhang L, Khan SU. A cloud based health plied Computing. 2012 March; 1427–34.
insurance plan recommendation system: A 13. CERT civis :http://cert.civis.net/index.php?ac-
4. user centered approach. Future Generation Computer Sys- tion=alert¶m=CVE-1999-1482
tems. 2015 Feb;43(44):99–109.. 14. Gunasekhar T, Thirupathi Rao K, Trinath Basu M. Under-
5. Agrawal R. Legal issues in cloud computing. IndicThreads, standing insider attack problem and scope in cloudCircuit,
Conference on Cloud Computing, 2011. Power and Computing Technologies. International Confer-
6. Alhamazani K, Ranjan R, Mitra K, Rabhi F, Khan SU, ence on Circuits, Power and Computing Technologies (IC-
Guabtni A, Bhatnagar V. An Overview of the Commer- CPCT).IEEE; 2015.
cial Cloud Monitoring Tools: Research Dimensions, De- 15. Gunasekhar T, Rao KT, Saikiran P, Lakshmi PS.A Survey on
sign Issues, and State-of-the-Art. Computing. 2015 April; Denial of Service Attacks.
97(4):357–77. 16. Gunasekhar T, Rao KT, Reddy VK, Kiran PS, Rao BT. Mit-
7. Ali M, Dhamotharan R, Khan E, Khan SU, Vasilakos AV, igation of Insider Attacks through Multi-Cloud. Interna-
Li K, Zomaya AY. SeDaSC: secure data sharing in clouds. tional Journal of Electrical and Computer Engineering.
IEEE Systems Journal. 2015 Jan; PP(99):1–10. 2015 Feb; 5(1):136–41.
8. Alowolodu OD, Alese BK, Adetunmbi AO, Adewale OS, 17. Durairaj M,Manimaran A. A Study on security is-
Ogundele OS. Elliptic curve cryptography for securing sues in cloud based E-learning. Indian Journal of
cloud computing applications. International Journal Of
Science and Technology. 2015 April; 8(8): 757–65.
Computer Applications. 2013 March; 66(23).
9. Anala MR, Shetty J, Shobha G. A framework for secure live 18. Sugumar R, Sheik Imam SB. Symmetric Encryp-
migration of virtual machines. International Conference tion Algorithm to Secure Outsourced Data in Pub-
on Advances in Computing, Communications and Infor- lic Cloud Storage. Indian Journal of Science and
mations.IEEE;2013. Technology. 2015 Sep; 8(23).
10. Andrieux A, Czajkowski K, Dan A, Keahey K, Ludwig H, 19. Karthik K. et al. A Study on IP Network Recovery
Nakata T, Pruyne J, Rofrano J, Tuecke S, Xu M. Web ser-
through Routing Protocols. Indonesian Journal of
vices agreement specification (WSagreement). Internation-
al Conference on Advances in Computing, Communica-
Electrical Engineering and Informatics (IJEEI).
tions and Informatics. 2013, 243–8. 2016; 4(3):176–80.
11. Aslam M, Gehrmann C, Bjorkman M. Security and trust 20. Sastry K, Narasimha B. Thirumala Rao, Gu-
preserving VM migrations in public clouds.11th Interna- nasekhar T. Novel Approach for Control Data Theft
tional Conference on Trust, Security and Privacy in Com- Attack in Cloud Computing. International Journal
puting and Communications (TrustCom). IEEE; 2012. of Electrical and Computer Engineering. 2015
869–76.
Dec;5(6):1545–52.
Vol 9 (43) | November 2016 | www.indjst.org Indian Journal of Science and Technology 5