Cloud Computing Security
Cloud Computing Security
Group Members
The term Cloud computing becomes more popular day by day. As this is happening,
security concerns start to arise. Maybe the most critical one is that as information is spread into
the cloud, the owner starts to lose the control of it. In the paper we attempt to give, a brief
overview of what is described by the term Cloud computing and introduce what we mean by
Cloud computing security [Brunette, 2009]. Make a discussion of what are the security benefits
that Cloud computing introduces and the security risks that arise due to its adaptation according
to [ENISA, 2009].
Introduction
Cloud computing funds started to build in early 90's. The main idea behind cloud
computing is to separate the infrastructure and the mechanisms that a system is composed of,
from the applications and services that delivers [Brunette, 2009]. Clouds are designed in such a
way that can scale easily, be always available and reduce the operational costs. That is achieved
due to on demand multi-tenancy of applications, information and hardware resources (such as
network infrastructure, storage resources and so on). According to [Mell, 2009] Cloud
computing is composed by five Essential Characteristics, three Service Models and four
Deployment Models as shown in figure bellow.
Security
The way that security control is implemented on Cloud computing is most of the times
similar to this of traditional IT environments. However, due to the distributed nature of the
assets, security risks vary depending on the kind of assets in use, how and who manages those
assets, what are the control mechanisms used and where those are located and finally who
consumes those assets [Brunette, 2009]. Furthermore, earlier we mentioned that multi-tenancy.
This means that a set of policies should be implementing how isolation of resources, billing, and
segmentation and so on is achieved is a secure and concise way.
Security Benefits
Security and the benefits of scale: when implementing security on a large system the cost
for its implementation is shared on all resources and as a result the investment end up being more
effective and cost saving. Security as a market differentiator: as confidentiality, integrity and
resilience is a priority for many the end users, the decision on whether they will choose one CP
over another is made based on the reputation this CP has on security issues. Hence, competition
among CPs made them provide high level services.
Standardize interfaces for managed security services: as CPs use standardize interfaces to
manage their security services the Cloud computing market benefits from the uniformity and
tested solutions this introduces.
Rapid, smart scaling of resources: Cloud computing is considered resilient since it has the ability
to dynamically reallocate resources for filtering, traffic shaping, authentication, encryption.
Audit and evidence gathering: since virtualization is used in order to achieve Cloud computing, it
is easy to collect all the audits that we need in order to proceed with forensics analysis without
causing a downtime during the gathering process.
Benefits of resource concentration: having all of your resources concentrated makes it cheaper to
maintain and allows physical access on those easier. That outweighs most of the times the risk
the disadvantages that this generates.
Security Risks
Loss of governance: as users do not physically possess any resources, CPs can take control on a
number of resources. If those resources are not covered from an SLA, security risks arise.
Lock-in: as we write this paper there is still no standardization on how to move data and
resources among different CPs. That means in case a user decides to move from a CP to another
or even to migrate those services in-house, might not be able to do so due to incompatibilities
between those parties. This creates a dependency of the user to a particular CP.
Isolation failure: one of the disadvantages of multi-tenancy and shared resources occurs when
the resource isolation mechanism fails to separate the resource among users. That can occur
either due to an attack (guest-hopping attacks) or due to poor mechanism design. In present days,
attacks of this kind are rare compared to the traditional Oss but for sure we cannot rely just on
that fact. Risk category covers the failure of mechanisms separating storage, memory, routing
and even reputation between different tenants.
Compliance risks: there is a possibility that investing on achieving certification is put under risk
due to the following:
The CP cannot provide evidence of their own compliance with the relevant requirements
In addition, it is possible that compliance with industry standards cannot be achieved when using
public Cloud computing infrastructure.
Management interface compromise: CPs provide to the users, management interface for their
resources on public Cloud infrastructures. That makes those interfaces available over the internet
allowing remote access applications or web browsers vulnerabilities to allow access on resources
from unauthorized users.
Data protection: CP is possible to handle data in ways that are not known (not lawful ways) to
the user since the users loses the complete governance of the data. This problem becomes even
more obvious when data are transferred often between locations. On the other hand, there is lots
of CPs that provide information on how data are handled by them, while other CPs offer in
addition certification summaries on their data processing and data security activities.
Insecure or incomplete data deletion: Various systems will not completely wipe it out. Such is
the case with Cloud computing as well. Furthermore, difficulties to delete a resource on time
might arise due to multi-tenancy or dues to the fact that many copies of this resource can exist
for backup/ redundancy reasons. In cases like this the risk adds to the data protection of the user
is obvious.
Malicious insider: there is always that possibility that an insider intentionally causes damage. For
that reason, a policy specifying roles for each user should be available.
The risks described above constitute the top security risks of cloud computing. [ENISA, 2009]
further categorizes risks into policy and organizational risks, technical risks, legal risks and
finally not specific risks.
Vulnerabilities
Vulnerabilities: Special care should be given on the authentication, authorization and accounting
system that CPs will use. Poor designed of systems can result to unauthorized users to have
Delays in synchronization between cloud system components (time wise and of profile
content) happen.
User de-provisioning vulnerabilities: Due to time delays that might occur, credential of user that
have earlier logged out might appear to be valid.
Lack of resource isolation: Resource use by one customer can affect resource use by another
customer. For example IAAS infrastructures use systems on which physical resources are shared
among VMs and hence many different users.
Lack of reputational isolation: The resource sharing can result on one user acting in such a way
that its actions have impact on the reputation of another user.
Lack of or weak encryption of archives and data in transit: In conjunction with the above when
failing to encrypt data in transit, data held in archives and databases, un-mounted virtual machine
images, forensic images and data, sensitive logs and other data at rest those are at risk.
Poor key management procedures: Cloud computing infrastructures require the management and
storage of many different kinds of keys; examples include session keys to protect data in transit,
file encryption keys, key pairs identifying cloud providers, key pairs identifying customers,
authorization tokens and revocation certificates. Because virtual machines do not have a fixed
hardware infrastructure and cloud based content tends to be geographically distributed, it is more
difficult to apply standard controls, such as hardware security module (HSM) storage, to keys on
cloud infrastructures.
Key generation: low entropy for random number generation: The combination of standard
system images, virtualization technologies and a lack of input devices mean that systems have
much less entropy than physical RNGs
Lack of standard technologies and solutions: This is the case of lock-in risk, where users cannot
move across different providers due to the lack of standards.
No control on vulnerability assessment process: If CPs will not prevent their users from port
scanning and testing for possible vulnerabilities and there is no audit on the time of use (ToU)
for a user (something that places responsibility on the customer) severe infrastructure security
problems will arise.
Possibility internal (Cloud) network probing will occur: Cloud customers can perform port scans
and other tests on other customers within the internal network.
Possibility that co-residence checks will be performed: Side-channel attacks exploiting a lack of
resource isolation allow attackers to determine which customers share which resources.
Sensitive media sanitization: Shared tenancy of physical storage resources means that sensitive
data may leak because data destruction policies applicable at the end of a lifecycle may either be
impossible to implement because, for example, media cannot be physically destroyed because a
disk is still being used by another tenant or it cannot be located, or no procedure is in place.
Cross-cloud applications creating hidden dependency: Hidden dependencies exist in the services
supply chain (intra- and extra-cloud dependencies) and the cloud provider architecture does not
support continued operation from the cloud when the third parties involved, subcontractors or the
customer company, have been separated from the service provider and vice versa.
SLA clauses with conflicting promises to different stakeholders: An SLA might include terms
that conflict one another, or conflict clauses made from other providers.
SLA causes containing excessive business risk: From CPs perspective an SLA can hide a bunch
of business risks when someone thinks of the possible technical failures that might arise. At the
end user point SLAs can include terms that can be disadvantageous.
Audit or certification not available to customers: The CP cannot provide any assurance to the
customer via audit certification.
Certification schemes not adapted to cloud infrastructures: CPs will not really take any actions
to provide security measures that comply with Cloud computing security standards.
No policies for resource capping: CPs should make really well provisioning of their resources. In
addition, end users should be able to configure the resources that are allocated to them. If the
limits of requested resources exceed this of the available resources results can be unpredictable.
Storage of data in multiple jurisdictions and lack of transparency: Multiple copies of user's data
can exist since mirroring of the data is performed in order to achieve redundancy. During that
time the user should we aware of where are those data stored. Such a move can introduce
unwanted vulnerabilities since CPs may violate regulations during this time.
Lack of information jurisdictions: there might be a case where data are stored using high level of
user rights. In that case, end users should be aware of it in order to take preventing measures.
Conclusion
In this paper we tried to give a brief overview of cloud computing and discuss what
security on Cloud computing means. Furthermore, we made it easy for the reader to understand
what the benefits and risks of moving toward Cloud computing are. Vulnerabilities of Cloud
computing are listed as those were described in [ENISA, 2009], allowing us to have a full view
of what are the considerations that we should keep in mind when moving on Cloud computing.
It is also well understood that exhaustive risk and security control is not recommended on all
Cloud computing implementations. The level of control should always depend on prior
evaluation. There are still lot of open research areas on improving Cloud computing security,
some of those are; Forensics and evidence gathering mechanisms, resource isolation mechanisms
and interoperability between cloud providers.
[ENISA, 2009] ENISA editors. (2009). Cloud Computing Benefits, risks and recommendations
for information security. <http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-
computing-risk-assessment/at_download/fullReport>. [Accessed 05 Dec 2012]
Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile,
security and more. Burlington, MA: Jones & Bartlett Learning.
[Brunette, 2009] Glenn Brunette and Rich Mogull (2009). Security Guidance for Critical Areas
of Focus in Cloud Computing, Version 2.1 <http://cloudsecurityalliance.org/csaguide.pdf>
[Accessed 05 Dec 2012]
Buyya, R., Broberg, J., & Gościński, A. (2011). Cloud computing: Principles and paradigms. Hoboken,
N.J: Wiley.
Antonopoulos, N., & Gillam, L. (2010). Cloud computing: Principles, systems and applications. London:
Springer.
[Mell, 2009] Peter Mell and Tim Grance (2009). The NIST Definition of Cloud Computing,
Version 15. <http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc> [A Accessed
05 Dec 2012]