Unit 4
Unit 4
CHAPTER
6
Cloud security is one of the evolving sub-domains of computer security,
and more broadly, information security. Nowadays a number of companies
are adopting cloud computing and the traditional method of information
security (to protect the system and application data) for securing data is being
challenged by the cloud-based architecture. In many cloud deployments,
users even transfer the data to external or even public environments, which
would never have been imagined a few years ago.
resources, web applications and services over the Internet, intranet, and
extranet. The hybrid cloud is a combination of public and/or private. The
security challenges related to these deployment models are stated below:
🞍 Cloning and resource pooling: Cloning deals with the replicating or
duplicating of data. Cloning leads to data leakage problems, revealing
the machine’s authenticity. Resource pooling as a service is provided to
the users by the provider to use various resources and share the same
according to their application demand.
🞍 Mobility of data and data residuals: For the best use of resources,
user may give access to its private data and make it available to various
services across the network. The identity management has to help in
authenticating the users through their credentials.
for customers of cloud services using various IT services that lack the
lucidity between the procedure and process relating to service providers.
Malicious users may gain access to certain confidential data, thus leading
to data breaches.
🞍 Storage and Backup: It is the responsibility of cloud vendor to ensure
that regular backup of data is carried out. However, this data backup is
generally found in unencrypted forms, leading to misuse of the data by
unauthorized users.
🞍 Shared technological issues: IaaS vendors transport their services in
to use another VM. An attacker can check the victim VM’s resource,
alter its configurations and can even delete stored data, thus putting
the VM’s confidentiality, integrity and availability in danger. This attack
is only possible if two VM’s are operating on the same host and the
victim VM’s IP address is recognized. In addition, multitenancy makes
the impact of a VM hopping attack larger than in a conventional IT
environment. As quite a few VMs can run at the same time on the
same host, there is a possibility of all of them becoming victim VMs.
Thus VM hopping is a critical vulnerability for both IaaS and PaaS
infrastructures.
🞍 VM mobility: Contents of VM virtual disks are saved as files such that
VMs can be copied from one host to another host over the system or
via moveable storage devices with no physical theft of a hard drive. VM
mobility might offer quick use and can show the way to security prob-
lems like the rapid spread of susceptible configurations that an attacker
can make use of to expose the security of a novel host. There are vari-
ous attacks that might take advantage of the weaknesses in VM mobil-
ity, which include man-in-the-middle attacks. The severity of the attacks
ranges from leaking sensitive information to completely compromising
the guest OS. In addition, VM mobility amplifies the complications of
security management because it offers enhanced flexibility.
Flooding attack: The invader sends the request for resources on the cloud
rapidly and continuously so that the cloud gets flooded with requests thus
leading to a flooding attack.
Incomplete data deletion: This is a hazardous and most critical attack on
cloud computing. When data is deleted, it is possible that all the replicated
data placed on a dedicated backup server is not removed. The reason being
that the operating system of that server will not delete the data unless it is
specifically commanded by the network service provider. Precise data dele-
tion is impossible because copies of the data are saved in replica but are not
available for use.
Locks in: Locks in is a small tender in the manner of tools, standard data
format or procedures, services edge that could embark on application, data
and service portability, not leading to facilitate the customer in transferring
from one cloud provider to another or transferring the services back to home
IT location.
Platform level: Security model at this level depends more on the provider
to maintain data availability and integrity. It must take care of following secu-
rity aspects:
a. Integrity: It assures that data has not been changed without your knowl-
edge. Integrity can be used in reference to the proper functioning of a
network, system or application. For example, when the term integrity is
used in reference to a system it means that the system behaves accord-
ing to design, specification and expectation even under adverse circum-
stances such as an attack or disaster. There are three goals of integrity:
🞍 Preventing unauthorized users from modifying the information.
🞍 Preservation of the internal and external consistency.
🞍 Preventing unintentional or unauthorized alteration of information
by authorized users.
b. Confidentiality: Confidentiality assures that the data cannot be viewed
by unauthorized people. It is concerned with preventing the unauthor-
ized disclosure of sensitive information. And the disclosure could be
intentional, such as breaking a cipher and reading the information, or it
could be unintentional due to carelessness or incompetence of individu-
als handling the information.
c. Authentication: Authentication is the verification that the user’s claimed
identity is valid, such as through the use of a password. At some funda-
mental level, you want to be sure that the people you deal with are really
who they say are. The process of proving identity is called authentication.
d. Defense against intrusion and denial of Service attack: The main
aim of the attack is to slow down or totally interrupt the service of any
system. This attack may have a specific target; for example, an entity may
suppress all messages directed to a destination. Another form of service
denial is the interruption of an entire network, either by overloading it
with messages or by disabling the network resulting in the degradation
of performance.
e. Service level agreement: A service level agreement (SLA) is a part
of a service contract where a service is formally defined. SLA is often
referred to the service and performance provided by the provider to the
customer.
Application Level: The following key security elements should be delib-
erately considered as an integral part of the application development and
deployment process.
cloud architecture. In the section, we will learn about the cloud information
(storage) architecture. The different types of storage provided at each layer
are listed below:
Infrastructure as a service: IaaS for the public or private cloud has the
following storage options:
🞍 Raw Storage: This includes the physical media where data is stored.
🞍 Volume Storage: This includes the volumes attached to IaaS instances,
typically as a virtual hard drive.
🞍 Object Storage: This is referred to as file storage.
application platform and consumables via APIs that do not fall into other
storage categories.
Software as a Service: As with PaaS, SaaS uses a very wide range of storage
and consumption models. SaaS storage is always accessed via a web-based
user interface or client/server application. If the storage is accessible via API
then it’s considered PaaS. Many SaaS providers also offer these PaaS APIs.
SaaS may Provide:
🞍 Content/file storage: File-based content is stored within the SaaS appli-
cation (reports, image files and documents) and made accessible via the
web based user interface.
🞍 Information storage and management: The data is entered into the sys-
tem via the web interface and stored within the SaaS application (usually
a back-end database). Some SaaS services offer data set upload options
or PaaS APIs.
cally located, which also has important legal and regulatory ramifications.
🞍 Information management policies: These policies define what activi-
ties are allowed for different information types.
🞍 Ownership: To know who is ultimately responsible for the information.
🞍 Authorizations: Define which types of users/employees have access to
information.
dalone service.
sender with a Proof Of Receipt (POR) which proves that the recipient
received the data. With receiver non-repudiation the recipient is pro-
vided with a Proof Of Origin (POO), which proves that the originator
sent the data. Non-repudiation can be achieved using a digital signature.
A digital signature is a mathematical scheme to show the authenticity of
a digital message or document.
g. Privacy: Internet privacy involves the desire or mandate of personal
privacy concerning transactions or transmission of data via the Internet.
It states certain rules to have control over the type and amount of infor-
mation revealed about a person on the Internet and who may access said
information. The provider should guarantee that there is no third-party
access to the platform processor, memory, and/or disk files.
Some of the privacy threats include:
🞍 Visits to websites will be tracked secretly.
🞍 E-mail addresses and other personal information can be used for
marketing or other purposes without approval.
🞍 Credit card theft.
🞍 Personal information can be sold to third parties without permission.
h. Trust: Trust revolves around assurance and confidence that people,
data, entities, information, or processes will function or behave in
expected ways. Trust may be machine to machine (like a handshake pro-
tocol), human to human, human to machine (like a digital signature), or
machine to human.
i. Policy: The term policies are high-level requirements that specify how
access is managed and under what circumstances who may access what
information. A security policy should fulfill many purposes. It should
protect people and information and set the rules for expected behavior
by users, system administrators and management and security person-
nel. The policy should define and authorize the consequences of viola-
tion, help reduce risk and help track compliance with regulations and
law formulation.
j. Authorization: Authorization is the act of checking to see if a user has
the proper permission to access a particular file or perform a particular
action. It enables us to determine exactly what a user is allowed to do.
Authorization is typically implemented through the use of access con-
trol. Access control is a mechanism that prevents unauthorized access
and ensures that authorized users cannot make improper modifications.
all the VMs running in the data center or cloud. For the native virtualization
architecture, there have been no known attacks on a hypervisor due to its
nature of being embedded in the hardware. A hypervisor can be attacked in
two ways: attack on hypervisor through the host OS and attack on hypervisor
through a guest OS.
Attacks on hypervisor through host OS: This is to exploit vulnerabili-
ties of the host OS on which the hypervisor runs. The native virtualization
architecture requires specially configured hardware; most virtualization
deployments are done with the hosted architecture. With vulnerabilities and
security lapses in most modern operating systems, attacks can be made to
gain control of the host OS. Since the hypervisor is simply a layer running on
top of the host OS, once the attacker has control of the host OS the hyper-
visor is essentially compromised. Thus, the administrative privileges of the
hypervisor enable the attacker to perform any malicious activities on any
of the VMs hosted by the hypervisor. This propagation of attacks from the
hosted OS to the hypervisor then to the VMs is shown in Figure 6.4.
attacks directly on the real physical resources. Modifying the virtual mem-
ory in a way that exploits how the physical resources are mapped to each
VM, the attacker can affect all the VMs, the hypervisor and potentially other
programs on that machine. Figure 6.5 shows the relationship between the
virtual resources and the physical resources, and how the attacker can attack
the hypervisor and other VMs.
These two types of attacks are the most distinct vulnerabilities in virtu-
alization, whereas there are other potential ways to exploit a virtualized data
center or cloud too. Other forms of attack such as virtual library checkout,
migration attacks and encryption attacks are exploits on the characteristics
and infrastructure of virtualization. The fast growth in virtualization and vir-
tualization security has solved many problems of new and existing compa-
nies, but still it faces challenges in areas such as monitoring, visibility, and
infrastructure.
Monitoring is the ability for data centers and clouds to log authentic
data in VMs or the hosts. Usually a company only imposes strong defense
and monitoring on the perimeter networks, whereas there is no or insuffi-
cient protection against internal threats. However even for companies that
provide extensive internal monitoring, the characteristics of virtualization
make monitoring very difficult. The new management layer created in vir-
tualization is intended to abstract away the underlying resources from the
VMs, but due to this new layer some information may be abstracted away
other customers’ systems, data and applications are invisible to him. Some of
best practices for the cloud providers include:
– Physical data center security—This includes building security like key card
protocols, biometric scanning protocols, round-the-clock interior, and exterior
monitoring and access to data center only by the authorized personnel.
– Isolating and securing networks—Each isolated network has to have
proper perimeter controls and policies to limit access to it.
– Host machine operating system security—Manages many guest virtual
machines at once, and any security hole might give the attacker access to
multiple customer environments. Host machine protection should include:
– Intrusion detection system monitoring network and system for any
malicious activities.
– As small a number of user accounts as possible with limited administra-
tor access to them.
– Policy on strong and complex access passwords.
– Performing regular vulnerability scanning of cloud infrastructure in
order to find and identify any new or recurring vulnerability to pre-
pare proper mitigation strategies.
– Strong authorization and authentication must be implemented to pro-
vide the customer with secure access to their data and resources. The
basis of least privilege should be taken into consideration ensuring that
the user can access only the resources he needs. And only the authorized
administrators can access the cloud’s resources.
– Ensuring auditing mechanisms are in place logging every time the cus-
tomers or administrators access and use the resources.
– Frequent backups of data should be carried out by the provider. It has to
be transparent to the customer what backups the provider will perform
and what should be done by the user.
– Encrypting APIs through which the customers access the cloud resources
with SSL, recommended to provide secure communication over Internet.
6.6.2 Security by Cloud Customers
Even though a significant amount of security responsibility falls on the pro-
vider, the cloud’s customers have to be aware of certain practices such as:
– Proper firewall protection is required to analyze the incoming and outgoing
traffic and making sure any unauthorized access is blocked. The user has
to make sure that the hardware firewalls are properly configured to cor-
rectly protect all the machines on a local network. Software firewalls have
to be installed on individual machines to prevent a third party from taking
control of the machine and to protect the customer’s virtual machines.
not supposed to. In such cases, the proper authentication and encryption
techniques e.g., IPsec, should be implemented to ensure that the VM
only communicates with the ones which it is supposed to.
– The users can manage a part of a cloud and access the infrastructure by
web interfaces or HTTP end points. In this case the interfaces have to
be properly developed, and standard security techniques of web applica-
tions have to be used to protect the diverse HTTP requests.
– Security policy must be implemented in the organization cloud to pro-
tect the system from any attacks originating within the organization. The
proper security rules and principles should exist across the organization’s
departments to implement the security control.
The hybrid cloud model is a combination of the public and private
clouds. Hence, the security issues explained above with respect to both the
public and private clouds are relevant to hybrid clouds also. However, a trust
model of cloud security in terms of social security has to be defined.