CC Module-4 Notes
CC Module-4 Notes
Module-4
Cloud Security: Top concern for cloud users, Risks, Privacy Impact Assessment, Cloud
Data Encryption, Security of Database Services, OS security, VM Security, Security Risks Posed by Shared
Images and Management OS, XOAR, A Trusted Hypervisor, Mobile Devices and Cloud Security
Cloud Security and Trust Management: Cloud Security Defense Strategies, Distributed
Intrusion/Anomaly Detection, Data and Software Protection Techniques, Reputation-Guided Protection of
Data Centers.
Textbook 2 Cloud Computing Theory and Practice by Dan C. Marinescu
Chapter 11: 11.1 to 11.3, 11.5 to 11.8, 11.10 to 11.14
Textbook 1: Chapter 4: 4.6
• Risks:
o Deleted records might still exist in backups.
o Attackers could recover residual data.
Lack of Standardization & Interoperability
• No global security standards for cloud computing.
• Unanswered questions:
o How to recover data if the CSP shuts down?
o What happens if prices increase unexpectedly?
o How difficult is switching CSPs?
Auditing & Compliance Challenges
• Full security audits on cloud infrastructure are nearly impossible.
• Legal compliance issues:
o Data laws differ across countries.
o Users don’t know where data is stored.
Emerging Threats from Autonomic Computing
• Autonomic features (self-repair, self-optimization) introduce new vulnerabilities:
o Harder to track and investigate security breaches.
o Automated systems may fail unpredictably.
Multi-Tenancy Security Concerns
• Shared cloud environments → Data breaches affect multiple users.
• Example: A hacked database can expose millions of user records.
Legal & Jurisdiction Issues
• Cloud data centers exist in multiple countries.
• Unclear jurisdiction:
o Which country's laws apply?
o What about data that crosses multiple borders?
• Data outsourcing risks:
o CSPs may subcontract data handling, making security compliance difficult.
o Example: Microsoft subpoenaed to provide Hotmail user emails.
3. Threats from third-party data control (loss of transparency and control over data
management).
A. Traditional Security Threats
• Increased Impact: Due to the large user base and shared resources.
• Responsibility Gaps: Unclear boundaries of security responsibility between the
cloud provider and the user.
• Key Attack Vectors:
o Distributed Denial of Service (DDoS) attacks → Overloading cloud services
to block legitimate access.
o Phishing → Tricking users into providing sensitive credentials.
o SQL Injection → Exploiting web applications to manipulate databases.
o Cross-Site Scripting (XSS) → Injecting malicious scripts into web pages.
• Authentication & Authorization Risks:
o Assigning different privilege levels to enterprise users is complex.
o Merging internal security policies with cloud security models is challenging.
B. System Availability Threats
• Disruptions can be caused by:
o System failures, power outages, or cyberattacks.
o Data lock-in → Customers may be unable to move data when needed.
o Phase transitions in complex cloud systems → Unexpected failures due to
rapid demand shifts.
o Unverified application results → Users cannot always trust the accuracy of
cloud computations.
C. Third-Party Data Control Risks
• Lack of Transparency:
o Users do not have full visibility into how data is handled.
o Cloud providers may subcontract services to untrusted third parties.
• Data Loss Risks:
o Poor storage quality or hardware failures can lead to irretrievable data loss.
o Legal challenges in proving whether cloud data has been deleted.
• Cloud Provider Espionage:
o Cloud providers may access or misuse user data.
o Example: AWS Terms of Service
▪ Disclaims liability for data breaches, losses, and service outages.
3. Cloud Security Alliance (CSA) Reports on Security Threats
A. 2010 CSA Report - Seven Major Cloud Threats
1. Abuse of cloud resources (e.g., using AWS for cyberattacks).
2. Insecure APIs (exposing cloud services to unauthorized access).
3. Malicious insiders (employees misusing privileged access).
4. Shared technology vulnerabilities (hypervisor and VM isolation flaws).
5. Account hijacking (stolen credentials granting attackers full access).
6. Data loss and leakage (accidental or intentional data deletion or exposure).
7. Unknown risk profiles (inadequate risk assessment by users).
B. 2016 CSA Report - Top Twelve Cloud Security Threats
o CSPs may use personal data for advertising (e.g., Google Ads).
• Data Proliferation:
o Data may be copied, duplicated, and stored across multiple servers and
jurisdictions.
• Dynamic Provisioning & Outsourcing Risks:
o Third-party CSPs may subcontract data storage without disclosing it to users.
o Legal complexities arise when CSPs go bankrupt or merge.
5. Privacy Regulations & Fair Information Practices
Federal Trade Commission (FTC) Guidelines for Privacy Protection:
1. Notice: Websites must clearly disclose data collection, usage, and storage policies.
2. Choice: Users should be able to control how their data is used.
3. Access: Users must be able to review and correct personal data.
4. Security: Websites must take reasonable steps to protect collected data.
• Legislative Challenges:
o There are no universal standards for privacy protection across countries.
o Laws such as the EU GDPR set high standards, but compliance varies globally.
6. Privacy Impact Assessment (PIA) in Cloud Computing
• Definition: PIA is a tool used to evaluate privacy risks in information systems.
• Purpose:
o Identify and address privacy concerns before system deployment.
o Ensure compliance with legal regulations.
• Implementation:
o Conducted by governments, corporations, and CSPs.
o Required in some countries for public sector IT projects.
7. PIA Tools and Methodologies
• PIA Report Components:
o Project Information: Description of data collection and processing.
o Privacy Risks: Identification of vulnerabilities.
o Stakeholders: Who handles and accesses data?
o Security & Transparency: How data is protected and disclosed.
o Cross-Border Data Flows: Evaluating the legality of international data
transfers.
• PIA Knowledge Base (KB):
o Maintained by domain experts.
o Uses questionnaires and rule-based systems to identify risks.
• Automated PIA Tools:
o Web-based tools can generate automated privacy risk reports.
o Some tools incorporate AI-based assessments.
• Cloud service providers (CSPs) offer encryption services, e.g., AWS Key Management
Service (KMS), which integrates with services like EBS, S3, RDS, Redshift, etc.
• Encryption SDKs are available for developers to enhance security in cloud applications.
Foundations of Cryptography for Cloud Security
1.CSP Encryption Offerings:
o Amazon AWS Key Management Service (KMS):
1. Creates & manages encryption keys.
2. Integrated with AWS services: EBS, S3, RDS, Redshift, WorkMail,
Elastic Transcoder.
o AWS Encryption SDK: Provides encryption tools for developers.
Research & Cryptographic Foundations:
o RSA Cryptosystem (1978): Basis of public-key cryptography.
o Paillier Cryptosystem (1999):
1. Uses composite residuosity classes (factoring large numbers).
2. Supports homomorphic properties for secure computation.
o Fully Homomorphic Encryption (FHE) (2009, Craig Gentry, Stanford
University):
1. Allows computation on encrypted data without decryption.
2. Significant breakthrough in privacy-preserving cloud computing
2.Homomorphic Encryption
• Ensures that computations on encrypted data yield the same results as operations on
plaintext data.
• Concept: A homomorphic function f(a) on encrypted data maintains structure-
preserving properties.
• Allows arithmetic and logic operations without decrypting data, closing the
vulnerability window.
• Challenges: High computational overhead; FHE currently impractical for large-scale
cloud applications.
o Maps a range of plaintext values (1, ..., M) into a much larger ciphertext range
(1, ..., N).
o Ensures encrypted values maintain relative order (but not actual values).
• Example:
o OPE transforms values while preserving order:
▪ Original: 10 < 20 < 30
▪ Encrypted: X1 < X2 < X3 (unknown values, but still ordered).
• Implementation:
o Uses a negative hypergeometric distribution (NHG).
o Encrypts values via binary search and probabilistic assignments.
• Advantage:
o Enables efficient range queries without decrypting data.
• Limitation:
o Trade-off between security and searchability (attackers may infer order).
• Private cloud data is safer from outsiders, but still vulnerable to insider threats.
• Potential Risks:
o Insiders accessing log files can:
▪ Infer database hot spots (frequently accessed areas).
▪ Copy sensitive data selectively.
▪ Use extracted data for malicious activities.
• Countermeasures:
o Role-based access control (RBAC): Restricts insider access.
o Audit logging & monitoring: Detects suspicious behavior.
o Data partitioning & protection rings: Limits access to critical data.
1. Access Control - Policies that define how users and applications interact with system
resources.
2. Authentication Mechanisms - Validating user identities before granting access.
3. Data Protection - Encrypting sensitive files and securing storage.
4. System Integrity - Preventing unauthorized modifications to the OS.
5. Application Security - Isolating and securing applications to prevent exploitation.
Major Security Threats to Operating Systems
1. Unauthorized Access and Privilege Escalation
• Attackers exploit weak passwords, misconfigured permissions, and software
vulnerabilities to gain higher privileges.
• Insider threats can misuse admin privileges to manipulate system settings.
2. Malware Attacks
• Viruses, worms, Trojans, ransomware, and spyware target OS vulnerabilities.
• Rootkits allow attackers to maintain persistent access while hiding malicious activities.
3. Application Vulnerabilities
• Buffer Overflows - Attackers execute arbitrary code by injecting excessive data into
application buffers.
• Code Injection Attacks - Malicious scripts injected into applications to execute
harmful commands.
4. OS Configuration and Patch Management Issues
• Unpatched OS software allows attackers to exploit known vulnerabilities.
• Default configurations may have insecure settings, leading to unauthorized access.
5. Lack of Secure Communication
• Unencrypted network connections expose data in transit to interception and
modification.
• Man-in-the-Middle Attacks compromise authentication and data integrity.
Security Measures for Operating Systems
1. Mandatory Access Control (MAC) Policies
• Prevent unauthorized processes from accessing sensitive system resources.
• Example: SELinux (Security-Enhanced Linux) enforces strict access policies.
2. Strong Authentication and User Management
• Implement password complexity rules and MFA.
• Use least privilege principles (LPP) to restrict admin privileges.
3. Regular Patch Management
• Automate OS updates to address vulnerabilities.
• Use vulnerability scanners to identify and patch security loopholes.
4. Secure File Systems and Encryption
• Encrypt sensitive files using BitLocker (Windows) or LUKS (Linux).
• Implement file integrity monitoring (FIM) to detect unauthorized changes.
5. Application Sandboxing and Trusted Path Execution
• Isolate applications to prevent cross-contamination of system resources.
• Use trusted execution environments (TEE) for secure processing.
6. Network Security Hardening
• Enforce firewall policies and restrict unnecessary ports.
• Utilize Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
7. System Logging and Monitoring
• Enable event logging to track security incidents.
• Use Security Information and Event Management (SIEM) solutions for real-time
analysis.
• Problem: Many users, especially beginners, use public/shared AMIs without verifying
their security.
• Even trusted cloud providers cannot prevent all risks from shared images.
➢ Attack Vectors:
1. SSH Key Backdoors
o AWS stores user’s public SSH key in ~/.ssh/authorized_keys.
o Malicious AMI creators can leave their own SSH keys → They can log into
any instance using that image.
2. Password-Based Authentication
o If SSH password authentication is enabled, AMI creators may leave their
passwords.
o Attackers can extract password hashes and crack them using "John the
Ripper" (a password-cracking tool).
Preventive Measures:
• Always revoke existing SSH keys & add new ones.
• Disable password-based login & enforce key-based authentication.
• Run cloud-init scripts to regenerate host SSH keys.
11.12 Xoar – Breaking the Monolithic Design of the Trusted Computing Base (TCB)
1. Introduction
• Xoar is a modified version of Xen designed to enhance system security.
• Security model assumptions:
o System is professionally managed.
o Only system administrators have privileged access.
o Administrators are trusted and do not have incentives to violate user trust.
• Sources of Security Threats:
o Malicious guest VMs attempting to compromise:
▪ Data integrity.
▪ Confidentiality of other guest VMs.
▪ Guest VM execution processes.
o Bugs in initialization code of the management VM.
• Key Innovation:
o Xoar follows microkernel design principles to increase security.
o Unlike Xen, Xoar is modular, explicitly defining exposure risks.
A. Permanent Components
XenStore-State – Maintains the state of the system.
Critical component → Must be hardened against attacks.
B. Self-Destructing Components (Used during boot, then removed)
PCIBack – Virtualizes access to the PCI bus configuration.
Bootstrapper – Coordinates hardware initialization and booting.
Removed before any user VM starts → Reduces security risks.
C. Components Restarted on Request (Loaded only when needed)
XenStore-Logic – Manages system state changes.
Toolstack – Handles VM management requests.
Builder – Creates and initializes guest VMs.
Minimizes exposure time to attacks.
D. Components Restarted on Timer (Periodically restarted for security)
BlkBack – Exports physical storage drivers.
NetBack – Exports network drivers.
Restarts periodically to ensure security freshness.
o Xoar:
▪ Modular – Components load only when needed.
▪ Minimized TCB → Lower risk.
Key Security Enhancements
Most privileged components (PCIBack & Bootstrapper) are removed after booting.
Builder (VM initialization) is small – Only 13,000 lines of code.
XenStore is split into two parts:
• XenStore-Logic → Handles changes.
• XenStore-State → Maintains records & includes a small monitor module for security
checks.
•
Guest VMs only share essential services (Figure 11.6).
Users can choose to share service VMs only with their own VMs (tagging system).
Benefit: Reduces security risks by restricting unnecessary interactions between
components.
Security Risk:
• Baseband processors (telephony services) operate outside mobile OS control.
• Attackers can exploit firmware vulnerabilities.
7. Summary
A. Trusted Hypervisor (Terra)
• Provides higher security guarantees than traditional hypervisors.
• Supports custom security levels per application (Open-box & Closed-box).
• Implements trusted paths & attestation to verify system integrity.
• Prevents root access by administrators to secure the hypervisor.
• Reduces device driver security risks using hardware protection mechanisms.
B. Mobile Cloud Security
Mobile devices introduce new cloud security challenges.
• Common threats include: malware, stolen data, unauthorized access, tracking, & fake
profiles.
• Cloud security risks from mobile devices include data leakage, ransomware
infections, & authentication bypass.
• Enterprise Mobile Management (EMM) helps enforce security policies,
encryption, & access control.
• Best practices include: device encryption, TLS security, authentication enforcement,
& automated monitoring.
• Securing mobile-cloud interactions is critical for overall cloud security.