Unit 3-4 CC
Unit 3-4 CC
Cloud Consumer
The cloud consumer is the principal stakeholder for the cloud computing service. A cloud consumer
represents a person or organization that maintains a business relationship with, and uses the service from a
cloud provider. A cloud consumer browses the service catalog from a cloud provider, requests the
appropriate service, sets up service contracts with the cloud provider, and uses the service. The cloud
consumer may be billed for the service provisioned, and needs to arrange payments accordingly.
Cloud consumers need SLAs to specify the technical performance requirements fulfilled by a cloud
provider. SLAs can cover terms regarding the quality of service, security, remedies for performance
failures. A cloud provider may also list in the SLAs a set of promises explicitly not made to consumers, i.e.
limitations, and obligations that cloud consumers must accept. A cloud consumer can freely choose a cloud
provider with better pricing and more favorable terms. Typically a cloud provider’s pricing policy and
SLAs are non-negotiable, unless the customer expects heavy usage and might be able to negotiate for better
contracts.
Cloud Provider
A cloud provider is a person, an organization; it is the entity responsible for making a service available to
interested parties. A Cloud Provider acquires and manages the computing infrastructure required for
providing the services, runs the cloud software that provides the services, and makes arrangement to deliver
the cloud services to the Cloud Consumers through network access.
For Software as a Service, the cloud provider deploys, configures, maintains and updates the operation of
the software applications on a cloud infrastructure so that the services are provisioned at the expected
service levels to cloud consumers. The provider of SaaS assumes most of the responsibilities in managing
and controlling the applications and the infrastructure, while the cloud consumers have limited
administrative control of the applications.
Cloud Auditor
A cloud auditor is a party that can perform an independent examination of cloud service controls with the
intent to express an opinion thereon. Audits are performed to verify conformance to standards through
review of objective evidence. A cloud auditor can evaluate the services provided by a cloud provider in
terms of security controls, privacy impact, performance, etc.
A privacy impact audit can help Federal agencies comply with applicable privacy laws and regulations
governing an individual‟s privacy, and to ensure confidentiality, integrity, and availability of an
individual‟s personal information at every stage of development and operation.
Cloud Broker
As cloud computing evolves, the integration of cloud services can be too complex for cloud consumers to
manage. A cloud consumer may request cloud services from a cloud broker, instead of contacting a cloud
provider directly. A cloud broker is an entity that manages the use, performance and delivery of cloud
services and negotiates relationships between cloud providers and cloud consumers.
In general, a cloud broker can provide services in three categories :
Service Intermediation: A cloud broker enhances a given service by improving some specific capability
and providing value-added services to cloud consumers. The improvement can be managing access to cloud
services, identity management, performance reporting, enhanced security, etc.
Service Aggregation: A cloud broker combines and integrates multiple services into one or more new
services. The broker provides data integration and ensures the secure data movement between the cloud
consumer and multiple cloud providers.
Service Arbitrage: Service arbitrage is similar to service aggregation except that the services being
aggregated are not fixed. Service arbitrage means a broker has the flexibility to choose services from
multiple agencies. The cloud broker, for example, can use a credit-scoring service to measure and select an
agency with the best score.
Cloud Carrier
A cloud carrier acts as an intermediary that provides connectivity and transport of cloud services between
cloud consumers and cloud providers. Cloud carriers provide access to consumers through network,
telecommunication and other access devices. For example, cloud consumers can obtain cloud services
through network access devices, such as computers, laptops, mobile phones, mobile Internet devices
(MIDs), etc [1]. The distribution of cloud services is normally provided by network and telecommunication
carriers or a transport agent, where a transport agent refers to a business organization that provides physical
transport of storage media such as high-capacity hard drives. Note that a cloud provider will set up SLAs
with a cloud carrier to provide services consistent with the level of SLAs offered to cloud consumers, and
may require the cloud carrier to provide dedicated and secure connections between cloud consumers and
cloud providers.
PUBLIC PRIVATE HYBRID CLOUD
This is a virtual equivalent of a traditional data center. Cloud infrastructure providers use
virtualization technology to deliver scalable compute resources such as server s, network s and
storage to their clients. This is beneficial for the clients, as they don’t have to buy personal
hardware and manage its component s. Instead, they can deploy their platforms and application s
within the provider’s virtual machines that offer the same technologies and capabilities as a
physical data center.
An IaaS provider is responsible for the entire infrastructure, but users have total control over it.
In turn, users are responsible for installing and maintaining apps and operating systems, as well
as for security, runtime, middleware and data.
IaaS users can compare the cost and performance of different providers in order to choose the
best option, as they can access them through a single API.
IaaS Advantages
IaaS Disadvantages
• If you are a small company or a startup that has no budget for creating your own infrastructure
• If you are a rapidly growing company and your demands are unstable and changeable
• If you are a large company that wants to have effective control over infrastructure but pay only
for the resources you actually use
Examples of IaaS
The best-known IaaS solution s vendors are Microsoft Azure, Google Compute Engine (GCE),
Amazon Web Services ( AWS ), Cisco Metapod, DigitalOcean, Linode and Rackspace.
PaaS in cloud computing is a framework for software creation delivered over the internet. This is
the offering of a platform with built-in software components and tools, using which developer s
can create, customize, test and launch applications. PaaS vendors manage servers, operating
system updates, security patches and backups. Clients focus on app development and data
without worrying about infrastructure, middleware and OS maintenance.
The main difference between IaaS and PaaS lies in the degree of control given to users.
• Allows for developing, testing and hosting apps in the same environment
• Resources can be scaled up and down depending on business needs
• Multiple users can access the same app in development
• The user doesn’t have complete control over the infrastructure
• Web services and databases are integrated
• Remote teams can collaborate easily
PaaS Advantages
Such solutions are especially profitable to developers who want to spend more time coding,
testing and deploying their applications. Utilizing PaaS is beneficial when:
Examples of PaaS
The best-known PaaS solutions vendors are Google App Engine, Amazon AWS, Windows
Azure Cloud Services, Heroku, AWS Elastic Beanstalk, Apache Stratos and OpenShift.
With this offering, users get access to the vendor’s cloud-based software. Users don’t have to
download and install SaaS applications on local devices, but sometimes they may need plugins.
SaaS software resides on a remote cloud network and can be accessed through the web or APIs.
Using such apps, customers can collaborate on projects, as well as store and analyze data.
SaaS is the most common category of cloud computing. The SaaS provider manages everything
from hardware stability to app functioning. Clients are not responsible for anything in this
model; they only use programs to complete their tasks. In this case, the client software
experience is fully dependent on the provider.
SaaS Advantages
• No hardware costs
• No initial setup costs
• Automated upgrades
• Cross-device compatibility
• Accessible from any location
• Pay-as-you-go model
• Scalability
• Easy customization
SaaS Disadvantages
• Loss of control
• Limited range of solutions
• Connectivity is a must
Examples of SaaS
The best-known SaaS solutions vendors are Google Apps, Dropbox, Gmail, Salesforce, Cisco
WebEx, Concur, GoToMeeting, Office365.
CLOUD STORAGE
Storage as a Service is a business model in which a large company rents space in their storage
infrastructure to a smaller company or individual.In the enterprise, SaaS vendors are targeting
secondary storage applications by promoting SaaS as a convenient way to manage backups. The key
advantage to SaaS in the enterprise is in cost savings --in personnel, in hardware and in physical storage
space. For instance, instead of maintaining a large tape library and arranging to vault (store) tapes
offsite, a network administrator that used SaaS for backups could specify what data on the network
should be backed up and how often it should be backed up. His company would sign a service level
agreement (SLA) whereby the SaaS provider agreed to rent storage space on a cost-per-gigabyte-stored
and cost-per-data-transfer basis and the company's data would be automatically transferred at the
specified time over the storage provider's proprietary wide area network (WAN) or the Internet. If the
company's data ever became corrupt or got lost, the network administrator could contact the SaaS
provider and request a copy of the data. It covers the key technologies in Cloud Computing and Cloud
Storage, several different types of clouds services, and describes the advantages and challenges of Cloud
Storage after the introduction of the Cloud Storage reference model
When Windows servers leave the factory, they can be configured with several storage
options. Most servers will contain 1 or more local disk drives which are installed internal to the
server’s cabinet. These drives are typically used to install the operating system and user
applications. If additional storage is needed for user files or databases, it may be necessary to
configure Direct Attached Storage (DAS).
DAS is well suited for a small-to-medium sized business where sufficient amounts of storage can
be configured at a low startup cost. The DAS enclosure will be a separate adjacent cabinet that
contains the additional disk drives. An internal PCI-based RAID controller is typically
configured in the server to connect to the storage. The SAS (Serial Attached SCSI) technology
is used to connect the disk arrays as illustrated in the following example.
As mentioned, one of the primary benefits of DAS storage is the lower startup cost to
implement. Managing the storage array is done individually as the storage is dedicated to a
particular server. On the downside, there is typically limited expansion capability with DAS,
and limited cabling options (1 to 4 meter cables). Finally, because the RAID controller is
typically installed in the server, there is a potential single point of failure for the DAS solution.
With Storage Area Networks (SAN), we typically see this solution used with medium-to-large
size businesses, primarily due to the larger initial investment. SANs require an infrastructure
consisting of SAN switches, disk controllers, HBAs (host bus adapters) and fibre cables. SANs
leverage external RAID controllers and disk enclosures to provide high-speed storage for
numerous potential servers.
The main benefit to a SAN-based storage solution is the ability to share the storage arrays to
multiple servers. This allows you to configure the storage capacity as needed, usually by a
dedicated SAN administrator. Higher levels of performance throughput are typical in a SAN
environment, and data is highly available through redundant disk controllers and drives. The
disadvantages include a much higher startup cost for SANs, and they are inherently much more
complex to manage. The following diagram illustrates a typical SAN environment.
A third type of storage solution exists that is a hybrid option called Network Attached Storage
(NAS). This solution uses a dedicated server or “appliance” to serve the storage array. The
storage can be commonly shared to multiple clients at the same time across the existing Ethernet
network. The main difference between NAS and DAS and SAN is that NAS servers utilize file
level transfers, while DAS and SAN solutions use block level transfers which are more efficient.
NAS storage typically has a lower startup cost because the existing network can be used. This
can be very attractive to small-to-medium size businesses. Different protocols can be used for
file sharing such as NFS for UNIX clients and CIF for Windows clients. Most NAS models
implement the storage arrays as iSCSI targets that can be shared across the networks. Dedicated
iSCSI networks can also be configured to maximize the network throughput. The following
diagram shows how a NAS configuration might look.
Summary:
In summary, there are many types of storage solutions that can be used in a Windows
environment. The main 3 types consist of DAS, SAN and NAS. The major differences between
the types are startup costs, whether the storage is shared or dedicated, and whether additional
storage can be added on-demand. Different technologies are also used to connect and control the
storage such as SAS, Fibre and iSCSI.
Users can easily drag and drop the files in the cloud storage. It is easy to save all the files and
data in the cloud, no technical knowledge is required for this purpose. The stored files can be
easily accessed from anywhere in the world with just a few clicks and an internet connection.
2. Disaster Recovery
It is recommended for every business to have a backup plan in case of any emergency. After all,
losing important business data can cause huge losses to any business. Cloud storage is the perfect
backup plan for businesses. It creates a backup of the files stored. These files are stored at a
remote location and they can be retrieved and accessed at any time.
3. Security
Business owners can be sure that once the data is stored in the cloud, it is safe. The best thing
about using cloud storage is that server data is distributed across redundant servers and the data
stored in the cloud is safeguarded against any type of hardware failure. Cloud servers also
provide automated backups and snapshots in order to make sure that your data is safe.
4. Cost Savings
Businesses and organizations can reduce annual operating costs by utilizing cloud storage.
Affordability can be ensured if data is stored online in the cloud. Users can ensure additional cost
savings because internal power and resources are not required separately for storing the data.
5. Easy Sharing
Data stored in cloud storage can be easily shared with clients and colleagues in an easy and
secure way. You can easily share access to a particular cloud environment or to the complete
account with some other user.
6. Automation
One of the biggest issues that most of the business owners face is creating data backups and
scheduling the backup in a way so that the daily operations don’t get hampered. With cloud
storage technology, the tedious task of data backups is simplified through automation. You
simply have to select what you want to backup and when you want to backup and your cloud
environment will take care of the rest.
7. Collaboration
Online cloud storage is also an ideal platform for collaboration purposes. A cloud environment
enables multiple people to access, edit and collaborate on a single file or document. People can
access the cloud environment from anywhere in the world and collaborate in real-time.
8. Scalable Service
Cloud hosting enables vertical as well as horizontal scaling and the best thing about cloud
hosting is that you only pay for the resources that you actually use. You can scale your cloud
hosting environment whenever required and you can also define the attributes of scaling the
cloud. This ensures more flexibility and a large storage space.
9. Synchronization
While using a local file storage you can only access your data from a certain location. With cloud
storage, the daily devices can be your access points like your PC and your smart phone.
Accessing files and synchronizing them can be done easily with any device through an internet
connection. Therefore, the stress of transferring the documents from one devise to another is
reduced as it can get complicated at times. Moreover, the files stored in the cloud storage remain
the same across all the devices and they can be automatically updated after making any changes.
You can always view the latest version of the updated file through a cloud storage.
10. Convenience
The amount of convenience and peace of mind offered by cloud storage system is amazing! Even
if you store data on transportable devices like external hard drives or flash drives, some kind of
manual intervention and physical handling is required. The data that is stored in a cloud is
backed up online and it can be accessed from anywhere. Information is automatically saved as it
streams in. There is no need for you to save, label or track information. The convenience of
online cloud storage enables you to completely concentrate on your work without getting
stressed about data loss.
UNIT 4 NOTES CLOUD COMPUTING
INTER CLOUD
The idea behind an inter cloud is that a single common functionality would combine many
different individual clouds into one seamless mass in terms of on-demand operations. To
understand how this works, it’s helpful to think about how existing cloud computing setups are
designed.
Cloud hosting is largely intended to deliver on-demand services. Through careful use of scalable
and highly engineered technologies, cloud providers are able to offer customers the ability to
change their levels of service in many ways without waiting for physical changes to occur.
Terms like rapid elasticity, resource pooling and on-demand self-service are already part of cloud
hosting service designs that are set up to make sure the customer or client never has to deal with
limitations or disruptions. Building on all of these ideas, the inter cloud would simply make sure
that a cloud could use resources beyond its reach by taking advantage of pre-existing contracts
with other cloud providers.
Federation Clouds: A Federation cloud is an Inter-Cloud where a set of cloud providers willingly
interconnect their cloud infrastructures in order to share resources among each other10. The
cloud providers in the federation voluntarily collaborate to exchange resources. This type of
Inter-Cloud is suitable for collaboration of governmental clouds (Clouds owned and utilized by
nonprofit institution or government) or private cloud portfolios (Cloud is a part of a portfolio of
clouds where the clouds belong to the same organization). Types of federation clouds are Peer to
Peer and Centralized clouds.
4. Integration and Interoperability: SMEs have a large amount of IT assets like business
applications in their premises and may not be migrated to the cloud. Sensitive data in an
enterprise also may not be migrated to the cloud for security reasons and privacy. A need
related to integration and interoperability arises between assets on premises and the cloud
services. Issues related to identity management, data management, and business process
orchestration need to be resolved.
RESOURCE PROVISIONING
Resource Provisioning means the selection, deployment, and run-time management of software
(e.g., database server management systems, load balancers) and hardware resources (e.g., CPU,
storage, and network) for ensuring guaranteed performance for applications.
This resource provisioning takes Service Level Agreement (SLA) into consideration for providing service
to the cloud users. This is an initial agreement between the cloud users and cloud service providers
which ensures Quality of Service (QoS) parameters like performance, availability, reliability, response
time etc. Based on the application needs Static Provisioning/Dynamic Provisioning and Static/Dynamic
Allocation of resources have to be made in order to efficiently make use of the resources without
violating SLA and meeting these QoS parameters
Here are some of the most common cloud computing security risks
Distributed-Denial-of-Service Attacks
When cloud computing first became popular, Distributed Denial-of-Service (DDoS) attacks
against cloud platforms were largely unthinkable; the sheer amount of resources cloud computing
services had made DDoS attacks extremely difficult to initiate. But with as many Internet of Things
devices, smartphones, and other computing systems as there are available now, DDoS attacks
have greatly increased in viability. If enough traffic is initiated to a cloud computing system, it can
either go down entirely or experience difficulties.
Not all cloud hosting solutions and cloud computing services are made equal. Many cloud
solutions do not provide the necessary security between clients, leading to shared resources,
applications, and systems. In this situation, threats can originate from other clients with the cloud
computing service, and threats targeting one client could also have an impact on other clients.
Employee Negligence
Employee negligence and employee mistakes remain one of the biggest security issues
for all systems, but the threat is particularly dangerous with cloud solutions. Modern employees
may log into cloud solutions from their mobile phones, home tablets, and home desktop PCs,
potentially leaving the system vulnerable to many outside threats.
Inadequate data backups and improper data syncing is what has made many businesses
vulnerable to ransomware, a specific type of cloud security threat. Ransomware "locks" away a
company's data in encrypted files, only allowing them to access the data once a ransom has been
paid. With appropriate data backup solutions, companies need no longer fall prey to these threats.
Due to the openness of a cloud computing system, phishing and social engineering attacks have
become particularly common. Once login information or other confidential information is acquired,
a malicious user can potentially break into a system with ease -- as the system itself is available
from anywhere. Employees must be knowledgeable about phishing and social engineering
enough to avoid these types of attackS.
System Vulnerabilities
Cloud computing systems can still contain system vulnerabilities, especially in networks that have
complex infrastructures and multiple third-party platforms. Once a vulnerability becomes known
with a popular third-party system, this vulnerability can be easily used against organizations.
Proper patching and upgrade protocols -- in addition to network monitoring solutions -- are critical
for fighting this threat.
Data Breach
Data Breaches result from an attack or employee negligence and error. This is a primary cause
for concern in cloud platforms. Vulnerabilities in the application or ineffective security practices
can also cause data breaches. Employees may log into cloud systems from their phones or
personal laptops thus exposing the system to targeted attacks.
Account Hijacking
With the increase in adoption of cloud services, organizations have reported an increased
occurrence of account hijacking. Such attacks involve using employee’s login information to
access sensitive information. Attackers can also modify, insert false information and manipulate
the data present in the cloud. They also use scripting bugs or reused passwords to steal
credentials without being detected.
Account hijacking could have a detrimental effect at the enterprise level, undermining the firm’s
integrity and reputation. This could also have legal implications in industries such as healthcare
where patients’ personal medical records are compromised. A robust IAM (Identity Access
Management) system can prevent unauthorized access and damage to the organization’s data
assets.
Insecure APIs and Interfaces
Customers can tailor their cloud computing experience according to their needs by using
Application Programming Interface or APIs.
These are used to extract, manage and interact with information on the cloud. However, the
unique characteristics of API leave the door wide open for threats. Hence the security of APIs
affects the security and availability of cloud services and platforms.
APIs facilitate communication between applications, herein lies the vulnerability. Firms need to
focus on designing APIs with adequate authentication, other access control methods, and
encryption technology.
The most recent example of an insecure API was at Salesforce, where an API bug in its
Marketing Cloud service exposed customer data. This caused data to be written from one
customer account to another.
Insider Threat
An Insider threat is the misuse of information through hostile intent, malware, and even
accidents. Insider threats originate from employees or system administrators, who can access
confidential information they can also access even more critical systems and eventually data.
When the relationship between the employer and system administrator turn sour, they may
resort to leaking privileged information.
There can be several instances of insider threat such as a Salesperson who jumps ship or a
rogue admin. In scenarios where the cloud service provider is responsible for security, the risk
from insider threat is often greater.
Insider threats can be circumvented through business partnerships, controlled access and
prioritizing initiatives.
Various security challenges related to these deployment models are
discussed below:
• Cloning and Resource Pooling: Cloning deals with replicating or duplicating the data. According to
cloning leads to data leakage problems revealing the machine’s authenticity. Resource pooling as a
service provided to the users by the provider to use various resources and share the same according to
their application demand. Resource Pooling relates to the unauthorized access due to sharing through
the same network.
• Motility of Data and Data residuals: For the best use of resources, data often is moved to cloud
infrastructure. As a result the enterprise would be devoid of the location where data is put on the cloud.
This is true with public cloud. With this data movement, the residuals of data is left behind which may
be accessed by unauthorized users.
• Elastic Perimeter: A cloud infrastructure, particularly comprising of private cloud, creates an elastic
perimeter. Various departments and users throughout the organization allow sharing of different
resources to increase facility of access but unfortunately lead to data breach problem.
• Shared Multi-tenant Environment: one of the very vital attribute of cloud computing, which allows
multiple users to run their distinct applications concurrently on the same physical infrastructure hiding
user data from each other. But the shared multi-tenant character of public cloud adds security risks such
as illegal access of data by other renter using the same hardware. A multi-tenant environment might
also depict some resource contention issues when any tenant consumes some unequal amount of
resources.
• Unencrypted Data: Data encryption is a process that helps to address various external and malicious
threats. Unencrypted data is vulnerable for susceptible data, as it does not provide any security
mechanism. These unencrypted data can easily be accessed by unauthorized users.
• Authentication and Identity Management: With the help of cloud, a user is facilitated to access its
private data and make it available to various services across the network. Identity management helps in
authenticating the users through their credentials.
Various security challenges with the service models are discussed below:
• Data Leakage and consequent problems: Data deletion or alteration without backup leads to certain
drastic data related problems like security, integrity, locality, segregation and breaches. This would lead
to sensitive data being accessed by the unauthorized users.
• Malicious Attacks: The threat of malicious attackers is augmented for customers of cloud services by
the use of various IT services which lacks the lucidity between the procedure and process relating to
service providers. Malicious users may gain access to certain confidential data and thus leading to data
breaches.
• Backup and Storage: The cloud vendor must ensure that regular backup of data is implemented that
even ensure security with all measures. But this backup data is generally found in unencrypted form
leading to misuse of the data by unauthorized parties. Thus data backups lead to various security
threats.
• Shared Technological issues: IaaS vendors transport their services in a scalable way by contributing
infrastructure. But this structure does not offer strong isolation properties for a multi-tenant
architecture. Hence in order to address this gap, a virtualization hypervisor intercede the access
between guest operating systems and the physical compute resources.
• Service Hijacking: Service hijacking is associated with gaining an illegal control on certain authorized
services by various unauthorized users. It accounts for various techniques like phishing, exploitation of
software and fraud. This is considered as one of the top most threats.
• VM Hopping: an attacker on one VM gains rights to use another victim VM. The attacker can check the
victim VM’s resource procedure, alter its configurations and can even delete stored data, thus, putting it
in danger the VM’s confidentiality, integrity, and availability. A requirement for this attack is that the
two VMs must be operating on the same host, and the attacker must recognize the victim VM’s IP
address. Although PaaS and IaaS users have partial authority, Thomas Ristenpart et al. [15] have shown
that an attacker can get hold of or decide the IP address using benchmark customer capabilities on the
basis of various tricks and combinational inputs to fetch user’s IP. Thus it can be inferred that VM
hopping is a rational threat in cloud computing. Additionally, multi-tenancy makes the impact of a VM
hopping attack larger than in a conventional IT environment. Because quite a few VMs can run at the
same time and on the same host there is a possibility of all of them becoming a victim VMs. VM hopping
is thus a critical vulnerability for IaaS and PaaS infrastructures.
• VM Mobility: The contents of VM virtual disks are saved as files such that VMs can be copied from one
host to another host over the system or via moveable storage devices with no physically pilfering a hard
drive. VM mobility might offer quick use but could show the way to security problems likewise, the rapid
spread of susceptible configurations that an attacker could make use of to endanger the security of a
novel host. Several types of attacks might take advantage of weaknesses in VM mobility which includes
man in-the-middle attacks. The severity of the attacks ranges from leaking perceptive information, to
completely compromising the guest OS.
• VM Denial of Service: Virtualization lets numerous VMs split physical resources like CPU, network
bandwidth and memory or disk. A Denial-of-Service or DoS attack in virtualization takes place when one
VM occupies all the obtainable physical resources such that the hypervisor cannot hold up more VMs
and accessibility is endangered. The most excellent move towards preventing a DoS attack is to bound
resource allocation using correct configurations
The network issues
The network structure of this cloud faces various attacks and security issues like cloud malware injection
attack, browser security issues, flooding attacks, locks-in, incomplete data deletion, data protection and
XML signature element wrapping, which are explained further below.
• Browser Security: Every client uses browser to send the information on network. The browser uses SSL
technology to encrypt user’s identity and credentials. But hackers from the intermediary host may
acquire these credentials by the use of sniffing packages installed on the intermediary host.
• SQL Injection Attack: These attacks are malicious act on the cloud computing in which a spiteful code is
inserted into a model SQL code. This allows the invader to gain unauthorized access to a database and
eventually to other confidential information.
• Flooding Attacks: In this attack the invader sends the request for resources on the cloud rapidly so that
the cloud gets flooded with the ample requests.
• XML Signature Element Wrapping: It is found to be a very renowned web service attack. it protects
identity value and host name from illegal party but cannot protect the position in the documents. The
attacker simply targets the host computer by sending the SOAP messages and putting any scrambled
data which the user of the host computer cannot understand
• Incomplete Data Deletion: Incomplete data deletion is treated as hazardous one in cloud computing.
When data is deleted, it does not remove the replicated data placed on a dedicated backup server. The
operating system of that server will not delete data unless it is specifically commanded by network
service provider. Precise data deletion is majorly impossible because copies of data are saved in replica
but are not available for usage.
• Locks in: Locks in is a small tender in the manner of tools, standard data format or procedures, services
edge that could embark on data, application and service portability, not leading to facilitate the
customer in transferring from one cloud provider to another or transferring the services back to home IT
location.
Cloud security governance refers to the management model that facilitates effective and efficient
security management and operations in the cloud environment so that an enterprise’s business
targets are achieved. This model incorporates a hierarchy of executive mandates, performance
expectations, operational practices, structures, and metrics that, when implemented, result in the
optimization of business value for an enterprise. Cloud security governance helps answer
leadership questions such as:
1. Strategic Alignment
Enterprises should mandate that security investments, services, and projects in the cloud
are executed to achieve established business goals (e.g., market competitiveness,
financial, or operational performance).
2. Value Delivery
Enterprises should define, operationalize, and maintain an appropriate security
function/organization with appropriate strategic and tactical representation, and charged
with the responsibility to maximize the business value (Key Goal Indicators, ROI) from
the pursuit of security initiatives in the cloud.
3. Risk Mitigation
Security initiatives in the cloud should be subject to measurements that gauge
effectiveness in mitigating risk to the enterprise (Key Risk Indicators). These initiatives
should also yield results that progressively demonstrate a reduction in these risks over
time.
5. Sustained Performance
Security initiatives in the cloud should be measurable in terms of performance, value and
risk to the enterprise (Key Performance Indicators, Key Risk Indicators), and yield results
that demonstrate attainment of desired targets (Key Goal Indicators) over time.
Whether developing a governance model from the start or having to retrofit one on existing
investments in cloud, these are some of the common challenges:
For example, the security configuration of a device may be modified (change event) by a staffer
without proper analysis of the business impact (control) of the modification. The net result could
be the introduction of exploitable security weaknesses that may not have been apparent with this
modification. The enterprise would now have to live with an inherent operational risk that could
have been avoided if the control had been embedded in the change execution process.
For example, a metric that quantitatively measures the number of exploitable security
vulnerabilities on host devices in the cloud over time can be leveraged as an indicator of risk in
the host device environment. Similarly, a metric that measures the number of user-reported
security incidents over a given period can be leveraged as a performance indicator of staff
awareness and training efforts. Metrics enable executive visibility into the extent to which
security tone and expectations (per established policy) are being met within the enterprise and
support prompt decision-making in reducing risks or rewarding performance as appropriate.
Virtual network security is the worst problem of all because it combines issues generated by
traditional hosting and application security with those from network security, and then adds the
challenges of virtual resources and services. In short, cloud-virtual service security issues occur because
security tools designed to protect hosted software features are different than those safeguarding
physical devices.
Following are some step that can ensure security virtual cloud management:-
Step one in securing virtual machine security in cloud computing is to isolate the new hosted elements.
For example, let's say three features hosted inside an edge device could be deployed in the cloud either
as part of the service data plane, with addresses visible to network users, or as part of a private sub
network that's invisible. If you deploy in the cloud, then any of the features can be attacked, and it's also
possible your hosting and management processes will become visible and vulnerable. If you isolate your
hosting and feature connections inside a private sub network, they're protected from outside access.
In container hosting today, both in the data center and in the cloud, application components deploy
inside a private sub network. As a result, only the addresses representing APIs that users are supposed
to access are exposed. That same principle needs to be applied to virtual functions; expose the
interfaces that users actually connect to and hide the rest with protected addresses.
Step two in cloud-virtual security is to certify virtual features and functions for security compliance
before you allow them to be deployed. Outside attacks are a real risk in virtual networking, but an insider
attack is a disaster. If a feature with a back-door security fault is introduced into a service, it becomes
part of the service infrastructure and is far more likely to possess open attack vectors to other
infrastructure elements.
Private subnetworks can help in addressing virtual machine security in cloud computing. If new
components can only access other components in the same service instance, the risk is reduced that
malware can be introduced in a new software-hosted feature. Yes, a back-door attack could put the
service itself at risk, but it's less likely the malware will spread to other services and customers.
This approach, however, doesn't relieve operators of the burden of security testing. It's important to
insist on a strong lifecycle management compliance process flow for all hosted features and functions --
one that operators can audit and validate. If the companies supplying your hosted features or functions
properly test their new code, it's less likely it will contain accidental vulnerabilities or deliberately
introduced back-door faults
Step three is to separate infrastructure management and orchestration from the service. Management
APIs will always represent a major risk because they're designed to control features, functions and
service behavior. It's important to protect all such APIs, but it's critical to protect the APIs that oversee
infrastructure elements that should never be accessed by service users.
By containing access, you limit your security risk. Additionally, operators should require that access to
infrastructure management and orchestration APIs by any source is chronicled, and that any access or
change is reviewed to prevent a management access leak from occurring.
The fourth and final point in cloud-virtual network security is to ensure that virtual network connections
don't cross over between tenants or services. Virtual networking is a wonderful way of creating agile
connections to redeployed or scaled features, but each time a virtual network change is made, it's
possible it can establish an inadvertent connection between two different services, tenants or
feature/function deployments. This can produce a data plane leak, a connection between the actual
user networks or a management or control leak that could allow one user to influence the service of
another
BENEFITS OF IAM
While this may seem the most obvious benefit, it deserves to be said: SSO eliminates the need
for users to remember and input multiple passwords to access different areas of your system.
Gone are the days of trying to keep dozens of password variations straight; with SSO, users can
enjoy automatic logins every time they move to a different connected system.
All vendors offer a variety of user authentication schemes ranging from more strict multi-factor
authentication to federated solutions that leverage existing user security profiles.
2. Enhancing Security Profiles
Just because SSO can grant users automatic access to all applications does not mean it has to.
More advanced IAM systems, most commonly using Security Assertion Markup Language
(SAML) 2.0 can use SSO with additional levels of security. IAM systems can authenticate and
authorize users based on the access level indicated in their directory profiles. IAM system can
also automaetically control user access using other factors. to specific functions of your system.
For example, Okta allows you to create identity management policies restricting access to
applications based on time of day, or adding additional authentication factors such as physical
location. PingFederate can extend a user security profile integrating with existing identity stores,
directories or other social identity providers. Additional rules can automate access decisions by
identity attribute, group membership or authentication method.
Consolidating user identities and passwords with SSO makes it easier for IT departments to audit
where and how these user credentials are used. In the event that user credentials are
compromised, IAM systems make it easier for IT departments to identify which user was
compromised and which data was accessed during the breach. PingFederate allows you to
monitor sign on performance metrics, traffic, and compliance centrally. Detailed audit trails
allow systems to record user provisioning and de-provisioning as employees are on-boarded or
teminated. OneLogin allows you to run detailed analytical reports on users, apps, logins other
events.
IAM/SSO allows users to access to all interconnected systems, regardless of where the user is
physically located. This can be especially useful for large companies doing business globally,
providing ease of access to employees, parnters and clients alike. OneLogin offers apps that
allow users to access any enterprise web-based application anywhere on any device. OneLogin
Mobile identity management provides users one-click access to all enterprise apps on
smartphones and tablets.
Some vendors offer suites of identity management solutions that require additional setup and
configuration. Okta claims to provide the only truly comprehensive mobile solution to securely
and efficiently enable new mobile initiatives, with enterprise mobility management completely
integrated with its identity management solutions.
• The original benefit of SSO for IT departments was to eliminate the cost of internal help
desks helping users locked out of their application accounts.
• IAM is purporting to do much more. By leveraging already existing identity stores such
as Active Director or LDAP, IAM allows you to extend what you have into the future.
• Cloud-based and mobile-based IAM tools not only allow users to authenticate from
anywhere anytime, they also provide the extensive audit trails, analytics, access rules and
policies to truly automate identity access and management across the enterprise.
DISADVANTAGES OF IAM
Major cloud providers specifically design and optimize their IAM products for their own platforms. This
might be fine for organizations that run all of their operations on that platform, but many IT teams also
manage on-premises applications, multiple cloud services, hybrid environments, distributed data stores
and customized legacy systems. In these situations, IT must either balance multiple IAM products or find
a single product that supports multiple environments, such as tools from Ping Identity or RSA.
Primary concern with SSO systems is that it creates a single point of failure. One of the main disadvantages
to SSO is decreased security, especially if it isn’t implemented properly. For starters, there’s a single sign-
on, but there’s no single logout. The logout process will vary across applications. Just because a user logs
out of one application doesn’t mean that the rest also shut down. In fact, user sessions stay active long
after a user logs out of a single application. Because SSO only requires one set of credentials to access all
of a user’s resources, a hacker could quite easily utilize all of them. This is especially dangerous if that user
has access to privileged information or mission-critical data.
It is a set of best practices and guidelines that define an integrated, process-based approach for
managing information technology services. ITIL helps make sure that proper security measures
are taken at all important levels, namely strategic, tactical, and operational level.
Realization of security requirements: “Security requirements are usually defined in the SLA as
well as in other external requirements, which are specified in underpinning contracts, legislation,
and internally or externally imposed policies".
Realization of a basic level of security: “This is necessary to guarantee the security and continuity
of the organization and to reach simplified service-level management for information security
management".
The major challenge for organizations that fail to adopt ITIL efficiently is that they might have to
re-define or re-implement the entire set of ITIL processes that they have. Thus, for implementing
ITIL a detailed analysis of existing processes along with gaps in relation to the ITIL framework
and level of process integration would be needed.
An OVF format virtual machine can be deployed easily by customers. They can do so on the
platform of their choice. It helps enhance customer experience as it provides customers with
portability, platform independence, verification, signing, versioning, and licensing terms
[OVF2].
• Portable VM packaging
• Optimization for secure distribution
• Simplified Installation and Deployment
• Supports both VM and multi-VM configurations
• Vendor and platform independent
• Extensible
• Localizable
.3 ITU-T X.1601
The ITU standard presents a sketch of issues pertaining to cloud computing and proposes a
framework for cloud security. It talks in detail about various security challenges and ways to
reduce these security risks in cloud computing. It also discusses a framework that provides an
insight into what security capabilities are required for making the cloud secure and facing
security challenges. ITU-T X.1601 starts by listing down major security threats that the cloud
can encounter. As we have already discussed major security threats for cloud computing in
section 2, in this section we will discuss the cloud security challenges and the security
capabilities that this standard deals with and those help in mitigating the relevant threats.
The standard discusses the security challenges based on the nature of the role that an individual
or an organization plays in the cloud computing paradigm. The standard divides the roles of an
individual or an organization into following three categories :
1. Cloud Service Provider (CSP): An individual or an organization responsible for making cloud
services available.
2. Cloud Service Customer (CSC): An individual or an organization that uses cloud services.
3. Cloud Service Partner (CSN): A partner that helps support the CSPs or the CSCs.
.4 PCI DSS
Payment Card Industry Data Security Standard (PCI DSS) was released by PCI security
standards council. PCI's main objective is to provide security guidelines for credit card usage and
address CSP's and CSC's. Cloud security is a shared responsibility between the CSP and its
clients. "For example, if payment card data is stored, processed or transmitted in a cloud
environment, PCI DSS will apply to that environment, and will typically involve validation of
both the CSP's infrastructure and the client's usage of that environment".
Though the responsibility for managing security is shared between client and provider the client
still has an important role to play. The client holds the responsibility of ensuring their cardholder
data is secure under PCI DSS requirements. The division of responsibilities between the client
and the CSP for managing PCI DSS controls is influenced by multiple factors, which are :
• The client uses the cloud service for what purpose.
• What scope of PCI DSS requirements is the client outsourcing to the CSP.
• The CSP validates which service and system components within its own operations.
• The service option that the client has selected to engage the CSP (IaaS, PaaS or SaaS).
• The scope of any additional services the CSP is providing to pro-actively manage the client's
compliance (for example, additional managed security services).
The client must have a clear understanding of the scope of responsibility that the CSP is
accepting for each PCI DSS requirement.
This standard is yet to be launched in the market. It aims to provide further guidance in the
information security domain of cloud computing. It is aimed at supplementing the guidance in
ISO/IEC 27002 and various other ISO27k standards including ISO/IEC 27018 on the privacy
aspects of cloud computing, ISO/IEC 27031 on business continuity, and ISO/IEC 27036-4 on
relationship management, as well as all the other ISO27k standards [ISO27017].
• It aims to provide an advancement to ISO/IEC 27002 in terms of adding value to its practices of
control implementation
• Additionally the standard will provide further security advice for both: clients and service
providers. It will do that by offering advice for both side-by-side in each section.