Data Storage Security Challenges in Cloud Computing
Data Storage Security Challenges in Cloud Computing
Data Storage Security Challenges in Cloud Computing
Department of Computer Engineering, Science and Research Branch, Islamic Azad University, West Azarbayjan, Iran
iau.hashemi@gmail.com
ABSTRACT
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud computing systems that by using these opinions can be overcome somewhat on the problems.
KEYWORDS
Cloud Computer, Security, Data Security, Trust.
1. INTRODUCTION
Cloud computing are an important structure with outstanding potential in decreasing the costs by improving and developing functionality and economic outcome which in turn can increase cooperation, pace and scalability acceptance to comprehensible degree [1, 2]. This technology has given many opportunities to large corporations and IT companies in developed countries, however, these opportunities face with challenges like security that is one of the most important concern in the field of cloud computing [2, 3]. If security services use badly the all parts of cloud computing face with problems such as the management of personal information in a public network or stored data users on the servers providing cloud services[2].It can be expressed that safety is a virtual highway to the adoption of the cloud, if the providers of this technology can destroy the obstacle from the path or minimizes it, cloud computing will be an important factor in the field of information technology, so it is easier to companies and public to accept and trust to use it [2]. Today, the main concern in cloud computing is how to make confidence in accepting, sharing applications, hardware, etc., in an environment that we don`t know who is responsible for securing our data [2, 4].So to build trust and develop the cloud computing use, it feels the need to repair the security flaws and minimize the challenges are necessary. In this paper, security issues in cloud technology, with emphasis on security challenges in the field of saving data examined. In addition to research in the field of cloud security and the issues and weaknesses in their investigation and decided to solutions for a better offer, and we refer to this issue that we build trust with consumers to transfer their data into the cloud and store them in the server side of a provider of cloud services necessary to develop and expand to use green
DOI : 10.5121/ijsptm.2013.2401 1
International Journal of Security, Privacy and Trust Management ( IJSPTM) Vol 2, No 4, August 2013
technology by users. Also, due to economic problems in the world and reduce the purchasing power of people the act of decrease security challenges and enhance public confidence in the services provided by the technology of cloud computing will follow economy for many people and governments.
2. PREVIOUS WORKS
Since the creation of computer networks and the expansion of Internet security issues of data transfer and storage, it was an important and growing importance of the subject is enhanced because the advancement of technology and the transfer of data from high-volume, highimportance requires channels with a greater safety factor for transferring data is felt. Accordingly, in this section we review presents offers and prior business to improving data security, especially in a cloud environment. Tsai W, et al within [5], framework of four-layer for the development of Web-based was made it interesting, but only one aspect of security in this process is discussed. Sources separation offer`s take place to ensure data security during the process, by separating processor`s cache in the virtual machines and separation of the virtual cache from hypervisor cache [6]. In reference [7], a security framework by different methods provided dynamically, that one of the components of this framework refers to provide data security by storage and access to data based on meta-data, which is similar to storing related data in different areas based on metadata, and if the destruction of user data takes place, it can be retrieved. Each part of the framework in "security as a service" is provided for practical applications by providers of security as a layer or multiple layers of required applications [7]. This research explains the concept of cloud security and the security system in the real world where security is depend on poses of individuals and organizations. Perhaps this is a good offer, but it should be clear that is security as a service provides with delivers service? In this case, the service provider must be put part of its focus on providing security and this is not good because it maybe decrease the growing of providing application services [7, 8]. M. Ahmed et al. [9], the accuracy of certain security issues related to cloud computing have examined and its aim is to explore and establish a secure channel for communication INO with the CSP, while the reliability and confidentiality of information is maintained. In addition, they have compared the provided protocol by the SSL of the activities associated with the work, along with the trustworthy security way to securing data. In the paper [10], the security problems at different levels of the architecture of cloud computing services have been studied. Security of customer-related data is a substantial need for services which is provided by each model of cloud computing [10]. They have studied matters of on-going security software as a service (SaaS), platform as a service (PaaS) and Infrastructure as a Service (IaaS). This paper focuses on the use of cloud services and security for working cross-domain Internetconnected [10].
3. CLOUD COMPUTING
Cloud computing have different shapes causing different understandings of them. For this reason many consider cloud as web-based applications. Others see it as useful and/or parallel computing because cloud is planned for better and improved efficiency in complicated & large scaled processes [12], [13]. Besides different shapes of cloud, the provided services are also highly different & numerous. Cloud computing have various definitions which some have been brought here. The definition of the national institute of standard and technology of America is as follows [2], [12], [14], [15]: Cloud computing is a model for enabling conve nient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. On othe r common
2
International Journal of Security, Privacy and Trust Management ( IJSPTM) Vol 2, No 4, August 2013
& acceptable definition is of Mater et al. [4], [16] A highly scalable tool, with the ability of service technology-enabled, which can be easily used via the internet when needed. Following the definition of cloud computing, we should comprehend their important features, developed models, the way of using services and also the way of protecting it, in order to know well and accept it [15]. Here are the five key features of cloud computing [2], [17]: Service demand on self. Using this feature when needed the customer can easily and automatically access to computing facilities like server, net, storage and soon from any provider. Ubiquitous network access. It implies that the facilities are accessible on the net and they can be used following standard methods. The methods which support weak and strong clients like laptop and mobile phones. Location-independent resource pooling. This features pools different customers needed resources in the same place dynamically by the providers. These resources can include the storage, memory, the bandwidth of net and virtual machines. Rapid elasticity. Using this feature, the facilities can be provided rapidly and with high elasticity and can be expanded or release fast. In other words the services can always be updated and improved and accessible for the users. Measured service. This feature enables monitoring, control and reporting of the resources, and can apparently control and report the amount and quantity of resource using for both customer and the provider of the infrastructure. In other words all these features cover the coherence and appearance of the clouds [18]. Development models include the aim and identity of cloud and the way they are settled. NIST definition of the development models are of the following four types [1], [2]. Public cloud: The substructure of public cloud is for the public use and accessible to all in which the resources, applications and web-services are provided through internet and public organizations help to provide and supply the substructures [19]. Indeed a cloud service provider organization owns the public cloud. Private cloud: Private cloud is for the exclusive use and only for an organization, so everyone in the organization can access data, services and applications but others out of organization cant [19]. Community cloud: Community cloud are provisioned and prepared to make some common facilities and resources available. Its substructure can be shared between one or some organizations but the main point here is that the requested work of them is the same and the demanders follow somehow the same mission, policy, security and soon. In Community cloud a certain group support tasks like security needs. Of course this king of sharing will have consequences for the organization at work [20]. Hybrid cloud: And latest model is hybrid cloud, which is combination of two or more clouds (including public, private and community). It is in fact an environment which uses some internal and external cloud providers [19]. Various services of cloud are presented into three models which are [1], [2]: SaaS. The services provided by SaaS include using functional programs on the infrastructure of cloud and access through the web browser [21]. in this section the customer doesn't manage the infra-structure of cloud including the net , servers, operational systems , and saving area , except the functional software to limited degree of adjustment at the level of user [20]. PaaS. In this kind of service, the client has the option of putting the purchased functional programs on the infra-structure of cloud [21]. Here also the client dose not mange or
3
International Journal of Security, Privacy and Trust Management ( IJSPTM) Vol 2, No 4, August 2013
control infrastructure of the cloud such as the net, servers, storage. He just has control over the functional program installed or Settled by him [20]. In fact the PaaS is similar to SaaS the difference is that PaaS includes exclusive program environment and computing platform, developing and solution strategies [2]. IaaS. This kind of service providing includes process potential, saving space. Nets and other basic computing re-sources and even operational system and application pro-grams [20]. The client dose not manage or control in infra-structure but has control over the operational system, saving area, and the established programs. In this service an artificial server is completely available for the client [21].
International Journal of Security, Privacy and Trust Management ( IJSPTM) Vol 2, No 4, August 2013
International Journal of Security, Privacy and Trust Management ( IJSPTM) Vol 2, No 4, August 2013
S3 Encryption Client, which makes local en cryption possible, but every user has to implement the all of mechanism using the defined library [26]. This is very complicated and time-consuming for many users which are not familiar with this technology, beside most users prefer to use a ready-made system.
International Journal of Security, Privacy and Trust Management ( IJSPTM) Vol 2, No 4, August 2013
International Journal of Security, Privacy and Trust Management ( IJSPTM) Vol 2, No 4, August 2013
6.4.2. Security of AES Regarding the security of AES, there has not been found any flaws in the algorithm. This algorithm has been used two years to analyse before it was approved in USA. It is enough to prove the quality and integrity of AES. Security of key is strong in AES, because the minimum key length is at least twice the length of the key used for the DES [25]. The rounds and Key length are not limited, so if we come close enough to break key by using powerful computing resources, it is possible to increase the key length and the number of rounds. There is a website [32], where researches and activities about AES are stated. The last research paper about Security of AES is presented in 2009 [25, 33]. It is an AES encryption with key lengths of 192 and 256 bits. Here an attack is used named as Related Key Boomerang. The paper concludes that this attack is only theoretical threat, and in action it is not possible. The complexity of data and time are so high, which its almost impossible to handle with the existing technology [25].
7. CONCLUSIONS
As noted in the system of cloud data storage, users store their data in the cloud, so there is no need to store them locally. Therefore, the security, integrity and availability of data files on storage distributed cloud servers are guaranteed. To accomplish this, the structure and security solutions of involved elements in the process of data storage in the cloud environment should be investigated. About the first element: client; we suggest to use an encryption mechanism from the customer like AES encryption that its high security and resistance has been proven in many testing. AES has been investigated and analysed by the NIST and its security has been approved by this validated Institute, and this encryption is used to encrypt sensitive information in the United States of America. Also we can use encryption algorithm by means of new methods like genetic algorithm or other dynamic algorithm which security can increase dramatically in this way. The next element must gave special consideration to its security is server, because our data store on the server and we possess storage space virtually as a user. Therefore, the accuracy and availability of data and information retrieval is very important and should provide the necessary security to accomplish this on the server side. Therefore, we use a comparison between some security policies by providers known in the field of providing data storage services, we did the comparison can be clearly seen that in order to the confidentiality of information, some providers use the mechanism of encryption control such as symmetric encryption. About the security of our server recommended service providers in this field to expand and to improve security mechanisms on their servers, because the users of cloud technology will go to the side of those providers that their services have enough security, thus server security will be important and providers can success in this technology with high server security and accountability to the users. The third element that its security is important in the storage and transmission of data is the connection channel between cloud service providers and user. In our opinion, the most vulnerable point that can put user`s data and information in the cloud environment at risk are communication channel. Because of the Internet and in most cases of the old mechanisms, therefore we must use new methods in order to avoid of unauthorized influences. In this case we can refer to the established protocols and retrieving or establishing more secure transmission channels that they introduce by using new sciences and methods in the computer science.
International Journal of Security, Privacy and Trust Management ( IJSPTM) Vol 2, No 4, August 2013
REFERENCES
[1] [2] H.Takabi, J.B.D.Joshi, G.Ahn., Security and Privacy Challenges in Cloud Computing Environments, IEEE Security Privacy Magazine, Vol 8, pp.24 -31, 2010. F. Soleimanian, S. Hashemi, Security Challenges in Cloud Computing with More Emphasis on Trust and Privacy, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, Vol. 1, ISSUE 6, pp. 49-54, 2012. M.Monsef, N.Gidado, Trust and privacy concern in the Cloud, 2011 European Cup, IT Security for the Next Generation, pp. 1-15, 2011. D Zissis, D Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems, Elsevier B.V, Vol.28, pp.583-592, 2010. Tsai W, Jin Z, Bai X.,Internetware computing: issues and perspective. Proceedings of the rst AsiaPacic symposium on Internetware. Beijing,China: ACM, pp. 110, 2009. Raj H, Nathuji R, Singh A, England P. Resource management for isolation enhanced cloud services., Proceedings of the 2009 ACM workshop on cloud computing security, Chicago, Illinois, USA, pp. 7784, 2009. S Subashini, V Kavitha, A survey on security issues in service delivery models of cloud computing, Network and Computer Applications, Elsevier, Vol. 34, pp. 1-11, 2010. KapilSachdeva, Cloud Computing: Security Risk Analysis and Recommendations, Master Thesis, University of Texas, Austin, 2011. Mahbub Ahmed, Yang Xiang, Shawkat Ali, Above the Trust and Security in Cloud Computing: A Notion towards Innovation, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.723-730, 2010. V.KRISHNA REDDY, Dr. L.S.S.REDDY, Security Architecture of Cloud Computing, International Journal of Engineering Science and Technology (IJEST), Vol. 3 No. 9, pp.7149-7155, 2011. Siani Pearson, Privacy, Security and Trust in Cloud Computing, HP Laboratories, appeared as a book chapter by Springer, UK, 2012. Fariborz farahmand, Risk Perception and Trust in Cloud, I SACA JOURNAL VOLUME 4, pp.1-8, 2010. Weiss, A.; Computing in the Clouds, netWorker, vol. 11, issue 4, p.16 -25, 2007. Mohamed Al Morsy, John Grundy and Ingo Mller, An Analysis of The Cloud Computing Security Problem, In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30 Nov 2010. M. Firdhous, O. Ghazali, and S. Hassan, Trust and Trust Manage-ment in Cloud Computing A Survey, Inter Networks Research Group, University Utara Malaysia, Technical Report UUM/CAS/InterNetWorks/TR2011-01, 2011. T. Mather, S. kumaraswamy, S. Latif, Cloud Security and privacy: an Enterprise perspective on Risk and Compliance, Governance An International Journal Of Policy And Administration, O'Reilly Media, Inc., p. 312, 2009. D. Jamil, H. Zaki, Security Issues in Cloud Computing and Countermeasures, International Journal of Engineering Science and Technology, Vol. 3, No. 4, p. 2672-2676, 2011. Yashpal Kadam, Security Issues in Cloud Computing A Transparent View, International Journal of Computer Science & Emerging Technologies, Vol-2 No 5 October, 2011. S. Qaisar, K.F. Khawaja, Cloud Computing: Network/Security Threats and Countermeasures, Interdisciplinary journal of con-temporary research in business, Vol.3, No 9, p. 1323-1329, 2012. J.R. Winkler, Securing the Cloud: Cloud Computer Security Techniques and Tactics, Technical EditorBill Meine, Elsevier Publishing, 2011. K, Sachdeva, Cloud Computing: Security Risk Analysis and Recommendations, Master Thesis, University of Texas, Austin, 2011. J. Hurwitz, R. Bloor, M. Kaufman, F. Halper, Cloud computing for dummies, Wiley, 2009. Z. A.Khalifehlou, F. S. Gharehchopogh, Security Directions in cloud Computing Environments, 5th International Conference on Information Security and Cryptology (ISCTURKEY2012), Ankara, Turkey, pp. 327-330, 17-19, 2012. B. Shwetha Bindu, B. Yadaiah, Secure Data Storage In Cloud Computing, International Journa l of Research in Computer Science, Vol 1 Issue 1, pp. 63-73, 2011. Abbas Amini, Secure Storage in Cloud Computing, Master Thesis, Technical University of Denmark, Kongens Lyngby, Denmark, 2012. 9
[10]
[16]
[24] [25]
International Journal of Security, Privacy and Trust Management ( IJSPTM) Vol 2, No 4, August 2013 [26] D. Kanchana, Dr. S. Dhandapani, A Novel Method for Storage Security in Cloud Computing, International Journal of Engineering Science and Innovative Technology (IJESIT), Vo 2, Issue 2, pp. 243-249, 2013. [27] Nikos Virvilis, Stelios Dritsas, Dimitris Gritzalis, Secure Cloud Storage: Available Infrastructu res and Architectures Review and Evaluation, TrustBus'11 Proceedings of the8th international conference on Trust, privacy and security in digital business, Springer-Verlag Berlin, Heidelberg 2011, 2011. [28] Ravi Gharshi, Suresha, Enhancing Security in Cloud Storage using ECC Algorithm, International Journal of Science and Research (IJSR), Vol 2, Issue 7, 2013. [29] Dan Boneh, Twenty Years of Attacks on the RSA Cryptosystem, Notices of the American Mathematical Society (AMS), Vol. 46, No. 2, pp. 203-213, 1999. [30] Charles P. Pfleeger, Security in Computing, Fourth Edition, Pfleeger Consulting Group, Shari Lawrence Pfleeger - RAND Corporation, Prentice Hall, 2006. [31] NIST.gov - Computer Security Division - Computer Security Resource Center, Block Cipher Modes, http://csrc.nist.gov/groups/ST/toolkit/BCM/index.html [accessed: July 2013]. [32] IAIK - TU Graz : AES Lounge, http://www.iaik.tugraz.at/content/research/krypto/aes/#security [accessed: 9 August 2013]. [33] Alex Biryukov and Dmitry Khovratovich, Related-key Cryptanalysis of the Full AES-192 and AES256, University of Luxembourg, ePrint Archive: Report 2009/317
AUTHORS
Sajjad Hashemi is a M.Sc. student in Computer Engineering Department, Science and Research Branch, Islamic Azad University, West Azarbayjan, Iran. Email: iau.hashemi@gmail.com
10