Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Developing The Model To Investigate The Challenges and Vulnerabilities of Cloud Computing Services in Wirless Networks

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

DEVELOPING THE MODEL TO INVESTIGATE THE CHALLENGES

AND VULNERABILITIES OF CLOUD COMPUTING SERVICES IN


WIRLESS NETWORKS: IN CASE OF WOLAITA SODO UNIVERSITY
1. Background of Study
The increased use of technology for improved teaching and enhanced learning is going to be the
future of education at all levels. Most of the colleges and universities, because of low enrolment
in their onsite classes, now offer courses and in some cases the entire degree program through
distance education or in online format as well as use various other teaching and learning
models.[1].
Cloudcomputing is one of information communication technology application that allow the
users to access software applications,hardware, storage, computing processes directly from the
web. It offers two paradigms in computing; SaaS and PaaS.
The application of cloud computing namely: social medias, Productivity management,
Marketing, Communication, educations, healthcare, and others.

The model provides to both students as well as teachers an open and modular learning
environment. In this approach, courses, seminars and exams are personalized according to the
needs and capabilities of each individual student. Teacher guidelines are also taken into account
in this process. To accomplish personalization, courses or lessons and precedence or succession
relationships are shown as graph nodes and arcs respectively. The lessons, for individual
students, are extracted through the creation of personalized sub graphs (Learning paths) using a
course generation engine. The lessons that are known to student are eliminated and rest is
arranged into a tree with all possible paths right from the knowledge that the students possess to
knowledge that is desired by the student[1]

1
Fig.1. cloud computing services:[2]
Benefits of cloud computing:

Cyber security is the protection of Internet-connected systems, including hardware, software, and
data from cyber-attacks. It is made up of two words one is cyber and other is security. Cyber is
related to the technology which contains systems, network and programs or data. Whereas
security related to the protection which includes systems security, network security and
application and information security.

In this study we will investigate the key challenges of the cloud computing security,
vulnerabilitiesof the cloud computing services and forwarding the suitable solution by proposing
the models.

1.1. Rationale of the study:


In the 21 century the world is under risks of cyber security problems in different countries are
complying in case of the crimes.

In the last Year 2020, The FDRE Government of Ethiopia Published and launched the working
regulation to combat and fight the challenges and crimes of the cybercrimes.

Different Hacktivists attacker’s and malware are strongly working the bounder less fight between
different sovereign states and societies.

2
The country’s privately owned critical infrastructure banks, telecommunications networks, the power
grid, and so on—is vulnerable to catastrophic cyber-attacks. The existing academic literature does not
adequately grapple with this problem, however, because it conceives of cyber-security in unduly narrow
terms: most scholars understand cyber-attacks as a problem of either the criminal law or the law of armed
conflict. Cyber-security scholarship need not run in such established channels.[3],[4],[5],[6]

1.2. Statement of the Problems:


There are many challenges in the cloud computing security issues:

Some of the challenges are

 Ransomware, malwares
 Cyber Criminals
 Hacktivists
 Attackers
 Insider Threats
Research Questions

1. What are the major cloud computing security problems?


2. How much the challenges level in the current networks?
3. How we can combat the cloud computing security challenges?

1.3. Objective of the study:


Developing the model to investigate the challenges and the level of vulnerabilities of cloud
computing services in WOLAITA SODO UNIVERSITY

1.4. Specific Objectives


 To identify the security challenges
 To investigate the vulnerabilities level of the threat
 To develop model that used to identify, measure and detect security problems
 To test and apply the developed model
 To evaluate the gaps before and after the models.

3
1.5. Scope of the Research
The scope of this research will contains the following major tasks

 Reviewing the existing current research works.


 Identifying the gaps on scientific scholars.
 Identifying the core security challenges of the current WSU network and cloud services
 Measuring the level of attacks on the network
 Developing the working frameworks and model to detect the challenges.
 Evaluating the developed models and systems
 Proposing the solutions to detect and combat the vulnerabilities in the cloud computing
services.
 Preparing the report
 Publishing the manuscripts in international journals

1.6. Significance and Innovation

 Builds trust.
 Security for large systems translates to security for everyone.
 Mitigates risk
 Protects proprietary information.
 Enables a more modern workplace.
 Access control.
 Antivirus and anti-malware software.
 Application security.
 Behavioral analytics.

1.7. Limitation of the study


The limitations of the research are the shortages of time in case of COVID and teaching class
schedule.

4
2. Literature Review.
2.1.Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol

IEEE has recently incorporated CCMP protocol to provide robust security to IEEE 802.11
wireless LANs. It is found that CCMP has been designed with a weak nonce construction and
transmission mechanism, which leads to the exposure of initial counter value. This weak
construction of nonce renders the protocol vulnerable to attacks by intruders. This paper presents
how the initial counter can be pre-computed by the intruder. This vulnerability of counter block
value leads to pre-computation attack on the counter mode encryption of CCMP. The failure of
the counter mode will result in the collapse of the whole security mechanism of 802.11 WLAN.

2.2.Towards achieving Data Security with the Cloud Computing Adoption Framework

Offering real-time data security for petabytes of data is important for Cloud Computing. A recent
survey on cloud security states that the security of users’ data has the highest priority as well as
concern. We believe this can only be able to achieve with an approach that is systematic,
adoptable and well-structured. Therefore, this paper has developed a framework known as Cloud
Computing Adoption Framework (CCAF) which has been customized for securing cloud data.
The paper explains the overview, rationale and components in the CCAF to protect data security.
CCAF is illustrated by the system design based on the requirements and the implementation
demonstrated by the CCAF multi-layered security. [7],[8]

Since there Data Center has 10 petabytes of data, there is a huge task to provide real-time
protection and quarantine. We use Business Process Modeling Notation (BPMN) to simulate
how data is in use. The use of BPMN simulation allows us to evaluate the chosen security
performances before actual implementation. Results show that the time to take control of security
breach can take between 50 and 125 hours. This means that additional security is required to
ensure all data is well-protected in the crucial 125 hours. This paper has also demonstrated that
CCAF multi-layered security can protect data in real-time and it has three layers of security: 1)
firewall and access control; 2) identity management and intrusion prevention and 3) convergent
encryption. To validate CCAF, this paper has undertaken two sets of ethical-hacking experiments
involved with penetration testing with 10,000 trojans and viruses. CCAF can be more effective
when combined with BPMN simulation to evaluate security process and penetrating testing
results.[9], [10], [4]

5
2.3.DATA SECURITY BASED ON LAN USING DISTRIBUTED FIREWALL

Network security consists of the provisions and policies adopted by a network administrator to
prevent and monitor unauthorized access, misuse, modification, or denial of a computer network
and network-accessible resources. In most of the systems, the network security is achieved by
firewall and acts as a filter for unauthorized traffic. But there are some problems with these
traditional firewalls like they rely on the notation of restricted topology and controlled entry
points to function. Restricting the network topology, difficulty in filtering of certain protocols,
end-to-end encryption problem and few more problems lead to the evolution of Distributed
Firewalls. It secures the network by protecting critical network endpoints, exactly where hackers
want to penetrate. This paper is a survey paper, dealing with the general concepts such
distributed firewalls, its requirements and implications and introduce, its suitability to common
threats on the Internet, as well as give a short discussion on contemporary implementations. A
distributed firewall gives complete security to the network.[4]

3. Methodology and Research Tools:


Systematic Literature Review (SLR)

Systematic Literature Review (SLR) will be one of the main research methodologies for this
research. This is primarily to summarize the existing information and knowledge on current
cloud computing security threats. This is essentially to create a bridge to reflect on how the
effectiveness of current cloud architecture security techniques.

Systematic literature review is a methodology that identify, evaluate and interpret all available
research that is relevant to the particular research question or topic. Systematic literature review
can provide a fair evaluation on research topic as it synthesises existing work in the field of
cloud computing in a just manner.

The difference between systematic literature review and traditional literature review are:

 Systematic Literature Review directly addresses the specified research questions by


utilizing a review protocol

6
 Systematic literature review creates a search strategy that targets and detects all of the
relevant literature as possible
 Systematic literature review would require criteria of inclusion and exclusion to assess
the viability of each primary study.

The systematic literature review will be conducted in three main phases

Sytematic
Planning Conducting Reporting Literature
Review

 Planning the systematic literature review


o Developing review protocol
 Conducting the review
o Selecting primary study, extracting data and assessing quality of data
 Reporting the review
o Reporting the whole review holistically and documenting the systematic literature
review process

Scientific Cloud services security mechanisms:

 Vulnerabilities assessment
 DDoS Protection
 Access Management

7
 Secure data transfer
 Local Data Backups
 End- to – End Data Encryption

4. Other Issues

4.1. Schedule of the study


NO Tasks

May 2014

June 2014
Oct to Jan
Sept 2014
May 20

30 2014
Marc to

May to

Apr 30
Feb to
2013

2013
1. Title selection & Proposal Writing o
2. Review of Research
3. Research Design
4. Data Analyses and Discussion
5. Findings
6. Conclusion and Recommendation

4.2.Budget of The research


4.2.1. Material Cost

No Items Item No of Items Unit Cost Total cost Remark


specification
01 Printer HP laser jet 1 1 4500
02 Printer Paper 5 pack 1000
03 Note Book Sinner Line 10 50 500
04 Pens (Red, black and Kenya Bic 1 packs 200
Blue)
05 Flash Disk 32GB 5 300 1,500
Total material cost 7,700

8
4.2.2. Manpower Cost

No Type of work Place No of No of Per- Total


days Investigator diam payment1
1 Title selection & Proposal Writing Wolaita 60 5 60 18,000
2 Research Review Wolaita 60 5 60 18,000
3 Research Design Wolaita 150 5 60 45,000
4 Data Analyses and Discussion Wolaita 90 5 60 27,000
5 Findings , Conclusion and Wolaita 30 5 60 9000
recommendation
6 Professional fee Wolaita 180 5 800 720,000

7 Data Encoding Wolaita 60 1 100 6000

Total 843,000

4.2.3. Other Costs

No Activity participant No of Total Remark


days payment

2 For communication 4 - 2000 -


3 For consultancy purpose - - 3,000 -

5 For refreshment - - 5,000 -


Total 10,000

4.2.4. Budget summery of the research


No Cost Cost in (Birr)
1 Material cost 7,700
2 Man power cost 843,000
3 Other cost 10,000
Grand total 860,000

4.3. Actors/Stake holders of the study

9
The main stakeholders of this study are ICT directorate, the study teams and SOI

4.4. Monitoring and Evaluation

The research principal investigator is more responsible to monitor and evaluate the study. But,
any time the RCSTT office can visit or monitory the research progress, and all team members are
willing to explain and response anything asked by the office promptly

5. References

[1] M. Al-Zoube, S. Abou El-Seoud, and M. F. Wyne, ―Cloud computing based e-learning
system,‖ Int. J. Distance Educ. Technol. IJDET, vol. 8, no. 2, pp. 58–71, 2010.
[2] M. J. Kavis, Architecting the cloud: design decisions for cloud computing service models
(SaaS, PaaS, and IaaS). John Wiley & Sons, 2014.
[3] R. Von Solms and J. Van Niekerk, ―From information security to cyber security,‖ Comput.
Secur., vol. 38, pp. 97–102, 2013.
[4] J. V. Gaud and M. M. Bartere, ―Data Security Based on LAN Using Distributed Firewall,‖
Int. J. Comput. Sci. Mob. Comput., 2014.
[5] L. Hansen and H. Nissenbaum, ―Digital disaster, cyber security, and the Copenhagen
School,‖ Int. Stud. Q., vol. 53, no. 4, pp. 1155–1175, 2009.
[6] N. A. Sales, ―Regulating cyber-security,‖ Nw UL Rev, vol. 107, p. 1503, 2012.
[7] J. W. Branch, N. L. Petroni, L. Van Doorn, and D. Safford, ―Autonomic 802.11 wireless
LAN security auditing,‖ IEEE Secur. Priv., vol. 2, no. 3, pp. 56–65, 2004.
[8] S. Miehlke et al., ―Efficacy and safety of budesonide, vs mesalazine or placebo, as induction
therapy for lymphocytic colitis,‖ Gastroenterology, vol. 155, no. 6, pp. 1795–1804, 2018.
[9] J.-C. Chen, M.-C. Jiang, and Y. Liu, ―Wireless LAN security and IEEE 802.11 i,‖ IEEE
Wirel. Commun., vol. 12, no. 1, pp. 27–36, 2005.
[10] D. E. Denning and P. J. Denning, ―Data security,‖ ACM Comput. Surv. CSUR, vol. 11,
no. 3, pp. 227–249, 1979.

10

You might also like