A Seminar Report
A Seminar Report
Submitted by
Saurabh Singh Kushwaha
Seminar Topic
Name of Internal Guide (Security in cloud
(Mr. Himanshu computing)
Swarnkar)
(February 2022)
TABLE OF CONTENTS
1 1 . Introduction......................................................................................................................................1
2 2. Evolution of cloud computing........................................................................................................1
3 3 . Cloud architecture..........................................................................................................................2
4 4. Cloud security challenges...............................................................................................................4
4.1 Characteristics of cloud computing.................................................................................................5
4.2 Security challenges............................................................................................................................6
5 5. Need for security in cloud..............................................................................................................10
5.1 Security and privacy attributes......................................................................................................11
5.1.1 Cloud confidentiality.......................................................................................................................12
5.1.2 Cloud integrity..............................................................................................................................15
5.1.3 Cloud availability............................................................................................................................17
5.1.4 Cloud accountability.......................................................................................................................19
5.1.5 Cloud privacy-preservability...........................................................................................................22
6 6 . Conclusions.....................................................................................................................................24
References.............................................................................................................................................25
lOMoAR cPSD| 11953201
Cloud computing began to get both awareness and popularity in the early 2000s. When the concept
of cloud computing originally came to prominence most people did not fully understand what role it
fulfilled or how it helped an organization. In some cases people still do not fully understand the concept
of cloud computing. Cloud computing can refer to business intelligence (BI), complex event
processing (CEP),
1
service-oriented architecture (SOA), Software as a Service (SaaS), Web-oriented architecture (WOA),
and even Enterprise 2.0. With the advent and growing acceptance of cloud- based applications like
Gmail, Google Calendar, Flickr, Google Docs, and Delicious, more and more individuals are now open to
using a cloud computing environment than ever before. As this need has continued to grow so has the
support and surrounding infrastructure needed to support it. To meet those needs companies like
Google, Microsoft, and Amazon have started growing server farms in order to provide companies with
the ability to store, process, and retrieve data while generating income for themselves. To meet this
need Google has brought on-line more than a million servers in over 30 data centres across its global
network. Microsoft is also investing billions to grow its own cloud infrastructure. Microsoft is currently
adding an estimated 20,000 servers a month. With this amount of process, storage and computing
power coming online, the concept of cloud computing is more of a reality than ever before. The growth
of cloud computing had the net effect of businesses migrating to a new way of managing their data
infrastructure. This growth of cloud computing capabilities has been described as driving massive
centralization at its deep centre to take advantage of economies of scale in computing power, energy
consumption, cooling, and administration.
3. CLOUD ARCHITECTURE
The architecture of cloud involves multiple cloud components communicating with each other over the
application programming interfaces (APIs), usually web services. The two most significant components
of cloud computing architecture are known as the front end and the back end. The front end is the part
seen by the client, i.e. the customer. This includes the client’s network or computer, and the
applications used to access the cloud via a user interface such as a web browser. The back end of the
cloud computing architecture is the cloud itself, which comprises of various computers, servers and data
storage devices.
The general architecture of cloud platform is also known as cloud stack given in figure
3.1. Cloud services may be offered in various forms from the bottom layer to top layer
in which each layer represent one service model. The three key cloud delivery models
are software as a service (SaaS), platform as a service (PaaS), and infrastructure as a
service (IaaS). Infrastructure-as-a-Service (IaaS) is offered in the bottom layer, where
resources are aggregated and managed physically (e.g., Emulab) or virtually (e.g.,
Amazon EC2), and services are delivered in forms of storage (e.g., GoogleFS), network
(e.g., Openflow), or computational capability (e.g., Hadoop MapReduce). The middle
layer delivers Platform- as a-Service (PaaS), in which services are provided as an
environment for programming (e.g., Django) or software execution (e.g., Google App
Engine). Software- as-a Service
2
(SaaS) locates in the top layer, in which a cloud provider further confines client
flexibility by merely offering software applications as a service. Apart from the service
provisioning, the cloud provider maintains a suite of management tools and facilities
(e.g., service instance life-cycle management, metering and billing, dynamic
configuration) in order to manage a large cloud system.
Cloud deployment models include public, private, community, and hybrid clouds
which is shown in figure 3.2. Public clouds are external or publicly available cloud
environments that are accessible to multiple tenants, whereas private clouds are
typically tailored environments with dedicated virtualized resources for particular
organizations. Similarly, community clouds are tailored for particular groups of
customers.
The world of computation has changed from centralized to distributed systems and now we are
getting back to the virtual centralization which is the Cloud Computing. Location of data and processes
makes the difference in the realm of computation. We have the cloud computing wherein, the service
and data maintenance is provided by some vendor which leaves the client/customer unaware of
where the processes are running or where the data is stored. So, logically speaking, the client has no
control over it. The cloud computing uses the internet as the communication media. When we look at
the security of data in the cloud computing, the vendor has to provide some assurance in service level
agreements (SLA) to convince the customer on security issues. Organizations use cloud computing as a
service infrastructure, critically like to examine the security and confidentiality issues for their business
critical insensitive applications. What are the security concerns that are preventing companies from
taking advantage of the cloud? This section deals with the taxonomy of the security concerns.
Traditional security issues are still present in cloud computing environments. But as enterprise
boundaries have been extended to the cloud, traditional security mechanisms are no longer suitable
for applications and data in cloud. Traditional concerns involve computer and network intrusions or
attacks that will be made possible or at least easier by moving to the cloud. Cloud providers respond
to these
4
concerns by arguing that their security measures and processes are more mature and tested than
those of the average company. It could be easier to lock down information if it’s administered by a
third party rather than in-house, if companies are worried about insider threats In addition, it may be
easier to enforce security via contracts with online services providers than via internal controls. Due to
the openness and multitenant characteristic of the cloud, cloud computing is bringing tremendous
impact on information security field. Availability concerns centre on critical applications and data
being available. Well publicized incidents of cloud outages include Gmail. As with the Traditional
Security concerns, cloud providers argue that their server uptime compares well with the availability
of the cloud users own data centres. Cloud services are thought of as providing more availability, but
perhaps not there are more single points of failure and attack. Third-party data control the legal
implications of data and applications being held by a third party are complex and not well understood.
There is also a potential lack of control and transparency when a third party holds the data. Part of the
hype of cloud computing is that the cloud can be implementation independent, but in reality
regulatory compliance requires transparency into the cloud.
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences
from, traditional computing approaches:
• Broad network access - Capabilities are available over the network and accessed through standard
mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones,
laptops, and PDAs) as well as other traditional or cloud based software services.
• Resource pooling - The providers computing resources are pooled to serve multiple consumers
using a multi-tenant model, with different physical and virtual resources dynamically assigned and
reassigned according to consumer demand. There is a degree of location independence in that the
customer generally has no control or knowledge over the exact location of the provided resources,
but may be able to specify location at a higher level of abstraction (e.g., country, state, or
datacentre). Examples of resources include storage, processing, memory, network bandwidth, and
virtual machines. Even private clouds tend to pool resources between different parts of the same
organization.
5
• Rapid elasticity - Capabilities can be rapidly and elastically provisioned in some cases automatically
to quickly scale out; and rapidly released to quickly scale in. To the consumer, the capabilities
available for provisioning often appear to be unlimited and can be purchased in any quantity at any
time.
• Measured service - Cloud systems automatically control and optimize resource usage by leveraging
a metering capability at some level of abstraction appropriate to the type of service (e.g., storage,
processing, bandwidth, or active user accounts). Resource usage can be monitored, controlled, and
reported providing transparency for both the provider and consumer of the service.
Cloud computing becomes a successful and popular business model due to its charming features. In
addition to the benefits at hand, the former features also result in serious cloud-
6
specific security issues. The people whose concern is the cloud security continue to hesitate to
transfer their business to cloud. Security issues have been the dominate barrier of the
development and widespread use of cloud computing. Understanding the security and privacy
risks in cloud computing and developing efficient and effective solutions are critical for its
success. Although clouds allow customers to avoid start-up costs, reduce operating costs, and
increase their agility by immediately acquiring services and infrastructural resources when
needed, their unique architectural features also raise various security and privacy concerns.
There are three main challenges for building a secure and trustworthy cloud system:
• Data security It focuses on protecting the software and hardware associated with the cloud. It
deals with choosing an apt location for data centres so as to protect it from internal threats,
different types of weather conditions, fire and even physical attacks that might destroy the
centre physically and external threats avoiding unauthorized access and break ins.
10
• Network security Protecting the network over which cloud is running from various attacks DOS,
DDOS, IP Spoofing, ARP Spoofing and any novel attacks that intruders may device. Attack on data
affects a single user whereas a successful attack on Network has the potential to affect multiple
users. Therefore network security is of foremost importance.
Five most representative security and privacy attributes are confidentiality, integrity, availability,
accountability, and privacy-preservability, which is shown in figure 5.1. Within the enterprise
boundaries, data transmission usually does not require encryption, or just have a simple data
encryption measure. For data transmission across enterprise boundaries, both data
confidentiality and integrity should be ensured in order to prevent data from being tapped and
tampered with by unauthorized users. In other words, only the data encryption is not enough.
Data integrity is also needed to be ensured .Therefore it should ensure that transport protocols
provide both confidentiality and integrity. Confidentiality and integrity of data transmission need
to
11
Figure 5.1: Security and privacy attributes
ensure not only between enterprise storage and cloud storage but also between
different cloud storage services.
Threats to these attributes and Defence strategies are discussing below.
12
User’s confidential data is disclosed to a service provider if all of the following three
conditions are satisfied simultaneously
• The service provider knows where the user’s confidential data is located inthe
cloud computing systems.
• The service provider has privilege to access and collect the user’s confidentialdata
in cloud.
• The service provider can understand the meaning of the user’s data.
• Cross-Virtual Machine (VM) attack via Side Channels - A Cross-VM attack exploits
the nature of multi-tenancy, which enables that VMs belonging to different
customers may co-reside on the same physical machine. Timing side channels as
an insidious threat to cloud computing security due to the fact that
a) the timing channels pervasively exist and are hard to control due to the nature
of massive parallelism and shared infrastructure; b) malicious customers are able
to steal information from other ones without leaving a trail or raising alarms.
• Malicious sysAdmin: The Cross-VM attack discusses how others may violate
confidentiality cloud customers that co-residing with the victim, although it is not
the only threat. Privileged sysadmin of the cloud provider can perform attacks by
accessing the memory of a customer’s VMs. For instance, Xenaccess enables a
sysadmin to directly access the VM memory at run time by running a user level
process in Domain0.
Defence strategies
Approaches to address cross-VM attack fall into six categories: a) placement prevention
intends to reduce the success rate of placement; b) physical isolation enforcement; c)
new cache designs; d) fuzzy time intends to weaken malicious VMs ability to receive the
signal by eliminating fine-grained timers; e) forced VM determinism ensures no timing
or other non-deterministic information leaking to adversaries; f) cryptographic
implementation of timing-resistant cache.
13
• Placement prevention: In order to reduce the risk caused by shared infrastructure,
a few suggestions to defend the attack in each step are given in . For instance,
cloud
providers may obfuscate co-residence by having Dom0 not respond in traceroute,
and/or by randomly assigning internal IP addresses to launched VMs. To reduce
the success rate of placement, cloud providers might let the users decide where
to put their VMs; however, this method does not prevent a brute-force strategy.
• Retaining data control back to customer: Considering the customers fear of losing
the data control in cloud environments, it is propose to retain data control for the
cloud customers by simply storing encrypted VMs on the cloud servers. Encrypted
VM images guarantee rigorous access control since only the authorized users
known as key-holders are permitted access. Due to the encryption, the data
cannot be mounted and modified within the cloud without an access key, assuring
the confidentiality and integrity. This approach offers security guarantees before a
VM is launched; however, there are ways to attack the VM during running time
and to jeopardize the data and computation.
Similar to confidentiality, the notion of integrity in cloud computing concerns both data
integrity and computation integrity. Data integrity implies that data should be honestly
stored on cloud servers, and any violations (e.g., data is lost, altered, or compromised)
are to be detected. Computation integrity implies the notion that programs are
executed without being distorted by malware, cloud providers, or other malicious
users, and that any incorrect computing will be detected.
15
accessed on rare occasions. The cloud servers are distrusted in terms of both
security and reliability, which means that data may be lost or modified
maliciously or accidentally. Administration errors may cause data loss (e.g.,
backup and restore, data migration, and changing memberships in P2P systems).
Additionally, adversaries may initiate attacks by taking advantage of data owner’s
loss of control over their own data.
Defence strategies
• Provable data possession (PDP): The main challenge of integrity checking is that
tremendous amounts of data are remotely stored on untrustworthy cloud
servers; as a result, methods that require hashing for the entire file become
prohibitive. In addition, it is not feasible to download the file from the server and
perform an integrity check due to the fact that it is computationally expensive as
well as bandwidth consuming. Each of the former notions is not acceptable in
cloud environments.
• Third party auditor (TPA): Instead of letting customers verify data integrity, it is
also possible to offload task of integrity checking to a third party which can be
trusted by both cloud provider and customers. It is propose to adopt a TPA to
check the integrity of outsourced data in cloud environments. TPA ensures the
following: 1) cloud data can be efficiently audited without a local data copy, and
cloud clients suffer no on-line overhead for auditing; 2) no new vulnerabilities will
be introduced to jeopardize data privacy. The key technique is a public based
homomorphic authenticator, which has been utilized in
• Flooding attack via bandwidth starvation: In a flooding attack, which can cause
Deny of Service (DoS), a huge amount of nonsensical requests are sent to a
particular service to hinder it from working properly. In cloud computing, there
are two basic types of flooding attacks:
17
Direct DOS the attacking target is determined, and the availability of the targeting
cloud service will be fully lost.
Indirect DOS the meaning is twofold: 1) all services hosted in the same physical
machine with the target victim will be affected; 2) the attack is initiated without a
specific target.
Defence strategies
• Defending the new DOS attack: This new type of DOS attack differs from the
traditional DOS or DDOS attacks in that traditional DOS sends traffic to the
targeting application/host directly while the new DOS attack does not; therefore,
some techniques and counter-measures for handling traditional DOSs are no
longer applicable. A DOS avoidance strategy called service migration has been
developed to deal with the new flooding attack. A monitoring agent located
outside the cloud is set up to detect whether there may be bandwidth starvation
by constantly probing the cloud applications. When bandwidth degradation is
detected, the monitoring agent will perform application migration, which may
stop the service temporarily, with it resuming later. The migration will move the
current application to another subnet of which the attacker is unaware.
• FRC attack detection: The key of FRC detection is to distinguish FRC traffic from
normal activity traffic. Idziorek et al. propose to exploit the consistency and
selfsimilarity of aggregate web activity. To achieve this goal, three detection
metrics are used: i) Zipf s law are adopted to measure relative frequency and self-
similarity of web page popularity; ii) Spearmans footrule is used to find the
proximity between two ranked lists, which determines the similarity score; iii)
overlap between the reference list and the comparator list measures the
similarity
between the training data and the test data. Combining the three metrics yields a
reliable way of FRC detection.
• SLA violation: the loss of data control is problematic when something goes awry.
For instance, the following problems may possibly arise: 1) The machines
19
in the cloud can be mis-configured or defective and can consequently corrupt the
customers data or cause his computation to return incorrect results; 2) The cloud
provider can accidentally allocate insufficient resources for the customer, an act
which can degrade the performance of the customers services and then violate
the SLA; 3) An attacker can embed a bug into the customers software in order to
steal valuable data or to take over the customers machines for spamming or DoS
attacks;
4) The customer may not have access to his data either because the cloud loses it
or simply because the data is unavailable at an inconvenient time.
Defence strategies
• Accountable virtual machine (AVM): The intent of AVM is to enable users to audit
the software execution on remote machines. AVM is able to 1) detect faults, 2)
identify faulty node, 3) provides verifiable evidence of a particular fault and point
to the responsible party. AVM is applicable to cloud computing in which
customers outsource their data and software on distrusted cloud servers. AVM
allows cloud users to verify the correctness of their code in the cloud system. The
approach is to wrap any running software in a virtual machine, which keeps a
tamper-evident log to record the entire execution of the software.
21
• Accountable MapReduce (AMR): This problem has been addressed with
SecureMR, which adopts full task duplication to double check the processing
result. SecureMR requires that twice two different machines, which will double
the total processing time, execute a task. Additionally, SecureMR suffers false
positive when an identical faulty program processes the duplicated tasks.
Privacy is yet another critical concern with regards to cloud computing due to the fact that customer’s
data and business logic reside among distrusted cloud servers, which are owned and maintained by the
cloud provider. Therefore, there are potential risks that the confidential data (e.g., financial data, health
record) or personal information (e.g., personal profile) is disclosed to public or business competitors.
Privacy has been an issue of the highest priority. Throughout this text, we regard privacy- preservability
as the core attribute of privacy. A few security attributes directly or indirectly influence privacy
preservability, including confidentiality, integrity, accountability, etc. Evidently, in order to keep private
data from being disclosed, confidentiality becomes indispensable, and integrity ensures that
data/computation is not corrupted, which somehow preserves privacy. Accountability, on the contrary,
may undermine TABLE 5.1: Approaches of privac
y enforcement them.
Approach Description ected
Information centric Data ts have access-control security policies are
objec with
Trusted computing The system will consistently behave in exp
ways with hardware or softw
privacy due to the fact that the methodsenforcement.
of achieving the two attributes usually
conflict Cryptographic
[5]. protocols Cryptographic techniques and tools are
employed to preserve privacy.
Threats to cloud privacy
Defence strategies
The privacy-preserving classified into three categories, which are shown in Table 5.1. It
is proposed that Fully Homomorphic Encryption (FHE) to preserve privacy in cloud
computing. FHE enables computation on encrypted data, which is stored in the
distrusted servers of the cloud provider. Data may be processed without decryption.
The cloud servers have little to no knowledge concerning the input data, the
processing
22
function, the result, and any intermediate result values. Therefore, the outsourced
computation occurs under the covers in a fully privacypreserving way.
23
FHE has become a powerful tool to enforce privacy preserving in cloud computing.
However, all known FHE schemes are too inefficient for use in practice. While
researchers are trying to reduce the complexity of FHE, it is worthwhile to consider
alleviating the power of FHE to regain efficiency. Somewhat homomorphic encryption,
which only supports a number of homomorphic operations, which may be much faster
and more compact than FHE.
6. CONCLUSIONS
Every new technology has its pros and cons, similar is the case with cloud computing. Although cloud
computing provides easy data storage and access. But there are several issues related to storing and
managing data, which is not controlled by owner of the data. This paper discussed security issues for
cloud. These issues include cloud integrity, cloud confidentiality, cloud availability, cloud privacy.
There are several threats to cloud confidentiality including cross-VM attack and Malicious sysadmin.
On the other hand integrity of cloud is compromised due to data loss and dishonest computation in
remote servers. Denial of Service attack (Dos) is the most common attack which is also possible in
cloud computing network. This attack attempts to prevent the data available to its intended users.
The last issue is cloud privacy and it is similar to cloud confidentiality. If cloud confidentiality is at risk,
cloud privacy will also be at risk.
24
REFERENCES
[1] C. Wang, Q, Wan, K. Ren nd Wenjing Lou, ”Privacy-Preserving Public Auditing for Data StorageSecurity in
Cloud Computing”, Infocom, Proceedings IEEE, 2010, pp.1-9.
[2] D. Chen and H. Zhao, ”Data Security and Privacy Protection Issues in Cloud Computing”, in International
Conference on Computer Science and Electronics Engineering(ICCSEE), 2012, vol.1, pp.647-651.
[3] H. Takabi, J. B. D. Joshi and G. J. Ahn, ”Security and Privacy Challenges in Cloud Computing Environments”
, Security and Privacy, IEEE, vol.8 , no.6, pp.24-31, Nov/Dec 2010.
[4] K. Ren, C. Wang and Q. Wang, ”Security Challenges for the Public Cloud”, Internet Computing, IEEE ,
vol.16, no.1, pp.69-73, Jan/Feb 2012.
[5] Z. Xiao and Y. Xiao, ”Security and Privacy in Cloud Computing ”,IEEE Commun. Surveys and Tutorials, vol.
15, no.2, pp.843 - 859, Second quarter 2013.
[6] Cloud Security Alliance (CSA). Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,
(Released December 17, 2009).
(http://www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf. Accessed Jan. 13, 2011.)
25