Sunteți pe pagina 1din 7

LOVELY

PROFESSIONAL
UNIVERSITY

Term Paper on
Security Issues In Cloud

Submitted to- Submitted by-


Ankita Sharma Aman Chaudhary
(Assistant Professor) K17UG(11714187)
Roll no.47
A term paper on Security Issues in Cloud

Ankita Sharma, Aman Chaudhary(K17UG,11714187)


Assistant Professor, Department of Computer Science UG Student, Department of Computer Science and
and Engineering, Lovely Professional University Engineering, Lovely Professional University Phagwara
Phagwara Punjab India Punjab India, ac91986@gmail.com.

Abstract
Cloud services comes as an option of relief in time of age release resources for other uses when they are no
where data is our gold and data storage is becoming more longer required.
and more expensive for organizations and companies.
Although these organizations are easily adapting to the • Pay as you go: Users pay for only the re-
cloud services but they still fear to store their sensitive sources they actually use and for only the time
data over the cloud, there are many reasons for that and they require them.
Cloud Security is one of them. What type of security
issues companies are worried about? This paper will • Self-provisioning of resources: Users self-
discuss different security issues and their possible provision resources, such as additional systems
mitigation. The study is carried out to on a variety of (processing capability, software & storage) and
research paper based on cloud security risks and network resources (Mather et al., 2009).
challenges to list some major threats to cloud security. So
this paper can be helpful for those who want to acquire There is a buzz around cloud computing, as users
knowledge about various cloud security challenges and of the cloud services only have to pay for what they
issue.
use and the resources that they need to cope with
demanding situations can be adjusted depending on
the demand (Hamilton, 2008; Hosangar et al., 2008).
The Cloud This is recognized as the cloud delivery model (SPI)
which consists of three services known as Software-
as-a-service (SaaS), Platform-as-a-service (PaaS) and
Cloud computing has five key attributes which grant Infrastructure-as-a-service (IaaS).
it some advantages over similar technologies and
these attributes include: Software-as-a-service allows the users to utilize
• Multitenancy (shared resources): Unlike various applications from the cloud rather than using
previous computing models, which assumed applications on their own computer (Krebs, 2008).
dedicated resources dedicated to a single user or The cloud service provider would usually provide
owner, cloud computing is based on a business some sort of software development environment to
model in which resources are shared at the network, allow applications to be developed for use within the
host and application level. cloud. The application programming interface (API)
• Massive scalability: Cloud computing provides which the users use to access and interact with the
the ability to scale to tens of thousands of systems, software allows the user to use the software without
as well as the ability to massively scale bandwidth having to worry about how or where the data is being
and storage space. stored or how much disk space is available as the
• Elasticity: Users can rapidly increase and de-crease cloud service provider will manage this for them.
their computing resources as needed, as well as
Platform-as-a-service operates at a lower level than infrastructure to run the cloud and also have to
the SaaS. It is responsible for the management of the manage the cloud themselves.
storage space, bandwidth allocation and computing
resources available for the ap-plications. It retrieves • Hybrid Clouds: It is the combination of both
the resources needed to run the software and public and private cloud as it provides the
dynamically scales up these resources when more is services of both private and public to the
needed. This service holds a key attribute of the cloud customer or organization. Depending upon the
data the customer can store it in private cloud if
mentioned above as self-provisioning of resources.
the data is sensitive and can store it on the
Infrastructure-as-a-service dynamically scales public cloud if the organization wants that all
bandwidth allocation and server resources for the the members can access the data.
cloud. This service allows the cloud to operate during
high traffic/ demanding situations as resources are
dynamically increased as they are needed. The pay as Security Issues in Cloud
you go attribute plays a large role in this service as the
user is charged for how much bandwidth or server Arun Krishna Chitturi and Purushotham Swarnalatha [8]
resources are needed. did a good work of identifying and categorizing security
issues into three major levels, that are Communication
Level, Computational Level and SLA Level Challenges.
They have Sub-Categorizes Network, Application, Host,
Virtualization, Data level risks in these three parent
categories covering almost every type of security issue.
Walker [5] has provided with 12 major risks which
concern cloud security, some of them are data breaches,
broken authentication, Hacked interface and Application
Program Interfaces, exploited system vulnerabilities,
account hijacking, malicious insiders.

There are three main types of cloud deployment


Network Level Security Challenges
models - public, private and hybrid clouds.

• Public Clouds: These are the most common Network Level security Challenges and issues are those
type of cloud. This is where multiple customers which pose risk to the secretiveness and integrity of the
can access web applications and services over data. Following are some the issues which come in this
the internet. Each individual customer has their category:
own resources which are dynamically
provisioned by a third-party vendor. This third- 1. Domain Name Server Attacks- Domain hijacking,
party vendor hosts the cloud for multiple Domain phishing, Typo-squatting are some of the type of
customers from multiple data centers, manages DNS attacks. These attacks are meant to steal data and
all the security, and provides the hardware and bring down websites.
infrastructure for the cloud to operate. The 2. Prefix Hijacking in Border Gateway Protocol- In
customer has no control or insight into how the BGP hijacking the attackers take control of IP prefix and
cloud is man-aged or what infrastructure is reroute the traffic.
available. 3. Sniffer Attacks- In sniffer attacks, attackers try to
steal or intercept the data packets by hijacking the
• Private Clouds: Emulate the concept of cloud
network using some sniffing applications.
computing on a private network. They allow
4. Issue of Reused IP Addressing- In this type of
users to have the benefits of cloud computing
attacks, attackers spoof the IP address of source and
without some of the pit-falls. Private clouds
make impossible for the process of 3-way handshaking to
grant complete control over how data is
happen.
managed and what security measures are in
place. This can lead to users having more
confidence and control. The major issue with
this deployment model is that the users have
large expenditures as they have to buy the
Application Level Security Challenges Concerns in virtualization

Applications need security to minimize the possibility The main type of virtualization are server, desktop,
attacks because attackers try to take control over them to network, application and machine. Laniepce [9] has
manipulate their formats, following are some of the provided the layers of virtualization as three layers, first
issues in Application layer: one physical layer having all the hardware infrastructure,
second virtualization layer having hypervisor/ V.M.M,
1. Cookie Poisoning- In this type of attacks cookies are and lastly virtual layer having all the guest OS and
manipulated or forged to bypass the security. privileged applications.
2. DDOS Attack- In this attack, attacker attempt to
utilize the resources of target by flooding it with internet 1. Virtual-layer security risks- VM undergo their own
traffic. life cycles of different conditions such as creation,
3. Dictionary Attack- This attack targets passphrase or power-off, prolong, destroyed, resumed, pending,
passwords by brute force technique. running, suspended, shut-down, etc [1].
4. Hidden Field Manipulation Attack- Attackers target following are some of the VM security risks:
the hidden field values of the forms to change post
requests to server. • VM Cloning- Creating a copy of existing
5. CAPTCHA breaking- Attackers try to bypass the (parent) VM by copying parent's ID, MAC
captcha. address, Computer name, Internet Protocol (IP)
address is known as cloning. Now, if both the
parent and the child Vm’s uses the same
Security Issues in Host Level network and there occurs a duplication of
Internet Protocol address then it causes security
Host level Issues are related to operating system on concerns.
which applications runs. Following are some of the • VM Migration- For better load balancing and
issues- energy saving VM's resources can be migrated
for one server to another server. The migration
1. Viruses, Trojan horses, and worms- These are process may lead to security risks for migrated
computer programs that harm, modify or steal the target's VM as well as new hosting machine.
data. • VM Isolation- The VM's are isolated from one
2. Foot-printing- In these attackers gather as much another for ensuring safety and security. But
information about the target that it become easy to hack. whenever there comes a case of multiple use of
3. Password Cracking- It is the process of discovering same IP address then the isolation among VM's
the password of a system. break, and this can lead in to serious security
4. Profiling- It is the technique to create profiles of target risks.
to analyze its behavior and pattern for malicious • VM rollback- In the scenario where a VM is
practices. rolled back when it was affected by viruses or
5. Unauthorized Access- It is the practice of gaining malware, it can re-surface the security
access to the system after bypassing the security vulnerabilities. Sabahi[5] told a secure way to
measures. protect memory snapshots by using hashing and
per-page encryption technique. If the VM
rollback is not done in secure manner then it can
lead to harmful viruses.
• VM Escape- Since VM runs in an isolated
environment so that no direct interaction with
Computational Level Security the hypervisor is done. But the attackers run
Challenges some code on the VM and make it interact
directly with the host operating system. This
type of attack can give access to the all other
The computational level security concerns are securely VMs as well as the host operating system.
and suitably implementing the virtualization. • VM Sprawl- It is the situation where VMs are
created and deployed without any control, which
lead to VM's multiplication over time and most
of them are inactive, wasting only host's
resources [10]. Therefore, to maintain the
effective and efficient management of host's
resources, VM sprawl need to be controlled.
Data Level Security Risks
• VM Poaching- When VM started to take more
resources than it is allocated to then it can starve Data is the main entity of the cloud and as per the Cloud
other VM running on the same hypervisor. This Security Alliance breaches are done mostly for data.
can lead to abnormal behavior of the entire Subramanian [1] have classified the data security as data-
system. in-transit and data-in-rest. Data-in-rest pose additional
• VM Hyper jumps/VM hopping- It is an type security risk than data-in-transit because for attackers it is
of attack where attackers access from one VM to more attractive, also data is transferred in secured way
another by exploiting vulnerabilities of using SSL and TLS. Another issue arises about security
hypervisor. This type attack can give access to and privacy of data is because now organizations hire
other VM’s and host system also. third party to manage and secure their data which store
data in remote places [5]. Chen [11] stated that there
seven stages in the life cycle of data, Generation, transfer,
Use, Share, Storage, Archival, Destruction and all of
these life stages need security.
Following are some of the Data level security challenges:
• Data Leakage- Sabahi [5] has stated that when
data is moving from single-tenant to multi-
Virtualization (Hypervisor) tenant then data leakage occurs. Ashish Singh
Layer Security Challenges [7] has stated that deletion, alteration and theft
of data, encryption key are some reasons of data
loss and leakage.
Hypervisors provide virtual-layer environment to run • Data Integrity- Data Integrity can be defined as
multiple VMs (operating systems) along each other. The the access and modification of data by
most common virtualization s are full-virtualization, authorized persons only. Some of the breach of
para-virtualization and hardware assisted virtualization. data integrity are lack of authentication,
Qin [6] stated that hypervisors are used to monitor the authorization and access control, weak
different stages of life processes of the VMs. Sabahi [5] encryption keys [ 7]. Ashish has told to use
has indicated that hypervisor generally suffer from Service Oriented Architecture (SOA) approach
single-reason-of-failure. Nalini [1] has provided a list of to solve the data Integrity issues.
the Security concerns of hypervisor layer: • Data Recovery- Data recovery can be defined
• Basic Information Security (authentication, as the process of accessing the corrupted or
authorization and integrity). deleted data form the storage. Subramanian [1]
• Virtual Machine to Virtual Machine attack. has stated four phases of the data recovery
• Risks in Virtual networking. which are repairing the hard drive disc, imaging
• Virtualized trusted computing. the drive to new drive, logical recovery of files,
• Hyper-jacking. partition and then repairing the retrieved
• Issues due to resource sharing. damaged files.
• VM Introspection. • Data Isolation- Isolation is very important
• Hypervisor Integrity protection and isolation of criteria and factor for the security of cloud
architecture, therefore there should be isolation
VM's.
between sensitive data and non-sensitive data so
that in case of breach important data can be
saved. Isolation is also important among the
Hardware Level Security VMs so that virtual machine to virtual machine
challenges attacks can be prevented. Data can be isolated
using access control and encryption technique
[ Subramanian]. According to Ashish [7], multi-
The physical layer consists of components like Central tenant technology can be used for data isolation
Processing Unit (CPU), storage, memory and because each tenant manages their features
networking, etc., which are distributed among VMs by individually.
the virtualization layer over the cloud. Since, the VMs • Data Location- When organizations use cloud
are isolated to work in a protected manner but if attackers for storage services, they want to ensure the
exploit the vulnerabilities of Virtual-layer and try to take location of the data because unknown location
control of mandatory access control and discretionary of data storage leads to security issues. That is
access control. why now organizations now hesitate to put their
data in untrusted cloud service providers. Sabahi
[5] raises a point that unknown location of data
can cause lack of control for the customers who
References
just have moved to cloud.
• Data Segregation- Data in cloud stored in 1. Subramanian, N., Jeyaraj, A.: Recent security
shared environment, with the data of different challenges in cloud computing. Comput. Electr.
users and systems, therefore it is very important Eng. 71, 28–42 (2018).
to keep data segregated. Data segregation can be
achieved using highly secure protocols and 2. Walker, K.: Cloud security alliance announces
encryptions. According to Subramanian [1], software defined perimeter (sdp) initiative
SQL injection imperfection, data validation and (online) (2013).
insecure storage are some of the reasons of data https://cloudsecurityalliance.org/media/news/csa-
segregation vulnerabilities. announcessoftwaredefined-
• DATA Lock-in- Data lock-in can be explained perimeter-sdp-initiative/. Accessed October, 2014.
as the inability to move the data from one cloud
vendor to another. If the data is breached and 3. Shirlei Aparecida de Chaves, Carlos Becker Westphall
customer is in lock-in period with the cloud and Flavio Rodrigo Lamin,:SLA Perspective in Security
provider, then he cannot move his data to Management for Cloud Computing (2010).
another provider. Lock-in also a great obstacle
in cloud interoperability and portability. 4. Hoehl M. Security SLA for cloud proposal for
standard cloud computing security SLAs – key metrics
for safeguarding confidential data in the cloud. SANS
Service Level Agreement (SLA) institute 2015https://www.sans.org/reading-
room/whitepapers/cloud/proposal-standard-cloud-
computing-security-slas-key-metrics-safeguarding-
Many organizations are moving from traditional servers
confidentialdat-
to the cloud to store their data. And it is very good for
35872.
them because there many advantages of this such as
lower cost of entry, lower maintenance, better availability
and access from all over the globe [4]. Also, there are 5. Sabahi F. Secure virtualization for cloud environment
high standard and SLA present in cloud availability that using hypervisor-based technology. Int J Mach
service providers offer. But when it comes to security,
6. Qin Z, Zhang Q, Wan C, Di Y. State-of-the-art
confidentiality and integrity the same amount of SLA
goodness (Sec-SLA) [3] and standard cannot be found. virtualization security in cloud computing. J Inf Comput
SLAs are used to provide Quality of service to an Sci 2012;9(6):1487–97http://www.joics.com.
acceptable level, also it is important for service provider
to include security in its services for effective transfer of 7. Ashish Singh and Kakali Chatterjee, Cloud security
issues and challenges: a survey, Journal of
responsibility. As per Subramanian [1], some standard are
there who provide security though Sec-SLAs, which are
SPECS (Secure Provisioning of Cloud Services) and 8. Chitturi A.K., Swarnalatha P. (2020) Exploration of
ENISA (European Network and Information Security Various Cloud Security Challenges and Threats. In: Das
Agency). K., Bansal J., Deep K., Nagar A., Pathipooranam P.,
Naidu R. (eds) Soft Computing for Problem Solving.
Advances in Intelligent Systems and Computing, vol
Conclusion 1057. Springer, Singapore.

9. Laniepce S, Lacoste M, Kassi-Lahlou M, Bignon F,


This paper has discussed many security challenges faced Lazri K, Wailly A. Engineering intrusion prevention
within communication, computation and Service Level services for iaas clouds: the way of the hypervisor, 2013
Agreement. Also, the issues which concern virtualization IEEE seventh international symposium on service-
layer, hardware, data is explored. Today, there are various oriented system engineering.
security challenges which provide several chances for
hackers to exploit, that is why cloud computing is seems 10. Bose,R., Sarddar, D.:Asecure hypervisor-based
incomplete in case of cloud security. This paper tried to technology create a secure cloud environment.
explore some root risks for the cloud security, but as a Int. J. Emerg. Res. Manage. Technol. ISSN (2014): 2278-
new day brings a new technology to this field, therefore 9359.
there is a need of constant search of vulnerabilities and
the ways to mitigate them. This paper can be used as 11. Chen D, Zhao H. Data security and privacy protection
mean of further research of unexplored paths to issues in cloud computing, International conference on
strengthen cloud security. computer science and electronics engineering 2012.

S-ar putea să vă placă și