Upload
vivek-maurya
View
427
Download
1
Tags:
Embed Size (px)
Citation preview
Cloud Computing Security Issues in Infrastructure as a Service
CHAPTER 1
Introduction of Cloud Computing
According to Gartner’s Hype Cycle Special Report for 2009, “technologies at the ‘Peak of
Inflated Expectations’ during 2009 include cloud computing, e-books and Internet TV, while
social software and micro blogging site have tipped over the peak and will soon experience
disillusionment among enterprise users”. Is cloud computing also heading for the trough of
disillusionment?
The Internet is often represented as a cloud and the term “cloud computing” arises
from that analogy. Accenture defines cloud computing as the dynamic provisioning of IT
capabilities (hardware, software, or services) from third parties over a network. McKinsey
says that clouds are hardware-based services offering compute, network and storage capacity
where: hardware management is highly abstracted from the buyer; buyers incur infrastructure
costs as variable OPEX [operating expenditures]; and infrastructure capacity is highly elastic
(up or down).
Large companies can afford to build and expand their own data centers but small- to
medium-sized enterprises often choose to house their IT infrastructure in someone else’s
facility. A collocation center is a type of data center where multiple customers locate
network, server and storage assets, and interconnect to a variety of telecommunications and
other network service providers with a minimum of cost and complexity.
Software, Platform, and Infrastructure as a Service are the three main service delivery
models for Cloud Computing. Those models are accessible as a service over the Internet. The
Cloud services are made available as pay-as-you-go where users pay only for the resources
they actually use for a specific time, unlike traditional services, e.g., web hosting.
Furthermore, The pricing for cloud services generally varies according to QoS requirements.
The cloud deployment models, based on their relationship to the enterprise, are
classified to private, public, and hybrid. Public Cloud services are sold as Utility Computing,
while private Cloud refers to internal datacenters of an enterprise which are not available to
1 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
the general public. Examples of emerging Cloud Computing Platforms include Microsoft
Azure1, Amazon EC22, and Google App Engine3. The confusion between Cloud and
Service Oriented Architecture (SOA) has prompted us to discuss this issue and offer a brief
comparison between them. SOA and Cloud Computing can be considered complementary
services sharing common characteristics. Hence, if SOA is a set of principles and
methodologies designed to facilitate systems integration and communication regardless of
development languages and platforms, Cloud Computing, on the other hand, is designed to
enable companies to utilize massive capacities instantly without having to invest into new
infrastructure, train new staff, or license new software.
Cloud Computing allows small and medium-sized businesses to completely outsource
their datacenter infrastructure, as well as large companies that need huge load capacities
without building larger expensive datacenters internally. Cloud Computing employs the
virtualization technology to offer a secure, scalable, shared, and manageable environment. In
short, regardless of the difference in designing purposes and the dependency of Cloud
Computing on virtualization technology, Cloud Computing might intersect with SOA in
Components as a Service, e.g., SOA via Web Service standards. Therefore, Cloud
Computing and SOA can be pursued independently, or concurrently as complementary
activities to provide an outstanding business.
Cloud Computing depends primarily on IaaS layer to provide cheap and pay-as-you-
go processing power, data storage, and other shared resources. This paper presents a detailed
and precise study of IaaS security and privacy concerns. We have investigated security for
each IaaS component: Service Level Agreement (SLA), Utility Computing (UC), Platform
Virtualization, Networks & Internet Connectivity, and Computer Hardware. Furthermore,
Cloud software’s security that impact on IaaS and on the whole Cloud Computing is
presented. We are interested in the IaaS delivery model because it is the foundation of all
other delivery models, and a lack of security in this layer affects the other delivery models
that are built upon IaaS layer.
2 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
CHAPTER-2
Cloud Computing
As we said previously, the term the cloud is often used as a metaphor for the Internet and has
become a familiar cliché. However, when “the cloud” is combined with “computing,” it
causes a lot of confusion. To define the term using a very broad sense, they contend that
anything beyond the firewall perimeter is in the cloud. A more tempered view of cloud
computing considers it the delivery of computational resources from a location other than the
one from which you are computing.
Cloud computing is about moving services, computation and/or data—for cost and
business advantage—off-site to an internal or external, location-transparent, centralized
facility or contractor. By making data available in the cloud, it can be more easily and
ubiquitously accessed, often at much lower cost, increasing its value by enabling
opportunities for enhanced collaboration, integration, and analysis on a shared common
platform.
Cloud computing models that encompass a subscription-based or pay-per-use
paradigm provide a service that can be used over the Internet and extends an IT shop’s
existing capabilities. Many users have found that this approach provides a return on
investment that IT managers are more than willing to accept.
Figure 2.1:- Cloud Computing.
3 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
2.1 Cloud Architecture
In Cloud architecture, the systems architecture(A system architecture or systems architecture
is the conceptual model that defines the structure, behavior, and more views of a system. An
architecture description is a formal description and representation of a system) of the
software systems(The term software system is often used as a synonym of computer program
or software.) involved in the delivery of cloud computing, typically involves multiple cloud
components communicating with each other over application programming interfaces,
usually web services. This resembles the Unix philosophy of having multiple programs each
doing one thing well and working together over universal interfaces. Complexity is
controlled and the resulting systems are more manageable than their monolithic counterparts.
Figure 2.2:- Cloud Architecture.
4 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
2.2 Cloud Components
Figure 2.3:- Cloud Component
A cloud computing solution is made up of several elements: clients, the data centre, and
distributed servers. As shown in Above Figure, these components make up the three parts of
a cloud computing solution.
Each element has a purpose and plays a specific role in delivering a functional cloud-
based application, so let’s take a closer look.
2.2.1 Clients
Clients are, in a cloud computing architecture, the exact same things that they are in a local
area network (LAN). They are, typically, the computers that just sit on your desk. But they
might also be laptops, tablet computers, mobile phones, or PDAs (Personal digital assistant
or Palmtop Computer)—all big drivers for cloud computing because of their mobility.
Anyway, clients are the devices that the end users interact with to manage their information
on the cloud. Clients generally fall into three categories:
5 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
• Mobile -Mobile devices include PDAs or Smartphone’s, like a Blackberry, Windows
Mobile Smartphone or an iPhone.
• Thin -Clients are computers that do not have internal hard drives, but rather let the servers
do all the work, but then display the information.
• Thick -This type of client is a regular computer, using a web browser like Firefox or
Internet Explorer to connect to the cloud.
Thin clients are becoming an increasingly popular solution, because of their price and effect
on the environment. Some benefits to using thin clients include
• Lower hardware costs -Thin clients are cheaper than thick clients because they do not
contain as much hardware. They also last longer before they need to be upgraded or become
obsolete.
• Lower IT costs -Thin clients are managed at the server and there are fewer points of failure.
• Security -Since the processing takes place on the server and there is no hard drive, there’s
less chance of malware invading the device. Also, since thin clients don’t work without a
server, there’s less chance of them being physically stolen.
• Data security -Since data is stored on the server, there’s less chance for data to be lost if the
client computer crashes or is stolen.
2.2.2 Datacenter
The datacenter is the collection of servers where the application to which you subscribe is
housed. It could be a large room in the basement of your building or a room full of servers on
the other side of the world that you access via the Internet.
A growing trend in the IT world is vitalizing servers. That is, software can be
installed allowing multiple instances of virtual servers to be used. In this way, you can have
half a dozen virtual servers running on one physical server.
The number of virtual servers that can exist on a physical server depends on the size
and speed of the physical server and what applications will be running on the virtual server.
6 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
2.2.3 Distributed Servers
In Distributed Servers, the servers don’t all have to be housed in the same location. Often, servers
are in geographically disparate locations. But to you, the cloud subscriber, these servers act as if
they’re humming away right next to each other.
This gives the service provider more flexibility in options and security. For instance, Amazon
has their cloud solution in servers all over the world. If something were to happen at one site,
causing a failure, the service would still be accessed through another site. Also, if the cloud
needs more hardware, they need not throw more servers in the safe room—they can add them
at another site and simply make it part of the cloud.
7 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
CHAPTER - 3
Cloud Computing Deployment models
Cloud computing architects provides three basic service models
i. Public cloud
ii. Private cloud
iii. Hybrid cloud
IT organizations can choose to deploy applications on public, private, or hybrid
clouds, each of which has its trade-offs. The terms public, private, and hybrid do not dictate
location. While public clouds are typically “out there” on the Internet and private clouds are
typically located on premises, a private cloud might be hosted at a Collocation (share or
designate to share the same place) facility as well.
A number of considerations with regard to which cloud computing model they choose
to employ, and they might use more than one model to solve different problems. An
application needed on a temporary basis might be best suited for deployment in a public
cloud because it helps to avoid the need to purchase additional equipment to solve a
temporary need. Likewise, a permanent application, or one that has specific requirements on
quality of service or location of data, might best be deployed in a private or hybrid cloud.
3.1 Public clouds
Public clouds are run by third parties, and applications from different customers are likely to
be mixed together on the cloud’s servers, storage systems, and networks. Public clouds are
most often hosted away from customer premises, and they provide a way to reduce
111customer risk and cost by providing a flexible, even temporary extension to enterprise
infrastructure.
If a public cloud is implemented with performance, security, and data locality in
mind, the existence of other applications running in the cloud should be transparent to both
cloud architects and end users.
Portions of a public cloud can be carved out for the exclusive use of a single client,
creating a virtual private datacenter. Rather than being limited to deploying virtual machine
8 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
images in a public cloud, a virtual private datacenter gives customers greater visibility into its
infrastructure. Now customers can manipulate not just virtual machine images, but also
servers, storage systems, network devices, and network topology.
3.2 Private clouds
Private clouds are built for the exclusive use of one client, providing the utmost control over
data, security, and quality of service . The company owns the infrastructure and has control
over how applications are deployed on it. Private clouds may be deployed in an enterprise
datacenter, and they also may be deployed
at a collocation facility.
Private clouds can be built and managed by a company’s own IT organization or by a
cloud provider. In this “hosted private” model, a company such as Sun can install, configure,
and operate the infrastructure to support a private cloud within a company’s enterprise
datacenter. This model gives companies a high level of control over the use of cloud
resources while bringing in the expertise needed to establish and operate the environment.
3.3 Hybrid clouds
Hybrid clouds combine both public and private cloud models. They can help to provide on-
demand, externally provisioned scale. The ability to augment a private cloud with the
resources of a public cloud can be used to maintain service levels in the face of rapid
workload fluctuations. This is most often seen with the use of storage clouds to support Web
2.0 applications. A hybrid cloud also can be used to handle planned workload spikes.
Sometimes called “surge computing,” a public cloud can be used to perform periodic tasks
that can be deployed easily on a public cloud.
Hybrid clouds introduce the complexity of determining how to distribute applications
across both a public and private cloud. Among the issues that need to be considered is the
relationship between data and processing resources. If the data is small, or the application is
stateless, a hybrid cloud can be much more successful than if large amounts of data must be
transferred into a public cloud for a small amount of processing.
9 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
CHAPTER- 4
Cloud computing Service Model
In practice, cloud service providers tend to offer services that can be grouped into three
categories: software as a service, platform as a service, and infrastructure as a service. These
categories group together the various layers with some overlap.
Table 4.1: - Cloud Computing Service Model
4.1 Software as a service (SaaS)
Software as a service features a complete application offered as a service on demand. A
single instance of the software runs on the cloud and services multiple end users or client
organizations.
10 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
The most widely known example of SaaS is salesforce.com, though many other
examples have come to market, including the Google Apps offering of basic business
services including email and word processing.
Although salesforce.com preceded the definition of cloud computing by a few years,
it now operates by leveraging its companion force.com, which can be defined as a platform
as a service.
4.2 Platform as a service (PaaS)
Platform as a service encapsulates a layer of software and provides it as a service that can be
used to build higher-level services. There are at least two perspectives on PaaS depending on
the perspective of the producer or consumer of the services:
• Someone producing PaaS might produce a platform by integrating an OS, middleware,
application software, and even a development environment that is then provided to a
customer as a service. For example, someone developing a PaaS offering might base it on a
set of Sun™ x VM hypervisor virtual machines that include a Net Beans™ integrated
development environment, a Sun Glass Fish™ Web stack and support for additional
programming languages such as Perl or Ruby.
• Someone using PaaS would see an encapsulated service that is presented to them through
an API. The customer interacts with the platform through the API, and the platform does
what is necessary to manage and scale itself to provide a given level of service. Virtual
appliances can be classified as instances of PaaS. A content switch appliance, for example,
would have all of its component software hidden from the customer, and only an API or GUI
for configuring and deploying the service provided to them.
PaaS offerings can provide for every phase of software development and testing, or they can
be specialized around a particular area such as content management.
Commercial examples of PaaS include the Google Apps Engine, which serves
applications on Google’s infrastructure. PaaS services such as these can provide a powerful
basis on which to deploy applications, however they may be constrained by the capabilities
that the cloud provider chooses to deliver.
11 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
4.3 Infrastructure as a service (IaaS)
Infrastructure as a service delivers basic storage and compute capabilities as standardized
services over the network. Servers, storage systems, switches, routers, and other systems are
pooled and made available to handle workloads that range from application components to
high-performance computing applications. Commercial examples of IaaS include Joyent,
whose main product is a line of virtualized servers that provide a highly available on-
demand infrastructure.
4.4 Anything-as-a-Service (XaaS)
Which is also a subset of cloud computing? XaaS broadly encompasses a process of
activating reusable software components over the network. The most common and
successful example is Software-as-a-Service. The growth of “as-a-service” offerings has
been facilitated by extremely low barriers to entry (they are often accessible for free or
available as recurring charges on a personal credit card). As a result, such offerings have
been adopted by consumers and small businesses well before pushing into the enterprise
space. All “as-a-service” offerings share a number of common attributes, including little or
no capital expenditure since the required infrastructure is owned by the service provider,
massive scalability, multi tenancy, and device and location independence allowing
consumers remote access to systems using nearly any current available technology.
On the surface, it appears that XaaS is a potentially game-changing technology that
could reshape IT. However, most CIOs still depend on internal infrastructures because they
are not convinced that cloud computing is ready for prime time. Many contend that if you
want real reliability, you must write more reliable applications. Regardless of one’s view on
the readiness of cloud computing to meet corporate IT requirements, it cannot be ignored.
The concept of pay-as-you-go applications, development platforms, processing power,
storage, or any other cloud-enabled services has emerged and can be expected to reshape IT
over the next decade.
4.5 Virtualization and Private Clouds
Virtualization of computers or operating systems hides the physical characteristics of a
computing platform from users; instead it shows another abstract computing platform. A
12 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
hypervisor is a piece of virtualization software that allows multiple operating systems to run
on a host computer concurrently. Virtualization providers include VMware, Microsoft, and
Citrix Systems. Virtualization is an enabler of cloud computing.
Recently some vendors have described solutions that emulate cloud computing on private
networks, referring to these as “private” or “internal” clouds (where “public” or “external” cloud
describes cloud computing in the traditional mainstream sense). Private cloud products claim to
deliver some of the benefits of cloud computing without the pitfalls. Hybrid solutions are also
possible: building internal clouds and connecting customer data centers to those of external cloud
providers. It has been reported that Eli Lilly wants to benefit from both internal and external
clouds3 and that Amylin6 is looking at private cloud VMware as a complement to EC2. Other
experts, however, are skeptical: one has even gone as far as to describe private clouds as absolute
rubbish.7 Platform Computing has recently launched a cloud management system, Platform ISF,
enabling customers to manage workload across both virtual and physical environments and
support multiple hypervisors and operating systems from a single interface. VMware, the market
leader in virtualization technology, is moving into cloud technologies in a big way, with vSphere
4. The company is building a huge partner network of service providers and is also releasing a
“vCloud API”. VMware wants customers to build a series of “virtual data centers”, each
tailored to meet different requirements, and then have the ability to move workloads in the
virtual data centers to the infrastructure provided by cloud vendors.
Cisco, EMC and VMware have formed a new venture called Acadia. Its strategy for
private cloud computing is based on Cisco’s servers and networking, VMware’s server
virtualization and EMC’s storage. (Note, by the way, that EMC owns nearly 85% of
VMware.) Other vendors, such as Google, disagree with VMware’s emphasis on private
clouds; in return VMware says Google’s online applications are not ready for the enterprise.
13 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
CHAPTER - 5
Cloud Security Alliance (CSA) Model
Understanding the relationships and dependencies between Cloud Computing models is
critical to understanding Cloud Computing security risks.
IaaS is the foundation of all cloud services, with PaaS building upon IaaS, and SaaS
in turn building upon PaaS as described in the Cloud Reference Model diagram. In this way,
just as capabilities are inherited, so are information security issues and risk. It is important to
note that commercial cloud providers may not neatly fit into the layered service models.
Nevertheless, the reference model is important for relating real-world services to an
architectural framework and understanding the resources and services requiring security
analysis. IaaS includes the entire infrastructure resource stack from the facilities to the
hardware platforms that reside in them. It incorporates the capability to abstract resources (or
not), as well as deliver physical and logical connectivity to those resources. Ultimately, IaaS
provides a set of APIs which allow management and other forms of interaction with the
infrastructure by consumers.
5.1 Key points to CSA model:
i. IaaS is the most basic level of service with PaaS and SaaS next two above levels of
service.
ii. Moving upwards each of the service inherits capabilities and security concerns of the
model beneath.
iii. IaaS provides the infrastructure, PaaS provides platform development environment
and SaaS provides operating environment.
iv. IaaS has the least level of integrated functionalities and integrated security while SaaS
has the most.
v. This model describes the security boundaries at which cloud service provider's
responsibility ends and the consumer's responsibilities begin.
14 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
vi. Any security mechanism below the security boundary must be built into the system
and above should be maintained by the consumer.
Figure 5.1:- Cloud Computing Cloud Security Alliance (CSA) Model
15 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
CHAPTER- 6
Cloud Computing Security Issues
In order to ensure that data is secure (that it cannot be accessed by unauthorized users or
simply lost) and that data privacy is maintained, cloud providers attend to the following areas
in Security and Privacy issues.
Figure 6.1: - Security Architecture Design
A security architecture framework should be established with consideration of
processes (enterprise authentication and authorization, access control, confidentiality,
integrity, no repudiation, security management, etc.), operational procedures, technology
16 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
specifications, people and organizational management, and security program compliance and
reporting. A security architecture document should be developed that defines security and
privacy principles to meet business objectives. Documentation is required for management
controls and metrics specific to asset classification and control, physical security, system
access controls, network and computer management, application development and
maintenance, business continuity, and compliance. A design and implementation program
should also be integrated with the formal system development life cycle to include a business
case, requirements definition, design, and implementation plans. Technology and design
methods should be included, as well as the security processes necessary to provide the
following services across all technology layers:
i. Authentication
ii. Authorization
iii. Availability
iv. Confidentiality
v. Integrity
vi. Accountability
vii. Privacy
The creation of a secure architecture provides the engineers, data center operations
personnel, and network operations personnel a common blueprint to design, build, and test
the security of the applications and systems.
Design reviews of new changes can be better assessed against this architecture to assure
that they conform to the principles described in the architecture, allowing for more consistent
and effective design reviews.
17 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
CHAPTER- 7
Deployment Model in Cloud Computing
7.1 Public Cloud
The deployment of a public cloud computing system is characterized on the one hand by the
public availability of the cloud service offering and on the other hand by the public network
that is used to communicate with the cloud service. The cloud services and cloud resources
are procured from very large resource pools that are shared by all end users. These IT
factories, which tend to be specifically built for running cloud computing systems, provision
the resources precisely according to required quantities. By optimizing operation, support,
and maintenance, the cloud provider can achieve significant economies of scale, leading to
low prices for cloud resources. In addition, public cloud portfolios employ techniques for
resource optimization; however, these are transparent for end users and represent a potential
threat to the security of the system. If a cloud provider runs several datacenters, for instance,
resources can be assigned in such a way that the load is uniformly distributed between all
centers.
Figure 7.1 : Three users accessing a public cloud
18 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
Some of the best-known examples of public cloud systems are Amazon Web Services
(AWS) containing the Elastic Compute Cloud (EC2) and the Simple Storage Service (S3)
which form an IaaS cloud offering and the Google App Engine with provides a PaaS to its
customers. The customer relationship management (CRM) solution Salesforce.com is the
best-known example in the area of SaaS cloud offerings.
7.2 Private CloudPrivate cloud computing systems emulate public cloud service offerings within an
organization’s boundaries to make services accessible for one designated organization.
Private cloud computing systems make use of virtualization solutions and focus on
consolidating distributed IT services often within data centers belonging to the company. The
chief advantage of these systems is that the enterprise retains full control over corporate data,
security guidelines, and system performance. In contrast, private cloud offerings are usually
not as large-scale as public cloud offerings resulting in worse economies of scale.
Figure 7.2: A user accessing a private cloud
7.3 Hybrid CloudA hybrid cloud service deployment model implements the required processes by combining
the cloud services of different cloud computing systems, e.g. private and public cloud
19 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
services. The hybrid model is also suitable for enterprises in which the transition to full
outsourcing has already been completed, for instance, to combine community cloud services
with public cloud services.
Figure 7.3: Hybrid cloud usage
7.4 Community CloudIn a community cloud, organizations with similar requirements share a cloud infrastructure. It
may be understood as a generalization of a private cloud, a private cloud being an
infrastructure which is only accessible by one certain organization.
Figure 7.4: Three users accessing a community cloud
20 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
CHAPTER- 8
SECURITY CONTROL
Although the term Cloud Computing is widely used, it is important to note that all Cloud
Models are not the same. As such, it is critical that organizations don't apply a broad brush
one-size fits all approach to security across all models. Cloud Models can be segmented into
Software as a Service (Saas), Platform as a service (PaaS) and Integration as a Service (IaaS).
When an organization is considering Cloud security it should consider both the differences
and similarities between these three segments of Cloud Models:
8.1 SaaS
This particular model is focused on managing access to applications. For example, policy
controls may dictate that a sales person can only download particular information from sales
CRM applications. For example, they are only permitted to download certain leads, within
certain geographies or during local office working hours. In effect, the security officer needs
to focus on establishing controls regarding users' access to applications.
Figure 8.1:- Cloud Service Model
21 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
8.2 PaaS
The primary focus of this model is on protecting data. This is especially important in the case
of storage as a service. An important element to consider within PaaS is the ability to plan
against the possibility of an outage from a Cloud provider. The security operation needs to
consider providing for the ability to load balance across providers to ensure fail over of
services in the event of an outage. Another key consideration should be the ability to encrypt
the data whilst stored on a third-party platform and to be aware of the regulatory issues that
may apply to data availability in different geographies.
8.3 IaaS
Within this model the focus is on managing virtual machines. The CSOs priority is to overlay
a governance framework to enable the organization to put controls in place regarding how
virtual machines are created and spun down thus avoiding uncontrolled access and potential
costly wastage.
22 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
CHAPTER - 9
THREATS AND SOLUTIONS SUMMARY FOR IAAS
Table 9.1: Threats and solutions summary for IaaS
A Security Model for IaaS (SMI) as a guide for assessing and enhancing security in each
layer of IaaS delivery model . SMI model consists of three sides: IaaS components, security
model, and the restriction level. The front side of the cubic model is the components of IaaS
which were discussed thoroughly in the previous sections. The security model side includes
three vertical entities where each entity covers the entire IaaS components. The first entity is
23 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
Secure Configuration Policy (SCP) to guarantee a secure configuration for each layer in IaaS
Hardware, Software, or SLA configurations; usually, miss-configuration incidents could
jeopardize the entire security of the system. The second is a Secure Resources Management
Policy (SRMP) that controls the management roles and privileges. The last entity is the
Security Policy Monitoring and Auditing (SPMA) which is significant to track the system
life cycle. The restriction policy side specifies the level of restriction for security model
entities. The level of restriction starts from loose to tight depending on the provider, the
client, and the service requirements. Nevertheless, we hope SMI model be a good start for the
standardization of IaaS layers. This model indicates the relation between IaaS components
and security requirements, and eases security improvement in individual layers to achieve a
total secure IaaS system.
24 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
Conclusions
In cloud computing, end-to-end security is critical. Building blocks from TCG and
commercial products built on these principles will help make the cloud environment more
secure. Ongoing research from TCG and operating system or device security vendors will
take advantage of the TPM using additional software to enhance its capability for cloud
computing. Other research on cloud computing security is under way at several companies.
Today, the good news is that most cloud security issues can be addressed with well-known,
existing techniques.
The TPM can be an independent entity that works on behalf of cloud computing
customers. Inside every server in the cloud, the TPM and associated software can check what
is installed on each machine and verify the machine’s health and proper performance. When
it detects a problem, TNC technology can immediately restrict access to a device or server.
For securing data at rest in the cloud or in clients that access cloud data, self-encrypting
drives based on Trusted Storage provide the ultimately secure solution.
Organizations that have already implemented TCG-based solutions can leverage their
corporate investment in hardware, software and policies and re-use them for cloud
computing. If cloud computing represents an organization’s initial implementation of TCG-
based technology (used by the cloud provider), the rest of the organization should be re-
evaluated for areas where TCG technology can provide improved internal security, including:
activating TPMs, use of self-encrypting drives and network access control through TNC.
In an emerging discipline, like cloud computing, security needs to be analyzed more
frequently. With advancement in cloud technologies and increasing number of cloud users,
data security dimensions will continuously increase. In this paper, we have analyzed the data
security risks and vulnerabilities which are present in current cloud computing environments.
The most obvious finding to emerge from this study is that, there is a need of better
trust management. We have built a risk analysis approach based on the prominent security
25 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
issues. The security analysis and risk analysis approach will help service providers to ensure
their customers about the data security. Similarly, the approach can also be used by cloud
service users to perform risk analysis before putting their critical data in a security sensitive
cloud.
At present, there is a lack of structured analysis approaches that can be used for risk
analysis in cloud computing environments. The approach suggested in this paper is a first
step towards analyzing data security risks. This approach is easily adaptable for automation
of risk analysis.
26 Dept. Of ISE, SJBIT
Cloud Computing Security Issues in Infrastructure as a Service
References
[1] R. Buyya, C. S. Yeo, and S. Venugopal, “Market-Oriented Cloud Computing:
Vision, Hype, and Reality for Delivering IT Servicesas Computing Utilities,”
Proceedings of the 10th IEEE International Conference on High Performance
Computing and Communications, p. 9, August 2008. [Online]. Available:
http://arxiv.org/abs/0808.3558.
[2] SLA Management Team, SLA Management Handbook, 4th ed. Enterprise
Perspective, 2004.
[3] G. Frankova, Service Level Agreements: Web Services and Security, ser. Lecture
Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007,
vol. 4607.
[4] P. Patel, A. Ranabahu, and A. Sheth, “Service Level Agreement in Cloud
Computing,” Cloud Workshops at OOPSLA09, 2009. [Online]. Available:
http://knoesis.wright.edu/aboutus/visitors/summer2009/PatelReport.pdf
[5] D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D.
Zagorodnov, “The Eucalyptus Open-Source Cloud- Computing System,” Cluster
Computing and the Grid, IEEE International Symposium on, vol. 0, pp. 124–131,
2009.
[6] T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy: An Enterprise
Perspective on Risks and Compliance, 1st ed., 2009. [Online]. Available:
http://books.google.com/books?id=BHazecOuDLYC&pgis=1
[7] R. Kanneganti and P. Chodavarapu, SOA Security. Manning Publications, 2008.
[Online]. Available: http://www.amazon.com/SOASecurity- Ramarao
Kanneganti/dp/1932394680
[8] M. McIntosh and P. Austel, “XML signature element wrapping attacks and
countermeasures,” Workshop On Secure Web Services, 2005.
URL:
[1] http://en.wikipedia.org/wiki/Cloud_Computing
[2] http://www.cloudsecurityalliance.org
[3] http://cloudcomputing.sys-con.com/node/1330353
27 Dept. Of ISE, SJBIT