National Research University Higher School of Economics Faculty of Business-Informatics Department of Information Security Management DRAFT of the paper “Ensuring the Safety of Costumers Information in the Cloud Network” Student: Prokhorov Vadim Group 475 Argument Consultant: Elin Vladimir Language Consultant: Podobed Karina 2013 Abstract The subject inquiry of the research is the cloud computing system. This system allows to use enormous computing capacities, store and process data remotely. Thus, the study urgency is defined by the necessity of more effective information security protection. The graduation work is aimed at building of cloud computing information security system. And in order to meet this goal, the author analysed the cloud structure and examined advantages and disadvantages of the system. Based on the core mass media editions and academic works, the author highlighted weaknesses of cloud computing process and, as a result, proposed several measures which should be taken in order to minimise risks of data damage. Content Introduction ................................................................................................................................................... 4 Chapter 1. Characteristics of services in the cloud ....................................................................................... 5 1.1 The concept of cloud computing ......................................................................................................... 5 1.2 Types of clouds ................................................................................................................................... 5 1.3 Advantages and disadvantages of using cloud technology ................................................................. 5 1.3.1 Advantages ................................................................................................................................... 5 1.3.2 Disadvantages............................................................................................................................... 8 Chapter 2. Protection problems ..................................................................................................................... 9 2.1 Hardware components of the data center ..........................................................................................10 2.2 Telecommunications section of the access to the resources of the data center .................................10 2.3 Users and their software and hardware .............................................................................................10 2.4 Middleware .......................................................................................................................................11 2.5 Application services ..........................................................................................................................11 2.6 Storage Systems ................................................................................................................................11 Conclusion...................................................................................................................................................12 Bibliography................................................................................................................................................14 Introduction Nowadays Information technologies are developing quickly. There is an immense development of software. Earlier developed applications were distributed on physical media, and then they had to be installed on a computer. Software developers are exhibited the minimum system requirements that a computer should correspond to for all programs correct functioning. The Internet is evolving, servers are constantly being upgraded. At some point, it turned out that the processing power can be combined with support software services. This was the starting point of the cloud computing development. The widespread using of computers and based on them all kinds of administrative and technical ("human-machine") systems, such as "cloud" computing, arise information security problems. Information security issues take a special place in society and attract to themselves increasing attention. The success of any activity largely depends on the ability to dispose such value, as information. The Russian Federation Law "On Information, Informatization and Protection of Information" emphasizes that "information resources are objects owned by citizens, organizations, associations, the state". This study is the first chapter version of the Graduate Qualification Work on the topic: “Ensuring the Safety of Customers Information in the Cloud Network”. According to the information given above the graduation work is aimed at building the information security ensuring system of cloud computing services. In order to meet the goal it was necessary to solve the following tasks: to analyse theoretical aspects of cloud computing; to study the cloud types; to examine the system advantages and disadvantages; to analyse information security data specificity by studying the problem of cloud computing protection. Chapter 1. Characteristics of services in the cloud 1.1 The concept of cloud computing Cloud computing is the technology of distributed data processing, in which computing resources and capacities are available to the user as an Internet service. The essence of cloud computing is to provide computing resources and applications (including operating systems and infrastructure) to users with remote access through the Internet. The term "cloud computing" is applicable to any services that are provided over the Internet. Cloud computing is a powerful approach for calculations resource. It becomes more and more popular. Anyone has ever used the services provided with the opportunity to work with applications without installing them on their computer. 1.2 Types of clouds Since the cloud is a collective term, it makes sense to classify them according to some criteria. There are two classifications of clouds below, where one is suggested publication InfoWorld, and other - business manager Parallels, one of the market leaders in virtualization. Analysts from InfoWorld propose to divide all the clouds into six types: 1) SaaS - Software as a Service (for example, Zoho Office and Google Apps); 2) Utility computing, for example, virtual servers; 3) Web service in the cloud - optimized online services for virtual environments (for example, Internet banking); 4) PaaS - Platform as a Service (for example, Live Mesh from Microsoft); 5) MSP - Managed Service Provider (for example, built-in virus scanner for email portals); 6) Commercial platform for services - union PaaS and MSP (for example, Cisco WebEx Connect). Clouds can also be public or private. Public cloud services can be used by anyone. At the moment, Amazon Web Services is the most famous and largest provider in the public cloud. The main difference between private and public cloud is providing services from the cloud in a closed from public access infrastructure to a limited number of users. Under such a structure, part of customer data is stored and processed by the resources of its own infrastructure, and another part by the resources of the external provider. Service from Amazon called Amazon Virtual Private Cloud (Amazon VPC) is an example of a virtual private cloud. 1.3 Advantages and disadvantages of using cloud technology 1.3.1 Advantages Cheap computers for users Users do not need to buy expensive computers with more memory and disk drives to use the program through the web interface. There is also no need for CD and DVD drives, because all the information and programs are held in the "cloud." Users can switch from conventional computers and laptops to a more compact and convenient netbooks. Increased performance of customer computers Most of the programs and services are run remotely through Internet. Therefore, computers with a smaller number of programs start and run faster. One good example is Panda Cloud Antivirus, which allows you to scan data for viruses remotely on powerful servers and thus twice reduces the load on the user's computer. Reduce costs and increase the efficiency of IT infrastructure Ordinary server loaded on the average of 10-15%. In some periods of time there is a need for additional computing resources, in others these costly resources are idle. Using the required amount of computing resources in the cloud (for example, Amazon EC2), at any time, companies reduce the cost of equipment and maintenance up to 50%. The flexibility of production in a constantly changing economic environment always increases. If a sufficiently large firm is concerned that valuable information will be stored and processed on the side, company can build its own cloud and enjoy all the benefits of virtualization infrastructure. Less service problems Because of physical servers with the introduction of Cloud Computing becomes smaller, they become faster and easier to maintain. Software is automatically updated in the cloud. Less costs with software purchasing Instead of purchasing software packages for each local user, companies buy the right software in the cloud. These programs will be used only by users which are required to use programs in their work. Moreover, the price of programs for the Internet access is much lower than their counterparts for PCs. The costs of updating and support programs are reduced to zero. Software update At any time, when user starts the remote program, he can be sure that the program has the latest version - without the need to reinstall or pay something for the upgrade. The increase in computing capacities Compared to a personal computer, computing power of cloud is limited only by its size, that is, the total number of remote servers. Users can deal with more difficult problems with a large number of necessary memory space for your data. Unlimited amount of storage Storage in the "cloud" can be flexibly and automatically adjusted to the user's needs. When storing the information in the "cloud," users can forget about the limitations imposed by conventional disks - "cloud" dimensions reach billions of gigabytes of free space available. Operating system compatibility Operating systems do not play any role in cloud computing. Unix users can share documents with users of Microsoft Windows, and vice versa, without any problems. Access to programs and virtual machines occurs using a Web browser or other means of access, installed on any personal computer with any operating system. Increased document format compliance If the same "cloud" software to create and edit documents is used, format compliance problem will not arise. A good example of this compliance is an office suite Google Docs. Simple work within a user group While working with documents in the "cloud" it is not necessary to send the document version or edit it constantly. Users can be sure that they have the latest version of the document, and any change made by one user is seen by all the others. Widespread access to documents If the documents are stored in the cloud, they can be available to users any time and everywhere. Users do not face such thing as a forgotten file because if there is the Internet, files are always available. Access from various devices Cloud Computing users have wide choice of devices to access documents and programs. It is possible to choose between a standard PC, laptop, Internet tablet, PDA, smartphone or netbook. Saving the natural resources Cloud computing allows to save on electricity, computing resources, the physical space occupied by the servers. Moreover, cloud computing spends natural resources reasonably. Data centers can be placed in a cooler climate. Users can replace heavy, demanding computers and laptops on easy and economical netbooks. This saves not only energy and space, but also the materials that those devices are made from. Stability of data loss or theft of equipment If data is stored in the cloud, copies are automatically distributed across multiple servers, which may be located on several continents. Theft or damage to the user's PC does not cause the loss of valuable information, because it can be found by any other user. 1.3.2 Disadvantages Permanent connection to the Internet Cloud Computing is almost always requires a connection to the Internet. Some of the cloud programs downloaded to the local computer and used at a time when the Internet is not available. In other cases, if there is no access to the Internet - no work, programs, and documents. This is probably the strongest argument against the cloud computing Bad working with slow Internet access Many of the cloud programs require a good Internet connection with high bandwidth. But these days, access speeds are increasing, and prices - are falling. Programs may run slower than on a local computer Some programs that require the transfer of a significant amount of information will work on your computer faster not only because of the restrictions on Internet connection speed, but due to busy remote servers and problems in the way between you and the cloud. Not all programs or their properties are available remotely Cloud analogues lose in functionality. For example, Google Docs table have far fewer features and functions than Microsoft Excel. Data security can be under the threat It all depends on who provides "cloud" services. If the cloud provider encrypts the data, always back-up copies should be made. With more than a year working experience on the market of such services and good reputation a company does not have any data security risk. If the data in the cloud is lost, they are lost forever. This is a fact. But to lose the data in the cloud is much more difficult than to lose it on a local computer. Despite the fact that there are more advantages than disadvantages, still, each time it’s a particular case needed to be observed. Chapter 2. Protection problems Recent years, the question aimed on the development of cloud computing, considering their prospects, arises more often. Only for the 2011 business growth in this area was more than 25%. The main principle of computing in the cloud is based on the implementation of various wishes of the users by providing the different services. The main goal of this approach is to move from the problems by the choice of hardware and supporting software applications to provide guaranteed data storage providers in the cloud service process. Data center construction is the basis solution of this strategy. This makes it possible to provide enormous computing resources, the ability to store and provide instant access to data for average user of the Internet or ordinary employee who has access to the corporate network. In such conditions, user's side of the process is most important. In this situation, the issue of information security pushed into the background. An intensive advertising campaign represents cloud computing as something new, the decision problem of information security is postponed at a later time. User data and the stability of the entire structure as a whole are at risk. This situation is reminiscent of the development of electronic "banking" in the last ten years, where the question of information security has been intensively considered due to large losses which reached 10-15% of the profits. Analogy processes of cloud computing can be seen in large computer systems, the 80's of the last century, where the main difference was a breadth of opportunities for high-speed user access to the data center resources. And such access was possible only within individual organizations that have used these centers for computing. But already in the 90's, when the computing speed exceeded the speed of processing and preparation of the information in peripherals, possibility of parallel tasks on a computing device was realized. The process of development of cloud computing began a few decades ago. At the same time began to consider the problems of information security. Basic principles of information security in computer systems that have developed over the last 20 years, can be used in cloud computing. Baranov A.P. in his article "Is it possible to protect confidential information within a cloud?" discusses the use of this opportunity and reveals unresolved problems that hinder the development of the information security for computing in the cloud. For the analysis considered the organization of the cloud computing which based on the data center, that implements the principle of virtualization computing. The author divides the computing system in a cloud on the six main parts: 1. Hardware components of the data center; 2. Telecommunications section of the access to the resources of the data center; 3. Users and their software and hardware; 4. Middleware; 5. Application services provided by data centers as a layer of application software for the guest operating systems; 6. Storage Systems (primarily databases). In article the author examines the problem of information security in each of the above parts, dividing the use each of them in two possible directions: corporate and public system. 2.1 Hardware components of the data center For corporate networks that handle confidential information, the principles of selection and certification of hardware parts are well known and is to ensure the reliability and stability of operation that give manufacturers. Also, these principles are reflected in number of organizational measures to ensure no access hackers to the hardware components of a data center. If the side effects of radiation or electromagnetism appear, exploration activities on the side signals and protective measures should be conducted by known methods. Similar events are held, as a rule, for a system of public cloud computing. 2.2 Telecommunications section of the access to the resources of the data center Telecommunications is based either on the open traffic or on IP-packet encryption by software or hardware. The personal data are processed in a corporate network typically require confidentiality. Therefore, to keep access to IP-based networks applies encryption at the IP-packets. In order to minimise costs to encryption, corporate network can be built in a tree structure of ties and form a dedicated VPN (virtual private network) for one hundred thousand users. Through this network structure it is sufficient to ensure simultaneous communication with a small number of users. The situation is more complicated in the systems of public cloud computing. In contrast to the corporate network, public system must provide Internet network access to more than one million people, workplaces which can constantly change the IP-address. Packets may arrive with a delay on the Internet. This creates a serious burden on the computer system data center. Obviously, there are a number of human activity areas in which these restrictions are unacceptable. Therefore, increasing the speed of IP-encryption is currently relevant and perspective task. 2.3 Users and their software and hardware Encryption of IP-flow in the workplace by using SSL by software and especially hardware at 1Mbit /s is not a problem. In the market a number of companies are offering certified products. More complex, but solvable problem for the corporate cloud is the protection of keys, operating system and information within the workplace user. Workplace can be equipped with special tools such as electronic locks, etc., the operation of which can be controlled by the user of this place, as well as information security services of the company. The situation is more difficult for the public system. A cracker may be officially registered user has a legal right of access to the system, and he can try to overcome the security system, in particular, access control system, using special equipment installed on workplaces. Practically it is impossible to control the user workplace composition in public networks. Obviously, the safety equipment in the data center of public systems should be highly effective and the requirements for them are very stringent. 2.4 Middleware The structure of the data center implements the concept of virtual machines. Consider the "middle" layer as the hypervisor and guest operating systems with application tasks on them. The control system is also rated as one of the virtual machines. The hypervisor is a key element of information security in the development and operation of virtual machines. Simultaneously, the hypervisor itself is an operating system that operates directly with the hardware, sometimes by delegating functions of basic systems guest. Thus, the hypervisor can be viewed as a traditional operating system. The question of creating or providing safe mode of the system is reduced to hypervisor complying with the requirements for standard operating systems. 2.5 Application services Situation is identical certification of application software for operating systems. Typically, constraint checking to software developed during certification of operating systems with the participation of the developer for the above systems takes no more quarter. Certification of large and complex products like Word or Explorer, require one year of effort in initial certification systems. In the future, the time for certification of the following systems versions was reduced significantly. The main challenge in this area is to develop a minimum set of requirements for the application software in the certification of operating systems. The same applies to the principles of certification hypervisor. 2.6 Storage Systems In terms of application of certified information security requirements for the storage situation is very grim. Only certified database MS SGL. Such powerful database like Oracle or DV2 must certify to the requirements FSTEC to Category 1-D. In the absence of certification must rely on the imposed protection remedies that do not affect the internal mechanisms mentioned databases. The market of protection means contains almost no proposals in this area. It appears that this situation will be maintained and supported by database vendors as long as in Russia will not create or certified alternative, quite effective database that can be applied to large data centers. Create a national database that is comparable with the products of the leading manufacturers and package business applications for it that can reduce development time of application software, is a national task, comparable to the task of creating and maintaining native operating system. Conclusion As a result of the research the author has made the following conclusions: 1) In the theoretical part of the research the author studied cloud computing characteristics and worked out the following advantages and disadvantages of the system: Advantages: Cheap computers for users; Increased performance of customer computers; Increased performance of customer computers; Reduce costs and increase the efficiency of IT infrastructure; Less service problems; Less costs with software purchasing; Software update; The increase in computing capacities; Unlimited amount of storage; Operating system compatibility; Increased document format compliance; Simple work within a user group; Widespread access to documents; Access from various devices; Saving the natural resources; Stability of data loss or theft of equipment. Disadvantages: Permanent connection to the Internet; Bad working with slow Internet access; Programs may run slower than on a local computer; Not all programs or their properties are available remotely; Data security can be under the threat. 2) Based on the article of A.P. Baranov, professor, Head of Information Security Management Department in National Research University Higher School of Economics, “Is it Possible to Protect Confidential Information within a Cloud”, the problem of information security was examined. 3) The cloud computing process was studied and six main parts of the system were defined: Hardware components of the data center; Telecommunications section; Users and their software and hardware; Middleware; Application services; Storage Systems (primarily databases). The author analysed all parts of cloud computing system and found their weaknesses. In the practical part of the research the information security risks will be evaluated, and several measures aimed at minimizing those risks will be proposed. Bibliography 1) V.F. Shangin Data Protection. \\ Effective measures. − M.: DMK Press, 2008. – p. 544. 2) V.M. Belogrudov Cloud Computing – advantages and disadvantages \\ http://www.smartcloud.org/sorted-articles/44-for-all/96-cloud-computing-plus-minus. 03.03.2012 3) A.P. Baranov “Is it Possible Confidential Information within a Cloud” \\ High Availability Systems, 2012. T. 8. № 2. p. 12—15 4) M.C. Kondrathin Cloud Computing Security \\ http://www.pcmag.ru/solutions/detail.php?ID=38248. 15.02.2010 5) Information Security Treat \\ http://www.internettechnologies.ru/articles/article_1147.html. 3.10.2007