A. Threats in Cloud Computing

advertisement
Cloud Computing : The Dark side
N. Sinha & S. Rastogi
I.T.S. Engineering College, Greater Noida, Uttar Pradesh, India
E-mail : nitishsinha107@gmail.com, shubham.rastogi762@gmail.com
service),application cloud (application, UML modeling
tools, or social networks as a service), and a business
cloud(for instance, business processes as a service)(see
www.thecloudcomputing.org/2009/2/).
Abstract – The Rapid growth of data has turned out to be a
very unstable for the cloud vendors. Such bulky data is
very difficult to handle and protect from malicious
hackers. Lack of security is the major problem to
overcome in wide adoption of cloud computing and
networking. The amount of threats and vulnerabilities
have also increased with time and organizations growth.
Cloud Computing has affected both consumers and cloud
vendors life. Everything nowadays is shared over the
network and until there is a security organization
safeguarding the network. This paper outlines the threats,
vulnerability and security organizations working to
improve the dark side of the cloud. These security
measures and organizations help us to create a safer
environment to work with. This will enable researchers
and IT professionals to know about users and vendors
concerns and critically analyse them.
In this new world of computing, users are
universally required to accept the underlying premise of
trust. In fact, some have conjectured that trust is the
biggest concern facing cloud computing [1]. Many
belief trust and security to be synonymous.
A. Threats in Cloud Computing:
Mervat Adib Bamiah, Sarfraz Nawaz Brohi
describes threats of cloud computing from Google's
perspective, stated in [2] as follows
Abuse and Nefarious use of cloud: Cloud providers
facilitate the users with various types of services such as
unlimited bandwidth and storage capacity. Spammers
and hackers get free opportunity to try their malicious
codes over the trial period of thecloud providers. For
example: flash files are installed to hide malicious codes
Keywords – Cloud computing; Security Issue, Threats,
Vulnerabilities,
I.
INTRODUCTION
The term "cloud" originates from the
telecommunication world of the 1990's when providers
began using Virtual Private Network (VPN) services for
data communication. VPN maintains the same
bandwidth as fixed networks with considerably less
cost. These networks supported dynamic routing which
allowed for a balanced utilization across the network
and increase in bandwidth efficiency, and led to the
coining of the term "telecom cloud". Cloud Computing
premise is very similar in that it provides a virtual
computing environment that's dynamically allocated to
meet user needs. Cloud computing shares its resources
among a cloud of service to consumers, partners and
vendors. By sharing resources at various levels this
platform offers services such as infrastructure cloud (for
example, hardware or IT infrastructure management),or
software cloud(such as software, middleware, or
traditional customer relationship management as a
Insecure interfaces and API's: The API's and
the codes of the cloud providers are not stable and
robust to prevent the basic confidentiality, integrity and
Malicious insiders: A Malicious insider can easily
obtain cryptographic keys, files and passwords to
commit fraud, damage or theft of information and
Virtualized technology: In order to maintain
security of users, cloud providers isolate the virtual
machines from one another so if any of them is
malicious, it will not affect other VM's. Hackers
normally target the hypervisor which resides between
the VM's and the h
phishing
Account or service hijacking: In this basically,
fraud and exploitation of software
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
39
International Journal on Advanced Computer Theory and Engineering (IJACTE)
vulnerabilities are put to practice to access premium
accounts by hackers.
The Fig.2 illustrates the challenges/issues ascribed
to the 'cloud'/on-demand model.
Fig.1: Security threat in Cloud [3]
B. An Aggressive response to threat
In fact, the response to cloud-based security
products and services has been fairly aggressive. Novell
has introduced the Novell Cloud Security Service. Part
of its Workload IQ system, it gives cloud providers the
ability to deliver secure access and compliance in the
cloud for their customers. “Security is the biggest
hindrance to cloud adoption that service providers
offering cloud services need to overcome,” says Antonio
Piraino, vice president of research, Tier 1 Research.
Novel currently has several beta deployments of its
cloud security service globally. In August, Novell said it
will target more than 200 IaaS, and 1,300 SaaS and
PaaS vendors to get them started with its technology.
Fig. 2 : Rating of issues ascribed to cloud [5]
II. THREAT VECTORS- WHAT TO WORRY
ABOUT IN SECURITY
Before categorizing new threats, it is important to
acknowledge that the structure of many cloud
architectures can mitigate or negate some current
security threats. If data are kept in the cloud, for
example, then a lost or stolen laptop is much less likely
to put sensitive information at risk. Standardized
interfaces could make security management easier
(ENISA, 2009), while the scale of a provider hosting
many parties can generate more information for better
threat monitoring. Centralized security management and
monitoring can be more effective than local efforts by
IT professionals with limited security experience.
Functionally, the Novel Cloud Security Service is
hosted in the cloud, either where the provider hosts its
application or via a Novell hosting partner. A user can
log on directly or via the enterprise identity system. The
service first verifies the identity and, if successful, will
generate an identity token in the format needed by the
SaaS provider. The user is now authenticated to the
SaaS service. Once inside the application, the
application connectors that are provided with the service
capture deep page-level user activity and provide the
audit stream for compliance purposes. WorkloadIQ is
Novell’s vision to deliver products for rapidly growing
intelligent workload management market, which the
market research firm IDC estimates is more than US$4.2
billion[4].
Some threat vectors are not new to cloud, but have
somewhat different dynamics. In classic IT architecture,
PCs inside the organization may be at risk of
compromise through a host of attack vectors exploiting
local applications such as browses or documents
viewers. If less data is stored locally, less isimmediately
at risk, but now the attacker could compromise
credentials to gain access to the user’s cloud privileges.
A compromise to an entire Gmail database probably
began with a compromised PC (Zetter, 2010). Similarly,
in an attack on the Twitter management team in 2009, a
compromised email password led to exposure of a wide
range of other important documents in other cloud
infrastructures (Lowensohn & McCarthy, 2009). Shared
authentication tokens can lead to brittle defences.
AT&T recently launched its latest cloud security
service to protect enterprise customers against
distributed denial-of-service (DDoS) attacks. The
system is based on Arbor Networks Inc. technology.
Webroot, another Internet security provider, recently
acquired Bright - Cloud, a Web content classification
and security service provider. Webroot plans to integrate
BrightCloud’s technology into its own proprietary
malware detection and SaaS technologies.
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
40
International Journal on Advanced Computer Theory and Engineering (IJACTE)
Organizations must be careful to safeguard data as
they move it around their organization, even without the
benefit of cloud computing. When they no longer need
data, it must be properly deleted, or else risk leaking
sensitive data to the outside (Garfinkel & Shelat, 2003).
When relying on a cloud service to handle data,
appropriate care must be made to arrange for
appropriate security management practices, such as
encryption and appropriate deletion.
Similarly, all organizations are vulnerable to an
insider attack from a trusted insider, but moving things
to the cloud can raise the costs of misplaced trust. A
cloud system with a well-thought out identity interface
and a clear access control system can restrict access and
foster accountability. However, a unified data system
with more people accessing more different types of data
through more applications can actually make it harder to
appropriately limit access and detect misuse (Sinclair &
Smith, 2008)[6].
Fig. 3 : Vulnerability in different vendors[10]
The Security has been a major issue for all the
vendor companies else no customer will purchase cloud
services. The stronger the network the better is the
security from the hackers. Intrusion will automatically
be very difficult for all the malicious software's which
make a way through the companies gateway without the
knowledge of the administrator. Some more issues for
cloud computing are as follows:
III. CLOUD VULNERABILITIES
Session Riding and Hijacking - Session hijacking
refers to use of a valid session key to gain
unauthorized access for the information or services
residing on a computer system[7].
Virtual Machine Escape- Cloud computing servers
user the same OS , enterprise and web applications
as localized virtual machines and physical servers.
The ability for an attacker or malware to remotely
exploit vulnerabilities in these systems is significant
Key Management - As the cloud is full of data so a
good encryption technique is required to
ensuresafety and the kept should be safely kept to
prevent the data from being leaked.
Destruction of data- When data is no longer
required, the data deleted may still exist and can be
Insecure Cryptography- Attackers can decode
any cryptographic mechanism or algorithm as main
methods to hack them are discovered. It's common
to find crucial flaws in cryptographic algorithms
implementations, which can twist strong encryption
into weak encryption or sometimes no encryptions
Data Integrity-Data can corrupt at any stage
and with any type of media. Data integrity can be
easily achieved in a standalone system with a single
database. Data integrity in such a system is
maintained via database constraints. Data generated
by cloud computing are kept in a cloud. So, it is
very difficult to check integrity of data by user
because the user has no control over data and their
Internet Dependency- Cloud computing is an
internet dependent technology where users are
accessing the services via web browser. What if
internet is not available or service is down, what
will happen to users systems and operations thatare
very critical and need to run 24 hours such as
Healthcare and Banking systems. In some Asianand
African underdeveloped countries where service of
internet is not considered as reliable enough, will
organizations adopt this paradigm to move their
Sharing of data - Data sharing is expanding the use
of the data. The data owners can authorize the data
access to one party and in turn the party can further
share the data to another party. This sharing can
create a serious problem like leakage of data to
unauthorised person. Therefore during the data
sharing specially when shared with the third party,
the data owner needs to consider whether the third
party continues to maintain the original protection
Fig.3. It depicts the variety of attacks performed on
various vendors by the hackers.
ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
41
International Journal on Advanced Computer Theory and Engineering (IJACTE)
IV. CONCLUSION
Cloud computing is a new and emerging
information technology that changes the way IT
architectural solutions are put forward by means
ofmoving towards the theme of virtualization : of data
storage , of local networks as well as software . There
are many new technologies emerging at a rapid rate ,
each with technological advancements and with the
potential of making human’s life easier. Although cloud
computing has many advantages there are still many
security problem. The bond between service providers
and users is necessary for providing better cloud
security. In this paper we analyse the security issues,
threats and challenges in wide acceptance of cloud
computing, because there may be loss of data and
privacy. Researchers Scholars and IT security
professionals must press forward towards practical
achievements in security and privacy to users. Our study
identifies top security concerns of cloud computing,
these concerns are security risks, techniques, problems,
challenges and securityissues of cloud computing and its
services.
[3]
Amit Sangroya, Saurabh Kumar, Jaideep
Dhok,Vasudevavarma, ”Towards Analyzing Data
Security
Risks
in
Cloud
Computing
Environments,”;http://books.google.co.in/bo
oks?ISBN=3642120342.
[4]
Ron Schnelderman,” For Cloud Computing ,the
Sky is the limit”.
[5]
www.export.writer.zoho.com.
[6]
Jaydie Sen Innovation Labs, Tata Consultancy
Services limited, Kolkata, INDIA.
[7]
T. Schreiber, “Session Riding a Widespread
Vulnerability in Today's Web Applications”
[Online],Available:http://www.securenet.de/
papers/Session_Riding.pdf,
white
paper,
2004.[Accessed : 20-Jul-2011].
[8]
S.,Subashini, V. Kavitha ,“A survey on security
issues in service delivery models of cloud
computing”. Journal of Network and Computer
Applications, vol.34 , pp.1-11, 2011.
[9]
B. Grobauer, T. Walloschek, and E. Stocker,
“Understanding
Cloud
Computing
Vulnerabilities,” Security & Privacy, IEEE, vol.
9, no. 2, pp.50-57, 2011.
[10]
http://www.zdnet.com/blog/security/reportapplehad-the-most-vulnerabilities-throughout-20052010/6801.
V. REFERENCE
[1]
[2]
J.Urquhart,”The Biggest Cloud-Computing Issue
of 2009 is Trust,”C-Net News,7 Jan
2009;http://news.c.net.com/8301-19413_310133487-240.html.
Mervat Adib Bamiah ,Safraz Nawaz Brohi,
”Seven Deadly Threats and Vulnerabilities in
CloudComputing,
”;http://ijaest.iserp.org/.../16.IJA EST-Vol-no-9Issue-No-1/html.

ISSN (Print) : 2319 – 2526, Volume-2, Issue-5, 2013
42
Download