iv. infrastructure as a service providers

advertisement
International Journal on Advanced Computer Theory and Engineering (IJACTE)
_______________________________________________________________________________________________
Different IaaS Security Attributes and Comparison of Different Cloud
Providers
1
Ramdas N. Khatake, 2Shridevi C. Karande
MIT Pune, India
Email: 1ramdaskhatake@gmail.com, 2shridevi.karande@mitpune.edu.in
Abstract—Cloud computing is a model for enabling
ubiquitous, convenient, on-demand network access to a
shared pool of configurable computing resources like
networks, servers, storage, applications, and services that
can be rapidly provisioned and released with minimal
management effort or service provider interaction. Despite
such promises, cloud computing has not been adopted at a
pace that was expected. Among various reasons that
prevent its widespread adoption, the most serious issue
that Cloud Computing faces concerns its inability to insure
data Confidentiality, Integrity, Availability, Authenticity
and Privacy. Infrastructure as a service (IaaS) model
serves as the underlying basis for other delivery model, and
lack of security in this layer will certainly affect the other
delivery models, i.e. PaaS and SaaS that are built upon
IaaS layer. This paper provide the idea of infrastructure as
a service models different security attributes which ensures
the security in IaaS components and comparison of
different IaaS vendors with respect to security attributes.
To assure security at an Infrastructure as a Service
(IaaS) level, the provider is required to give security
guarantees from the hardware level to the hypervisor
while the consumer is required to ensure that the
software stack uploaded by him is free from security
risks. For Software as a Service (SaaS), the requirements
are completely one sided because only the provider is
required to guarantee security of the cloud but in IaaS
customer also required to manage their own cloud
security.
Section II describes IaaS model component, section III
describe the different security attributes related to IaaS
components and section IV describes comparison
between IaaS providers with respect to the security
attributes to assure the security.
II. INFRASTRUCTURE AS A SERVICE
Keywords—Cloud
Computing,
Cloud
Security,
Infrastructure as a Service, Data Privacy, Cloud Vendors.
I. INTRODUCTION
Cloud computing model is composed of five essential
characteristics On-demand self-service, broad network
access, Resource pooling, rapid elasticity, and measured
service. There are three service models three service
models that cloud computing can adopted Software as a
Service (SaaS), Platform as a Service (PaaS),
Infrastructure as a Service (IaaS), and four deployment
models are Private cloud, Public cloud, Community
cloud, Hybrid cloud[1].
To encourage the cloud based computing environment
its security challenges must be addressed in an
appropriate method and with proper service level
agreements between the cloud service provider and the
end user. According to the security guidance published
by the Cloud Security Alliance, the security risks faced
by the providers and consumers in Cloud Computing
depend on its deployment model and the manner in
which the Cloud services are consumed [2].
Cloud Computing system begins with its infrastructure.
IaaS provides the delivery of on demand shared
resources and computing services, which avoids the cost
of investing, operating and maintaining the hardware.
IaaS consist of the given components like Storage,
Network, Compute, Virtualization, User interface and
access management, Data management and Security
Automation.
2.1
Storage
IaaS provide the cloud storage as a service model in
which data is maintained, managed and backup remotely
and it is made available to users over the network. Cloud
storage delivers virtualized storage on demand over a
network based on consumer request [3]. When data
stored on cloud storage we need to consider the three
aspects of information security: Confidentiality,
Integrity and Availability.
Confidentiality: Confidentiality refers to limiting
information access and disclosure to authorized users
and preventing access by or disclosure to unauthorized
ones.
_______________________________________________________________________________________________
ISSN (Print): 2319-2526, Volume -3, Issue -6, 2014
13
International Journal on Advanced Computer Theory and Engineering (IJACTE)
_______________________________________________________________________________________________
Integrity: Integrity refers to the trustworthiness of
information resources.
Availability: Availability of information resources.
2.2
Network
IaaS provides the Cloud network to the consumer for
communication and accessing the services provided by
the provider. Cloud networking is a new networking
paradigm for building and managing secure private
networks over the public Internet by utilizing global
cloud computing infrastructure. In cloud networking,
traditional network functions and services including
connectivity, security, management and control, are
pushed to the cloud and delivered as a service [3][4].
2.3
Compute
Compute cloud is a web service that provides resizable
compute capacity in the cloud. It allows you to obtain
and configure capacity with minimal conflict. It also
provides complete control of your resources and lets you
run on computing environment. Compute cloud reduces
the time required to obtain and boot new server
instances, allowing you to quickly scale up or scale
down as requirement changes.
2.4
Virtualization
Virtualization is the one of the most important elements
that makes cloud computing. In computing virtualization
means to create a virtual version of a device or resource,
such as a server, storage device, network or even
an operating system where the framework divides the
resource into one or more execution environments.
Virtualization associated with following technologies
[4][5].
Storage virtualization: the amalgamation of multiple
network storage devices into what appears to be a single
storage unit.
Server virtualization: the partitioning a physical server
into smaller virtual servers.
Operating system-level virtualization: a type of server
virtualization technology which works at the operating
system (kernel) layer.
Network virtualization: using network resources through
a logical segmentation of a single physical network.
2.5
User Interface and Access Management
IaaS provides the simple and intuitive web-based user
interface for accessing and managing cloud services.
With the help of Console or Application Programming
Interface (API) you can manage your account, managing
security credentials and accessing the cloud services.
Figure. 1. IaaS model
2.6
Data Management
The rapid adoption of cloud-based applications,
platforms, and infrastructure has resulted in more
fragmented data scattered across the enterprise both
inside and outside of the firewall, increasing the demand
for a robust cloud data management solution [3]. In data
management we consider mostly transactional data
management and analytical data management. It is hard
to maintain ACID guarantees in the face of data
replication over large geographic distances.
2.7
Security Automation
Security automation helps you code in the practices that
make your data meet your organization's security policy.
It includes identifying vulnerabilities on running
instances as well as patching those vulnerabilities [6][7].
Security automation starts with application design.
Consider the requirements for access to data in transit, at
rest, and in process.
III. SECURITY ATTRIBUTES IN CLOUD
COMPUTING
3.1
Authentication and User Management
Authentication and user management unit provide the
idea about how to manage the individual user account,
group account, active directory and LDAP
authentication, and multifactor authentication.
3.1.1
Individual User Accounts
You can create users, assign them individual security
credentials that are access keys, passwords, and MultiFactor Authentication devices or request temporary
security credentials to provide users access to services
and resources. You can manage permissions in order to
control which operations a user can perform.
_______________________________________________________________________________________________
ISSN (Print): 2319-2526, Volume -3, Issue -6, 2014
14
International Journal on Advanced Computer Theory and Engineering (IJACTE)
_______________________________________________________________________________________________
3.1.2
User Groups
A group is a collection of users. Groups let you assign
permissions to a collection of users, which can make it
easier to manage the permissions for those users based
on change in responsibilities. Only one change to update
permissions for multiple users
3.1.3
Active Directory and LDAP Authentication
Active Directory (AD) is a directory service created by
Microsoft. Active Directory is popularly used in
organizations with Windows based networks to manage
users and establish policy controls. It helps to
Administrators centralize creation of usernames and
passwords, and specify roles and access levels for IT
resources across the cloud. This greatly simplifies the
task of administrators, as they save the effort of
managing administration for multiple instances
separately for each user.
with a decryption key. Encryption is a powerful security
mechanism because it can make decryption
mathematically infeasible if you do not possess the
decryption key.
3.3
Data storage unit provide the key management storage,
data integrity and tampering check in multitenant
environment.
3.3.1
3.1.4
Multifactor Authentication
Multi-Factor authentication (MFA) is an approach
to authentication which requires the presentation of two
or more of the three independent authentication factors:
A knowledge factor something only the user knows,
a possession factor something only the user has and
an inherence factor something only the user is.
3.2
Data Privacy and Confidentiality
Data Privacy and Confidentiality unit provide the idea
about Stored Data Encryption and Data Encryption at
Transmission.
3.2.1
Stored Data Encryption
Data encryption, which prevents data visibility in the
event of its unauthorized access or theft, is commonly
used to protect Data in Motion and increasingly
recognized as an optimal method for protecting Data at
Rest. Stored data encryption includes strong encryption
methods such as AES, RSA, SHA-256 [8]. When access
control such as username and password fails then
encrypted data remain encrypted.
3.2.2
Data Encryption at Transmission
Sensitive information that travels over an intranet or the
Internet can be protected by encryption. Encryption is
the mutation of information into a form readable only
Key Management
Key management is the management of cryptographic
keys in a cryptosystem. This includes dealing with the
generation, exchange, storage, use, and replacement of
keys. It includes cryptographic protocol design, key
servers, user procedures, and other relevant protocols
[3].
3.3.2
Lightweight directory access protocol is an open,
vendor-neutral,
industry
standard application
protocol for accessing and maintaining distributed
directory information services over an Internet
Protocol (IP) network. Common usage of LDAP is to
provide a single sign on where one password for a user
is shared between many services.
Data Storage
Data Integrity and Tampering check:
Data Integrity as the word in itself explains the
completeness or wholeness of the data which is the basic
requirement of the information technology. As Data
Integrity is an essential in databases similarly in
integrity of data.
Storages is an essential in the cloud, it is a major factor
that affecting on the performance of the cloud. The data
integrity provides the validity of the data, assuring the
consistency or regularity of the data. It is the complete
mechanism of writing of the data in a reliable manner to
the persistent data storages which can be retrieved in the
same format without any changes later [9][10].
Check tampering is a type of fraudulent disbursement
scheme whereby an employee either prepares a
fraudulent check for his own benefit, or intercepts a
check intended for a third party and converts the check
to his own benefit.
3.4
Cloud Security Certificate
Cloud security certificate unit provide the certificates
like SSAE-16 certification, FIPS 140-2, PCI-DSS level
1.
3.4.1
SSAE 16-certified facility
The Statements on Standards for Attestation
Engagements (SSAE 16) is an attestation standard
established by the AICPA to report on the controls and
services provided to customers. As opposed to the SAS
70 audit standard, compliance with the SSAE 16
attestation standard requires the data center’s
management to provide a written assertion about the fair
presentation of the system’s design, controls, and
operational effectiveness. This statement, along with an
independent auditor’s evaluation of controls like Data
_______________________________________________________________________________________________
ISSN (Print): 2319-2526, Volume -3, Issue -6, 2014
15
International Journal on Advanced Computer Theory and Engineering (IJACTE)
_______________________________________________________________________________________________
Foundry’s
organization,
security and
change
management systems, are considered when determining
SSAE 16 compliance.
IT security standards, including SSAE 16 certified
facility(formerly SAS 70), FIPS 140-2 compliant, PCI
DSS Level 1 compliant [11].
3.4.2
4.2
FIPS 140-2 compliant
GoGrid
The National
Institute
of
Standards
and
Technology (NIST) issued the FIPS 140 Publication
Series to coordinate the requirements and standards for
cryptography modules that include both hardware and
software components. Protection of a cryptographic
module within a security system is necessary to maintain
the confidentiality and integrity of the information
protected by the module. This standard specifies the
security requirements that will be satisfied by a
cryptographic module.
GoGrid enables companies to evaluate and run multiple,
on-demand Big Data solutions quickly, simply, reliably,
securely, and cost-effectively [12]. As the leader in
Open Data Services (ODS), GoGrid is committed to
delivering purpose-built Big Data solutions and services
for the management and integration of open source,
commercial, and proprietary technologies across
multiple platforms. Data centers are SSAE-16 Type II
(formerly SAS-70 Type II) compliant and internal
security procedures are PCI-DSS compliant.
3.4.3
4.3
PCI DSS Level 1 compliant
The PCI Security Standards Council offers robust and
comprehensive standards and supporting materials to
enhance payment card data security. These materials
include a framework of specifications, tools,
measurements and support resources to help
organizations ensure the safe handling of cardholder
information at every step. The keystone is the PCI Data
Security Standard (PCI DSS), which provides an
actionable framework for developing a robust payment
card data security process including prevention,
detection and appropriate reaction to security incidents.
IV. INFRASTRUCTURE AS A SERVICE
PROVIDERS
This section provides the comparison of different IaaS
cloud service providers.
4.1
Amazon Web services
AWS operates the cloud infrastructure that you use to
provision a variety of basic computing resources such as
processing and storage. The AWS infrastructure
includes the facilities, network, and hardware as well as
some operational software (e.g., host OS, virtualization
software, etc.) that support the provisioning and use of
these resources. The AWS infrastructure is designed and
managed according to security best practices as well as a
variety of security compliance standards. As an AWS
customer, you can be assured that you’re building web
architectures on top of some of the most secure
computing infrastructure in the world [11].
AWS provides to its customers is designed and managed
in alignment with best security practices and a variety of
Rackspace
The Rackspace Cloud is a set of cloud computing
products and services billed on a utility computing basis
from the US based company Rackspace [13]. Offerings
include web application hosting or platform as a
service (Cloud Sites), Cloud Storage (Cloud Files),
virtual private server (Cloud Servers), load balancers,
databases, backup, and monitoring.
4.4
Google Compute Engine
Google Compute Engine (GCE) is the Infrastructure as a
Service (IaaS) component of Google Cloud Platform
which is built on the global infrastructure that runs
Google’s search engine, Gmail, YouTube and other
services [14].
Google Compute Engine enables users to launch virtual
machines (VMs) on demand. VMs can be launched from
the standard images or custom images created by users.
GCE users need to get authenticated based on OAuth 2.0
before launching the VMs. Google Compute Engine can
be accessed via the Developer Console, RESTful
API or Command Line Interface.
4.5
vSphere
In vSphere ESXi handles user authentication and
supports user and group permissions [15][16]. In
addition, you can encrypt connections to the vSphere
Client and SDK. ESXi and vCenter Server support
standard X.509 version 3 (X.509v3) certificates to
encrypt session information sent over Secure Socket
Layer (SSL) protocol connections between components.
If SSL is enabled, data is private, protected, and cannot
be modified in transit without detection.
_______________________________________________________________________________________________
ISSN (Print): 2319-2526, Volume -3, Issue -6, 2014
16
International Journal on Advanced Computer Theory and Engineering (IJACTE)
_______________________________________________________________________________________________
Table I Comparison Of Iaas Providers
Security Attributes
Individual user
accounts
Amazon Web
Services
With the help of
Identity Access
Management(IAM)
assign them
individual security
credential
Identity Access
Management roles
allow you to delegate
access to users or
services
GoGrid
RackSpace
Google Compute
Engine
Yes, using API.
vSphere
Yes, Console
Access
Yes, Customers have
root/administrator
access to manage
users and groups.
Allow
Administrator
to insert a layer
of access
control by
assigning a
specific task to
specific user
Yes, custom
Yes, Customers have
root/administrator
access to manage
users and groups.
Yes, for API layer.
Yes through
ESX console
N/A, Rackspace does
not provide
AD/LDAP
authentication
however IaaS
customers can
implement their own
solution.
YES, Rackspace can
provide Multifactor
authentication for
Rack Connected
systems (Hybrid of
Cloud and Dedicated
infrastructure).
No, customers are
responsible for data
encryption
Yes, for API access
ESX Console
Yes, Two- Step
Authentication
Uses
proximity
sensors,
biometrics,
key cards or
key fobs
Yes, transparently
for all running VM
disk data using
AES-128.
Encryption happens
before data touches
local disk or leaves
the host machine
Yes, HTTPS for all
API traffic. All VM
to VM traffic is
over Google's
private network
Storage DRS
Yes, using
API
AD/LDAP
authentication
Amazon Identity and
Access Management
(IAM) enable identity
federation between
your corporate
directory and AWS
services.
Multifactor
authentication
Enable Multi Factor
Authentication for
AWS account using
RSA token or QR
code
Yes, Token
based
Authentication
individual IP
address
Stored data
encryption
Server Side
Encryption for
Amazon S3 and
Amazon Glacier,
encrypt data using
AES-256
No
Data
transmission
encryption
Yes, via Virtual
Private Cloud and
Secure socket layer
on portal
Yes, via
Virtual Private
Network,
Secure Socket
Layer on portal
N/A, Rackspace
customers would
determine
transmission
encryption.
Key
Management
Each EC2 instance
has an assigned
private key. Keys can
be managed through
the AWS web
console.
N/A
Administrative level
via API and console
access
and
must
authenticate
using
persistent API or
keys. Customers can
regenerate API keys
on-demand to help
ensure that their API
access
is
not
compromised.
Created and
managed by cloud
service provider
Trend Micro
provide the
key no need
to manage
separate key
server
Data Integrity
and Tampering
Integrity checks using
the CRC32 Algorithm
Yes, custom
Rackspace customers
have
Yes, for persistent
disk, checksums,
With the help
of Data
Data Storage
Data Privacy and Confidentiality
User management and Authentication
User groups
Infrastructure as a Service Providers
ESXi and
vCenter
Server
component
communicate
securely over
Secure Socket
Layer
_______________________________________________________________________________________________
ISSN (Print): 2319-2526, Volume -3, Issue -6, 2014
17
International Journal on Advanced Computer Theory and Engineering (IJACTE)
_______________________________________________________________________________________________
Security Attributes
Infrastructure as a Service Providers
Amazon Web
Services
GoGrid
RackSpace
Yes
Yes
root/administrator
access to their servers
and can implement
data integrity or
tampering checking
system to meet their
needs.
Yes
Yes, Virtual private
cloud and GovCloud
No
Yes
Yes
Cloud security
Check
SSAE 16
certified
facility(formerly
SAS 70)
FIPS 140-2
compliant
PCI DSS Level 1
compliant
V. CONCLUSION
I have shown different IaaS component related security
attributes or security techniques used by different cloud
vendors. The concepts I have discussed here will help to
build a strong architecture for security in the field of
cloud computation. This kind of structured security will
also be able to improve customer satisfaction to a great
extent and will attract more investors in this cloud
computation concept for industrial as well as future
research farms. Lastly, I propose to build strong
theoretical concepts for security in order to build a more
generalized architecture to prevent different kinds of
attacks.
REFERENCES
[1]
Peter Mell, and Tim Grance, “The NIST
Definition of Cloud Computing,”Version 15, 107-09,
http://
www.wheresmyserver.co.nz
/storage/media/faq-files/cloud-def-v15.pdf.
Google Compute
Engine
encryption at rest
and other
techniques
vSphere
Domain
Operating
System, Data
Domain
Boost
Yes
Yes
No
No
Yes
Yes
Yes
Yes
[5]
Farzad Sabahi, “Virtualization level security in
cloud computing.” 978-1-61284-486-2/11/$26.00
©2011 IEEE, pp. 250-254.
[6]
Santos, Nuno, Krishna P.Gummadi, Rodrigo
Rodrigues, “Towards trusted cloud computing,”
Proceeding of the 2009 conference on hot topics
in cloud computing. USENIX Association, 2009.
[7]
Manas Jog, M. Madiajagan, “Cloud Computing:
Exploring Security Design Approaches in
Infrastructure as a Service,” Proceedings of 2012
1ntemational of Cloud Computing, Technologies,
Applications & Management 978-1-4673-44166112/$31.00 ©2012 IEEE, pp. 156-159.
[8]
T. G. Ben, B. Pfaff, J. Chow, M. Rosenblum, and
D. Boneh, “Terra: A Virtual Machine-Based
Platform for Trusted Computing.” ACM
Press,2003, pp. 193–206.
[9]
Wesam Dawoud, Ibrahim Takouna, Christoph
Meinel, “Infrastructure as a service security:
Challenges and solutions,” proceeding of
Informatics and Systems (INFOS), 2010 The 7th
International Conference.
[2]
Cloud Security Alliance, "Security Guidance for
Critical Areas of Focus in Cloud Computing",
2012,
https://
cloudsecurityalliance.
org/guidance/ csaguide. v 3.0. pdf.
[3]
Deyan Chen, Hong Zhao, “Data Security and
Privacy Protection Issues in Cloud Computing,”
Proceeding of 2012 International Conference on
Computer Science and Electronics Engineering
978-0-7695-4647-6/12 $26.00 © 2012 IEEE
[DOI 10.1109/ICCSEE.2012.193], pp. 647-651.
[10]
Pankaj Arora, Rubal Chaudhry Wadhawan, Er.
Satinder Pal Ahuja, “Cloud Computing Security
Issues in Infrastructure as a Service,” proceeding
of International Journal Of Advanced Research in
Computer Science and Software Engineering
Volume 2, Issue 1, january 2012.
[4]
Ali Sajid, Srijit k. Nair, “Secure Communication
using Dynamic VPN Provisioning in an InterCloud
Environment.”
978-1-467345231/12/$31.00©2012 IEEE, pp. 428-433.
[11]
amazon web services secuity whitepaper “
http://aws.amazon.com
“
and
“http://media.amazonwebservices.com/pdf/AWS
_Security_Whitepaper.pdf.”
_______________________________________________________________________________________________
ISSN (Print): 2319-2526, Volume -3, Issue -6, 2014
18
International Journal on Advanced Computer Theory and Engineering (IJACTE)
_______________________________________________________________________________________________
[12]
GoGrid
Cloud
security
“http://www.gogrid.com/gg/assets/
GoGrid_Security-Overview_F.pdf”
[13]
Rackspace
Cloud
security
whitepaper,
“http://www.rackspace.com
/knowledge_center/whitepaper/
rackspaceprivate-cloud-security-white-paper”
[14]
whitepaper,
cloud.google.com/files/GoogleCommonSecurity-WhitePaper-v1.4.pdf”
[15]
vSphere,
http://www.vmware.com/products/vsphere/featur
es.html.”
[16]
vSphere
common
security
whitepaper,
“http://www.vmware.com/files/
pdf/techpaper/
VMware-vSphere-Data-Protection-AdvancedEMC-Data-Domain-Integration.pdf.”
Google Compute Engine common security
whitepaper,
“https://

_______________________________________________________________________________________________
ISSN (Print): 2319-2526, Volume -3, Issue -6, 2014
19
Download