You are on page 1of 7

ISSN - 2348-2397 S SHODH SARITA

ODH ARITA
UGC Approved, Journal No. 48836 SH Vol. 3, Issue 11, July-September, 2017
Page Nos. 153-155
COMPUTER SCIENCE
AN INTERNATIONAL BILINGUAL PEER REVIEWED REFEREED RESEARCH JOURNAL

A COMPREHENSIVE STUDY OF CLOUD


Pragya Shukla*
COMPUTING AND SECURITY
Shashank Dahiya**
Vipul Dhariwal***
ABSTRACT
Now almost everyone use or take a service that usesstorage that can be accessed anytime anywhere without
actually carrying it, Cloud computing proved to be a revolution it was predicted to be. It's elastic nature and on-
demand and pay per use access to a pool of shared resources namely networks, storage, servers, services and
applications, without physically acquiring them worked wonders for cloud service providers. A report from
Forrester[1]predicted that the total global public cloud market will be $178B in 2018, up from $146B in 2017, and will
continue to grow at a 22% compound annual growth rate (CAGR). With such huge market, comes possibilities of
threats, attacks and possible compromise on regulations. Even though it is ever growing but still many IT firms are
reluctant to invest in Cloud due to security concerns.This researchpaperdefines the modern-day definition of Cloud
computing, outlines various models of Cloud and its architecture. This paper alsoincludes research on major security
threats and possible attacks and categorized based on security architecture. Relevant solutions and their efficiency
areone of the most important factors in recent scenario and the paper consolidates the ideas and techniques
mentioned in various other researches.
Keywords : Cloud computing, Secuity in cloud, Threats to cloud, Solutions to threats and attacks.

Introduction their organizations are not thoroughly vetted for


Cloud computing is growing inall fields, from security before beingused while 71 percent said they
Commercial entities to Governments to consumers.A would not receive immediate notifications involving the
[2]
survey by Right Scale found that an average user runs loss or theft of customer data. All these point in
applications in 3.1 clouds and experimenting with 1.7 onedirection: Need of increased reliability and tighter
more for a total of 4.8 clouds at least four cloud-based security.
applications and at any point in time is evaluating Hence, we have to look at issues and threats that the
another four. The survey also found that commercial modern cloud infrastructurefaces, some modern issues
entities run32 percent of workloads in public cloud and are: Data protection, User Authentication,
45 percent in private cloud. With so much workload Authorization, Availability, Confidentiality, Integrity,
shifting towards clouds, its security and guideline Audit, Security monitoring, incident response. Lock-in
compliance has come under deeper scrutiny. These and multi tenancy are threats which are new to the cloud
results are supported by the findings of another study computing world but are growing more and more as the
[3]
in which 66 percent of respondents said their user base and number of cloud providers are increasing.
organization's use of a cloud resource diminishes its There are three categories of cloud computing based on
[4]
ability to protect confidential sensitive information and delivery as defined by ENISA :
62 percent said they believed the cloud services in use by 1. Software as a service (SaaS): is software offered
*Guide - Computer Science Department IET DAVV, Indore
**Computer Science Department IET DAVV, Indore
***Information Technology Department, IET DAVV, Indore, India
Vol. 3 Issue 11 July to Sept. 2017 'kks/k lfjrk 53
153 QUARTERLY BI-LINGUAL RESEARCH JOURNAL
by a third-party provider, available on demand, usually and its need. Possible threats are summarized in section
via the Internet configurable remotely. Examples 4 and relevant solutions to them are classified by section
include online word processing and spreadsheet tools, 5. Section 6 is for Conclusion.
CRM services and web content delivery services Architecture
(Salesforce CRM, Google Docs, etc.). Before examining the threats and security
2. Platform as a service (PaaS): allows customers architecture, we need to understand the definition and
to develop new applications using APIs deployed and architecture of cloud computing. Thereare many
configurable remotely. The platforms offered include definitions for cloud computing in the literature [6]. The
development tools, configuration management, and definition provided by the National Institute of
deployment platforms. Examples are Microsoft Azure, Standards and Technology (NIST) [5]appears to include
Force and Google App engine. key common elements widely used in the cloud
[7]
3. Infrastructure as service (IaaS): provides virtual computing community : “Cloud computing is a model
machines and other abstracted hardware and operating for enabling convenient, on demand network access to a
systems which may be controlled through a service API. shared pool of configurable computing resources (e.g.,
Examples include Amazon EC2 and S3, Terremark networks, servers, storage, applications, and services)
Enterprise Cloud, Windows Live SkyDrive and Rackspace that can be rapidly provisioned and released with
Cloud. minimal management effort or service provider
Also, it can be categorized by type of deployment: interaction”.
• Private cloud. The cloud infrastructure is While a comparatively recent definition
[8]
operated for a private organization. It may be managed bySharma and Trivedi , cloud computing is a set of
by the organization or a third party and may exist on resources that can scale up and down on-demand. It is
premise or off premise. available over the Internet in a self-service model with
• Community cloud. The cloud infrastructure is little to no interaction required with the service
shared by several organizations and supports a specific provider. Cloud enables new ways of offering products
community that has communal concerns (e.g., mission, and services with innovative, technical, and pricing
security requirements, policy, and compliance opportunities.
considerations). It may be managed by the organizations Characteristics of cloud computing as defined
or a third party and may exist on premise or off premise. by Dr. U Ravi Babu[9]are -
• Public cloud. The cloud infrastructure is made 1. On-demand self service
available to the general public or a large industry group 2. Broad network access
and is owned by an organization selling cloud services. 3. Resource pooling
• Hybrid cloud. The cloud infrastructure is a 4. Rapid elasticity
composition of two or more clouds (private, community, 5. Measured service
or public) that remain unique entities, but are bound As per NIST's Cloud Computing Reference
[5]
together by standardized or proprietary technology, Architecture , major activities are identified and their
that enables data and application portability (e.g., cloud activities and functionalities are depicted in a generic
[5]
bursting for load-balancing between clouds) . high-level architecture intended to facilitate the
This article summarizes the definition of cloud understanding of the requirements, uses,
and its architecture and while defining possible threats characteristics and standards of cloud computing.
and attacks it also provides with relevant solutions. As shown in the figure, there are 5 major actors
The remainder of the paper is organized as involved in the process, they can be an organization or a
follows: Section 2 describes the architecture of Cloud user that takes part in process or transaction or manages
while Section 3 laying out the architecture for security functionalities in cloud computing. It follows the Open
Vol. 3 Issue 11 July to Sept. 2017 'kks/k lfjrk 53
154 QUARTERLY BI-LINGUAL RESEARCH JOURNAL
System Interconnection (OSI) model and all the seven also depicts the interactions of actors according to the
layers are depicted in the reference model. The model delivery model described in the previous section.
The major actors can further be defined

according to their roles in cloud computing as - typically think. As the technology progresses, so does
Need for security and its architecture the techniques of data breaches become advanced, with
The average cost to an organization for a breach huge money and infrastructure in cloud the incidents of
of all compliance-related data is $2.8M per year as data breaches and attacks are ever growing. In a recent
[10]
reported by Symantec . The report also finds that an blow torideshare application Uber hackers gained
averageenterprise uses 1516 cloud apps, 40 time they

Vol. 3 Issue 11 July to Sept. 2017 'kks/k lfjrk 53


154 QUARTERLY BI-LINGUAL RESEARCH JOURNAL
access topersonal information of 57 million customers security issues in cloud computing from a customer's
[11]
and driversin October 2016 . The list of data breaches perspective. The architecture is based on delivery model
in cloud includes one of the most popular names like of cloud computing as discussed in section 1 of this
Dropbox, LinkedIn, Yahoo, Pro wrestling giant WWE and paper:Software-as-a-Service (SaaS), Platform-as-a-
many others. While Dropboxhackers tapped into more Service (PaaS), and Infrastructure-as-a-Service (IaaS).
than 68 million user accounts – email addresses and Some of the important components of User
passwords included – representingnearly 5 gigabytes of layer are Cloud Applications, Programming, Tools and
data[12], LinkedIn's cloud data was breached two times – Environments. Some of the popular examples for these
2012 & 2016, with 167 million users' personal applications are B2B, Facebook, Myspace, Enterprise,
information including email and passwords was ISV, Scientific, CDNs, Web 2.0 Interfaces, Aneka,
compromised in 2016[13]. With all these attacks and Mashups, Map Reduce, Hadoop, Dryad, Workflows,
breaches increasing, a robust and unified architecture Libraries, Scripting.
for security needs to be followed by all cloud providers Some of the important components of Service
and cloud users both. Provider Layer are SLA Monitor, Metering, Accounting,
[14]
V.KRISHNA REDDY, Dr. L.S.S.REDDY have Resource Provisioning, Scheduler& Dispatcher, Load
designed a detailed architecture for addressing the

Figure 2 –Security Architecture for Cloud Computing

Vol. 3 Issue 11 July to Sept. 2017 'kks/k lfjrk 53


154 QUARTERLY BI-LINGUAL RESEARCH JOURNAL
Balancer, Advance Resource Reservation Monitor, and 3. Multi tenancy - Multitenancy refers to the cloud
Policy Management. characteristic of resource sharing. Several aspects of the
Some of the security issues related to Service IS are shared including, memory, programs, networks
Provider Layer are Identity, Infrastructure, Privacy, Data and data among multiple unrelated customers.
transmission, People and Identity, Audit and Multitenancy presents a number of privacy and
Compliance, Cloud integrity and Binding Issues. Some of confidentiality threats by breaching data confidentiality
the important components of Virtual Machine Layer as the separation of storage is only virtual so sometimes
creates number of virtual machines and number of data residuals are left in the hardware and space is
operating systems and its monitoring. Some of the allocated to other users.
security issues related to Virtual Machine Layer are VM 4. Data crash – Data can be compromised through
Sprawl, VM Escape, Infrastructure, Separation between various ways; deleted or altered data without formation
Customers, Cloud legal and Regularity issues, Identity of backup, loss of encoding key, weak encryption
and Access management. Some of the important algorithm, lack of disaster recovery systems and illegal
components of Data Center (Infrastructure) Layer access of sensitive data.
contains the Servers, CPU's, memory, and storage, and is 5. Identity and access management - Identity theft
henceforth typically denoted as Infrastructure-as-a- is a form of fraud in which someone pretends to be
Service (IaaS). Some of the security issues related to someone else, to access resources or obtain credit and
Data Center Layer are secure data at rest, Physical o t h e r b e n e f i t s . T h i s a f f e c t s
Security: Network and Server. SaaS, PaaS and IaaS.
Security Issues and challenges 6. Account, Server Hi-jacking – Such threats are
Security concerns and issues can be divided caused when the credentials are stolen. Cause of stolen
among three categories: Threats, Vulnerabilities and credentials are many such as Phishing, Hacking of
Attacks. database and leak of information.
Threats Vulnerabilities
1. Insecure interfaces and API – Customers usually 1. Session riding and Hi-jacking – session hi-jacking
interact with the cloud services through Application refers to accessing of the current session by
Programming Interfaces (APIs). These APIs are extra unauthorized user by use of valid session-key. This is also
layer added to the top of cloud framework and hence known as cookie-stealing and is more of a vulnerability
adds to the complexity of infrastructure. Improper use of web technology. Hi-jacker can delete user's data,
[15]
of such interfaces would often pose threats such as make bids or orders, send spam or even open firewall .
clear-text authentication, transmission of content, 2. Reliability and Availability of service – As the
improper authorizations, etc. cloud is growing to be one of the most depending
2. Malicious insiders – Wicked insiders are most technology for storage of data, continuousavailability of
troublesome factor for security as the customers data is vital. For example, in February 2008, Amazon's
generally are not fully aware of the provider policies and Web Service (Amazons-S3) cloud storage infrastructure
procedures. Insiders gain unauthorized access to the went down for several hours, causing data loss and
[16]
customer's database and might go undetected. This access issues with multiple Web 2.0 services and a
[10] [17]
threat is identified in study by Symantec as it shows similar outage occurred in 2017 .
68% of organizations have some employees who exhibit 3. Insecure Cryptography – As methods to hack the
high-risk behavior in their cloud accounts. Up to 71% of encryption algorithms are in public domain, all an
employees in some cases. High-risk behaviorincludes attacker has to do is to find the encryption algorithm
activities that can indicate data destruction, data used which is fairly easy.
exfiltration, and account takeovers. 4. Diminished Customer Trust - Data breaches
Vol. 3 Issue 11 July to Sept. 2017 'kks/k lfjrk 53
154 QUARTERLY BI-LINGUAL RESEARCH JOURNAL
inevitably result in diminished trust by customers. In one are the most popular solutions to the problems:
of the larges breaches of payment card data ever, cyber 1. Network Protection - Network infrastructure
criminals stole over 40 million customer credit and debit security levels can be enhanced by DNSSEC- Domain
card numbers from Target. The breach led customers to Name System Security implementation, developing
stay away from Target stores and led to a loss of business Denial of Service prevention and router security tactics.
[20]
for the company, which ultimately impacted the .
company's revenue[18]. 2. End to End Encryption – This type of encryption
Attacks is based on asymmetric keys, here through the data is
1. Zombie Attack – Also known as flooding attack. encrypted by using same encryption algorithm for all
In this, the attackers send the cloud with numerous users but the set of keys for every encryption is different
requests from different users requesting for Virtual for different set of users.
Machines(VMs). This might lead to slowing of server or 3. Secure Interfaces and APIs - the interfaces and
even can cause load to be increased so much as to occur APIs are important to implement automation,
Denial of Service (DoS). orchestration, and management. The cloud provider has
2. Server Injection - It's an attack whereby a hostile to ensure that any vulnerability is mitigated.
user submits code to one of your web forms, instead of 4. Insider Attack – Tighter screening and deeper
whatever data you were trying to collect. The hostile background check for employees is very useful in
code either queries your database in a way you don't decreasing inside unauthorized access.
expect or breaks out of your web application and 5. Validation of cloud consumers - the cloud
performs operations directly on your cloud server. provider has to take adequate precautions to screen the
3. Man-in-the middle Attack - If secure socket layer cloud consumer to prevent important features of cloud
(SSL) is not properly configured, then any attacker is able being used for malicious attack purposes. The provider
to access the data exchange between two parties. This should ensure that virtual boundaries are enforced
cryptographic attack is carried out when an attacker can strictly.
place themselves in the communication's path between Conclusion
the users. Here, there is the possibility that they can Security issues are one of the most burning
interrupt and change communications. concern in cloud computing technology. Though major
4. Phishing Attack – Phishing attack is a well- threats remain mostly same over the years but the
known attack where attacker directs user to a link which techniques of threats are advancing like never before.
is a fake version of some service to get the sensitive data. Most risks and faults are identified too late to prevent
This link can be hosted on cloud platform without being causing harm to revenue and trust of users. Though
detected as an independent link. much research is done in identifying the threats,
Solutions formation of uniform global protocols for cloud is yet to
Solutions for threats, vulnerabilities and attacks see the light of day. Also, much work is to be done in the
on cloud computing can be solved mostly by following a field of training and educating employees on security of
security architecture like one described in section 2. cloud. This paper deals with the complexity of cloud
Also, cloud computing security challenges can be infrastructure and its security while explaining the
handled practically by performing security assessment threats caused by it. However, future works can be done
[19]
. The architecture of cloud includes various on filling the gaps in security and linking of SaaS, PaaS
securitycomponents like Access Management, Security and IaaS.
API, Network Security and Storage Security. These References
components areembedded in the cloud architecture to 1. Cloud Computing Predictions 2018. (2017).
provide secure cloud computing. However, following https://www.forrester.com/report/Predictions+2018+
Vol. 3 Issue 11 July to Sept. 2017 'kks/k lfjrk 53
154 QUARTERLY BI-LINGUAL RESEARCH JOURNAL
Cloud+Computing+Accelerates+Enterprise+Transforma 11. U b e r D a t a b r e a c h . 2 0 1 6 .
tion+Everywhere/-/E-RES139611 https://www.telegraph.co.uk/technology/2017/11/21/
2. State of the Cloud Report. (2017). uber-cyber-breach-sees-57-million-users-data-
https://www.rightscale.com/lp/state-of-the-cloud exposed/
3. Data Breach: The Cloud Multiplier Effect. (2014). 12. Dro p b o x Data L eak.2017.
http://www.netskope.com/reports/ponemon-2014- https://www.forbes.com/sites/leemathews/2017/12/
data-breach-cloud-multiplier-effect/ 11/billion-hacked-passwords-dark-
4. Cloud Computing Benefits, risks and web/#6dae866521f2
recommendations for information security by ENISA. 13. LinkedIn Data Leak. 2016.
(2012). https://resilience.enisa.europa.eu/cloud- https://www.forbes.com/sites/thomasbrewster/2016/
security-and-resilience/publications/cloud-computing- 05/18/linkedin-2012-password-hack-gets-much-
benefits-risks-and-recommendations-for-information- worse/#5e2117334f3c
security/ 14. V.KRISHNA REDDY, Dr. L.S.S.REDDY.
5. National Institute of Standards and Technology, 2011.https://www.researchgate.net/profile/Vuyyuru_
The NIST Definition of Cloud Computing, Information Reddy/publication/299572565_Security_Architecture_
Technology Laboratory, 2009. of_Cloud_Computing/links/56ffe79508aee995dde81a
6. L. Vaquero, L. Rodero-Merino, J. Caceres, and 6f/Security-Architecture-of-Cloud-
M. Lindner, “A Break in the Clouds: Towards a Cloud Computing.pdf?origin=publication_detail
Definition,” ACM SIGCOMM Computer Communication 15. T. Schreiber, “Session Riding a Widespread
Review, Volume 39 Issue 1, pages 50-55, January 2009. Vulnerability in Today'sWeb Applications” [Online],
7. P. Mell and T. Grance, “The NIST Definition of A v a i l a b l e :
Cloud Computing” Recommendation of NIST, Special http://www.securenet.de/papers/Session_Riding.pdf,
P u b l i c a t i o n 8 0 0 - 1 4 5 , 2 0 1 1 . white paper, 2004. [Accessed: 20-Jul-2011].
http://csrc.nist.gov/publications/nistpubs/800- 16. AWS S3 Availability Report.
145/SP800-145.pdf 2008.https://status.aws.amazon.com/s3-
8. Sharma, R. & Trivedi, R. K. (2014). Literature 20080720.html
review: Cloud Computing –Security Issues, Solution and 17. AWS S3 Availability Report. 2017.
Technologies. International Journal of Engineering https://aws.amazon.com/message/41926/
Research, Vol. 3, Issue 4, pp. 221-225. 18. https://www.reuters.com/article/us-target-
9. Dr. U Ravi Babu. INTERNATIONAL JOURNAL breach/target-cyber-breach-hits-40-million-payment-
FOR RESEARCH IN EMERGING SCIENCE AND cards-at-holiday-peak-idUSBRE9BH1GX20131219
TECHNOLOGY, VOLUME-4, ISSUE - 1, JAN – 19. Carl Almond, “A Practical Guide to Cloud
2017 C o m p u t i n g S e c u r i t y ” ,
10. Symantec Report. 2018. http://www.avanade.com/Documents/Research%20a
https://resource.elq.symantec.com/LP=4717?cid=7013 nad%20Insights/practicalguidetocloudcomputingsecuri
8000001QNHyAAO&inid=symc_cloud-application- ty574834.pdf, August 2009.
security-cloudsoc_fam_to_leadgen_form_LP- 20. Diana Kelley,” Cloud computing security model
4717_1H-2017-shadow-data-report overview: Network Infrastructure issues”,
http://searchcloudsecurity.techtarget.com/tip/ , 2009.

Vol. 3 Issue 11 July to Sept. 2017 'kks/k lfjrk 53


154 QUARTERLY BI-LINGUAL RESEARCH JOURNAL

You might also like