Datacenter and Cloud Security - Unit 3
Datacenter and Cloud Security - Unit 3
Module Number:
3
Module Name:
Security Levels & Issues
1
Contents
2
Cloud security delivery models
3
Cloud security delivery models
Introduction
• Software-as-a-Service (SaaS)
• Platform-as-a-Service (PaaS)
• Infrastructure-as-a-Service (IaaS)
4
Cloud security delivery models
SaaS
- Rents software on a subscription basis.
- Service includes software, hardware and support.
- Users access the service through authorized device.
- Suitable for a company to outsource hosting of apps.
PaaS
- Vendor offers development environment to application developers.
- Provide, develops toolkits, building blocks, payment hooks.
IaaS
- Processing power and storage service.
- Hypervisor is at this level.
5
Deployment Models
Public Clouds
• Hosted, operated and managed by third party vendor.
• Security and day to day management by the vendor.
Private Clouds
• Networks, infrastructures, data centers owned by the organisation.
Hybrid Clouds
• Sensitive applications in a private cloud and non sensitive applications in a
public cloud.
6
What is Cloud sec?
7
Infrastructure security
Infrastructure
Different levels
Network level
Host level
Application level
8
Network Level
• Ensuring availability of the internet facing resources of the public cloud used by
the organisation.
9
Network Level
Reassigned IP address
Expose services unexpectedly.
Spammers using EC2 are difficult to identify.
10
Network Level
11
Network Level Security Issues
12
Network Level Security Issues
13
Host Level
14
(Continued) Host Level
Hypervisor security
“zero-day vulnerability” in VM, if the attacker controls hypervisor.
15
Host Level Security Issues
Host Level
16
Application level
17
Application level Security issues
18
Application level Security Issues
Various techniques to
detect the security flaws
Inject the malicious like: Active
Cross site scripts into web contents. Content Filtering,
Scripting Content Based
attacks Data Leakage Prevention
Technology, Web
Application
Vulnerability Detection
Technology.
19
Cloud Storage And Data Security
20
Cloud Storage And Data Security
Introduction
Cloud storage providers and enterprises share responsibility for cloud storage
security. Cloud storage providers implement baseline protections for their platforms
and the data they process, such authentication, access control, and encryption.
21
Aspects of Data Security
Security for:
Data in transit
Data at rest
Data Lineage
Data Provenance
Data remnance
22
Data Security
Data-in-transit
Cannot be encrypted for most PaaS and SaaS (such as Google Apps) –
prevent indexing or searching.
23
Data Lineage
24
Data Provenance
Origin/ownership of data
25
Data Remanence
26
Provider’s Data and it’s Security
27
Data Security Mitigation
• Even through data in transit is encrypted, use of the data in the cloud will require
decryption. i.e., cloud will have unencrypted data.
28
Data Privacy and Security Issues
29
Data Privacy and Security Issues
Introduction
Data security and privacy protection are the two main factors of user's concerns
about the cloud technology. Though many techniques on the topics in cloud
computing have been investigated in both academics and industries, data security
and privacy protection are becoming more important for the future development of
cloud computing technology in government, industry, and business. Data security
and privacy protection issues are relevant to both hardware and software in the
cloud architecture.
30
Data privacy and security Issues
31
Data Integrity
• Data integrity in the cloud system means preserving information integrity. The
data should not be lost or modified by unauthorized users.
• Data integrity is the basis to provide cloud computing service such as SaaS, PaaS,
and IaaS. Besides data storage of large-scaled data, cloud computing environment
usually provides data processing service.
32
Data Confidentiality
Data confidentiality is important for users to store their private or confidential data in
the cloud. Authentication and access control strategies are used to ensure data
confidentiality.
The data confidentiality, authentication, and access control issues in cloud computing
could be addressed by increasing the cloud reliability and trustworthiness.
33
Data Confidentiality
• Homomorphic Encryption.
• Distributive Storage.
• Hybrid Technique.
• Data Concealment.
• Deletion Confirmation.
34
Data Availability
When accidents such as hard disk damage, IDC fire, and network failures occur, the
extent that user's data can be used or recovered and how the users verify their data by
techniques rather than depending on the credit guarantee by the cloud service
provider alone.
The issue of storing data over the trans boarder servers is a serious concern of clients
because the cloud vendors are governed by the local laws and, therefore, the cloud
clients should be cognizant of those laws.
Moreover, the cloud service provider should ensure the data security, particularly data
confidentiality and integrity. The cloud provider should share all such concerns with
the client and build trust relationship in this connection.
35
(Continued) Data Availability
The cloud vendor should provide guarantees of data safety and explain jurisdiction of
local laws to the clients. The main focus of the paper is on those data issues and
challenges which are associated with data storage location and its relocation, cost,
availability, and security.
Locating data can help users to increase their trust on the cloud. Cloud storage
provides the transparent storage service for users, which can decrease the complexity
of cloud, but it also decreases the control ability on data storage of users.
Benson et al. studied the proofs of geographic replication and succeeded in locating
the data stored in Amazon cloud.
36
Data Privacy
2. How: a user may be comfortable if his/her friends can manually request his/her
information, but the user may not like alerts to be sent automatically and frequently.
3. Extent: a user may rather have his/her information reported as an ambiguous region
rather than a precise point.
37
(Continued) Data Privacy
The privacy issue differs according to different cloud scenarios and can be divided into
four subcategories as follows:
1. How to enable users to have control over their data when the data are stored and
processed in cloud and avoid theft, nefarious use, and unauthorized resale.
38
Security Management in Clouds
39
Security Management Standards
Security of information is becoming a serious matter over the internet. There are
number of security standards developed which are used in conventional computing.
This standard which was formerly known as BS 7799-2, is intended to “provide a model
for establishing, implementing, operating, monitoring, reviewing, maintaining and
improving an information security management system (ISMS)”.
40
(Continued) Security Management Standards
This standard is an auxiliary standard to ISO 27001. It establishes the “guidelines and
general principles for initiating, implementing, maintaining and improving
information security management in an organisation”
It’s purpose is stated as “provide general guidance on the commonly accepted goals of
information security management”.
The objectives and controls in this standard are expected to meet the requirements
identified during risk assessment when implemented.
41
Management of Security in Cloud
42
Questions?
43