Unit-5 CC
Unit-5 CC
Unit – V
Security and Privacy Issues in Cloud Computing
The aim of cloud infrastructure security is to protect cloud-based assets from cyber security
threats.
Infrastructure security is the practice of protecting critical systems and assets against physical
and cyber threats.
1) Data Loss –
Data Loss is one of the issues faced in Cloud Computing. This is also known as Data
Leakage.
As we know that our sensitive data is in the hands of Somebody else, and we don’t have
full control over our database.
So, if the security of cloud service is to break by hackers then it may be possible that
hackers will get access to our sensitive data or personal files.
Many organizations will face different problems while shifting from one vendor to
another.
For example, An Organization wants to shift from AWS Cloud to Google Cloud Services
then they face various problems like shifting of all data, also both cloud services have
different techniques and functions, so they also face problems regarding that.
Also, it may be possible that the charges of AWS are different from Google Cloud, etc.
5) Lack of Skill –
While working, shifting to another service provider, need an extra feature, how to use a
feature, etc. are the main problems caused in IT Company who doesn’t have skilled
Employees.
So it requires a skilled person to work with Cloud Computing.
There are no new attacks, vulnerabilities, or changes that need to be considered in this specific
topology by the information security personnel, beside that our organization’s IT infrastructure
might be affected by the implementation of a private cloud but our current network topology
probably will not get affected. whereas if we used the services of public clouds any changes in
the security requirements will require a change in the network topology. Therefore, we must
define some ways through which our existing network topology will interact with the topology of
the cloud provider.
User can reduce their cloud security challenges in many ways, which is why it is essential.
Network security provides enterprise-level protection for cloud resources. It means operating
remotely becomes more secure and more manageable. It helps company teams collaborate better
and improve productivity.
2. Reduces Costs
The cloud infrastructure is not expensive for customers because they don’t have to buy them.
You only use cloud services offered by a provider and pay through a subscription model.
Implementing cloud computing or network security will safeguard you from cyber-attacks and
reduce the cost of data recovery.
3. Data Protection
Cloud computing network security helps protect user data from cyber-attacks and shields against
misconfigurations and human errors.
Cloud services need to be available to customers around the clock. To ensure this availability,
you must first employ network security measures to prevent downtime due to a breach. In
addition, network security helps build customer trust because it shows commitment to protecting
their data.
How you implement your private cloud environment is the critical element in meeting cloud
security compliance. A compliance management platform can help you leverage solutions while
connecting them to your business risk and regulatory requirements. For example, in the
healthcare industry.
You can use some tools in your line of service for data protection. Some of the common ones
include:
A common form of cyber attack is malware, which infiltrates and corrupts user files. When a
user experiences a malware attack, the best way to counter it is by installing an antivirus like
Kerperskey. It scans your file system and removes all threats.
2. Application Security
Updating your system security can be the first step in protecting your data from attack.
Combining antiviruses and best practices can help patch security gaps in a platform.
3. Behavioral Analytics
Creating a system that monitors user behavior is crucial to an organization, and here is why.
When staff or devices access a cloud system, monitoring use and behavior is easy. If they’re
irregular behavior like unauthorized access, it can indicate a system breach. Having such systems
can help to prevent any threat early.
5. Access Control
It’s when a company limits access to sensitive information to only authorized people. Companies
accomplish it by applying security policies restricting access to specific networks or system
sections.
Any business needs to understand the top cloud data security network challenges they can face.
Common ones include:
Most cloud failures are because of some human error. It is a constant risk, especially when
building business apps. It gets amplified when these business apps get hosted in a public cloud.
The reason is the ease of use by multiple users without proper controls. Ways you can manage
this challenge is by building strong controls.
2. DDoS Attack
When your environment gets exposed, it’s called a DDoS attack. It happens when you
continuously add microservices to your caseload. Small data leaks can build up to a full-blown
attack. A user can manage the attack surface by managing their cloud resources.
3. Shadow IT
When an organization’s employee illegally gets access to the cloud servers without approval, it’s
called shadow IT. The risks associated with it are compliance violations, breaches, and more. In
addition, they can implement cloud usage policies. Not only that but also monitor cloud usage
and provide staff with approved cloud services and applications.
4. Scaled Vulnerabilities
The cloud needs more advanced security protocols than on-premise servers. That’s why an
admin needs to learn a new cloud security strategy that adheres to modern standards. So,
businesses need the proper knowledge and expertise to know cloud security challenges.
Host level security in cloud computing about safeguarding the individual servers or virtual
machines (VMs) that run applications and store data in the cloud.
Host-level security in cloud computing refers to the security measures and practices implemented
at the level of individual virtual or physical machines (hosts) within a cloud environment.
These measures are crucial for protecting data, applications, and resources from unauthorized
access, malicious attacks, and other potential threats. Here are some key aspects of host-level
security in cloud computing:
1. Hypervisor Security: The hypervisor, also known as a virtual machine monitor (VMM), is
responsible for managing and allocating computing resources among virtual machines (VMs) on
a physical host. Ensuring the security of the hypervisor is critical to prevent vulnerabilities that
could be exploited to compromise multiple VMs running on the same host.
2. Secure Boot and Firmware Integrity: Secure boot mechanisms ensure that only trusted
firmware and operating system components are loaded during the boot process, guarding against
unauthorized modifications and boot-time attacks. Maintaining the integrity of firmware and
keeping it up to date is essential for host security.
3. Access Control: Implement strong access control mechanisms to regulate who can access and
manage host systems. This includes using role-based access control (RBAC), least privilege
principles, and multi-factor authentication (MFA) to restrict unauthorized access.
4. Patch Management: Regularly update and patch the host operating systems, applications, and
libraries to address known vulnerabilities and mitigate the risk of exploitation by attackers.
Automated patch management solutions can help streamline this process.
6. Antivirus and Malware Protection: Install and maintain up-to-date antivirus and anti-malware
software on host systems to detect and remove malicious software that could compromise the
integrity and security of the environment.
7. Encryption: Use encryption protocols (e.g., TLS for network communications, BitLocker for
data-at-rest encryption) to protect data both in transit and at rest on host systems, reducing the
risk of unauthorized data access and interception.
8. Logging and Monitoring: Enable logging and monitoring mechanisms to track and analyze
host-level activities, including login attempts, system changes, and security events. Security
information and event management (SIEM) tools can help centralize and correlate logs for better
threat detection and response.
9. Backup and Disaster Recovery: Implement robust backup and disaster recovery strategies to
ensure data resilience and continuity of operations in case of host failures, data corruption, or
cyber incidents.
10. Security Best Practices: Follow industry best practices and security guidelines provided by
cloud service providers (CSPs) and security standards bodies (e.g., NIST, ISO) to enhance host-
level security posture and compliance with regulatory requirements.
Application-level security in cloud computing refers to the security measures and practices
implemented to protect the software applications and services hosted in a cloud environment.
These measures are crucial for ensuring the confidentiality, integrity, and availability of data, as
well as protecting against various cyber threats. Here are some key aspects of application-level
security in cloud computing:
2. Data Encryption: Use encryption techniques to protect data both at rest and in transit. Encrypt
sensitive data before storing it in databases or file systems, and ensure that communication
channels between clients and servers are encrypted using protocols like TLS (Transport Layer
Security).
4. Session Management: Employ secure session management practices, such as session tokens
with limited lifespan and session timeout mechanisms, to reduce the risk of session hijacking and
unauthorized access to user sessions.
5. Secure Coding Practices: Follow secure coding guidelines and best practices, such as those
provided by organizations like OWASP (Open Web Application Security Project), to develop
secure and resilient applications. Conduct regular code reviews and security testing (e.g., static
analysis, dynamic analysis) to identify and mitigate vulnerabilities early in the development
lifecycle.
6. API Security: If your application exposes APIs (Application Programming Interfaces), ensure
that API endpoints are secure and protected against unauthorized access, abuse, and attacks such
as API key leakage, parameter manipulation, and injection attacks. Implement rate limiting,
authentication, and authorization mechanisms for API endpoints.
7. Web Application Firewall (WAF): Deploy a WAF to monitor and filter incoming and
outgoing traffic to the application, providing protection against common web application attacks
such as XSS, SQL injection, and CSRF (Cross-Site Request Forgery).
8. Logging and Monitoring: Enable comprehensive logging of application activities, events, and
security-related incidents. Implement real-time monitoring and alerting mechanisms to detect
and respond to suspicious activities, anomalies, and potential security breaches promptly.
10. Incident Response Planning: Develop and maintain an incident response plan that outlines
procedures for responding to security incidents, including data breaches, unauthorized access
attempts, and service disruptions. Conduct regular security drills and exercises to test the
effectiveness of the plan and improve incident response capabilities.
Data security and storage in cloud computing are critical aspects that involve
safeguarding sensitive information, ensuring data integrity, availability, and
confidentiality.
Cloud computing offers various services and deployment models, each with its own data
security considerations.
Here are key aspects of data security and storage in cloud computing:
1. Data Encryption: Encrypt data both at rest (stored data) and in transit (data being transmitted
over networks). Use strong encryption algorithms (e.g., AES-256 for data at rest, TLS for data in
transit) to protect data from unauthorized access and interception.
2. Access Control: Implement robust access control mechanisms to regulate who can access data
and resources in the cloud environment. Use identity and access management (IAM) tools to
enforce least privilege principles, role-based access control (RBAC), and multi-factor
authentication (MFA) to authenticate and authorize users.
3. Data Masking and Tokenization: Use data masking techniques to obfuscate sensitive
information in non-production environments, reducing the risk of exposure during development
and testing. Tokenization can also be used to replace sensitive data with non-sensitive
equivalents (tokens) to protect sensitive data in storage and transit.
4. Backup and Disaster Recovery: Implement regular data backups and disaster recovery
strategies to ensure data resilience and continuity of operations. Use cloud-based backup
solutions and replication mechanisms to create redundant copies of data in geographically
diverse locations.
5. Data Loss Prevention (DLP): Deploy DLP solutions to monitor, detect, and prevent
unauthorized access, leakage, or misuse of sensitive data. DLP tools can identify and enforce
policies to protect data based on content, context, and user behavior.
6. Secure Data Sharing: Use secure methods for sharing data within and outside the
organization, such as encrypted file sharing platforms, secure APIs, and data access controls.
Implement data governance policies to manage data sharing permissions and track data access
and usage.
7. Compliance and Regulatory Requirements: Ensure that data storage and handling practices
comply with relevant regulatory requirements, industry standards, and data protection laws (e.g.,
GDPR, HIPAA, PCI DSS). Cloud providers may offer compliance certifications and tools to
help meet these requirements.
9. Monitoring and Auditing: Enable logging, monitoring, and auditing capabilities to track data
access, modifications, and security events in the cloud environment. Use security information
and event management (SIEM) tools to centralize logs, analyze threats, and generate real-time
alerts.
10. Vendor Security Assurance: Evaluate the security practices and certifications of cloud
service providers (CSPs) regarding data security, storage, and privacy. Understand the shared
responsibility model to clarify which security responsibilities are managed by the CSP and which
remain the customer's responsibility.
By addressing these data security and storage considerations in cloud computing, organizations
can enhance data protection, reduce security risks, and maintain compliance with regulatory
requirements, ultimately fostering trust and confidence in their cloud-based operations. Regular
security assessments, training, and collaboration between stakeholders are essential for effective
data security management in the cloud.
Privacy issues in cloud computing revolve around concerns related to the collection,
storage, processing, and sharing of personal and sensitive data in cloud environments.
These issues stem from the distributed nature of cloud infrastructure, shared resources,
potential lack of transparency, and varying levels of control over data.
Here are some key privacy issues in cloud computing:
Attackers can take undue advantage of the multi-residence opportunities and can launch
various attacks against their co-tenants which can result in several privacy challenges.
5. Transparency Issues
In cloud computing security, transparency means the willingness of a cloud service
provider to reveal different details and characteristics on its security preparedness.
Some of these details compromise policies and regulations on security, privacy, and
service level.
In addition to the willingness and disposition, when calculating transparency, it is
important to notice how reachable the security readiness data and information actually
are.
It will not matter the extent to which the security facts about an organization are at hand
if they are not presented in an organized and easily understandable way for cloud service
users and auditors, the transparency of the organization can then also be rated relatively
small.
7. Managerial Issues
There are not only technical aspects of cloud privacy challenges but also non-technical
and managerial ones.
Even on implementing a technical solution to a problem or a product and not managing it
properly is eventually bound to introduce vulnerabilities.
Some examples are lack of control, security and privacy management for virtualization,
developing comprehensive service level agreements, going through cloud service vendors
and user negotiations, etc.
1. Data Creation:
Data is gathered from various sources, including sensors, devices, applications, human
interactions, social media posts, and IoT temperature readings.
The raw material for the data lifecycle passes through the ingestion, processing, storage,
and analysis phases to produce insightful information.
Creating data is the first step in turning unactionable information into knowledge that can
be used.
2. Data Storage:
Data finds a secure place in cloud storage infrastructure, encompassing object, block, and
database storage options.
These choices have diverse features to suit various data types and use cases.
Cloud storage ensures accessibility, scalability, and resilience while allowing
organizations to pick the ideal storage method.
This stage is pivotal in the data lifecycle, where data is protected and prepared for future
use and retrieval.
3. Data Processing:
Processing transforms data into a usable format, making tasks like data analysis, machine
learning, and artificial intelligence applications feasible.
This process converts unstructured data into structured data that can power automation
and insights.
Data processing is essential for deriving value and understanding from data, whether
combining numbers for analytics or developing AI algorithms.
It bridges the gap between unactionable insight and raw data.
4. Data Sharing:
Data is accessible to approved users and programs for collaboration and utilization.
This phase entails securely distributing it inside a restricted framework to ensure only
authorized parties can interact with the data.
Sharing data is crucial to data management as it promotes collaboration, decision-
making, and the ability to derive insights from the data.
Strong access controls and permissions are needed to maintain data security and
compliance.
5. Data Archival:
Data is archived to meet compliance requirements and to ensure long-term storage.
Data is transferred at this phase to cost-effective, secure storage options built for long-
term retention.
Archiving ensures that previous data is still available when needed and reduces storage
expenses for data utilized less often.
It is essential for ensuring data integrity and compliance with legal requirements.
6. Data Destruction:
When data no longer serves a purpose or when required by laws and regulations, it is
destroyed.
Information must be securely deleted or removed at this step to ensure that data cannot be
accessed or retrieved.
Data deletion is crucial for preserving data privacy and compliance, especially when
keeping data is useless or illegal.
It adheres to data governance standards and protects sensitive information.
Addressing privacy issues in cloud computing requires a comprehensive approach that combines
technical controls, legal compliance, transparency, user education, and ongoing risk
management. Organizations should conduct privacy impact assessments, adopt privacy-
enhancing technologies, implement strong data protection measures, and engage in transparent
communication with stakeholders to mitigate privacy risks and protect individuals' privacy rights
in the cloud.
1. Data Ownership and Control: One of the primary concerns is determining who owns the
data stored in the cloud and how much control individuals or organizations have over their data.
Cloud service providers (CSPs) may assert certain rights over data stored on their platforms,
leading to questions about data ownership and sovereignty.
2. Data Location and Jurisdiction: Data stored in the cloud may be replicated across multiple
geographical locations for redundancy and performance reasons. This raises concerns about data
residency, compliance with local data protection laws, and the jurisdictional issues that arise
when data crosses international borders.
3. Data Security and Breaches: The security of data in the cloud is a major privacy concern.
Breaches, unauthorized access, data leaks, or vulnerabilities in cloud services can lead to the
exposure of sensitive information, compromising individuals' privacy rights and potentially
resulting in financial or reputational damage.
4. Data Access and Sharing: Cloud environments often involve sharing data with third parties,
such as cloud service providers, partners, or subcontractors. Privacy risks arise when data is
accessed, processed, or shared without proper authorization, encryption, or contractual
safeguards in place.
5. Compliance and Regulatory Challenges: Compliance with data protection regulations and
privacy laws (e.g., GDPR, CCPA, HIPAA) presents challenges in cloud computing.
Organizations must ensure that cloud providers adhere to relevant privacy requirements, provide
transparency about data handling practices, and offer data protection assurances.
6. Data Minimization and Purpose Limitation: The principle of data minimization, which
advocates for collecting only necessary data, and purpose limitation, which restricts data use to
specified purposes, can be challenging to enforce in cloud environments where data may be
stored or processed for various purposes without clear consent or control.
7. Vendor Lock-in and Portability: Organizations may face vendor lock-in issues when
migrating data between cloud providers or transitioning from cloud to on-premises
environments. Lack of data portability standards, interoperability challenges, and contractual
limitations can hinder data mobility and control.
8. Cloud Service Agreements and Terms: Privacy concerns also arise from the terms and
conditions outlined in cloud service agreements. Organizations must carefully review and
negotiate contractual terms related to data privacy, security, compliance, data retention, and data
access rights to protect their interests and privacy obligations.
9. Data Analytics and Profiling: Cloud-based data analytics, machine learning, and profiling
techniques raise privacy concerns related to the aggregation, analysis, and use of personal data to
derive insights, make decisions, or create targeted advertising, posing risks to individual privacy
and autonomy.
10. Transparency and Accountability: Transparency about data practices, security measures,
data breaches, and incident response capabilities is crucial for building trust and accountability in
cloud computing. Organizations should demand transparency from cloud providers and maintain
transparency with users regarding data handling practices and privacy policies.
3. Data encryption
One of the best ways to protect your data while using cloud storage is to do data
encryption.
This is the best form of security because you need decryption before accessing the data.
This will protect data against service providers and users also.
To make it more protected, you can also ensure cloud encryption during uploading and
downloading phases.
But, this will make data sharing and sync in the cloud platform little slow.
5. Using password
The first thing which can be done is to put strong password which can stand a hacking.
You can take the help of internet to learn how to create a strong password.
It is very important to change your password frequently and never use the same password
for all the accounts or folders.
You can opt for 2-step verification for login if your cloud service offers that option.
Google drive use 2 phase log in option, consist of password & code sent to the registered
number.
This added security will make your data much safer.
7. Anti-virus is a must
Sometimes the weakest link happens to be the computer or device you use for cloud data
access.
You need to put proper protection in your system/device.
It will help in securing your business data. If you expose yourself to bugs and viruses,
hackers can access your system easily.
You need to choose a very effective and robust anti-virus system for your system, which
will protect all the files and information inside that.
If your system isn’t well protected, and if the system is not encrypted and secured from
bugs, hackers can get hold of your information.
9. Access limitation
Give access to those users who really need.
Internal users and third party vendors should only get access to those files which will
help them to do their jobs.
Use encryption keys if required. Make sure to evaluate the users and vendors regularly
and add/remove users as per the requirement.