Unit 4 - Cloud Computing
Unit 4 - Cloud Computing
The revenue we generate from the ads we show on our website and app
funds our services. The generated revenue helps us prepare new notes
and improve the quality of existing study materials, which are
available on our website and mobile app.
If you don't use our website and app directly, it will hurt our revenue,
and we might not be able to run the services and have to close them.
So, it is a humble request for all to stop sharing the study material we
provide on various apps. Please share the website's URL instead.
Downloaded from www.rgpvnotes.in, whatsapp: 8989595022
Cloud security fundamentals, Vulnerability assessment tool for cloud, Privacy, and Security in cloud:
Cloud computing security architecture, General Issues, Trusted Cloud computing, Security challenges:
Virtualization security management-virtual threats, VM Security Recommendations, VM-Specific
Security techniques, Secure Execution Environments and Communications in the cloud.
policies. It gives an alarm when a person tries to sign in from on premise cloud software or cloud
applications.
infrastructure. Sometimes, the components that make up the infrastructure for cloud technology-as-a-service
offers are not designed to offer strong isolation properties for a multi-tenant cloud service.
• VM Image Management: VM Image (VMI) is a type of file or the format of the data which is used to create
the virtual machine in the environment of virtualization. Hence, the confidential data and the integrity of
VMIs are very important when the VMs are migrating or starting.
• Patch Management: Patch management is acquiring, installing, or testing system management or inserting
code changes to the computer system administration. It also includes on the available patches of the
maintaining current knowledge ensuring the patches are installed properly. Patch management is built for
identify and test the various types of code changes.
• Audit: In the lifecycle of the Virtual machines, the sensitive data and the behavior of the virtual machines
should be monitored throughout the virtual system. This may be done with auditing which provides the
mechanism to check the traces of the activities left by the virtual system.
VIRTUAL THREATS
Some of the virtual threats to Cloud computing security are:
1. Shared clipboard:
Shared clipboard technologies enable information to become transferred between VMs as well as the host,
offering a means of moving information between malicious programs in VMs of various security realms.
2. Keystroke logging:
Some VM technologies allow the logging of keystrokes and screen updates to become passed across virtual
terminals within the virtual machine, writing to host files and permitting the monitoring of encrypted
terminal connections in the VM.
3. VM monitoring in the host:
Since all network packets coming from or planning to a VM pass with the host, the host may be able to
impact the VM from the following this:
• Starting, stopping, pausing, and restart VMs
• Monitoring and configuring resources available to the VMs, including CPU, memory, disk, and network
usage of VMs
• Adjusting the amount of CPUs, level of memory, quantity, and variety of virtual disks, and quantity of
virtual network interfaces offered to a VM.
• Monitoring the applications running inside the VM.
• The viewing, copying, and modifying data stored about the VM’s virtual disks.
4. Virtual machine monitoring from another VM:
VMs shouldn’t have the ability to directly access one another’s virtual disks around the host. Nevertheless, if
the VM platform uses a virtual hub or switches for connecting the VMs to the host, then intruders may be
able to use a hacker technique called “ARP poisoning” to redirect packets planning to or in the other VM for
sniffing.
5. Virtual machine backdoors:
Virtual machine backdoors, covert communications channel between guest and host could allow intruders to
execute potentially harmful operations.
VM SECURITY RECOMMENDATIONS
Following virtual machine security recommendations help ensure the integrity of the cloud:
• General Virtual Machine Protection: A virtual machine is, in most respects, the equivalent of a physical
server. Employ the same security measures in virtual machines that for physical systems.
• Minimize Use of the Virtual Machine Console: The virtual machine console provides the same function
for a virtual machine that a monitor provides on a physical server.
Users with access to the virtual machine console have access to virtual machine power management and
removable device connectivity controls. Console access might therefore allow a malicious attack on a virtual
machine.
• Prevent Virtual Machines from Taking over Resources: When one virtual machine consumes so much of
the host resources that other virtual machines on the host cannot perform their intended functions, a Denial
of Service (DoS) might occur.
To prevent a virtual machine from causing a DoS, use host resource management features such as setting
Shares and using resource pools.
• Disable Unnecessary Functions Inside Virtual Machines: Any service that is running in a virtual machine
provides the potential for attack. By disabling system components that are not necessary to support the
application or service that is running on the system, to reduce the potential.
sensitive data that resides within the VM. In this environment, as with the previous one described, the key
server could reside anywhere.
• Encryption of VM images and application data:
Another model combines encryption at the VM and storage layers. This combined option is superior because
there's an encrypted path for sensitive data from the VM through the hypervisor. This prevents the VM
administrator from seeing clear text data.
The need for cloud communications has resulted from the following trends in the enterprise:
• Distributed and decentralized company operations in branch and home offices
• Increase in the number of communication and data devices accessing the enterprise networks
• Hosting and managing IT assets and applications
These trends have forced many enterprises to seek external services and to outsource their requirement for IT
and communications. The cloud is hosted and managed by a third party, and the enterprise pays for and uses
space on the cloud for its requirements. This has allowed enterprises to save on costs incurred for hosting and
managing data storage and communication on their own.
The following are some of the communication and application products available under cloud communications
that an enterprise can utilize:
• Private branch exchange
• SIP Trucking
• Call center
• Fax services
• Interactive voice response
• Text messaging
• Voice broadcast
• Call-tracking software
• Contact center telephony
All of these services cover the various communication needs of an enterprise. These include customer relations,
intra-branch and inter-branch communication, inter-department memos, conference, call forwarding, and
tracking services, operations center, and office communications hub.
Cloud communication is a center for all enterprise-related communication that is hosted, managed, and
maintained by third-party service providers for a fee charged to the enterprise.