Cloud Computing- Unit 3
Cloud Computing- Unit 3
SOA foundation
A service-oriented architecture (SOA) is a design methodology used to develop
software based on interoperable services. Actually, these services are the IT capabilities
that are provided to components using a communication network.
Organizations compliant with SOA are known as the service-oriented enterprises
(SOE)
Characteristics
Refurbished and reusable: Services can be reused multiple times for multiple
processes.
Loosely coupled: Services are designed to be independent with minimum
dependency on implementation.
Platform independent: The base of services in the XML format.
Based on standards: The service design is based on WSDL and SOAP standards.
Service Provider: It provides all kinds of service-related operations like service registration,
service discovery, exception handling, platform independence, interoperability, and so on.
Service Consumer: It is a human or a system that uses service(s) supported by SOA and
which has a valid entry in the service registry.
Service Registry: It is the connection between service providers and service customers. Both
the service provider and service consumer needs to register themselves to service registry
before starting communication. It is just like an information catalog that allows service
providers to discover services. The registry is constantly updated with services and their
information.
SOA components
There are three core components in a SOA communication model:
SOA Infrastructure
Applications need the SOA infrastructure and SOA platform for successful execution
and organization.
Core: This level performs core functions which include constructing, seeking and binding
of web services.
Platform: This level is where the World Wide Web services are developed using some
programming languages like J2EE and .NET.
QoS: This level tests if the evolved web service supports value of service.
Need of SOA
Reduced cost:
Reengineering and reusability adds value to core investments
Faster integration, agile and long-term value of interoperability
Scalability:
Scalable and evolvable systems
Rapid scale up and scale down as per organizational needs
Platform independence and compatibility with heterogeneous environment:
Semantic message-oriented interactions
Business agility:
Build to change
Build and deployed incrementally
Loosely coupled
Business Process Management (BPM)
BPM is a dimension of operations management that emphasizes on refining and optimizing
business processes through automation.
BPM itself is not a technology but enables technologies to operate in such a way that the
current processes get aligned to a desired and optimized state.
Reengineering and outsourcing are examples of BPM.
CLOUD SECURITY
Data breaches: Data breach occurs when an unauthorized third party maliciously gains access
to data at rest in a cloud infrastructure or data in transit for compromising its integrity
Network security: Network security problems often arise when an elastic cloud infrastructure
is incorrectly configured or experience a malicious-denial-of-service attack or unauthorized
access leading to data leakage.
Data locality: Cloud service consumers are not aware of where their data is stored due to
virtualization.
Data access: Data accessibility is the ability of cloud service customers to be able to gain
authorized access to their subscribed services anywhere and at any time. However, strong
identity management and access control schemes must be implemented for user authentication
before access to the massive cloud resources is granted.
System vulnerabilities: Vulnerabilities of the system are exploitable program bugs in the
operating system that can be exploited by attackers to gain full access to the host computer.
Account hijacking: This involves the stealing and using of the account details of a legitimate
user for disreputable purposes using techniques like fraud and phishing.
Malicious insiders: These are past or present malicious insiders like system administrators,
former employees, business partners or a third-party contractors with high-level of access to
potentially private, sensitive information and critical systems leading to a serious data breach.
The advanced persistent threats: This is a stealthy computer network attack in which
multiple assault code are injected into a vulnerable system at entry points
Permanent data loss: This can be due to natural disaster, total hardware failure, unintentional
cancellation by clients or support staff at the service providers' end or psychological militant
assault.
Hacked interfaces and Application Programming Interface (API): APIs and user interfaces
are the fundamental backbones of cloud system connections and interaction among clients and
the elastic computing systems. Cloud APIs' Internet Protocol (IP) addresses expose the
association between clients and the cloud, so securing APIs from corruption or human mistakes
is pertinent to cloud security.
Data confidentiality
Data confidentiality refers to the ability to share sensitive data between a numbers of users
without violating the privileges granted by the data owner to each of the targeted user.
Data integrity
Data integrity refers to the process of ensuring that cloud users' data is protected from
unauthorized modification
Data availability
This characteristic indicates that rightful owners of data, in this case, cloud service consumers,
can seamlessly gain access to their data, and they are not denied access erroneously or due to
malicious attacks by any entity. A Denial of Service (DoS) attack is the main threat to data
availability.
The security architecture of cloud computing is the most critical and fundamental determinant
of the level of security that would be experienced in the entire cloud computing ecosystem.
User Layer
The user layer consists of several components, including programming, cloud applications,
tools, and environments.
Common security implementations at the user layer include, but are not limited to, Browser
Security, Authentication and Security-as-a-Service.
Service Provider Layer
At the service provider layer, the important constituent components include resource
provisioning, SLA Monitor, Scheduler & Dispatcher, Metering, Load Balancer,
Accounting, Policy Management and Advance Resource Reservation Monitor.
Security concerns in the service provider layer include Data transmission, Privacy, People
and Identity, Infrastructure management, Audit and Compliance, Cloud integrity and
Biding Issues.
User identity
Provide the capability for the users to easily and efficiently use single sign-on logons for both
the cloud and internally-hosted applications
Flooding attacks
A flooding attack causes the server's hardware resources to become completely exhausted such
that the same hardware system is unable to perform any intended tasks. Cloud Computing
pprovides a dynamic adaptation of hardware requirements to the actual workload by using
virtual machines.
Securing data-storage
Cloud data storage' security concerns include the manner in which data is accessed and stored,
notification requirements, audit requirements, compliance, issues involving the cost of data
breaches and damage to brand value
Sensitive information: These are private information that can be used to describe a
person or way of life. These include health records, religion or race, sexual orientation,
union membership, and so on.
Usage data: Usage data is data that is collected from computer devices like printers and
behavioral information such as viewing habits for digital content, users' recently visited
websites or product usage history.
Unique device identities: The other types of information that can be uniquely traceable
to a user device are IP addresses, Radio Frequency Identity (RFID) tags, and unique
hardware identities.
The cloud service user: Being forced or persuaded to be tracked or give personal information
against their will, or in a way in which they feel uncomfortable.
Organization using the cloud service: Failure to comply with business policies and
legislation, credibility and loss of reputation.
Cloud Management System (CMS): CMS leverages on RESTful Web Services to provide
monitoring services.
Runtime Model for Cloud Monitoring (RMCM): RMCM is designed to monitor resources
through abstract models which allow possible homogeneous handling of heterogeneous
resources.
Governing law and jurisdiction: This is often liable and governed within the service provider's
country.
Data location: Issues related to data storage locations must be addressed directly within the
contract by the cloud service provider and the customer.
Privacy and confidentiality: Most often, data are used for a specific purpose for which they
are collected.
Data security: Independent specific security standards should be used to replace relative cloud
service providers envisioned reasonable or industry-standard security provisions in the contract
to realize greater level of security.
Data access for E-discovery: This contract is expected to exhibit the architecture of the service
being provided.
End-users responsibility: In a situation where the cloud subscriber makes end users of the
service to abide to the terms and agreements of the cloud service provider and customer, a
liability of the third-party usage of the system
Inappropriate and unauthorized usage: In an attempt made by the service providers to place
the responsibility of monitoring and preventing inappropriate and unauthorized usage
End-users' account suspension: Service providers can suspend the customer's end-users'
account at their will on the violation of some terms and conditions.
Emergency security issues: Service providers may have legislation laws inserted to suspend
without notice, a provisioned service, in the event that an unethical use of such a service causes
an emergency issue.
Service suspension and termination: Service providers have the reserved right to suspend a
service or to even terminate a service in the event of specified events.
Data ownership: The service contract between the service provider and the consumer is
expected to explicitly state that all data
Publicity: The service provider may request to use the customer's name, logos or trademarks
for the service providers' own advertisement purpose
Disclaimer of warranty: The service contract is expected to guarantee that the provided
service operates correspondingly to its specifications without breaching the rights of any third
party
Customer indemnification: Some service provider contracts require indemnification for the
service provider
Vendor indemnification: Service provider contracts rarely outline any indemnification that
benefits the customer
Contract modifications: The cloud service consumer must ensure that the rights of the service
providers to modify services
URL terms incorporation: Beyond advertised contract terms advertised on the service
provider's website and other related avenues, legal information should rather be maintained
within the confines of the service contract
Sub-contractors:
A number of cloud service providers with multiple layers of cloud services usually engage in
subletting cloud provisioning to support the services of other cloud providers
Discuss how to provide the identities of all sub-contractors with the cloud service
provider in order to monitor their compliance status.
Reach a contractual agreement with the service provider to ensure that the serial
service providers associated with the organization's cloud service provisioning
adhere to compliance requirements.
Ensure that the service provider puts a vendor management program in place to
track the compliance of its vendors.
Monitor the service provider's compliance with the vendor management program
requirements.
Data ownership:
Most cloud service providers usually place ownership claims, usage and redistributable rights
over consumers' data being hosted.
To manage this risk
Contractually bind the service provider to inform the organization of any required
legal disclosure that may compromise the organization's data via e-discovery.
Make internal arrangements to tackle e-disclosure needs if it arises.
Data censorship:
Unacceptable delays on the part of an organization (cloud consumer) are often experienced
when changes are required to be made to an organization's data when the cloud providers hold
the right to audit and censor any data to the host.
Contractually identify and assess conditions for such activities to hold any
supported process from the service provider.
Request to be notified of such activities by the service provider
Encryption:
Some uncommon cloud services are hyped to meet specific regulatory requirements,
including data encryption
Service changes:
Possibility is high that an organization might me unable to gain access to its data or to
its cloud services
To manage this risk:
For possible event of service changes, contractually demand for a specified
minimum period of prior notice.
Confirm the availability of alternative service options that can be used on
needs.
Keep an updated internal copy of the data for emergency use.
Cost changes:
Due to possible cost changes to cloud services over time, the essence of cloud
adoption might become risked.
To address this:
Ensure that the service contract contains information regarding the service costs and
potential changes.
Assess the cost/benefit/risk trade-offs of the relationship during each contract
renewal.
Malicious activity risks:
The fact that the cloud service providers operate in the open internet makes their
cloud environments and services rich targets for attacks through their website portals.
To manage this risk:
Ascertain that the service provider adheres to recommended security best practices
Ascertain that appropriate vulnerability and penetration tests are conducted
Ensure that proper auditing of these tests is conducted by the service provider