1 / 16

Security Issues in Cloud Computing

Security Issues in Cloud Computing. Cloud Computing. Cloud Computing is an emerging field wherein the focus is on providing virtualized resources as service. Also the user is almost entirely blinded from the infrastructure that supports Cloud Computing.

floramaria
Download Presentation

Security Issues in Cloud Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Issues in Cloud Computing

  2. Cloud Computing • Cloud Computing is an emerging field wherein the focus is • on providing virtualized resources as service. • Also the user is almost entirely blinded from the infrastructure • that supports Cloud Computing. • This is why we have most of the issues in Cloud Computing

  3. Security issues and possible solutions Issue 1 : Maintaining the privacy of the user data in the cloud Solutions: Users must be informed of what data is being collected and how it would be used. (b) Users must be informed about the entities having access to their data.

  4. Issue 2 : Dynamic data Storage Solutions: The user data is stored on a server that may be anywhere in the globe. Different parts of the user data may be stored in different servers. These servers are actually encrypted block servers. The user data is usually encrypted using a strong AES encryption algorithm.

  5. Issue 3 : Data Recovery Solutions: Data can be easily lost because of a successful attack or in the event of any natural disaster. (b) As a precautionary measure cloud providers should store data in less risky areas. (c) The cloud providers should replicate cloud storage in order to have a chance of recovery data in case of a main server failure

  6. Issue 4 : Legal Issues Solutions: Both user and service provider must be updated with the local governments transfer laws and restrictions. If any third party services are used by the provider then the latter must educate the user about it. (c) The user and/or service provider must be held liable for any violations of the rules and regulations.

  7. Issue 5 : Software as a Service (Saas) Solutions: • The software technology that offers services in cloud computing • undergoes changes more frequently than desired. • (b) This can develop a doubt in the minds of the customers. • (c) As the cloud computing is in its initial stage of development overly • stringent rule may not be so useful.

  8. Failure of traditional web application firewall in the cloud • The privacy settings of each cloud user could vary. • Allocation of separate web application firewall/hardware for • each of these settings will lead to enormous consumption of • resources. • Managing of these hardwares is tedious. • Aim of using of less resources in the cloud is hampered.

  9. Distributed Web Application Firewall (dWAF) • It operates in a virtualized environment. • It provides firewall as a service. • The filtering is done by a combination of hardware and software • and also relies on how well it integrates with the existing • Firewall Technologies. • An user-friendly web based interface enables cloud users to • specify their security settings.

  10. Hyperguard SaaS provided by Amazon Web Services is one of the few • DWAF’s available today to protect your cloud. It has basically two • modes of operation. • There are two modes of operation: • Detection only mode. • Protection only mode.

  11. Detection only mode: In this mode the administrator may only test new/proposed rule sets but will not enforce them. Although the administrator may use the exisiting proven rule sets to test the new rule sets.

  12. Protection only mode: In this mode the administrator can enforce the rule sets that have been tested over and over again and proven. These rule sets are authorized to block an attempted attack. In this mode logging is performed for future analysis and documentation.

  13. Case Study: T - Mobile Sidekick Recently T-Mobile Sidekick cellphones which uses a cloud network to store the data present in the user’s cellphone suffered a major embarrassment. The data was stored in a server present on the cloud. The user could extract data from this server whenever needed because T Mobile were storing and providing data back to the users using this server.

  14. Case Study: T – Mobile Sidekick The server crashed and the rest is history. There were no back up servers. All user’s data gone in the blink of an eye. Thus this incident points out the need to store user data even on a back up server.

  15. References 1)http://www.artofdefence.com/dokumente/Cloud_AppSec_Whitepaper.pdf(dwaf) 2http://communities.intel.com/community/openportit/server/blog/2008/07/03/gartner-seven-cloudcomputing-security-risks 3)http://www.hpl.hp.com/techreports/2009/HPL-2009-54.pdf 4)http://devcentral.f5.com/weblogs/macvittie/archive/2009/01/21/cloud-computing-location-is-important-but-not-the-way-you.aspx 5)http://www.comnews.com/features/2009_march_april/0409_web1_data.aspx 6)http://www.computerweekly.com/Articles/2009/11/09/235782/Top-five-cloud-computing-security-issues.htm 7)http://aws.artofdefence.com/faq/ 8)http://www.sans.org/newsletters/newsbites/newsbites.php?vol=11&issue=81#sID200

  16. THANK YOU!!!

More Related