Comparing Aspects Project Management Approaches

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

ABSTRACT

In spite of the potential advantages of cloud computing, security is a major barrier to the adoption of cloud services for organizations, which forms the reasons for them not moving into the cloud. This survey paper provides a brief introduction to the cloud computing platforms and services it provides and we intend to discuss some of the key security issues that are associated with the cloud computing and analyze the possible security solutions.

General Terms

Cloud computing, security issues and threats

Keywords Infrastructure as a service ( IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Virtual Machine (VM), SOAP (Simple Object Access Protocol).

INTRODUCTION

Cloud computing is a large-scale distributed computing paradigm [1]. It is a collection of sources in order to enable resource sharing in terms of scalability, managed computing services that are delivered on demand over the network NIST (National Institute of Standards and Technology) defines cloud computing as "Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of computing resources which can provisioned and released with nominal management effort or minimal service provider interaction [2]. This model promotes availability and is composed of three service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS); the four deployment models are private cloud, community cloud, public cloud and hybrid cloud.

Cloud Computing characteristics

On demand Self Service

It refers to the service provided by various vendors that enables the provision of cloud resources on demand and whenever they are required.

Broad Network Access

Capabilities that are available over the network and accessed through standard mechanisms that promote use of heterogeneous thin or thick client platforms.

Resource Pooling

The service provider’s computing resources are pooled together in order to serve multiple consumers, with different physical and virtual resources by dynamically assigning and reassigning these resources according to consumer demand.

Rapid Elasticity

Capabilities can be elastically provisioned and released depending on the requirement.

Measured Services

Cloud systems automatically control and optimize resource use by providing a metering capability at some level of abstraction according to the type of service.

Cloud Architecture

The general architecture of a cloud platform is also called cloud stack [3]. Built upon hardware facilities (usually supported by modern data centers), cloud services may be offered in various forms from the bottom layer to the top layer. In the cloud stack, each layer represents one service model. Infrastructure-as-a-Service (IaaS) is offered in the bottom layer, where resources are accumulated and managed physically or virtually (e.g. Amazon EC2), and various services are delivered in forms of storage (e.g. GoogleFS), network (e.g. Openflow), or computational capability (e.g., Hadoop MapReduce). The middle layer delivers Platform-as-a-Service (PaaS), in which services are provided as an environment for the programmers or software execution (e.g., Google App Engine). Software as a Service (SaaS) locates in the top layer, in which a cloud provider further confines client flexibility by merely offering software application as a service. Apart from it, the cloud provider maintains a suite of management tools and facilities (e.g., Service life-cycle management, metering and billing) in order to manage a large cloud system.

Fig. 1: Architecture of Cloud Computing

CLOUD COMPUTING SECURITY THREATS

Top Seven Cloud Security Threats

The top seven security threats to cloud computing discovered by "Cloud Security Alliance" (CSA) [4] are:

Misuse And Vicious Use Of Cloud Computing

Misuse and vicious use of cloud computing is one of the main threat detected by the CSA. An easy to understand example of this is the use of bonnets to spread spam and malware. Malicious users can access a public cloud, for instance, find a way to upload malware to thousands of computers and use the power of the cloud infrastructure to attack other machines.

Some remedies to minimize this threat:

Apply strict initial registration and validation processes.

Improved credit card fraud monitoring and coordination.

Detailed introspection of customer network traffic.

Supervising public blacklists for one’s own network blocks.

Insecure Application Programming Interfaces

Because software interfaces or APIs are what customers use to interact with cloud services, those must have very secure authentication, access control, encryption and activity monitoring mechanisms - especially when third parties start to build on them.

Some remedies to minimize this threat:

Examine the security model of cloud provider interfaces.

Guarantees strong authentication and access controls are implemented in concert with encrypted transmission.

Comprehend the dependency chain associated with the API.

Malicious Insiders

The CERT guide to cloud computing defines malicious insiders as "the current or the former employee, business partner who has or had authorized access to an organized system, network or data and intentionally misused and used in a manner affected the confidentiality, integrity and availability of the organization's information or information systems" [8]. Many service providers don't show how they hire people, how they grant the access to assets or how they supervise them. In this case, important to a secure cloud offering, along with compliance reporting and break notification.

Some remedies to minimize this threat:

Impose supply chain management and conduct a comprehensive supplier assessment.

Determine human resource requirements as part of legal contracts.

Entail transparency into overall information security and management practices, as well as compliance reporting.

Finding security breach notification processes.

Shared Technology Vulnerabilities

The parts on which the infrastructure is based were not designed for that. To ensure that customers don't pose danger on each other's "territory", monitoring and strong compartmentalization are required.

Some remedies to minimize this threat:

Employ security best practices for installation/configuration.

Scrutinize environment for unauthorized changes/activity.

Support authentication and access control for administrative access and operations.

Employ service level agreements for patching and vulnerability remediation.

Perform vulnerability scanning and configuration audits.

Data Loss/Leakage

Data is always in danger of being lost or stolen. This is one of the zenith concerns for the organization, because they don’t want to lose their reputation, but are also compelled by law to keep it safe.

Some remedies to minimize this threat:

Employ strong API access control.

Encrypt and protect integrity of data.

Examine data protection at both design and run time.

Apply strong key generation, storage and management, and destruction practices.

It is the duty of cloud providers to wipe persistent media before it is released into the pool.

Contractually recognizes provider backup and retention strategies.

Account Service & Traffic Hijacking

Account service and traffic hijacking is another issue in which an attacker tries to gain access to your credentials, the attacker can eavesdrop on your activities and transactions, manipulate the data, return false information, and redirect clients to illegitimate sites. 

Some remedies to minimize this threat:

Exclude the sharing of account credentials between users and services.

Apply two-factor authentication techniques where possible.

Use proactive monitoring to detect unauthorized activity.

Understand security policies and SLAs of the cloud service providers..

Unknown Risk Profile

Security should be in the upper part of the priority list. Code updates, security practices, vulnerability profiles, intrusion attempts – all points that should always be taken into account.

Some remedies to minimize this threat:

Exposure of applicable logs and data.

Partial/full disclosure of infrastructure details (e.g. patch levels, firewalls, etc.).

Controlling and alerting on mandatory information.

Other Security Threats

Specific threats to security include[9]:

Failures in Providers Security

The Cloud service providers must monitor the hardware and the hypervisor on which data is stored and applications are run and therefore their security is very vital while designing cloud.

Attacks by another customer

If the barriers between customers collapsed, one customer can access another customer's data or interfere with their applications.

Availability and reliability issues

The cloud is only usable via the internet so internet reliability and availability is essential.

Legal and Regulatory issues

The virtual nature of cloud computing raises many legal and regulatory issues regarding the data exported outside the jurisdiction.

Perimeter security model broken

Many organizations use a perimeter security model with strong security at the perimeter of the enterprise network. The cloud is definitely beyond the perimeter of enterprise control but it will now store critical data and applications.

Integrating Provider and Customer Security Systems

Cloud providers should integrate with existing systems or the bad old days of manual provisioning and uncoordinated response will return.

Wrapping Attack

A renowned type of attacks on protocols using XML Signature for authentication or integrity protection is wrapping attack. This of course applies to Web Services and therefore also for Cloud Computing [8].

EXISTING SOLUTIONS FOR SECURITY THREATS

There are some existing solutions for the security threats:

Client Based Privacy Manager

Client based privacy manager helps to minimize the risk of data leakage and loss of privacy of the sensitive data processed in the cloud and provides additional privacy related benefits [5]. Figure 2 shows the architecture of the privacy manager. The main features of the privacy manager are:

Obfuscations: This feature can automatically obfuscate some or all of the fields in a data structure before it is sent off to the cloud for processing, and converts the output from the cloud back into deobfuscated form. The obfuscation and deobfuscation is done with the help of a key which is selected by the user and not revealed to cloud service providers.

Preference Setting: It allows users to set their priorities about handling of personal data that is stored in an unobfuscated form inside the cloud. This feature permits the user to take maximum charge over the usage of his data.

Data Access: The Privacy Manager holds a module that permits users to access personal information in the cloud, in order to see what is being possessed about for , and to check its correctness. This is an auditing mechanism which will identify privacy violations once they have occurred.

Feedback: It manages and portraits feedback to the user in respect of the usage of his personal information, including notification of data used in the cloud. This module could supervise personal data that is transferred from the platform.

Personae: This feature permits the user to choose between numerous personae when dealing with cloud services.

Fig.2: Architecture of Privacy Manager [5]

Mirage Image Management System

The security and integrity of VM images are the foundation for the overall security of the cloud since many of them are designed to be shared by various and frequently unrelated users [6]. This system caters the issues related to security management of the virtual-machine images that encapsulate each application of the cloud.

Mirage Image Management System contains 4 major parts:

Access Control: This framework controls the sharing of VM images. Each image in the repository has a distinct owner, who can share images with trusted parties by permitting access permissions.

Image Transformation by Running Filters: Filters abolish unwanted information from images at publishes and retrieval time. Filters at publish time can discard or conceal sensitive information from the publisher's original image. Filters at retrieval time filters may be mentioned by the publisher or the retriever.

Provenance Tracking: This process that tracks the derivation history of an image.

Image maintenance: Repository maintenance services, such as periodic virus scanning, that identify and correct vulnerabilities discovered after images are published.

Fig 3: Architecture of Mirage Image

Management System

Advantages: Filters mitigate the danger in a systematic way. The system stores all the revisions which permit the user to go back to the previous version. The default access permission for an image is private in order to provide access to the owner and system administrator can access the image and hence untrusted parties cannot access the image.

Disadvantages: Large performance overheads, in terms of space and time. It is not possible for filters to be 100% accurate and therefore the system does not remove risk. Virus scanning does not promise to find all malware in an image.

Wrapping Attack Problem and Solution

When a user makes a request from his VM via the browser, the request is first directed to the web server. A SOAP (Simple Object Access Protocol) message is generated that contains the structural information that will be exchanged between the browser and server during the message passing. The SOAP header should contain all the necessary information for the destination after computation is done. For a wrapping attack, the opponent does its trick during the translation of the SOAP message in the TLS (Transport Layer Service) layer. The body of the message and signature value is duplicated and sent to the server as a valid user. The server checks the authentication and integrity and as a result, the adversary is able to intrude in the cloud and can run malicious code.

Possible Solution

Since an adversary can intrude in the TLS layer; to increase the security during the message passing from the web server to a web browser by using the SOAP message. As the signature value is appended, we can add a redundant bit (STAMP bit) with the SOAP header. When the message is interfered when this bit will be toggled. The STAMP bit is checked first and if it is found toggled, then a new signature value is produced in the browser end and the new value sent back to the server as recorded to modify the authenticity checking.

Advantage:

It brings advantages in many applications:business process scenario, single sign on.

Disadvantages:

Lack of processing applications.

It doesn’t check if has the same values.

Flooding Attack Problem and Solution

Whenever a server is overloaded or has reached the threshold limit, it transfers some of its jobs to a nearest and similar service-specific server to offload itself [8]. When an adversary has achieved the authorization making a request to the cloud, then he/she can simply create false data and pose these requests to the cloud server. As a non-legitimate requests must be checked to determine their authenticity, checking consumes CPU utilization, memory and engages the IaaS to large scale. As a result, legitimate services can starve the server will offload its services to another server. Repeating the adversary is successful in engaging the whole cloud system by interrupting the usual processing of one server, in particular flooding system.

Possible solution

The approach is to put in order all the servers in the cloud system as a group of servers. Each of the servers will be designated for a particular type of job. All the servers in the group will have internal communication among themselves via message passing. Therefore when a server is overloaded, a new server will be implemented in the fleet. A hypervisor can also be utilized for the scheduling among these fleets, finding the genuineness of the requests and preventing the fleets from being overloaded with bogus requests from an adversary.

Advantages

Whenever a server is overloaded or has reached the threshold limit, it transfers some of its jobs to a nearest and similar service-specific server to offload itself.

Requests are executed more efficiently and rapidly.

CONCLUSION AND FUTURE WORK

There is a lot of personal and private information and potentially secure data that people store on their computers, and this information is now being transferred to the cloud.This makes security in the cloud a primary concern. This paper discussed the various security issues of cloud computing along with their models to overcome them. It also enlightens various advantages and disadvantages of the solutions that are widely available. Hence it also motivate to explore this area further inorder to overcome the problems that are faced by the cloud community.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now