You are on page 1of 8

Term paper

Security: now
and Then

Submitted to Submitted by
Neha bassan Rashmi Burman
11410590
B-57
Introduction cloud provider for each of the service models
also needs to be made.
Cloud computing has led to a shift in how
people think about IT systems architecture. Cloud computing security
Many organizations today are either
Trust
implementing cloud-based solutions, or
evaluating which cloud-based solutions they The concept of trust, adjusted to the case of
will be implementing in the future. two parties involved in a transaction, can be
According to gartener Inc. cloud computing described as follows: An entity A is
is "no less influential than e-business". This considered to trust another entity B when
shift in architecture from an enterprise-based entity A believes that entity B will behave
traditional server-based system to a cloud- exactly as expected and required.
based system will have associated costs of Thereinafter, an entity can be considered
entry and risks, but it can result in enormous trustworthy, if the parties or people involved
benefits in savings and in IT and business in transactions with that entity rely on its
agility. While there is considerable pressure credibility. In general, the concept described
on organizations to consider moving to the above can be verbally represented by the term
cloud-based services, security issues reliability, which refers to the quality of a
continue to be one of the largest concerns that person or entity that is worthy of trust. Trust
organizations have about this move. The in the information society is built on various
different cloud-based deployment models, different grounds, based on calculus, on
including private, public or hybrid cloud, knowledge or on social reasons . The notion
bring with them a range of challenges, and of trust in an organization could be defined as
security concerns cut across them all. Many the customers certainty that the organization
organizations will need to apply best practice is capable of providing the required services
security standards that are far in excess of accurately and infallibly. A certainty which
those that they currently implement with their also expresses the customers faith in its
on-premise systems. The migration or moral integrity, in the soundness of its
adoption of cloud services then can provide operation, in the effectiveness of its security
an advantage in that firms can design, from mechanisms, in its expertise and in its
the ground up, their new cloud-based abidance by all regulations and laws, while at
infrastructures with security "baked-in"; this the same time, it also contains the
is in contrast to the piecemeal and "after the acknowledgement of a minimum risk factor,
fact" or "bolted-on" nature of security seen in by the relying party. The notion of security
most data centers today. The cloud service refers to a given situation where all possible
model that an organization wants to risks are either eliminated or brought to an
implement influences security design and absolute minimum .Trust in a cloud
implementation. We will cover the three environment depends heavily on the selected
cloud computing service deployment model, as governance of data and
models: Infrastructure as a Service applications is outsourced and delegated out
iaas , and Software as a Service saas . These of the owners strict control. In traditional
models all have different security issues that architectures, trust was enforced by an
need to be considered and more importantly, efficient security policy, which addressed
a determination of the balance of constraints on functions and flow among
responsibilities between the customer and the them, constraints on access by external
systems and adversaries including programs
and access to data by people. In a cloud information systems functional and
deployment, this perception is totally operational requirements, as well as other
obscured. In the case of public or community pertinent system requirements
clouds, control is delegated to the (e.g., reliability, maintainability,
organization owning the infrastructure. When supportability). Cloud computing due to its
deploying on a public cloud, control is architectural design and characteristics
mitigated to the infrastructure owner to imposes a number of security benefits, which
enforce a sufficient security policy that include centralization of security, data and
guarantees that appropriate security activities process segmentation, redundancy and high
are being performed to ensure that risk is availability. While many traditional risks are
reduced. This introduces a number of risks countered effectively, due to the
and threats, as essentially security is related infrastructures singular characteristics, a
to trusting the processes and computing base number of distinctive security challenges are
implemented by the cloud owner. It is crucial introduced. Cloud computing has unique
to differentiate between deployment models, attributes that require risk assessment in areas
as a private cloud, where the infrastructure is such as availability and reliability issues, data
operated and managed on premise by a integrity, recovery, and privacy and
private organization, does not introduce auditing. Security in general, is related to the
additional unique security challenges, as trust important aspects of confidentiality, integrity
remains within the organization. In such a and availability; they thus become building
situation the infrastructures owner remains blocks to be used in designing secure
the data and process owner systems. These important aspects of security,
apply to the three broad categories of assets
which are necessary to be secured, data,
software and hardware resources. The cloud
infrastructure proposes unique security
challenges which need to be considered in
detail.

Security identification of
threats
Essentially securing an Information System
(IS), involves identifying unique threats and
challenges which need to be addressed by
implementing the appropriate
countermeasures. Ultimately, the identified
security requirements and selected security
controls are introduced to the standard
systems engineering process, to effectively
integrate the security controls with the
unauthorized access, organizations can
achieve greater confidence in data and
system integrity. Additionally, such
mechanisms offer the greater visibility into
determining who or what may have altered
data or system information, potentially
affecting their integrity (accountability).
Authorization is the mechanism by which a
system determines what level of access a
particular authenticated user should have to
secured resources controlled by the system.
Due to the increased number of entities and
access points in a cloud environment,
authorization is crucial in assuring that only
authorized entities can interact with data.

A cloud computing provider is trusted to


.1. Confidentiality and privacy maintain data integrity and accuracy. The
cloud model presents a number of threats
Confidentiality refers to only authorized including sophisticated insider attacks on
parties or systems having the ability to access these data attributes.
protected data. The threat of data
compromise increases in the cloud, due to the 3. Availability
increased number of parties, devices and
applications involved, that leads to an Availability refers to the property of a system
increase in the number of points of access. being accessible and usable upon demand by
Delegating data control to the cloud, an authorized entity. System availability
inversely leads to an increase in the risk of includes a systems ability to carry on
data compromise, as the data becomes operations even when some authorities
accessible to an augmented number of misbehave. The system must have the ability
parties. A number of concerns emerge to continue operations even in the possibility
regarding the issues of multitenancy, data of a security breach. Availability refers to
remanence, application security and privacy data, software but also hardware being
available to authorized users upon demand.
2. Integrity Leveraging users from hardware
infrastructure demands, generates a heavy
Integrity means that assets can be modified reliance on the ubiquitous networks
only by authorized parties or in authorized availability. The network in now burdened
ways and refers to data, software and with data retrieval and processing. The cloud
hardware. Data Integrity refers to protecting owner needs to guarantee that information
data from unauthorized deletion, and information processing is available to
modification or fabrication. Managing an clients upon demand. System availability
entitys admittance and rights to specific includes a systems ability to carry on
enterprise resources ensures that valuable operations even when some authorities
data and services are not abused, misbehave. The system must have the ability
misappropriated or stolen. By preventing to continue operations even in the possibility
of a security breach. Cloud computing
services present a heavy reliance on the
resource infrastructures and network
availability at all times.

4. Trusted Third Party

We claim that employing Trusted Third Party


services within the cloud, leads to the
establishment of the necessary Trust level
and provides ideal solutions to preserve the
confidentiality, integrity and authenticity of
data and communications [21] (Fig. 2). In
cryptography, a Trusted Third Party (TTP) is
an entity which facilitates secure interactions
between two parties who both trust this third
Cloud security controls
party. The scope of a TTP within an Cloud security architecture is effective only
Information System is to provide end-to-end if the correct defensive implementations are
security services, which are scalable, based in place. An efficient cloud security
on standards and useful across different architecture should recognize the issues that
domains, geographical areas and will arise with security management.[8] The
specialisation sectors. The establishment and security management addresses these issues
the assurance of a trust relationship between with security controls. These controls are put
two transacting parties shall be concluded as in place to safeguard any weaknesses in the
a result of specific acceptances, techniques system and reduce the effect of an attack.
and mechanisms. The Third Party reviews all While there are many types of controls
critical transaction communications between behind a cloud security architecture, they can
the parties, based on the ease of creating usually be found in one of the following
fraudulent digital content. Introducing a categories.
Trusted Third Party can specifically address
the loss of the traditional security boundary Deterrent controls-
by producing trusted security domains. As These controls are intended to reduce attacks
described by Castell, A Trusted Third Party on a cloud system. Much like a warning sign
is an impartial organization delivering on a fence or a property, deterrent controls
business confidence, through commercial typically reduce the threat level by informing
and technical security features, to an potential attackers that there will be adverse
electronic transaction. It supplies technically consequences for them if they proceed.
and legally reliable means of carrying out, (Some consider them a subset of preventive
facilitating, producing independent evidence controls.)
about and/or arbitrating on an electronic
transaction.
Preventive controls
Preventive controls strengthen the system
against incidents, generally by reducing if not
actually eliminating vulnerabilities. Strong
authentication of cloud users, forinstance,
makes it less likely that unauthorized users system of their own. Cloud ID, for instance,
can access cloud systems, and more likely provides privacy-preserving cloud-based and
that cloud users are positively identified. cross-enterprise biometric identification. It
links the confidential information of the users
Detective controls to their biometrics and stores it in an
Detective controls are intended to detect and encrypted fashion. Making use of a
react appropriately to any incidents that searchable encryption technique, biometric
occur. In the event of an attack, a detective identification is performed in encrypted
control will signal the preventative or domain to make sure that the cloud provider
corrective controls to address the or potential attackers do not gain access to
issue.[8] System and network security any sensitive data or even the contents of the
monitoring, including intrusion detection and individual queries.
prevention arrangements, are typically
employed to detect attacks on cloud systems Physical security
and the supporting communications Cloud service providers physically secure the
infrastructure. IT hardware (servers, routers, cables etc.)
against unauthorized access, interference,
Corrective controls theft, fires, floods etc. and ensure that
Corrective controls reduce the consequences essential supplies (such as electricity) are
of an incident, normally by limiting the sufficiently robust to minimize the possibility
damage. They come into effect during or after of disruption. This is normally achieved by
an incident. Restoring system backups in serving cloud applications from 'world-class'
order to rebuild a compromised system is an (i.e. professionally specified, designed,
example of a corrective control. constructed, managed, monitored and
maintained) data centers.

Personnel security
Various information security concerns
relating to the IT and other professionals
associated with cloud services are typically
handled through pre-, para- and post-
employment activities such as security
screening potential recruits, security
awareness and training programs, proactive.

Security and privacy Privacy


Identity management Providers ensure that all critical data (credit
Every enterprise will have its own identity card numbers, for example) are masked or
management system to control access to encrypted and that only authorized users have
information and computing resources. Cloud access to data in its entirety. Moreover,
providers either integrate the customers digital identities and credentials must be
identity management system into their own protected as should any data that the provider
infrastructure,using federation or SSO techn collects or produces about customer activity
ology, or a biometric-based identification in the cloud.
system,[1] or provide an identity management
Cloud security: Now Forrester Research, were on the cusp of the
second wave of cloud computing, with
Todays cloud computing environment goes service providers focused on next-gen
well beyond what most could even have applications that require Omni channel
imagined at the birth of modern computing support, time-based analytics, and micro
service support. The barrier to entering the
and innovation in the field isnt slowing.
cloud seems likely to shrink significantly due
From digital assistants to smart cars to virtual to adjusted compliance requirements and
reality to the internet of things, all of the latest regulations, and although security already is
modernizations rely on cloud technology. a primary focus, with the expansion of cloud,
But so too do most of the traditional services
its importance will be magnified. Finally, due
individuals and organizations rely on.
to the high demand for cloud services, service
Although weve seen new products and
providers will soon, if not already, be
services focused on managing money, the
building next-generation architecture on
traditional banking institutions are
hyper-converged platforms further reducing
developing their own services and the
maintenance costs and speeding up
environment is nearly unrecognizable to that
of ten years ago. Who can even imagine a scalability.
world without internet banking?
Conclusion
And the benefits cloud computing Inevitably cloud computing will support a
promises education are immense. Already, surplus of information systems as the benefits
cloud technology is changing the way outnumber its shortcomings. Cloud
students learn and extending access to computing offers deployment architecture,
schooling into remote and impoverished with the ability to address vulnerabilities
areas. Though schools and universities are recognized in traditional IS but its dynamic
adopting cloud technologies themselves, characteristics are able to deter the
many startups such as Education effectiveness of traditional countermeasures..
Modified, KikoLabs, and HSTRY, are To do so, software engineering and
coming up with new methods and platforms information systems design approaches were
which enhance and further learning. adopted. Security in a cloud environment
requires a systemic point of view, from which
Cloud security: Then security will be constructed on trust,
mitigating protection to a trusted third party.
Its predicted that the cloud service market A combination of PKI, LDAP and SSO can
will be worth around $108 billion next year, address most of the identified threats in cloud
and by 2020 the number of connected devices computing dealing with the integrity,
worldwide is expected to reach 25 billion. confidentiality, authenticity and availability
Further estimates suggest cloud computing of data and communications. The solution,
offers green benefits too, and US presents a horizontal level of service,
organizations moving to the cloud before available to all implicated entities, that
2020 will save $12.3 billion in energy costs. realizes a security mesh through federations,
Gartner points to a hybrid cloud within which essential trust i
infrastructure in the coming years, and says
Ed Anderson, I start to think of a multi-
cloud environment as a foundation for a next
wave of applications. And according to
Reference
https://www.finecomb.com
http://www.sciencedirect.com
https://www-ssl.intel.com
https://en.wikipedia.org/wiki/Cloud_comput
ing_security
https://www.google.co.in/search?q=images+
of+cloud+security

You might also like