999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Current Cloud Computing Security Concerns from Consumer Perspective

2013-12-07 06:04:44HafizGulfamAhmadZeeshanAhmad
機(jī)床與液壓 2013年4期

Hafiz Gulfam Ahmad, Zeeshan Ahmad

1.Department of Computer Science, Agriculture University, Faisalabad, Pakistan;2.Bahria University, Islamabad, Pakistan

CurrentCloudComputingSecurityConcernsfromConsumerPerspective

Hafiz Gulfam Ahmad1*, Zeeshan Ahmad2

1.DepartmentofComputerScience,AgricultureUniversity,Faisalabad,Pakistan;2.BahriaUniversity,Islamabad,Pakistan

In recent years cloud computing is the subject of extensive research in the emerging field of information technology and has become a promising business. The reason behind this widespread interest is its abilityto increase the capacity and capability of enterprises, having no investment for new infrastructure, no software license requirement and no need of any training. Security concern is the main limitation factor in the growth of this new born technology.The security responsibilities of both, the provider and the consumer greatly differ between cloud service models.In this paper we discuss a variety of security risks, authentication issues, trust, and legal regularity in cloud environment with consumer perspective.Early research focused only on technical and business consequences of cloud computing and ignored consumer perspective. Therefore, this paper discusses the consumer security and privacy preferences.

cloud computing, security issues, legal regularity

1. Introduction

Cloud services are based on these essential characteristics[1]. a)on demand self-service, b) resource access over the network, c) resource pooling where dynamically reassign the resources, d)resource elasticity and e) characteristic is service measured where resource usage time will be measured.Many SMEs join the cloud computing environment that provide the platform, infrastructure and application as services[2]. Cloud computing is becoming one of the fast growing technology in computing era, that build on the internet and virtualizationtechnologies, infrastructure, platform and software as services (IaaS, PaaS, SaaS)[3]. In cloud computing there present three prime layers.

a) System layer which consist ofvirtualized hosts and networks, normally the services deliver are referred as infrastructure as service(IaaS).

b) The platform layer contains virtualized operating system and APIs as platform as service (PaaS)

c) The application layer provide the virtual applications as software as service (SaaS)[4].

In distributed environment, cloud computing is a suitable place for the cyber-attack in any organization[5]. The pioneer of cloud computing vendors, Amazon Simple Storage Service (S3) and Amazon Elastic Compute Cloud (EC2) are both well-known examples. While these internet-based online services provide huge amounts of storage space and customizable computing resources. This computing platform eliminates the responsibility of local machines for data maintenance at the same time. As a result, users are at the mercy of their cloud service providers for the availability and integrity of their data. Recent downtime of Amazon’s S3 is an example. In spite of all these hype the enterprise consumer are still reluctant to deploy there business in the cloud, because of security issues such as data privacy and data protection[6]. Cloud computing is agonized from various types of attacks such as, Address Resolution Protocol spoofing, IP spoofing, routing Information Protocol attack, DNS poisoning, Flooding, Denial of Service (DoS), Distributed Denial of Service (DDoS), etc. e.g. DoS attack on the underlying Amazon Cloud infrastructure caused BitBucket.org, a site hosted on AWS to remain unavailable for few hours. Computing Intrusion Detection System (GCCIDS)[7], which is designed to cover the attacks that network and host-based systems cannot detect. Their proposed method used the integration of knowledge and behavior analysis to detect specific intrusions. The paper is focus on the matters related to the security issues of consumer such as provider license and services to consumer on demand. The researcher has tended to focus on virtualization rather than security in cloud computing environment, many issues still prevail.

The paper is structured as follows. Section 2 describes the common security issues in current year that are postured by the cloud providers; section 3 describes the solution for these security challenges; section 4 consists of the conclusion derived out of this discussion.

2.Cloud computing top threats in 2013

There are numerous security threats for cloud computing. New technologies and services, networks, databases, operating system, virtualization, transaction management, and concurrency control are use in cloud computing infrastructure which has not been fully evaluated with respect to security issues. In everyday life especially in computing security is the one of the most important aspects due to sensitivity and data storage in cloud[7]. Management of the data is not fully trustworthy and malicious in loud,denial ofservice compel organization to focus strong attention on these issues[8].The recent top security issues in cloud computing areas follows.

2.1.Trust

One of the major concerns about cloud computing today is the trust between the service provider and the user (customer). In SaaS the client has to depend on the service providerfor security measures, but unfortunately there is no such method that can ensure the user that whether the service provider is trustworthy or not and also it’s difficult to get guarantee that the service will be available whenever the user wants[9]. Hwang et al. proposed a cloud architecture that uses avirtual private network and a secure socket layer, and the model focuses on trust management in provider’s and consumer’s perspective[6]. The only legal agreement between the user and the service provider is that the service level agreement for service quality, priorities, and the responsibilities. This legal document contains all the rules and regulations between both of them, which contains the information that what the service provider is providing and what he is willing to provide[10]. Traditionally SLA have been a contract between a cloud service customer (an enterprise, business, or government agency), and service provider. The expanding value chain, for other services, has made SLAs important for a myriad to have complex relationships between partnerships. Currently there is no clear format for the SLA. However there may be services not documented in the SLAwhich the customer may be unaware off and it may need these services at some later time. In Tab.1, a comparison of the cloud providers in context of the different characteristics from the ACM computing Surveys 2013 is shown.

Tab.1 Comparison: cloud service provider in contextof different service trust characteristics

2.2.Confidentiality

Another significant issue in cloud is confidentiality, in which the sensitive data is obtained from the organization or customer and is processed by SaaS application and then stored at the service provider storage data houses. In this whole process, staff of the cloud service provider has an easy access to data so even though encrypted, such data could easily be accessed and tampered. Data confidentiality could be breached unintentionally, due to data remanence. Data remanence is the residual representation of data that have been deleted. In cloud the logical drives are virtually separated and on a single infrastructure there is same hardware shared between multiple users, so there can be some possibility of unwilling disclosure of data. Protection of user account from unauthorized access is needed. The solution can be the use of electronic authentication[11]. Software confidentiality is also important as data confidentiality for overall cloud system security. Software confidentiality enlightens the trust that specific applications or processes will sustain and handle the user’s personal data in a secure way. In a cloud environment the user is required to delegate “trust” to applications provided by the service provider, owning the infrastructure. Software applications interacting with the user’s data must be certified not to introduce additional confidentiality and privacy risks. Unauthorized access can become possible through the exploitation of application vulnerability, cause the issues of data confidentiality. In addition, it is the responsibility of the cloud provider providing secure cloud instances, which should ensure users confidentiality and privacy.

3.Legal regulatory

Currently the legal regulatory landscape for the cloud computing is not static.Cloud computing should be developed in complexlegal and regulatory environments. There are federal, international and even state laws that impose responsibilities to both cloud computing tenants and the providers. Regardless of which side your business is on, you have to consider the legal issues, especially those related to the data you collect, store and process. Laws or regulations typically specify who within an enterprise should be held responsible and accountable for data accuracy and security. New laws have been proposed for both customers and providers of cloud computing, that effect positively in regard of their responsibilities. These phenomena create new challenge that how these laws will be implemented to a wide range of information management. When we discuss the Laws and regulations governing the cloud computing environment, we cannot ignore the latest cyber security bills proposed recently in 2012[12]. There have been many cyber bills proposed, but none was as important as the cyber security act of 2012.Cyber security is a top administration priority for Obama’s second term. His approach to IT security will influence the U.S cloud computing environment over the next four years. This year, in July, senators Joseph Lieberman and Susan Collins proposed the cyber security act of 2012 . The act would have requiredcompanies to voluntary create best practices for the protection of key infrastructures from cyber-attacks.Data breach or intrusion risks are seen to be higher for any company that stores personal information or that operates in the cloud.Glen et al, in their white paper[13], create some practical challenges to understand implementation of laws, regardless of any condition which the cloud computing model is using. In any case of data protection failure, cloud provider may be fine by thecloud tenant, if the cloud customer and provider work in America, Canada or some European country.

3.1.Contractualissues

These are some of the core issues which one must consider at all stages of the contractual process:

Initial due diligence

Contract negotiation

Implementation

Termination(end of term or abnormal)

Supplier transfer

1) Different sector specific laws for cloud computing tenants and providers

To ensure we are in legal compliance, we may want to know more about American laws. In the United States, privacy and security are spread over different industry specific laws and regulations:

2) Health insurance portability and accountability act (HIPAA)

Under HIPAA’s Privacy Rule, an entity may not use or disclose protected health information unless as permitted or required by the rule, or as authorized in writing by the individual affected. HIPAA’s Security Rule complements the Privacy Rule and deals specifically with Electronic Protected Health Information (EPHI).

3) The gramm-leach-bliley act (GLBA)

It has 2 key rules for “financial institutions” for storing data in the cloud: the financial privacy ruleand the safeguards rule. The financial privacy rule requires institutions to notify each customer at the time the relationship is established and annually thereafter about the personal information about them like how it is collected, where that information is kept, with whom is shared, how is used, and how it is protected. The safeguards rule requires financial institutions to develop a written information security plan that describes how the company plans to protect clients’ nonpublic personal information.

4) Family educational rights and privacy Act (FERPA)

FERPA is a federal law that protects student information collected by educational institutions and associated vendors. These institutions must have the student’s consent prior to disclosure of personal data including grades, enrolment status, or billing information. Protection of student information according to FERPA regulations is a key consideration in using cloud-based applications that handle student records. IT administrators must be aware of the information that is passed to a cloud network or application.US-based cloud tenants and providers must consult a plethora of industry-specific laws to determine their legal risks and obligations. But if you don’t adequately protect the information you store, there are some important consequences, like fines or lawsuits which can have devastating consequences for small or midsize businesses.

4.Encryption

The current generation of cloud computing infrastructures does not provide any security against untrusted cloud operators making it unsuitable for storing sensitive information such as medical records, financial records or high impact business data. To address these security holes Microsoft researchers are pursuing various research projects that ranges from theory to practice.

1) Holomorphic cryptography

The most common use of encryption is to provide confidentiality by hiding the plaintext. However, left data useless in the sense that one loses the ability to operate on it. To address this need to design cryptosystems that support a variety of computations on encrypted data covers from general-purpose computationsto special-purpose computations. Research on holomorphic cryptography includes work on fully-holomorphic encryption (FHE), somewhat holomorphic encryption (SHE), searchable encryption, structured encryption, functional encryption and garbled circuits[14].

2) Proofs of storage

Using a proof of storage (also known as a proof of data possession or a proof of retrieveability) a client can verify whether the cloud operator has tempered his data or not. In particular, this can be done without the client, by storing a local copy of the data and without it retrieving any of the data. In fact, the work for the client is negligible no matter how large the data is.

Fig.1 Encryption in cloud

5.Data breaches

When a cloud customer puts its sensitive data into the cloud it is completely reliant on the security and incident response processes of the cloud service provider in order to respond to a data breach. This situation poses many fundamental problems. When an organization handling its own data suffers a breach, it is clear that the organization will be investigating and managing the incident with its own interests as a priority. It has control of its systems and also the data residing therein and can make decisions that protect its own interests from a business and liability perspective.

6.Account and IP Hijacking

There are some standard hacker tricks that cause major headaches for cloud computing companies. One of those is called key logging. Individual user identification and authentication for both Cloud Server Provider and client personnel is essential for access control and accountability.Shared credentials such as user accounts and passwords should not be used in the CSP environment for system administration and maintenance nor should generic or shared accounts be assigned to or used by clients. In cloud service. Compromise of the client’s user-level account in the second environment could therefore result in the attacker hake the account by gaining administrator-level access to the first environment. Client accounts and passwords should be unique for each service, and any account with elevated privilege should be restricted for a specific service or function, and not used for activities or access that do not require such privilege. The other major threat to cloud computing is IP prefix hijacking because of the Defacto protocol of internet domain routing on internet. Many examples for this vulnerability of BGP such as AS27506 prefix hijacking in January 2006 and the famous website YouTube Hijack event in February 2008[13]. Many popular network services unavailable and redirect to other destination.IP prefix hijacking is a serious threat for internet users that can damage the cloud service provider platform[15].

Fig.2 IP Prefix Hijacking

7.Conclusions

There are many advantages of cloud computing but yet many problems needed to addressed and solved. In this paper we have explored the security issues which createhurdles for a lot of potentialconsumers to adopt cloud. The companies offering cloud computing services should have reliable security measures at macro and micro level. Otherwise, they would lose all theirconsumers. It’s in their interest to employ the most advanced techniques to protect their clients’ data. This discussion caters imperative issues,risingin all directions in cloud. There is a demandingneed of designing an integrated solution and then deployed in a cloud to attract the potential users.

[1] Noor T H, Sheng Q Z, Zeadally S. Trust Management of Services in Cloud Environments: Obstacles and Solutions[J].ACM Computing Surveys, 2013.

[2] Subashini S, Kavitha V.A Survey on Security Issues in Service Delivery Models of Cloud Computing[J].Journal of Network and Computer Applications,34(1):1-11.

[3] Gul I, Hussain M.Distributed Cloud Intrusion Detection Model[J]. International Journal of Advanced Science and Technology,2011,34:71-82.

[4] Marston S L, Zhi S,Bandyopadhyay A G.Cloud Computing-The Business Perspective[C]//In 44th Hawaii International Conference on System Sciences, 2011:1-11.

[5] Hwang K,Li D. Trusted Cloud Computing with Secure Resources and Data Coloring[J].IEEEInternet Computing.2010(5):14-22.

[6] Subashini S, Kavitha V.A servey on security issues in service delivery models of cloud computing[J].Journelof Network and Computer Applications,2011(34).

[7] AlZain M, Soh B, Pardede E. A New Approach Using Redundancy Technique to Improve Security in Cloud Computing[J].IEEE,2012.

[8] Bracci F, Corradi A, Foschini L.Database Security Management for Healthcare SaaS in the Amazon AWS cloud[J]. IEEE.2012.

[9] Choudhary V. Software as a service: Implications for investment in softwaredevelopment[J]. International conference on system sciences, 2007.

[10] Weis J, Alves-Foss J.Securing Database as a Service[M]. IEEE Security and Privacy,2011: 49-55.

[11] Dimitrios Z. Addressing cloud computing security issues[J]. Elsevier,2011,28(3).

[12] “The Cyber security act 2013”,http://www.wired.com/images_blogs/threatlevel/2012/02/CYBER-The-Cybersecurity-Act-of-2012-final.pdf data fetch(May 13,2013).

[13] Brunette G. Rich Mogull of Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing[M].Cloud Security Alliance December,2009.

[14] Kamara S, Wei L. Garbled Circuits via Structured Encryption, in Workshopon Applied Homomorphic Encryption (WAHC’13), April 2013.

[15] LIU Yujing.Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack Planning. 2011 International Joint Conference.

2013-09-15

*Hafiz Gulfam, PhD. E-mail:gulfambise@yahoo.com

10.3969/j.issn.1001-3881.2013.24.001

主站蜘蛛池模板: 精品亚洲麻豆1区2区3区| 国产丝袜第一页| 亚洲一区波多野结衣二区三区| 久久五月天综合| 久久国产精品国产自线拍| 亚洲三级网站| 欧美亚洲激情| 亚洲中文字幕久久精品无码一区| 欧洲日本亚洲中文字幕| 国产精品99久久久久久董美香| 久久国产亚洲欧美日韩精品| 亚洲欧美在线看片AI| 凹凸国产熟女精品视频| 黄色网址免费在线| 婷婷色在线视频| 国产福利在线观看精品| 国产精品99r8在线观看| 无码乱人伦一区二区亚洲一| 亚洲香蕉伊综合在人在线| 成人在线综合| 97国产在线播放| 宅男噜噜噜66国产在线观看| 色婷婷电影网| 日韩av电影一区二区三区四区| 99中文字幕亚洲一区二区| 久久这里只有精品国产99| 国产亚洲欧美在线人成aaaa| 亚洲 欧美 偷自乱 图片| 国产女人水多毛片18| 综合社区亚洲熟妇p| 久久伊伊香蕉综合精品| 成年A级毛片| 欧美日韩成人在线观看| 国产精品男人的天堂| 国产一区二区人大臿蕉香蕉| 国产真实乱了在线播放| 不卡无码网| 国产精品hd在线播放| 色综合久久88色综合天天提莫| 久精品色妇丰满人妻| 国产白浆在线| 国产免费久久精品44| 五月婷婷亚洲综合| 国产电话自拍伊人| 久热re国产手机在线观看| 特级毛片免费视频| 午夜视频在线观看区二区| 91久久国产成人免费观看| 香蕉综合在线视频91| www.亚洲天堂| 国产靠逼视频| 欧美激情福利| 中文字幕欧美日韩| 91色在线观看| 中文字幕天无码久久精品视频免费| 国产成人综合亚洲欧美在| 国产专区综合另类日韩一区| 成人精品午夜福利在线播放| 国产91无毒不卡在线观看| 小13箩利洗澡无码视频免费网站| 久久国产成人精品国产成人亚洲 | 亚洲丝袜中文字幕| 亚洲一级毛片在线观| 992tv国产人成在线观看| 国产又大又粗又猛又爽的视频| 91av成人日本不卡三区| 欧美亚洲一区二区三区导航| 亚洲国产精品无码AV| 成人av专区精品无码国产| 国产成人亚洲日韩欧美电影| 少妇精品在线| 久久精品国产999大香线焦| 99精品伊人久久久大香线蕉| 国产真实乱人视频| 欧美啪啪视频免码| 666精品国产精品亚洲| 国产色婷婷| 一本无码在线观看| 99精品国产电影| 五月婷婷综合在线视频| 日韩在线欧美在线| 91精品国产一区自在线拍|