Security in Cloud Computing A survey of the unique challenges and - - PowerPoint PPT Presentation

security in cloud computing
SMART_READER_LITE
LIVE PREVIEW

Security in Cloud Computing A survey of the unique challenges and - - PowerPoint PPT Presentation

Security in Cloud Computing A survey of the unique challenges and risks inherent to the Cloud Computing model. Presented By: Marissa Hollingsworth Overview What is Cloud Computing? Unique Security Concerns in the Cloud


slide-1
SLIDE 1

Security in Cloud Computing

A survey of the unique challenges and risks inherent to the Cloud Computing model.

Presented By: Marissa Hollingsworth

slide-2
SLIDE 2

Overview

 What is Cloud Computing?  Unique Security Concerns in the Cloud  Confidentiality  Integrity  Availability  Intrusion Detection  Conclusion

slide-3
SLIDE 3

CLOUD COMPUTING

What’s it all about?

slide-4
SLIDE 4

Definition of Cloud Computing

 Applications delivered as a service over

the internet using hardware and systems software in data centers that provide the services.

slide-5
SLIDE 5

Key Characteristics

 On-demand self-service.

  • Provision server time and network storage automatically

without requiring human interaction (e.g. GoogleDocs)

 Broad network access.

  • Available over network and accessed by client platforms.

 Resource Pooling.

  • Multi-tenant model with dynamic assignment of resources

depending on demand.

 Rapid Elasticity.  Measured Service.

  • Resource usage can be monitored, controlled, and reported –

providing transparency for provider and consumer.

slide-6
SLIDE 6

Service Models

 Software as a Service (SaaS)

  • Consumer uses provider’s applications
  • No management or control of underlying cloud infrastructure

 Platform as a Service (PaaS)

  • Consumer deploys self-created or acquired applications using

supported tools.

  • No management or control of underlying cloud infrastructure
  • Controls deployed applications and hosting environment configurations

 Infrastructure as a Service (IaaS)

  • Consumer provisions processing, storage, networks, and other

resources to run arbitrary software (e.g. operating systems and applications)

  • No management or control of underlying cloud infrastructure
  • Control over OS, storage, deployed applications, networking

components (such as host firewalls)

slide-7
SLIDE 7

Deployment Models

 Public Cloud

  • Owned and managed by off-site third-party
  • Available to the general public
  • Multi-tenacity

 Need for segmentation, isolation, governance, service levels,

  • etc. for different consumer needs.

 Private/Community Cloud

  • Used for a single or multiple trusted organizations
  • May still use third-party management

 Hybrid Cloud

slide-8
SLIDE 8

DEPLOYMENT MODELS

Public deployment model has the greatest risk of security breaches.

slide-9
SLIDE 9

MAJOR SECURITY CONCERNS

slide-10
SLIDE 10

Data Migration to the Cloud

Customers keep storage and application data in secure, on-site databases managed by hired employees. Customers must transfer storage and application data to off-site, provider database locations managed by third-party employees.

slide-11
SLIDE 11

Off-site data storage

 Considered the greatest concern in cloud

security

 Third-party management

  • Even authorized users may be a threat
  • Customers lose exclusive access control of

data

 Provider hiring standards

  • Could allow security breach if standards are

low

slide-12
SLIDE 12

Off-Site Data Storage

 Security Principles Affected

  • Confidentiality

 Data access shared with authorized employees.

  • Integrity

 Data integrity becomes responsibility of third-party (may be careless or malicious).  Most customers do not keep backup copies of data.

  • Availability

 Customers need to have access to the data they need when they need it.  Most customers move all data to the cloud.

slide-13
SLIDE 13

Shared Hardware in the Cloud

Customers own and manage hardware. Only trusted data is stored on machine hardware.

Providers allocate virtual machines on shared hardware to several customers.

Machine Hardware

Company data Company data

Machine Hardware

Company data Company data

Machine Hardware

VM

(Customer A)

VM

(Customer B)

Machine Hardware

VM

(Customer A)

VM

(Malicious Customer)

Conventional Hardware Infrastructure Shared Hardware Infrastructure in the Cloud

slide-14
SLIDE 14

Shared Hardware

 Scalable way to deliver services

  • Dynamic hardware allocation among users

 Underlying components often not

designed to provide strong isolation

  • CPU caches, GPUs, disk partitions, etc.

 Guest operating systems can gain

influence over underlying platform.

slide-15
SLIDE 15

Shared Hardware

 Security Principles Affected

  • Confidentiality

 Shared hardware side-channel threats

  • Integrity

 Inappropriate levels of underlying platform control could compromise data integrity

  • Availability

 Denial-of-Service vulnerabilities

slide-16
SLIDE 16

Server

Dynamic Hardware Adaption

When resources are exhausted, incoming requests are queued and wait for free resources. When resources on one VM instance are exhausted, a new VM will be allocated to fulfill incoming requests.

Static Hardware Adaption Server Server Server Requests being served Pending requests Static Hardware Adaption Server

VM VM VM VM

Dynamically Allocated VMs … …

slide-17
SLIDE 17

Dynamic Hardware Adaption

 Security Principles Affected

  • Availability

 Denial-of-Service attacks  Users need to be able to access data when they need it

slide-18
SLIDE 18

CONFIDENTIALITY

“Privacy. Ensuring unauthorized disclosure of information”

slide-19
SLIDE 19

Confidentiality: Threats

 Malicious insiders

  • Similar to conventional insider attacks, but

amplified by third-party access

  • Provider employees

 How is access granted to physical and virtual assets?  How are employees monitored?

  • Insiders can access confidential data with little
  • r no risk of detection.
slide-20
SLIDE 20

Confidentiality: Threats

 Co-residence

  • Sharing physical machine hardware (public cloud

model)

  • Cross-virtual machine attacks

 Strategic virtual-machine placement to gain co-residence with victim  Side-channels to monitor shared physical resources (CPU, data caches, keystroke over SSH, etc.)

 High-probability of co-residence when using

“cloud cartography”

  • Use heuristics such as local IP and creation time to
  • btain and verify co-residence
  • Brute-force successful over 50% of the time
slide-21
SLIDE 21

Confidentiality: Responsibilities

 Global encryption scheme  Secure data storage

  • Partitioned RAM
  • Local storage wiping
  • Strict access control and

monitoring

 Inhibit cloud cartography

(used in co-residence attacks)

 Blinding techniques to hide

local IP addresses

 Instance encryption scheme

  • Ensure privacy even if provider is

careless

 Make sure that provider meets

needed standards before migration

  • Make sure contracts are strict and

include all necessary precautions

Provider Customer

slide-22
SLIDE 22

INTEGRITY

“Correctness. Ensuring unauthorized modification of data.”

slide-23
SLIDE 23

Integrity: Threats

 Malicious Insiders

  • Similar to confidentiality threats

 Third-party employees have access to modify cloud services, undetected

  • Providers may threaten integrity to save money
  • r space in the cloud

 Careless Providers

  • Insufficient authorization controls
  • Inconsistent encryption and software keys
  • Data replication and persistence challenges
slide-24
SLIDE 24

Integrity: Responsibilities

 Scheduled data backup  Safe storage

  • Replication and disaster

recovery

 Strict access control  Allow customer to

configure firewall settings

 Monitor employee actions  Monitor data with integrity

checking techniques

 Carefully configure firewall

and access control lists

 Make sure that provider

meets needed standards before migration

Provider Customer

slide-25
SLIDE 25

AVAILABILITY

“Ensuring data is available when needed.”

slide-26
SLIDE 26

Availability: Threats

 Denial-of-Service Attacks

  • Attempt to disrupt (or completely disable)

availability of computer resources to intended users

  • Dynamic resource allocation

 Allows attackers to easily saturate servers  Focus attack on one server and when resources are low, more will be allocated.

  • Direct Attack

 Flood a single target address

  • Indirect Attack

 Perform computationally expensive operations on and instance co-residing with target

slide-27
SLIDE 27

Availability: Threats

 Careless Providers

  • Providers need to provide reliable service
slide-28
SLIDE 28

Availability: Responsibilities

 Stable servers  Prevent denial-of-service

attacks

  • Monitor hardware usage
  • Prevent unlimited resource

allocation

 Monitor instance to ensure

it is not used to execute denial-of-service attack

 Monitor own client usage

Provider Customer

slide-29
SLIDE 29

INTRUSION DETECTION

“Risk management. Detecting and successfully reporting malicious behavior.”

slide-30
SLIDE 30

Intrusion Detection Systems

 Important to monitor all systems running in

the Cloud.

  • No Cloud can be more secure than its weakest

link

  • Need to prevent rapid infection in cloud

 Multi-tenacity

  • Requires flexible settings

 Needs to be capable of monitoring thousands of diverse virtual machines on shared hardware  Different operating systems, deployment models, hardware usage, etc.

slide-31
SLIDE 31

IDS Design Considerations

 Separation of monitored systems and

monitors

  • Cannot trust alerts from a compromised machine

 Centralized and instance management

systems

 How to stop intrusion once detected

  • Cloud virtualization makes this easy

 Simply stop and resume the infected virtual machine

slide-32
SLIDE 32

Intrusion Detection Systems: Responsibilities

 Centralized management

  • Control and monitor alerts

throughout cloud

  • Detect attacks on instances as

well as the cloud as a whole

 Monitor service exploitation

  • Detect internal attacks
  • Determine if Cloud has been

used to attack victims

 Monitor all infrastructure

resources they are using

 Monitor service exploitation

  • Detect attacks on own instance
  • Determine if instance has been

used to attack other instances

Provider Customer

slide-33
SLIDE 33

Conclusions

 Main concerns involve:

  • Third-party data access
  • Shared hardware
  • Dynamic hardware adaption

 Security in Cloud Computing is still an

  • pen topic

 Security responsibilities for providers are

not standardized (yet)

slide-34
SLIDE 34

THANK YOU!