Module 4 (Notes)
Module 4 (Notes)
MODULE – 4
Cloud Security
Syllabus: Cloud Security: Top concern for cloud users, Risks, Privacy Impact Assessment,
Cloud Data Encryption, Security of Database Services, OS security, VM Security, Security
Risks Posed by Shared Images and Management OS, XOAR, A Trusted Hypervisor, Mobile
Devices and Cloud Security. Cloud Security and Trust Management: Cloud Security
Defense Strategies, Distributed Intrusion/Anomaly Detection, Data and Software
Protection Techniques, Reputation-Guided Protection of Data Centers.
1. Traditional threats :are those experienced for some time by any system connected to
the Internet
1
BIS613D CLOUD COMPUTING & SECURITY
The user must protect the infrastructure used to connect to the cloud and to interact with the
application running on the cloud.
This task is more difficult because some components of this infrastructure are outside the
firewall protecting the user.
b. Phishing
c. SQL Injection
2. Availability of cloud services : refers to how reliably users can access their services and data
whenever needed.
o Hardware/software failures
o Power outages
o Extended downtime
o Loss of productivity
2
BIS613D CLOUD COMPUTING & SECURITY
Data Lock-In: Occurs when organizations are too dependent on one cloud provider.
Loss of data due to inferior storage devices provided by third-party hardware vendors.
Cloud providers could potentially access and misuse proprietary user data (Business
Most cloud contracts place full responsibility on the user, not the provider.
No liability for:
o Data loss
o Service outages
Shared infrastructure
3
BIS613D CLOUD COMPUTING & SECURITY
Example: A hacker using many AWS servers to send bulk spam or attack websites.
2. Insecure APIs
APIs used to manage cloud services may lack proper security controls.
Risk: Vulnerabilities in Virtual Machine Monitors (VMMs) can let one user affect others.
5. Account or Service Hijacking
: Users are often unaware of how secure the cloud really is.
Risk: Not knowing who accesses the data, where it's stored, or how it's protected.
4
BIS613D CLOUD COMPUTING & SECURITY
The term privacy refers to the right of an individual, a group of individuals, or an organization
to keep information of a personal or proprietary nature from being disclosed to others.
Many nations view privacy as a basic human right. The Universal Declaration of Human Rights,
Article 12, states: “No one shall be subjected to arbitrary interference with his privacy, family,
home or correspondence, nor to attacks upon his honor and reputation. Everyone has the
right to the protection of the law against such interference or attacks.”
At the same time, the right to privacy is limited by laws. For example, taxation laws require
individuals to share information about personal income or earnings.
Individual privacy may conflict with other basic human rights, e.g., freedom of speech.
Privacy laws differ from country to country; laws in one country may require public disclosure
of information considered private in other countries and cultures.
Significant challenges related to privacy such as identity theft(personal information voluntarily
shared, but stolen from sites granted access to it or misused).
Primarily public clouds where privacy has an entirely new dimension because the data, often
in an unencrypted form, resides on servers owned by a CSP. Services based on individual
preferences, the location of individuals, membership in social networks, or other personal
information present a special risk
The owner of the data cannot rely exclusively on the CSP to guarantee the privacy of the data.
Privacy concerns are different for the three cloud delivery models and also depend on the
actual context. For example, consider Gmail, a widely used SaaS delivery model.
The main aspects of privacy are:
5
BIS613D CLOUD COMPUTING & SECURITY
The lack of user control refers to the fact that user-centric data control is incompatible with
cloud usage. Once data is stored on the CSP’s servers, the user loses control of the exact
location, and in some instances the user could lose access to the data. For example, in case of
the Gmail service, the account owner has no control over where the data is stored or how long
old emails are stored in some backups of the servers.
A CSP may obtain revenues from unauthorized secondary usage of the information, e.g., for
targeted advertising. There are no technological means to prevent this use.
Data proliferation refers to the rapid and exponential increase in the generation, collection,
storage, and sharing of data across various platforms, systems, and devices. This massive
volume of information that can be difficult to manage, analyse and secure.
Dynamic provisioning refers to threats due to outsourcing. A range of issues is very fuzzy; for
example, how to identify the subcontractors of a CSP, what rights to the data they have, and
what rights to data are transferable in case of bankruptcy or merger. There is a need for
legislation addressing the multiple aspects of privacy in the digital age.
A document elaborated by the Federal Trade Commission for the U.S. Congress states:
“Consumer-oriented commercial Web sites that collect personal identifying information from
or about consumers online would be required to comply with the four widely accepted fair
information practices:
Notice. Web sites would be required to provide consumers clear and conspicuous notice of their
information practices, including what information they collect, how they collect it (e.g., directly
or through nonobvious means such as cookies), how they use it, how they provide Choice,
Access, and Security to consumers, whether they disclose the information collected to other
entities, and whether other entities are collecting information through the site.
Choice. Web sites would be required to offer consumers choices as to how their personal
identifying information is used beyond the use for which the information was provided (e.g., to
consummate a transaction). Such choice would encompass both internal secondary uses (such
as marketing back to consumers) and external secondary uses (such as disclosing data to other
entities).
Access. Web sites would be required to offer consumers reasonable access to the information
a Web site has collected about them, including a reasonable opportunity to review information
and to correct inaccuracies or delete information.
Security. Websites would be required to take reasonable steps to protect the security of the
information they collect from consumers. The Commission recognizes that the implementation
of these practices may vary with the nature of the information collected and the uses to which
it is put, as well as with technological developments. For this reason, the Commission
recommends that any legislation be phrased in general terms and be technologically neutral.
Thus, the definitions of fair information practices set forth in the statute should be broad
enough to provide flexibility to the implementing agency in promulgating its rules or
regulations.”
6
BIS613D CLOUD COMPUTING & SECURITY
o
o
o
o
o
o
o
o
7
BIS613D CLOUD COMPUTING & SECURITY
Entities involved in DBaaS security include Data Owners, DBaaS Users, Cloud Service Providers
(CSPs), and Third Party Auditors (TPAs).
The main concerns are data integrity, confidentiality, and availability.
Security threats come from both internal (insider misuse) and external attackers (spoofing,
sniffing, man-in-the-middle attacks, side channeling, illegal transactions, DoS attacks).
Illegal data recovery from deleted storage in multi-tenant environments is a major issue unless
complete scrubbing is done.
8
BIS613D CLOUD COMPUTING & SECURITY
Data transmission risks arise when data moves over public networks without encryption.
➔ Encryption before transfer reduces risk.
o Lack of knowledge about the physical location of data, making it hard to trace breaches.
o Time-sensitive and expensive data provenance (tracking the origin and movement of
data).
Legal and privacy issues arise as data privacy laws in regions like Europe and South America
prohibit data storage outside the country.
DBaaS data confidentiality is affected by insider and outsider attacks, access control issues,
illegal data recovery from storage, network breaches, third-party access, inability to establish
the provenance of the data.
An operating system (OS) allows multiple applications to share the hardware resources of a
physical system, subject to a set of policies.
A critical function ->protect applications against a wide range of malicious attacks such as
unauthorized access to privileged information, tempering with executable code, and spoofing.
Access control: policy specifies how the OS controls the access to different system objects
Cryptographic usage policies: last specifies the cryptographic mechanisms used to protect the
data.
9
BIS613D CLOUD COMPUTING & SECURITY
Applications with special privileges that perform security-related functions are called trusted
applications.
10
BIS613D CLOUD COMPUTING & SECURITY
Probable causes:
2.VM side-channel attacks: malicious attack on one or more VMs by a rogue VM under the
same VMM.
Probable causes:
lack of proper isolation of inter-VM traffic due to misconfiguration of the virtual network
residing in the VMM.
limitation of packet inspection devices to handle high speed traffic, e.g., video traffic.
11
BIS613D CLOUD COMPUTING & SECURITY
presence of VM instances built from insecure VM images, e.g., a VM image having a guest
OS without the latest patches.
VM-BASED THREATS
Probable cause:
Probable causes:
Even trustworthy cloud providers like AWS can’t eliminate all risks.
A key vulnerability lies in the use of shared Amazon Machine Images (AMIs).
These AMIs are accessible via Quick Start or Community AMI menus and often used by first-
time or less experienced users.
AMI Creation Process
12
BIS613D CLOUD COMPUTING & SECURITY
Public SSH keys of the AMI creators were not removed, allowing unauthorized access.
Modified syslog daemons found that forwarded sensitive system logs to external entities.
ClamAV detected:
o A Trojan-Spy variant with keylogging and file access abilities.
o A Trojan-Agent that decrypts stored browser passwords (Firefox).
Risks for Image Creators
Command history files recovered from 612 AMIs revealed sensitive data.
Deleted files could be undeleted from 98% of AMIs using exundelete, with up to 40,000 files
recoverable from one image.
Users must:
13
BIS613D CLOUD COMPUTING & SECURITY
Use tools like shred, scrub, zerofree, wipe to remove sensitive deleted data.
A virtual machine monitor, or hypervisor, is considerably smaller than operating system, e.g.,
the Xen VMM has ~ 60,000 lines of code.
The Trusted Computer Base (TCB) of a cloud computing environment includes not only the
hypervisor but also the management OS.
The management OS supports administrative tools, live migration, device drivers, and
device emulators.
In Xen the management OS runs in Dom0; it manages the building of all user domains, a
process consisting of several steps:
Allocate memory in the Dom0 address space and load the kernel of the guest OS from the
secondary storage.
Allocate memory for the new VM and use foreign mapping to load the kernel to the new
VM.
Release the foreign mapping on the new VM memory, set up the virtual CPU registers and
launch the new VM.
Possible actions of a malicious Dom0
14
BIS613D CLOUD COMPUTING & SECURITY
o Undermine the integrity of the new VM by setting the wrong page tables and/or setup
wrong virtual CPU registers.
o Refuse to release the foreign mapping and access the memory while the new VM is
running.
At run time:
o Dom0 exposes a set of abstract devices to the guest operating systems using split
drivers with the frontend of in a DomU and the backend in Dom0. We have to ensure
that run time communication through Dom0 is encrypted. Transport Layer Security
(TLS) does not guarantee that Dom0 cannot extract cryptographic keys from the
memory of the OS and applications running in DomU
To implement a secure run-time system, we have to intercept and control the hypercalls used
for communication between a Dom0 that cannot be trusted and a DomU we want to protect.
o The privacy and integrity of the virtual CPU of a VM :When Dom0 wants to save the
state of the VM the hypercall should be intercepted and the contents of the virtual CPU
registers should be encrypted. When DomU is restored, the virtual CPU context should
be decrypted and then an integrity check should be carried out.
o The privacy and integrity of the VM virtual memory:The page table update hypercall
should be intercepted and the page should be encrypted so that Dom0 handles only
encrypted pages of the VM. To guarantee the integrity, the hypervisor should calculate
a hash of all the memory pages before they are saved by Dom0. An address translation
is necessary as a restored DomU may be allocated a different memory region.
o The freshness of the virtual CPU and the memory of the VM: The solution is to add to
the hash a version number.
15
BIS613D CLOUD COMPUTING & SECURITY
16
BIS613D CLOUD COMPUTING & SECURITY
Another component, QEMU, is responsible for device emulation. Bootstrapper, PCIBack, and
Builder are the most privileged components, but the first two are destroyed once Xoar is
initialized.
The Builder is very small, it consists of only 13000 lines of code. XenStore is broken into two
compo nents, XenStore-Logic and XenStore-State. Access control checks are done by a small
monitor module in XenStore-State.
Guest VMs share only the Builder, XenStore-Logic, and XenStore-State, see Fig ure 11.6. Users
of Xoar are able to only share service VMs with guest VMs that they control; to do so they specify
a tag on all of the devices of their hosted VMs.
Auditing is more secure, whenever a VM is created, deleted, stopped, or restarted by Xoar the
action is recorded in an append-only database on a different server accessible via a secure
channel. Rebooting provides the means to ensure that a VM is in a known good state.
To reduce the overhead and the increased startup time demanded by a reboot, Xoar uses
snapshots instead of rebooting. The service VMsnapshots itself when it is ready to service a
request. Similarly, snapshots of all components are taken immediately after their initialization
and before they start interacting with other services or guest VMs. Snapshots are implemented
using a copy-on-write mechanism9 to preserve any page about to be modified.
A TRUSTED HYPERVISOR
Terra is a trusted hypervisor designed to support both traditional (open-box) and closed-box
platforms.
For closed-box platforms, the platform owner cannot inspect or manipulate the system
contents.
Supports hardware abstraction for both platform types.
Applications can build their own software stack based on their security needs:
o High-security apps (e.g., financial systems, e-voting) should run under a minimal OS
with only essential functions.
o Low-assurance apps needing rich OS features should use commodity OS.
Focus on Information Assurance (IA):
17
BIS613D CLOUD COMPUTING & SECURITY
18
BIS613D CLOUD COMPUTING & SECURITY
networks operating outside the control of the mobile OS which runs on the application
processor.
Security-specific hardware and firmware store encryption keys, certificates, credentials, and
other sensitive information on some mobile devices.
The nature of mobile devices places them at higher exposure to threats than stationary ones.
Mobile devices are designed to easily install applications, to use third-party applications from
application stores, and to communicate with computer clouds via often untrusted cellular and
WiFi networks.
Mobile devices interact frequently with other systems to exchange data and often use untrusted
content.
Mobile devices often require a short authentication passcode and may not support strong
storage encryption. Location services increase the risk of targeted attacks.
Potential attackers are able to deter mine user’s location, correlate the location with
information from other sources on the individuals the user associates with, and infer other
sensitive information.
Special precautions must then be taken due to exposure to the unique security threats affecting
mobile devices, including:
Mobile malware.
Stolen data due to loss, theft, or disposal.
Unauthorized access.
Electronic eavesdropping.
Electronic tracking.
Access to data by third party applications.
Some of these threats can propagate to the cloud infrastructure a mobile device is connected
to. For example, files stored on the mobile devices subject to ransomeware and encrypted by a
malicious intruder can migrate to the backup stored on the cloud. The risks posed to the cloud
infrastructure by mobile devices are centered around data leakage and compromise.
Such security risks are due to a set of reasons including:
Loss of the mobile device, lock screen protection, enabling smudge attacks and other causes
leading to mobile access control. A smudge attack is a method to discern the password pattern
of a touchscreen device such as a cell phone or tablet computer.
Lack of confidentiality protection for data in transit in unsafe or untrusted WiFi or cellular
networks.
Unmatched firmware or software including operating system and application software
bypassing the security architecture, e.g., rooted/jailbroken devices. • Malicious mobile
applications bypassing access control mechanisms
CLOUD SECURITY AND TRUST MANAGEMENT
Lack of trust between cloud users and service providers hinders cloud adoption.
User concerns include:
Privacy protection
Security assurance
Copyright protection
19
BIS613D CLOUD COMPUTING & SECURITY
Complete reliance on cloud providers faces resistance from traditional PC/server users.
Trust is a social problem, but can be solved with technical solutions
Technology can build trust by ensuring:
Justice
Reputation
Credit
Assurance
20
BIS613D CLOUD COMPUTING & SECURITY
21
BIS613D CLOUD COMPUTING & SECURITY
An IDS can be a NIDS or a HIDS. Program shepherding can be applied to control and verify code
execution.
Other defense technologies include using the RIO dynamic optimization infra structure, or
VMware’s vSafe and vShield tools, security compliance for hypervisors, and Intel vPro
technology. Others apply a hardened OS environment or use isolated execution and sandboxing.
Cloud Defense Methods
Virtualization enhances cloud security, but adds an extra software layer (VMs), which may
become a single point of failure.
A single physical machine can be partitioned into multiple VMs (e.g., for server
consolidation).
Malicious intrusions can damage hosts, networks, and storage if not isolated properly.
Internet anomalies (in routers, gateways, etc.) can disrupt cloud services.
Trust negotiation is usually performed through Service Level Agreements (SLAs).
Public Key Infrastructure (PKI) can be enhanced using data center reputation systems.
Worms and DDoS attacks must be contained quickly to maintain cloud reliability.
Establishing cloud security is challenging, as data and software are shared by default in cloud
environments.
22
BIS613D CLOUD COMPUTING & SECURITY
Privacy breaches
Security threats
Copyright violations
Users need robust cloud platforms with tools to build applications over large datasets.
Google’s cloud platform uses in-house software for resource protection.
Amazon EC2 secures resources using:
HMEC (Hash-based Message Authentication Code)
X.509 certificates
Browser-initiated applications also need special protection in cloud environments.
23
BIS613D CLOUD COMPUTING & SECURITY
SaaS users may request services (e.g., secretarial work) from a shared cloud platform.
24
BIS613D CLOUD COMPUTING & SECURITY
Cloud platforms operate across network domains, including edge networks where resources
are connected.
DDoS (Distributed Denial of Service) attacks are often combined with worms and can cause:
Buffer overflow
Disk exhaustion
Connection saturation
Flooding attacks generate massive traffic from zombie machines toward a victim server.
Attack traffic flows through a hierarchical pattern (like a tree), starting from many zombies and
funnelling through intermediate routers to the victim.
Provider-level cooperation helps eliminate the need for edge network intervention, improving
response efficiency and centralized control.
Users desire a software environment that provides many useful tools to build cloud applications
over large data sets. In addition to application software for MapReduce, BigTable, EC2, 3S, Hadoop,
AWS, GAE, and WebSphere2, users need some security and privacy protection software for using
the cloud.
Such software should offer the following features:
Special APIs for authenticating users and sending e-mail using commercial accounts
25
BIS613D CLOUD COMPUTING & SECURITY
Fine-grained access control to protect data integrity and deter intruders or hackers
Shared data sets protected from malicious alteration, deletion, or copyright violation
Ability to secure the ISP or cloud service provider from invading users’ privacy
Personal firewalls at user ends to keep shared data sets from Java, JavaScript, and ActiveX
applets
A privacy policy consistent with the cloud service provider’s policy, to protect against identity
theft, spyware, and web bugs
VPN channels between resource sites to secure transmission of critical data objects
Privacy
Security
Copyright protection
Users seek trusted software environments that offer tools to build secure cloud
applications over protected data.
Watermarking was traditionally used for digital copyright management.
Data coloring is a modern approach where:
User identity is also "colored", allowing matching between user and data color.
Color matching supports various trust management functions, such as access control and
ownership validation.
Cloud storage supports the full life cycle of watermarking:
Generation
Embedding
26
BIS613D CLOUD COMPUTING & SECURITY
Cloud computing shifts both data and computation to cloud provider-managed server
clusters.
Once data is in the cloud, it’s difficult to extract or move to another platform — this leads
to the data lock-in problem.
Lack of interoperability:
o Each cloud provider uses proprietary APIs, limiting data portability.
Lack of application compatibility:
o Users must often rewrite applications from scratch when switching platforms.
27
BIS613D CLOUD COMPUTING & SECURITY
Reputation refers to the collective opinion regarding the character, behavior, or reliability
of an entity such as a person, agent, service, or product. In cloud environments, reputation
systems are crucial for enhancing trust, especially since users often rely on third-party
providers to store data and run applications. These systems enable users to make
informed decisions by assessing past behavior or service quality
Initially developed for P2P networks and e-commerce platforms like eBay and Amazon,
reputation systems are now being adapted for cloud computing. By incorporating trust
evaluations, they help mitigate risks like data breaches, unreliable services, and dishonest
users, while promoting accountability and service quality.
P2P networks
Multi-agent systems
E-commerce
Cloud computing
A. Based on Architecture
28
BIS613D CLOUD COMPUTING & SECURITY
Reputation systems strengthen cloud security by aiding trust negotiation, supporting SLA
enforcement, and working alongside identity management and access control systems. In hybrid
and multi-cloud models, reputation-based systems help guide vendor selection and resource
allocation, leading to efficient and trustworthy operations.
Reputation systems must serve both cloud users and data centers.
They track security breaches across all levels of the cloud infrastructure.
Effective for:
o VM management
o Snapshot control using RPO (Recovery Point Objective)
o Safe data migration and cloning
29
BIS613D CLOUD COMPUTING & SECURITY
30
BIS613D CLOUD COMPUTING & SECURITY
31