Title: Cloud Computing
1Cloud Computing Security Issues
University of Colorado at Colorado
Springs Engineering Applied Science Department
Prepared by Hamoud Al-Shammari
CS6910 Professor Chow
July 25, 2011
2First Part
- What is Cloud Computing?
- Layers of Cloud Computing.
- Technical Security Issues in Cloud Computing.
- Second Part
- What are the problems?
- Opportunities for Advancement.
- The Idea of PVI model.
3What is Cloud Computing?
- It is a new paradigm for the provision of
computing services. - Shifting the location of these services to the
network causes reducing the costs of hardware and
software resources.
4Models of Cloud Computing
- 1- Software as a Service.
- 2- Platform as a Service.
- 3- Infrastructure as a Service.
5Models of Cloud Computing
- 1- Software as a Service
- Provides users to use the applications online.
- Ex www.zoho.com
- Mail, Writer, Projects etc.
6Models of Cloud Computing
- 2- Platform as a Service
- To control the hosting environments to specific
needs. - Ex Google App Engine to deploy and dynamically
scale Python and Java based web applications.
7Models of Cloud Computing
- 3- Infrastructure as a Service (IaaS)
- Provides basic infrastructure components such as
CPU, memory and storage. - Ex Amazons Elastic Compute Cloud (EC2).
8(No Transcript)
9Two main technologies are used to access these
three Cloud services
- 1- Web-Services
- Provide access to (IaaS)
- 2- Web-Browsers
- Provide access to (SaaS)
- Both provide the access to (PaaS)
10Why we use Cloud Computing?
- To reduce the costs (Pay As You Go)
- 1- To reduce hardware costs (IaaS).
- 2- To reduce software license costs (SaaS),
(PaaS). - To support the Scalable Systems
- - To NOT worry about increasing of users and
requests.
11Some Technical Security Issues in Cloud Computing
- Cloud Security issues focus on
- 1- Confidentiality.
- 2- Integrity.
- 3- Authentication.
- Two places that must be secure in Cloud which
are - 1- Web-Services (WS).
- 2- Web-Browser (WB).
121- Web-Service Security
- WS-Security it is a mechanism for web service
working in message level. - How to provide Confidentiality, Integrity, and
Authentication for messages? - 1- By using XML signature
- For XML fragments to be digitally signed to
ensure integrity and authentication. - 2- By using XML Encryption
- For XML fragments to be encrypted to ensure data
confidentiality.
132- Web-Browser Security
- Also works with
- 1- XML Signature.
- 2- XML Encryption.
- Modern Web-Browser are using AJAX techniques
(Asynchronous Java Scripts and XML) to develop
platform independent I/O tools. - New names for that techniques (Web Applications,
Web 2.0, or SaaS).
143- Transport Layer Security (TLS) OR Secure
Sockets Layer (SSL)
- 1- Record Layer
- Encrypts/Decrypts TCP data stream.
- 2- TLS Handshake
- Used to authenticate the server and the client.
- SSL became the most important cryptographic
protocol worldwide, because it is implemented in
every web browser.
154- Cloud Malware Injection Attack
- Attacker adds his own system to the Cloud system.
- To Solve the PROBLEM
- Store a hash value in the cloud and compare any
new service or request with the hash value. - WHAT if the attacker can create a valid hash
value !!!
165- Flooding Attacks
- Attacker sends a huge amount of nonsense requests
to a certain service which make the problem by
having the data traffic of different time zones
operated by the same server. - That cause, the servers will NOT serve the other
requests from another users. - To Solve The PROBLEM
- Cloud Computing enables a dynamic adaptation of
hardware requirements to the actual workload
occurring by using Virtual Machines (VM).
17Second Part What are the problems?
18What is the problem with Web-Services?
- XML Signature Element Wrapping
- SOAP messages are generally transmitted through
HTTP protocol with an XML format. - Attacker is able to manipulate a SOAP messages by
copying the target element and inserting another
value and moving the original element to
somewhere on the SOAP message.
- To Solve The Problem
- Using a combination of WS-Security with XML
signature to sign particular element and digital
certificated such as X.509. - Create a list of elements that is used in the
system, and reject any other messages.
19What is the problem with Web-Browser?
- The web-Browsers are not able to apply
WS-Security concepts (XML signature and XML
encryption). -
- BECAUSE
- 1- Data can only be encrypted through (TLS)
- which is Transport Layer Security.
- 2- XML signatures are only used within the (TLS)
- handshake.
20What is the problem with TSL/SSL?
- The TSL/SSL technique is point-to-point.
- Messages will be Encrypted and Decrypted many
times in the process. - possibility of breaking the security between the
browser and the clouds. - Then, attacker can get the DECRYPTED message and
change it !
21Opportunities for Advancement
- 1- For the problems in Web-Browsers / SSL
- Create new web browsers that apply WS-Security
concepts. - The WS-Security works in message level, so it
appears to be more suitable than SSL/TLS. - Then, these web browsers are able to use XML
Encryption in order to provide end-to-end
encryption in SOAP messages.
22Opportunities for Advancement
- 2- Private Virtual Infrastructure (PVI)
- Usually, cloud computing place an organizations
data in the control of a third party. - PVI model is designed to separate the duties
between the users and the providers - 1- The PVI datacenter is under control of the
- information owner.
- 2- The cloud fabric is under control of the
service provider.
23Opportunities for Advancement
- Private Virtual Infrastructure (PVI)
- Client CANNOT manipulate the security settings of
the fabric. - Client CAN remove, destroy, or lock down their
data at any time. - The Service Level Agreement (SLA) between the
user and the provider determines the
responsibilities of all parties. - In this model Client needs to
- 1- Vision into the security settings and
configuration of the fabric. - 2- Communicate to VPI through virtual private
network and all - links should be encrypted with tunnels like
SSL.
24Opportunities for Advancement
- Private Virtual Infrastructure (PVI)
- Trusted Computing
- Providers are required to use trusted computing
technologies, so organizations can verify their
security posture in the cloud and control their
information. - The key component here is Trusted Platform Model
(TPM) which is a cryptographic component that
stores cryptographic keys. - Cryptographic keys can be used to attest the
operating state of the platform. - Platform Configuration Registers (PCRs) are
places where cryptographic keys are stored in.
25Opportunities for Advancement
- Private Virtual Infrastructure (PVI)
- Trusted Computing
- PROBLEM with TPM it only works for
non-virtualized environment. - Virtual TPM (VTPM) is implemented by providing
software instances of TPMs for each virtual
machine. - The developers here developed an architecture
that secures each VM by coupling a VTPM in its
own sub domain called Locator Bot (LoBot). - LoBot allows each VM to be verifiable by its
owner and provide secure provisioning and
migration of the VM within the cloud as well.
26Opportunities for Advancement
- Private Virtual Infrastructure (PVI)
- Five Tenets of Cloud Computing
- 1- Trusted Cloud Platform the provider needs to
provide security services -
which protect and monitor the fabric. - 2- PVI Factory
- - The most sensitive component of PVI.
- - It is the root authority for
- - Provisioning.
- - VTPM key generation.
- - Certificate generation management.
- - Should be under full control of the
information owner. - - It serves as the controller and policy
decision point for the PVI.
27Opportunities for Advancement
- Private Virtual Infrastructure (PVI)
- 3- Measurement and Secure Provisioning
- Providers must allow clients transparent insight
into their infrastructures. - LoBot can perform the fabric pre-measurement
which allows PVI to share the responsibility of
security management. - LoBot is a VM architecture and secure transfer
protocol based on VTPM. - 4- Secure Shutdown and Data Destruction
- This process is required to ensure all sensitive
data is removed before new processes are allowed
to run on it. - The PROBLEM the VM do not provide that, so the
authors recommended to enclose that on future VM
monitors or through LoBot.
28Opportunities for Advancement
- Private Virtual Infrastructure (PVI)
- 5- Monitoring and Auditing
- LoBot provide continuous monitoring of the cloud
environment. - Clients provide the auditing process.
- But with that number of users and amount of
information the legal using of the information
will be decreased. - The authors recommend the sharing of auditing
responsibilities between the service providers
and clients. - Locator Bot (LoBot) is the authors architecture
and protocol for secure provisioning and secure
migration of virtual machines within an IaaS
cloud. LoBot provides many other security
features for PVI such as environmental
monitoring, tamper detection and secure shutdown.
29Conclusion
- Two main technical security points
- 1. WS-Security Mechanism
- XML Signature.
- XML Encryption.
- With developing new browsers this mechanism might
be applied. - 2. Private Virtual Infrastructure (PVI) Model
- Duties between provider and client.
- Locator Bot (LoBot).
- Because users are part of the solution, this
model will face many problems to be applied well.
30References
- Cloud Computing Security Risk. LaQuata Sumter,
Department of Computer and Information Sciences.
Florida AM University. - Infrastructure As A Service Security Challenges
and Solutions. Wesam Dawoud, Ibrahim Takouna,
Christoph Meinel, Hasso Platter Institute.
Postdam, Germany. - On Technical Security Issues in Cloud Computing.
M. Jensen, J. Schwenk. Horst Gortz Institute for
IT Security, Ruhr University Bochum, Germany. - Private Virtual Infrastructure for Cloud
Computing. F. John Krautheim. University of
Maryland. - Security Issues In Cloud Computing and
Countermeasures. D. Jamil, H. Zaki. University of
Engineering and Technology. Karachi, Pakistan.
31Cloud Computing Security Issues
Thank you