Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/327100442

Survey on Security Issues in Cloud Computing

Conference Paper · November 2014

CITATIONS
READS
0
12

2 authors, including:

Cherif Ghazel
Université de la Manouba
33 PUBLICATIONS 53 CITATIONS

Some of the authors of this publication are also working on these related projects:

NGN - QoS View project

All content following this page was uploaded by Cherif Ghazel on 19 October 2020.

The user has requested enhancement of the downloaded file.


International Journal Of Engineering Research and Technology (IJERT)

PEMWN-2014 Conference Proceedings

Survey on Security Issues in Cloud Computing


H. Guesmi, C. Ghazel and L. A. Saidane
Cristal Lab, National School of Computer Sciences.
University of Manouba – Tunisia

Abstract—Cloud computing presents an emerging technology of four deployment models depending upon the customers’
paradigm that provides current technological and computing requirements [5]: private cloud in which the infrastructure is
concepts into utility-like solutions similar to water and owned and managed by a specific organization; public cloud
electricity systems. A wide range of benefits is supplied by
in which the physical infrastructure is owned and managed by
clouds including service flexibility, configurable computing
resources and economic savings. However, the primary
the service provider; community cloud in which the physical
obstacles to a wide adoption of clouds are security and privacy infrastructure is owned and managed by a consortium of
concerns. The clouds introduce new concepts, such as organizations; and hybrid cloud witch includes combinations
outsourcing, resource sharing and multi-tenancy, which of the previous three models.
generate new challenges to the security community. These This paper is organized as follows: Section 2 describes
challenges require, in addition to the ability to tune the security cloud security categories and issues. Section 3 presents an
measures of traditional computing systems, providing new evaluation of main general cloud security mechanisms. An
security models, policies and protocols to address the unique analysis of security issues is presented in section 4. In section
cloud computing security challenges. We provide in this work,
5 we conclude the paper.
an entire study of cloud computing privacy concerns and
security. We present cloud vulnerabilities and classification of II. CLOUD SECURITY CATEGORIES AND ISSUES
known security threats, and present the state-of-the-art
measures to control the vulnerabilities and neutralize the
menaces. Finally, we analyze and identify the limitations of the In this part of this work we identify the five categories of
current cloud security solutions. cloud computing security issues cited in [6]. Then, we
describe the different cloud security issues and their
Keywords—Cloud computing; cloud security; security classifications.
vulnerabilities; threats; attacks; data protection.
A. Cloud security categories
I. INTRODUCTION  Security Standards category: regroups the standards
required to take precaution measures in order to
Cloud computing, as defined by NIST, is a new computing prevent attacks in cloud computing. It includes
model that provides a centralized pool of configurable auditing and other agreements among users, service
computing resources (e.g., storage, applications, services, level agreements, service provider and other
etc.) that can be rapidly provisioned and released with service stakeholders. It governs cloud security policies
provider interaction or minimal management effort [1]. without compromising performance and reliability.
Five key characteristics of cloud computing was defined  Network category: it’s the medium through which
by the National Institute of Standards and Technology (NIST) users connect to cloud infrastructure to accomplish the
[2], namely: broad network access, rapid elasticity or required computations. It includes network
expansion, measured service, on-demand self-service, and connections, information exchange through
resource pooling [2]. Cloud computing is also described as a registration, and browsers. This type of security covers
dynamic and often easily extended platform to provide network attacks like Connection Availability, Internet
transparent virtualized resources to users through the Internet Protocol Vulnerabilities, Flooding Attack, Denial of
[3]. Service (DoS), Distributed Denial of Service (DDoS),
According to the different types of services offered, cloud etc.
computing architecture can be considered to consist of three  The Access Control category: allows capturing issues
layers: Infrastructure as a Service (IaaS) is the lowest layer that affect privacy of user information and data
that provides basic infrastructure support service; Platform as storage. It covers access control, identification and
a Service (PaaS) is the middle layer, which offers platform authentication. This category allows capturing issues
oriented services, besides providing the environment for that affect privacy of data storage and user
hosting user’s applications; Software as a Service (SaaS) is information.
the topmost layer which features a complete application  The Cloud Infrastructure category: Involves the
offered as service on demand [4]. Cloud services can be attacks specific to the cloud infrastructure within IaaS,
deployed in one PaaS and SaaS such as privileged insiders and
tampered
www.ijert.org 39
International Journal Of Engineering Research and Technology (IJERT)

PEMWN-2014 Conference Proceedings

binaries and is related particularly with virtualization on behalf of legitimate users [14]. Hackers can run
environment. malicious code on the hijacked resources or they can generate
 The Data category involves related security issues. It bogus data and occupy resources. Denial of service can be
includes data confidentiality, migration, integrity and launched by appearance of vulnerabilities in Internet
data warehousing. protocols such as Session Initiation Protocol (SIP) which
B. Cloud Security Issues and Classification could cause an un-trusted internet [15].
1) Cloud security standards issues 3) Access control issues
Currently, there is lack of appropriate security standards Service and account hijacking causes phishing and
in cloud computing [1]. Special attention is required towards software vulnerabilities where hackers gain unauthorized
mutual security standards such as Secure Sockets Layer access to servers. This unauthorized access results a threat to
(SSL)/Transport Layer Security (TLS), XML Encryption integrity and confidentiality of data and services [1].
Syntax and Processing, XML signature, and Key Malicious insiders present another access control issue such
Management Interoperability Protocols. The lack of as impacting organizations’ security by dishonest
governess for audits and assessment of corporate standards administrators. The current mechanisms of authentication
causes many security issues which are associated with may not be applicable in cloud environments [4]. A customer
compliance risks [1]. Customers of cloud do not have enough can access data and compose services from multiple cloud
knowledge of processes and procedures of the provider, providers using a browser or mobile application. This access
particularly in segregation of duties and areas of identity brings in a risk called privileged user access [16].
management. Auditability is an important aspect of cloud 4) Cloud Infrastructure issues
computing security; even so, there is not an audit net for The important cloud infrastructure issues in different case
service providers [7, 8]. Governing bodies and security studies are: insecure interface of Application Programming
standards are part of legal aspects and service level Interface (API) it covers the vulnerabilities in the set of APIs
agreements (SLA), which have not been practiced for cloud in the cloud portal (customers use APIs to connect to a cloud)
computing [9,10]. SLA determines the relationship among [1], Quality of Service (QoS), sharing technical flaws,
provider and recipient and is important for both parties [11]. reliability of suppliers, security misconfiguration and multi-
It identifies the customer’s needs, encourages dialog in the tenancy.
event of disputes, simplify complex issues, provides a 5) Data security issues
framework for understanding, reduces areas of conflict and Data loss and leakage, data redundancy, data recovery,
eliminates unrealistic expectations. If there is a loss of data data location, data protection, data availability and data
and some factors are not taken into consideration as users privacy have been the important issues in different case
may not be able to put claims on providers. The Trust studies which require data to be properly protected,
relationship between users and the different cloud encrypted, controlled, and transmitted.
stakeholders is required when users transfer data on cloud Fig. 1 shows cloud components where security issues are
infrastructure [12]. raised. Each component, such as policies, cloud
2) Cloud network security issues infrastructure, clients, and network, is prone to certain
Network security issues are considered the biggest security attacks and requires attack detection, prevention and
security challenges in clouds [13]. The overlooked security response strategies.
configurations on networks and the lack of proper installation
of network firewalls facilitate to hackers to access the cloud

Fig. 1. Cloud components that are prone to security attacks.


information to stakeholders that helps them to manage the
III. COMPARATIVE EVALUATION OF risks when migrating into the clouds, covers advisory services
GENERAL CLOUD SECURITY on setting SLAs and to identify the critical cloud services and
MECHANISMS analyze the impact of the cloud service failure in such
To addressing many security issues related to the cloud, circumstances, ENISA provides cooperative studies with
the European Union Agency for Network and Information various stakeholders.
Security (ENISA) has done a significant work: provides

www.ijert.org 40
International Journal Of Engineering Research and Technology (IJERT)

PEMWN-2014 Conference Proceedings

Depending on its cloud offering and the architecture, In table 1, we present a comparative evaluation of some
every cloud service provider has installed diverse security well-known general tools that are used to countermeasure
measures. Their security model mainly depends upon the type cloud security attacks.
of cloud offering they provide, customer section being served
and the deployment models they basically implement.

TABLE 1. COMPARATIVE ANALYSIS FOR STRENGTHS AND LIMITATIONS OF SOME EXISTING SECURITY MECHANISMS

Countermeasures Limitations

Intrusion Detection Systems (IDS) :


1. The main limitation in GCCIDS is the
1. Implementing IDS offers additional security measures by
high communication overhead and
investigating network traffic, log files and user behaviour.
redundancy.
2. IDS have two types (1) host based IDS (HIDS) which monitors the
behaviour on a single host and (2) network based IDS (NIDS) which
2. GCCIDS does not provide any
analyses traffic flowing through a network [17].
information as to whether a node should
3. An IDS system named Grid and Cloud Computing Intrusion
immediately alert other nodes as intrusion
Detection System (GCCIDS) was proposed in [18]. It consists of an
occurs or at certain predefined periodic time
audit system that detects and covers attacks that have not been covered,
interval.
previously, by other NIDS and HIDS systems. In GCCIDS each node
identifies the local event and alerts all other connected nodes.

Autonomous Systems :

1. An autonomous system is an IDS that works with pre-specified 1. Security audit as a Service (SaaS)
basic rules. These rules configure, heal, optimize and protect involves the use of large number of agents
themselves automatically, thereby reducing human efforts and and functions such as initiating agent,
involvement [19]. moving agent, killing agent, etc., which
2. It is impossible, without autonomic computing, to manage next creates high communication among agents
generation distributed-systems such as clouds and grids effectively. and increases the processing and
3. An intelligent autonomous agent for incident detection named computational overhead.
Security audit as a Service (SaaS) as presented in [20]. SaaS addresses
three main problems of cloud computing namely: abusing cloud 2. There is no flexible management system
resources; missing security monitoring in cloud infrastructure and by number of user access, at a given time or
defective isolation of shared resources. by load averages.
4. A pure concept of autonomic manager in grid and cloud
computing as defined in [21]. It provides a feature of self-
configuration, self-healing, self-optimization and self-protection.

Federated Identity Management System


1. The main issue with single Sign-On lies
1. Management of identities (IDM) is about maintaining the integrity in the wider damage that it causes in case of
of identities, throughout their life cycle, to make it and its related data compromise. If a user identity is
(e.g., authentication and authorization results) available to different compromised, the illegitimate user will not
services in secure and privacy-protected manner [22]. be verified again, which could create higher
2. The process to repeat authentication of user (Single Sign-On) can be level of information leakage.
an example of federated identity [23]. 2. Another issue is lacking dynamic
federation and agile mechanism in FIM
systems. It is an architectural concern and
requires further investigation.

attacks across all cloud components, to achieve


IV. ANALYSIS comprehensive cloud security. In 2011 the number of browser
Cloud computing is an emerging paradigm that involves based attacks increased from 580,371,937 to 946,393,693
all the basic components of computing such as [24]. This important increase is mainly due to the growing
communication networks, end-user machines (PCs), access value of the data assets and resources available on the clouds,
management systems and cloud infrastructures. The data and which makes the platform very attractive for attackers.
cloud infrastructure must be protected against known and Unfortunately, we cannot protect the cloud-computing
unknown
infrastructure from all the known and unknown attacks because it requires additional computational overhead and
www.ijert.org 41
International Journal Of Engineering Research and Technology (IJERT)

PEMWN-2014 Conference Proceedings

resources. Current security solutions such as IDS, DIDS, REFERENCES


outsourcing the identity management systems, firewalling and [1] Tripathi, A., Mishra, A. “Cloud computing security considerations”. In
installing antivirus, are expensive and degrade performance. Proceedings of the 2011 IEEE International Conference on Signal
Thus, the important cloud security research challenge is not Processing, Communications and Computing (ICSPCC), Xi’an, China,
14–16 September 2011; pp. 1–5.
only in providing high level measures but also in doing so [2] “Final Version of NIST Cloud Computing Definition Published”.
with minimum resources and reduced performance Available online: http://www.nist.gov/itl/csd/cloud-102511.cfm
degradation. (accessed on 25 August 2013).
Using this current study, we found that to achieve better [3] Lv, H., Hu, Y. “Analysis and research about cloud computing security
protect policy”. In Proceedings of the 2011 International Conference on
security, data and system security should be embedded in the Intelligence Science and Information Engineering (ISIE), Wuhan,
design of cloud computing architecture. Furthermore, security China, 20–21 August 2011; pp. 214–216.
measures should be autonomous and dynamic. Cloud [4] Mell, P., Grance, T. “The NIST Definition of Cloud Computing”, NIST,
infrastructure is changing fast requiring security policies and USA. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-
145.pdf, USA, 2009.
measures to be regularly updated at the same pace. Moreover, [5] Gowrigolla, B., Sivaji, S., Masillamani, M.R. “Design and auditing of
licensing is essential to the security of clouds. Standard cloud computing security”. In Proceedings of the 2010 5th International
security policies should be implemented strictly in clouds and Conference on Information and Automation for Sustainability
organizational bodies should control clouds’ infrastructure on (ICIAFs), Colombo, Sri Lanka, 17–19 December 2010; pp. 292–297.
[6] Issa M. Khalil, Abdallah Khreishah, Muhammad Azeem. “Cloud
regular bases to evaluate the adeptness of the security Computing Security: A Survey”, Computers 2014, 3, 1-35;
precautions used by the vendors. In addition, it is very doi:10.3390/computers3010001.
important to holistically explore the various cloud security [7] Morin, J., Aubert, J., Gateau, B. “Towards cloud computing SLA risk
related parameters including challenges, risks, threats, management: Issues and challenges”. In Proceedings of the 2012 45th
Hawaii International Conference on System Science (HICSS), Maui,
attacks, and vulnerabilities. HI, USA, 4–7 January 2012; pp. 5509–5514.
[8] Braun, V., Clarke, V. “Using thematic analysis in psychology”. Qual.
V. CONCLUSION Res. Psychol. 2006, 3, 77–101.
[9] “A Survey on Cloud Computing Security, Challenges and Threats|
Currently the adoption of cloud paradigm is growing. Whitepapers| TechRepublic”. Available online:
http://www.techrepublic.com/whitepapers/a-survey-on-cloud-
Analysts suppose that the factor of cost reduction in cloud computingsecurity challenges and-threats/3483757 (accessed on 18
computing will increase the adoption of cloud computing in March 2012).
the public sector. With the greet evolution in cloud adoption [10] Thalmann, S., Bachlechner, D., Demetz, L., Maier, R. “Challenges in
the sector of security attracted the attention of practitioners cross-organizational security management”. In Proceedings of the 2012
45th Hawaii International Conference on System Science (HICSS),
and researchers. We conduct, in this work, a survey on the Maui, HI, USA, 4–7 January 2012; pp. 5480–5489.
current issues of cloud security and the state-of-the-art [11] M. Taifi, J. Y. Shi, A. Khreishah, “SpotMPI: A Framework for
security solutions. The main issues were tampered binaries, Auction-based HPC Computing Using Amazon Spot Instances”, in
firewall misconfigurations, side channels, multi-tenancy, Proc. of the International Symposium on Advances of Distributed
Computing and Networking (ADCN), 2011.
mobility, and weak browser security. These issues are [12] Riquet, D., Grimaud, G., Hauspie, M. “Large-scale coordinated attacks:
classified into five security categories includes: security Impact on the cloud security”. In Proceedings of the 2012 Sixth
standards, network, cloud infrastructure, access, and data. International Conference on Innovative Mobile and Internet Services in
There are variable incidents of attacks that target the clouds Ubiquitous Computing (IMIS), Palermo, Italy, 4–6 July 2012; pp. 558–
563.
such fate sharing, phishing, botnet, and malware injection. In [13] Wang, J.-J., Mu, S. “Security issues and countermeasures in cloud
a comparative analysis we present the state-of-the-art well- computing”. In Proceedings of the 2011 IEEE International Conference
known countermeasures for cloud security attacks including on Grey Systems and Intelligent Services (GSIS)”, Nanjing, China, 15–
intrusion detection systems, autonomous systems, and 18 September 2011; pp. 843–846.
[14] Gonzalez, N., Miers, C., Redigolo, F., Carvalho, T., Simplicio, M.,
federated identity management systems. Finally, we highlight Naslund, M., Pourzandi, M. “A quantitative analysis of current security
limitations of these systems including the high concerns and solutions for cloud computing”. In Proceedings of the
communication and computation overhead and the detection 2011 IEEE Third International Conference on Cloud Computing
efficiency and coverage. Technology and Science (CloudCom), Athens, Greece, 29 November–1
December 2011; pp. 231–238.
At this moment, a big concerns are related with data. Data [15] Rachel Suresh, N. Mathew, S.V. “Security concerns for cloud
migration from one cloud to another is not realizable because computing in aircraft data networks”. In Proceedings of the 2011
of the heterogeneous nature of clouds. Furthermore, if a International Conference for Internet Technology and Secured
contract has expired, clouds lack the tools that confirm that Transactions (ICITST), Abu Dhabi, United Arab Emirates, 11–14
December 2011; pp. 132–136.
user data has been deleted from the cloud. These data threats [16] Jain, P., Rane, D., Patidar, S. “A survey and analysis of cloud model-
require researchers’ attention to cover some standards for based security for computing secure cloud bursting and aggregation in
continuous data deletion. We plan in the future to investigate renal environment”. In Proceedings of the 2011 World Congress on
the possibility of presenting appropriate frameworks for Information and Communication Technologies (WICT), Mumbai,
India, 11– 14 December 2011; pp. 456–461.
DIDS for clouds with scheduling algorithms for Green IT. [17] Van athi, R., Gunasekaran, S. “Comparison of network intrusion
detection systems in cloud computing environment”. In Proceedings of
the 2012 International Conference on Computer Communication and
Informatics (ICCCI), Coimbatore, India, 10–12 January 2012; pp. 1–6.
[18] Vieira, K., Schulter, A., Westphall, C.B., Westphall, C.M. “Intrusion
detection for grid and cloud computing”. IT Prof. 2010, 12, 38–43.
[19] Erdil, D.C. “Dependable autonomic cloud computing with information
proxies”. In Proceedings of the 2011 IEEE International Symposium on

www.ijert.org 42
International Journal Of Engineering Research and Technology (IJERT)

PEMWN-2014 Conference Proceedings

Parallel and Distributed Processing Workshops and Phd Forum


(IPDPSW), Shanghai, China, 16–20 May 2011; pp. 1518–1524.
[20] Doelitzscher, F., Reich, C., Knahl, M., Clarke, N. “An autonomous
agent based incident detection system for cloud environments”. In
Proceedings of the 2011 IEEE Third International Conference on Cloud
Computing Technology and Science (CloudCom), Athens, Greece, 29
November–1 December 2011; pp. 197–204.
[21] Balen, D., Westphall, C., Westphall, C. “Experimental assessment of
routing for grid and cloud”. In Proceedings of the Tenth International
Conference on Networks (ICN 2011); St. Maarten, The Netherlands
Antilles, January 23-28, 2011, pp. 341–346.
[22] Bishop, M. “Computer Security: Art and Science”. Addison-Wesley
Professional: Reading, MA, USA, 2002.
[23] Leandro, M.A.P., Nascimento, T.J., dos Santos, D.R., Westphall, C.M.,
Westphall, C.B. “Multitenancy authorization system with federated
identity for cloud-based environments using shibboleth”. In
Proceedings of the Eleventh International Conference on Networks,
2012; pp. 88–93.
[24] Kaspersky Security Bulletin. Statistics 2011. Available online:
http://www.securelist.com/en/analysis/204792216/Kaspersky_Security
_Bulletin_Statistics_2011 (accessed on 13 January 2013).

www.ijert.org 43
International Journal Of Engineering Research and Technology (IJERT)

PEMWN-2014 Conference Proceedings

View publication stats

You might also like