Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/327100442

Survey on Security Issues in Cloud Computing

Conference Paper · November 2014

CITATIONS READS

0 12

2 authors, including:

Cherif Ghazel
Université de la Manouba
33 PUBLICATIONS   53 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

NGN - QoS View project

All content following this page was uploaded by Cherif Ghazel on 19 October 2020.

The user has requested enhancement of the downloaded file.


International Journal Of Engineering Research and Technology (IJERT)

PEMWN-2014 Conference Proceedings

Survey on Security Issues in Cloud Computing


H. Guesmi, C. Ghazel and L. A. Saidane
Cristal Lab, National School of Computer Sciences.
University of Manouba – Tunisia

Abstract—Cloud computing presents an emerging technology of four deployment models depending upon the customers’
paradigm that provides current technological and computing requirements [5]: private cloud in which the infrastructure is
concepts into utility-like solutions similar to water and owned and managed by a specific organization; public cloud
electricity systems. A wide range of benefits is supplied by in which the physical infrastructure is owned and managed by
clouds including service flexibility, configurable computing
the service provider; community cloud in which the physical
resources and economic savings. However, the primary
obstacles to a wide adoption of clouds are security and privacy infrastructure is owned and managed by a consortium of
concerns. The clouds introduce new concepts, such as organizations; and hybrid cloud witch includes combinations
outsourcing, resource sharing and multi-tenancy, which of the previous three models.
generate new challenges to the security community. These This paper is organized as follows: Section 2 describes
challenges require, in addition to the ability to tune the security cloud security categories and issues. Section 3 presents an
measures of traditional computing systems, providing new evaluation of main general cloud security mechanisms. An
security models, policies and protocols to address the unique analysis of security issues is presented in section 4. In section
cloud computing security challenges. We provide in this work, 5 we conclude the paper.
an entire study of cloud computing privacy concerns and
security. We present cloud vulnerabilities and classification of II. CLOUD SECURITY CATEGORIES AND ISSUES
known security threats, and present the state-of-the-art
measures to control the vulnerabilities and neutralize the
In this part of this work we identify the five categories of
menaces. Finally, we analyze and identify the limitations of the
current cloud security solutions. cloud computing security issues cited in [6]. Then, we
describe the different cloud security issues and their
Keywords—Cloud computing; cloud security; security classifications.
vulnerabilities; threats; attacks; data protection.
A. Cloud security categories
I. INTRODUCTION  Security Standards category: regroups the standards
required to take precaution measures in order to
Cloud computing, as defined by NIST, is a new computing prevent attacks in cloud computing. It includes
model that provides a centralized pool of configurable auditing and other agreements among users, service
computing resources (e.g., storage, applications, services, etc.) level agreements, service provider and other
that can be rapidly provisioned and released with service stakeholders. It governs cloud security policies without
provider interaction or minimal management effort [1]. compromising performance and reliability.
Five key characteristics of cloud computing was defined  Network category: it’s the medium through which
by the National Institute of Standards and Technology (NIST) users connect to cloud infrastructure to accomplish the
[2], namely: broad network access, rapid elasticity or required computations. It includes network
expansion, measured service, on-demand self-service, and connections, information exchange through
resource pooling [2]. Cloud computing is also described as a registration, and browsers. This type of security covers
dynamic and often easily extended platform to provide network attacks like Connection Availability, Internet
transparent virtualized resources to users through the Internet Protocol Vulnerabilities, Flooding Attack, Denial of
[3]. Service (DoS), Distributed Denial of Service (DDoS),
According to the different types of services offered, cloud etc.
computing architecture can be considered to consist of three  The Access Control category: allows capturing issues
layers: Infrastructure as a Service (IaaS) is the lowest layer that affect privacy of user information and data storage.
that provides basic infrastructure support service; Platform as It covers access control, identification and
a Service (PaaS) is the middle layer, which offers platform authentication. This category allows capturing issues
oriented services, besides providing the environment for that affect privacy of data storage and user information.
hosting user’s applications; Software as a Service (SaaS) is the  The Cloud Infrastructure category: Involves the attacks
topmost layer which features a complete application offered as specific to the cloud infrastructure within IaaS, PaaS
service on demand [4]. Cloud services can be deployed in one and SaaS such as privileged insiders and tampered

www.ijert.org 39
International Journal Of Engineering Research and Technology (IJERT)

PEMWN-2014 Conference Proceedings

binaries and is related particularly with virtualization on behalf of legitimate users [14]. Hackers can run
environment. malicious code on the hijacked resources or they can generate
 The Data category involves related security issues. It bogus data and occupy resources. Denial of service can be
includes data confidentiality, migration, integrity and launched by appearance of vulnerabilities in Internet protocols
data warehousing. such as Session Initiation Protocol (SIP) which could cause an
un-trusted internet [15].
B. Cloud Security Issues and Classification
3) Access control issues
1) Cloud security standards issues Service and account hijacking causes phishing and
Currently, there is lack of appropriate security standards in software vulnerabilities where hackers gain unauthorized
cloud computing [1]. Special attention is required towards access to servers. This unauthorized access results a threat to
mutual security standards such as Secure Sockets Layer integrity and confidentiality of data and services [1].
(SSL)/Transport Layer Security (TLS), XML Encryption Malicious insiders present another access control issue such as
Syntax and Processing, XML signature, and Key Management impacting organizations’ security by dishonest administrators.
Interoperability Protocols. The lack of governess for audits The current mechanisms of authentication may not be
and assessment of corporate standards causes many security applicable in cloud environments [4]. A customer can access
issues which are associated with compliance risks [1]. data and compose services from multiple cloud providers
Customers of cloud do not have enough knowledge of using a browser or mobile application. This access brings in a
processes and procedures of the provider, particularly in risk called privileged user access [16].
segregation of duties and areas of identity management.
4) Cloud Infrastructure issues
Auditability is an important aspect of cloud computing The important cloud infrastructure issues in different case
security; even so, there is not an audit net for service providers studies are: insecure interface of Application Programming
[7, 8]. Governing bodies and security standards are part of Interface (API) it covers the vulnerabilities in the set of APIs
legal aspects and service level agreements (SLA), which have in the cloud portal (customers use APIs to connect to a cloud)
not been practiced for cloud computing [9,10]. SLA [1], Quality of Service (QoS), sharing technical flaws,
determines the relationship among provider and recipient and reliability of suppliers, security misconfiguration and multi-
is important for both parties [11]. It identifies the customer’s tenancy.
needs, encourages dialog in the event of disputes, simplify 5) Data security issues
complex issues, provides a framework for understanding, Data loss and leakage, data redundancy, data recovery,
reduces areas of conflict and eliminates unrealistic data location, data protection, data availability and data
expectations. If there is a loss of data and some factors are not privacy have been the important issues in different case
taken into consideration as users may not be able to put claims studies which require data to be properly protected, encrypted,
on providers. The Trust relationship between users and the controlled, and transmitted.
different cloud stakeholders is required when users transfer Fig. 1 shows cloud components where security issues are
data on cloud infrastructure [12]. raised. Each component, such as policies, cloud infrastructure,
2) Cloud network security issues clients, and network, is prone to certain security attacks and
Network security issues are considered the biggest security requires attack detection, prevention and response strategies.
challenges in clouds [13]. The overlooked security
configurations on networks and the lack of proper installation
of network firewalls facilitate to hackers to access the cloud

Fig. 1. Cloud components that are prone to security attacks.

information to stakeholders that helps them to manage the


III. COMPARATIVE EVALUATION OF GENERAL risks when migrating into the clouds, covers advisory services
CLOUD SECURITY MECHANISMS on setting SLAs and to identify the critical cloud services and
To addressing many security issues related to the cloud, analyze the impact of the cloud service failure in such
the European Union Agency for Network and Information circumstances, ENISA provides cooperative studies with
Security (ENISA) has done a significant work: provides various stakeholders.

www.ijert.org 40
International Journal Of Engineering Research and Technology (IJERT)

PEMWN-2014 Conference Proceedings

Depending on its cloud offering and the architecture, every In table 1, we present a comparative evaluation of some
cloud service provider has installed diverse security measures. well-known general tools that are used to countermeasure
Their security model mainly depends upon the type of cloud cloud security attacks.
offering they provide, customer section being served and the
deployment models they basically implement.

TABLE 1. COMPARATIVE ANALYSIS FOR STRENGTHS AND LIMITATIONS OF SOME EXISTING SECURITY MECHANISMS

Countermeasures Limitations

Intrusion Detection Systems (IDS) :


1. The main limitation in GCCIDS is the
1. Implementing IDS offers additional security measures by
high communication overhead and
investigating network traffic, log files and user behaviour.
redundancy.
2. IDS have two types (1) host based IDS (HIDS) which monitors the
behaviour on a single host and (2) network based IDS (NIDS) which
2. GCCIDS does not provide any
analyses traffic flowing through a network [17].
information as to whether a node should
3. An IDS system named Grid and Cloud Computing Intrusion
immediately alert other nodes as intrusion
Detection System (GCCIDS) was proposed in [18]. It consists of an
occurs or at certain predefined periodic time
audit system that detects and covers attacks that have not been covered,
interval.
previously, by other NIDS and HIDS systems. In GCCIDS each node
identifies the local event and alerts all other connected nodes.

Autonomous Systems :

1. An autonomous system is an IDS that works with pre-specified


1. Security audit as a Service (SaaS)
basic rules. These rules configure, heal, optimize and protect involves the use of large number of agents
themselves automatically, thereby reducing human efforts and
and functions such as initiating agent,
involvement [19]. moving agent, killing agent, etc., which
2. It is impossible, without autonomic computing, to manage next creates high communication among agents
generation distributed-systems such as clouds and grids effectively.
and increases the processing and
3. An intelligent autonomous agent for incident detection named computational overhead.
Security audit as a Service (SaaS) as presented in [20]. SaaS addresses
three main problems of cloud computing namely: abusing cloud
2. There is no flexible management system
resources; missing security monitoring in cloud infrastructure and by number of user access, at a given time or
defective isolation of shared resources. by load averages.
4. A pure concept of autonomic manager in grid and cloud
computing as defined in [21]. It provides a feature of self-
configuration, self-healing, self-optimization and self-protection.

Federated Identity Management System


1. The main issue with single Sign-On lies
1. Management of identities (IDM) is about maintaining the integrity in the wider damage that it causes in case of
of identities, throughout their life cycle, to make it and its related data compromise. If a user identity is
(e.g., authentication and authorization results) available to different compromised, the illegitimate user will not
services in secure and privacy-protected manner [22]. be verified again, which could create higher
2. The process to repeat authentication of user (Single Sign-On) can be level of information leakage.
an example of federated identity [23]. 2. Another issue is lacking dynamic
federation and agile mechanism in FIM
systems. It is an architectural concern and
requires further investigation.

attacks across all cloud components, to achieve


IV. ANALYSIS comprehensive cloud security. In 2011 the number of browser
Cloud computing is an emerging paradigm that involves based attacks increased from 580,371,937 to 946,393,693
all the basic components of computing such as communication [24]. This important increase is mainly due to the growing
networks, end-user machines (PCs), access management value of the data assets and resources available on the clouds,
systems and cloud infrastructures. The data and cloud which makes the platform very attractive for attackers.
infrastructure must be protected against known and unknown Unfortunately, we cannot protect the cloud-computing

www.ijert.org 41
International Journal Of Engineering Research and Technology (IJERT)

PEMWN-2014 Conference Proceedings

infrastructure from all the known and unknown attacks REFERENCES


because it requires additional computational overhead and [1] Tripathi, A., Mishra, A. “Cloud computing security considerations”. In
Proceedings of the 2011 IEEE International Conference on Signal
resources. Current security solutions such as IDS, DIDS,
Processing, Communications and Computing (ICSPCC), Xi’an, China,
outsourcing the identity management systems, firewalling and 14–16 September 2011; pp. 1–5.
installing antivirus, are expensive and degrade performance. [2] “Final Version of NIST Cloud Computing Definition Published”.
Thus, the important cloud security research challenge is not Available online: http://www.nist.gov/itl/csd/cloud-102511.cfm
(accessed on 25 August 2013).
only in providing high level measures but also in doing so
[3] Lv, H., Hu, Y. “Analysis and research about cloud computing security
with minimum resources and reduced performance protect policy”. In Proceedings of the 2011 International Conference on
degradation. Intelligence Science and Information Engineering (ISIE), Wuhan,
Using this current study, we found that to achieve better China, 20–21 August 2011; pp. 214–216.
[4] Mell, P., Grance, T. “The NIST Definition of Cloud Computing”, NIST,
security, data and system security should be embedded in the
USA. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-
design of cloud computing architecture. Furthermore, security 145.pdf, USA, 2009.
measures should be autonomous and dynamic. Cloud [5] Gowrigolla, B., Sivaji, S., Masillamani, M.R. “Design and auditing of
infrastructure is changing fast requiring security policies and cloud computing security”. In Proceedings of the 2010 5th International
Conference on Information and Automation for Sustainability
measures to be regularly updated at the same pace. Moreover,
(ICIAFs), Colombo, Sri Lanka, 17–19 December 2010; pp. 292–297.
licensing is essential to the security of clouds. Standard [6] Issa M. Khalil, Abdallah Khreishah, Muhammad Azeem. “Cloud
security policies should be implemented strictly in clouds and Computing Security: A Survey”, Computers 2014, 3, 1-35;
organizational bodies should control clouds’ infrastructure on doi:10.3390/computers3010001.
[7] Morin, J., Aubert, J., Gateau, B. “Towards cloud computing SLA risk
regular bases to evaluate the adeptness of the security
management: Issues and challenges”. In Proceedings of the 2012 45th
precautions used by the vendors. In addition, it is very Hawaii International Conference on System Science (HICSS), Maui,
important to holistically explore the various cloud security HI, USA, 4–7 January 2012; pp. 5509–5514.
related parameters including challenges, risks, threats, attacks, [8] Braun, V., Clarke, V. “Using thematic analysis in psychology”. Qual.
Res. Psychol. 2006, 3, 77–101.
and vulnerabilities.
[9] “A Survey on Cloud Computing Security, Challenges and
Threats|Whitepapers| TechRepublic”. Available online:
V. CONCLUSION http://www.techrepublic.com/whitepapers/a-survey-on-cloud-
computingsecurity challenges and-threats/3483757 (accessed on 18
Currently the adoption of cloud paradigm is growing. March 2012).
Analysts suppose that the factor of cost reduction in cloud [10] Thalmann, S., Bachlechner, D., Demetz, L., Maier, R. “Challenges in
cross-organizational security management”. In Proceedings of the 2012
computing will increase the adoption of cloud computing in 45th Hawaii International Conference on System Science (HICSS),
the public sector. With the greet evolution in cloud adoption Maui, HI, USA, 4–7 January 2012; pp. 5480–5489.
the sector of security attracted the attention of practitioners [11] M. Taifi, J. Y. Shi, A. Khreishah, “SpotMPI: A Framework for
and researchers. We conduct, in this work, a survey on the Auction-based HPC Computing Using Amazon Spot Instances”, in
Proc. of the International Symposium on Advances of Distributed
current issues of cloud security and the state-of-the-art Computing and Networking (ADCN), 2011.
security solutions. The main issues were tampered binaries, [12] Riquet, D., Grimaud, G., Hauspie, M. “Large-scale coordinated attacks:
firewall misconfigurations, side channels, multi-tenancy, Impact on the cloud security”. In Proceedings of the 2012 Sixth
mobility, and weak browser security. These issues are International Conference on Innovative Mobile and Internet Services in
Ubiquitous Computing (IMIS), Palermo, Italy, 4–6 July 2012; pp. 558–
classified into five security categories includes: security 563.
standards, network, cloud infrastructure, access, and data. [13] Wang, J.-J., Mu, S. “Security issues and countermeasures in cloud
There are variable incidents of attacks that target the clouds computing”. In Proceedings of the 2011 IEEE International Conference
such fate sharing, phishing, botnet, and malware injection. In a on Grey Systems and Intelligent Services (GSIS)”, Nanjing, China, 15–
18 September 2011; pp. 843–846.
comparative analysis we present the state-of-the-art well- [14] Gonzalez, N., Miers, C., Redigolo, F., Carvalho, T., Simplicio, M.,
known countermeasures for cloud security attacks including Naslund, M., Pourzandi, M. “A quantitative analysis of current security
intrusion detection systems, autonomous systems, and concerns and solutions for cloud computing”. In Proceedings of the
federated identity management systems. Finally, we highlight 2011 IEEE Third International Conference on Cloud Computing
Technology and Science (CloudCom), Athens, Greece, 29 November–1
limitations of these systems including the high communication December 2011; pp. 231–238.
and computation overhead and the detection efficiency and [15] Rachel Suresh, N. Mathew, S.V. “Security concerns for cloud
coverage. computing in aircraft data networks”. In Proceedings of the 2011
At this moment, a big concerns are related with data. Data International Conference for Internet Technology and Secured
Transactions (ICITST), Abu Dhabi, United Arab Emirates, 11–14
migration from one cloud to another is not realizable because December 2011; pp. 132–136.
of the heterogeneous nature of clouds. Furthermore, if a [16] Jain, P., Rane, D., Patidar, S. “A survey and analysis of cloud model-
contract has expired, clouds lack the tools that confirm that based security for computing secure cloud bursting and aggregation in
user data has been deleted from the cloud. These data threats renal environment”. In Proceedings of the 2011 World Congress on
Information and Communication Technologies (WICT), Mumbai,
require researchers’ attention to cover some standards for India, 11– 14 December 2011; pp. 456–461.
continuous data deletion. We plan in the future to investigate [17] Van athi, R., Gunasekaran, S. “Comparison of network intrusion
the possibility of presenting appropriate frameworks for DIDS detection systems in cloud computing environment”. In Proceedings of
for clouds with scheduling algorithms for Green IT. the 2012 International Conference on Computer Communication and
Informatics (ICCCI), Coimbatore, India, 10–12 January 2012; pp. 1–6.
[18] Vieira, K., Schulter, A., Westphall, C.B., Westphall, C.M. “Intrusion
detection for grid and cloud computing”. IT Prof. 2010, 12, 38–43.
[19] Erdil, D.C. “Dependable autonomic cloud computing with information
proxies”. In Proceedings of the 2011 IEEE International Symposium on

www.ijert.org 42
International Journal Of Engineering Research and Technology (IJERT)

PEMWN-2014 Conference Proceedings

Parallel and Distributed Processing Workshops and Phd Forum


(IPDPSW), Shanghai, China, 16–20 May 2011; pp. 1518–1524.
[20] Doelitzscher, F., Reich, C., Knahl, M., Clarke, N. “An autonomous
agent based incident detection system for cloud environments”. In
Proceedings of the 2011 IEEE Third International Conference on Cloud
Computing Technology and Science (CloudCom), Athens, Greece, 29
November–1 December 2011; pp. 197–204.
[21] Balen, D., Westphall, C., Westphall, C. “Experimental assessment of
routing for grid and cloud”. In Proceedings of the Tenth International
Conference on Networks (ICN 2011); St. Maarten, The Netherlands
Antilles, January 23-28, 2011, pp. 341–346.
[22] Bishop, M. “Computer Security: Art and Science”. Addison-Wesley
Professional: Reading, MA, USA, 2002.
[23] Leandro, M.A.P., Nascimento, T.J., dos Santos, D.R., Westphall, C.M.,
Westphall, C.B. “Multitenancy authorization system with federated
identity for cloud-based environments using shibboleth”. In
Proceedings of the Eleventh International Conference on Networks,
2012; pp. 88–93.
[24] Kaspersky Security Bulletin. Statistics 2011. Available online:
http://www.securelist.com/en/analysis/204792216/Kaspersky_Security
_Bulletin_Statistics_2011 (accessed on 13 January 2013).

www.ijert.org 43

View publication stats

You might also like