Cloud Specific Issues and Vulnerabilities Solutions Author 4: B.Suresh Kumar (M.Tech), Author 1: C.Kishor Kumar Reddy (M.Tech), Dept
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Scientific & Engineering Research Volume 3, Issue 7, July-2012 1 ISSN 2229-5518 Cloud Specific Issues and Vulnerabilities solutions Author 4: B.Suresh Kumar (M.Tech), Author 1: C.Kishor Kumar Reddy (M.Tech), Dept. of C.S.E, VCE, Dept. of C.S.E, VCE, Samshabad, R.R (Dist), A.P, India. Samshabad, R.R (Dist), A.P, India. [email protected], [email protected], Ph: +91 9533444094. Ph: +91 9493024236. Author 2: SK. Lokesh Naik (Assistant Professor), Dept. of C.S.E, VCE, Samshabad, R.R (Dist), A.P, India. [email protected], Ph: +91 9885601370 Abstract: The current discourse about cloud computing security issues makes a well-founded assessment of cloud computing's security impact difficult for two primary reasons. First, as is true for many discussions about risk, basic vocabulary such as "risk," "threat," and "vulnerability" are often used as if they were interchangeable, without regard to their respective definitions. Second, not every issue that's raised is really specific to cloud computing. We can achieve an accurate understanding of the security issue "delta" that cloud computing really adds by analyzing how cloud computing influences each risk factor. One important factor concerns vulnerabilities: cloud computing makes certain well-understood vulnerabilities more significant and adds new vulnerabilities. Here, we define four Figure 1: Factors contributing to risk according to the indicators of cloud-specific vulnerabilities, introduce security- open Group’s risk taxonomy. specific cloud reference architecture, and provide examples of cloud- specific vulnerabilities for each architectural component. This paper This second factor brings us toward a useful definition of highlights and categorizes many of security issues introduced by the vulnerability. "cloud"; surveys the risks, threats and vulnerabilities, and makes the Defining Vulnerability: necessary recommendations that can help promote the benefits and According to the Open Group’s risk taxonomy, mitigate the risks associated with Cloud Computing. Vulnerability is the probability that an asset will be unable to resist the actions of a threat agent. Vulnerability exists when Index-Terms: cloud-specific vulnerabilities, risk, threat, delta. there is a difference between the force being applied by the threat agent, and an object’s ability to resist that force. So, Vulnerability: An Overview vulnerability must always be described in terms of resistance Vulnerability is a prominent factor of risk ISO 27005 defines to a certain type of attack. risk as ―the potential that a given threat will exploit Vulnerabilities and Cloud Risk Vulnerability of an asset or group of assets and thereby cause We’ll now examine how cloud computing influences harm to the organization,‖ measuring it in terms of both the the risk factors in Figure 1, starting with the right-hand side of likelihood of an event and its con- sequence. The Open Group’s the risk factor tree. From a cloud customer perspective, the risk taxonomy offers a useful overview of risk factors (see Figure right-hand side dealing with probable magnitude of future loss 1). isn’t changed at all by cloud computing: the consequences and • The frequency with which threat agents try to exploit ultimate cost of, say, a confidentiality breach, is exactly the vulnerability. This frequency is determined by both the agents’ same regardless of whether the data breach occurred within a motivation (What can they gain with an attack? How much cloud or a conventional IT infrastructure. For a cloud service effort does it take? What is the risk for the attackers?) and how provider, things look somewhat different: because cloud com- much access (―contact‖) the agents have to the attack targets. puting systems were previously separated on the same • The difference between the threat agents’ attack infrastructure, a loss event could entail a considerably larger capabilities and the system’s strength to resist the attack impact. But this fact is easily grasped and incorporated into a risk assessment: no conceptual work for adapting impact analysis to cloud computing seems necessary. So, we must Author 3:S.K.Prasanth (Associate Professor), search for changes on Figure 1’s left-hand side—the loss event Dept. of C.S.E, VCE, frequency. Cloud computing could change the probability of a Samshabad, R.R (Dist), A.P, India. harmful event’s occurrence. As we show later, cloud [email protected], computing causes significant changes in the vulnerability Ph: +91 9908965812. factor. Of course, moving to a cloud infrastructure might IJSER © 2012 http://www.ijser.org International Journal of Scientific & Engineering Research Volume 3, Issue 7, July-2012 2 ISSN 2229-5518 change the attackers’ access level and motivation, as well as Using the cloud reference architecture’s structure, we can now the effort and risk—a fact that must be considered as future run through the architecture’s components and give examples work. But, for supporting a cloud-specific risk assessment, it of each component’s cloud-specific vulnerabilities. seems most profitable to start by examining the exact nature of CloudSoftwareInfrastructure and Environment: cloud-specific vulnerabilities. The cloud software infrastructure layer provides an Architectural Components of could computing abstraction level for basic IT resources that are offered as ser- vices to higher layers: computational resources (usually VMEs), storage, and (network) communication. These services can be used individually, as is typically the case with storage services, but they’re often bundled such that servers are delivered with certain network connectivity and (often) access to storage. This bundle, with or without storage, is usually referred to as IaaS. Computational Resources: A highly relevant set of computational resource vulnerabilities concerns how virtual machine images are han- dled: the only feasible way of providing nearly identical server images—thus providing on-demand service for virtual servers—is by cloning template images. Because cryptography is frequently used to overcome storage-related vulnerabilities, this core technology’s vulnerabilities—insecure or obsolete cryptography and poor key management—play a special role for cloud storage. Communication: The most prominent example of a cloud communi- cations service is the networking provided for VMEs in an IaaS environment. Because of resource pooling, several Figure 2: The cloud reference architecture. customers are likely to share certain network infrastructure components: vulnerabilities of shared network infrastructure Architectural Components and Vulnerabilities: components, such as vulnerabilities in a DNS server, Cloud service models are commonly divided into Dynamic Host Configuration Protocol, and IP protocol SaaS, PaaS, and IaaS, and each model influences the vulner- vulnerabilities, might enable network-based cross-tenant abilities exhibited by a given cloud infrastructure. It’s helpful attacks in an IaaS infrastructure. to add more structure to the service model stacks: Figure 2 Cloud Web Applications: shows a cloud reference architecture that makes the most A Web application uses browser technology as the important security-relevant cloud components explicit and front end for user interaction. With the increased uptake of provides an abstract overview of cloud computing for security browser-based computing technologies such as JavaScript, issue analysis. Java, Flash, and Silverlight, a Web cloud application falls into In addition to the original model, we’ve identified two parts: supporting functions relevant to services in several layers and • An application component operated somewhere in the cloud, added them to the model as vertical spans over several and horizontal layers. • A browser component running within the user’s browser. Our cloud reference architecture has three main parts: Identity, Authentication, Authorization, and Supporting (IT) infrastructure. These are facilities and Auditing Mechanisms: services common to any IT service, cloud or otherwise. We Most vulnerability associated with the IAAA include them in the architecture because we want to provide component must be regarded as cloud-specific because they’re the complete picture; a full treatment of IT security must prevalent in state-of-the-art cloud offerings. Earlier, we gave account for a cloud service’s non-cloud-specific components. the example of weak user authentication mechanisms; other Cloud-specific infrastructure. These components constitute examples include the heart of a cloud service; cloud-specific vulnerabilities and • Denial of service by account lockout. One often-used corresponding controls are typically mapped to these security control—especially for authentication with username components. and password—is to lock out accounts that have received Cloud service consumer. Again, we include the cloud service several unsuccessful authentication attempts in quick customer in the reference architecture because it’s relevant to succession. Attackers can use such attempts to launch DoS an all-encompassing security treatment. attacks against a user. • Weak credential-reset mechanisms. When cloud computing providers manage user credentials themselves rather than IJSER © 2012 http://www.ijser.org International Journal of Scientific & Engineering Research Volume 3, Issue 7, July-2012 3 ISSN 2229-5518 using federated authentication, they must provide a these service models. In the future, we expect virtualization to mechanism