International Journal of Computer Sciences and Engineering Open Access Cloud Security: Threats, Attacks and Mitigation

International Journal of Computer Sciences and Engineering Open Access Cloud Security: Threats, Attacks and Mitigation

International Journal of Computer Sciences and Engineering Open Access Review Paper Vol.-6, Issue-5, May 2018 E-ISSN: 2347-2693 Cloud Security: Threats, Attacks and Mitigation K. K. Chauhan1*, A. K. S. Sanger2 1Computer Science & Engineering, Meerut Institute of Engineering & Technology, Meerut, India 2Computer Science & Engineering, Meerut Institute of Technology, Meerut, India *Corresponding Author: [email protected] Available online at: www.ijcseonline.org Accepted: 18/May/2018, Published: 31/May/2018 Abstract: With tremendous growth of cloud computing in IT industries, cloud security has become one of the major issues that garnered noticeable attention of researchers from industries as well as academia. Cloud computing technology is vulnerable to number of security threats and attacks. Security challenges are major barriers in the adaptation of cloud computing model. Security issues are related to virtualization, network and data including eavesdropping, masquerading, privacy, confidentiality, availability of resources, access control, and identity management. In cloud computing, data are stored on a remote server and accessed through public network. Many of the cryptographic based solutions such as encryption/decryption and digital signature for authentication have been developed. In this paper, we have identified and discussed number of security issues such as authentication, access control, data confidentiality, data integrity, identity management, legal and contractual issues, data breaches, data theft, and unavailability. Moreover, we have also discussed some possible solutions to the security issues and their feasibility and security analysis in real time cloud environment. Keywords—Cloud, Data, Security, Threats, Attacks, Mitigation I. INTRODUCTION services) that can be rapidly provisioned and released with minimal management efforts or service provider interaction. Cloud computing has become fast growing technology in This cloud model is comprises of five essential last few years that increased the capability of IT services characteristics: on-demand self service, broadband network without investing in new infrastructure. Due to its benefits access, resource pooling, rapid elasticity and multi-tenancy; like economic, reliability, scalability and quality of service; three service models: Platform-as-a-Service (PaaS), number of organizations has accepted cloud computing Software-as-a-Service (SaaS) and Infrastructure-as-a-Service paradigm in their professions. Cloud computing increases the (IaaS), and four deployment models: Public cloud, Private utilization of computing resources making them sharable cloud, Community cloud and Hybrid cloud. among number of users. Therefore cloud computing is also called utility computing. Cloud computing provides on- Numbers of challenges have been encountered in cloud demand Services over Networks (SoN). It allows users to computing models. There are various issues associated with access services or resources anytime and from anywhere in cloud computing [2], [3]. These issues are categorized into pay-per-use fashion. various categories varying from security, identity and resource management, energy management, data protection Companies such as Google, Amazon, and Microsoft etc. and isolation, availability, heterogeneity and many more. developed cloud infrastructure providing services through Major challenges that prevent cloud computing from being Internet. Internet-based services like Gmail and Hotmail are adopted are: data portability, security, recovery from lost cloud services. Emails are hosted on servers, instead of data, cost barrier, performance, and reliability on new client’s local computer and users can access their email using technology, virtualization, contractual and legal issues. any device having only a web browser and Internet Cloud computing models are vulnerable to number of connection. In last few years, there is huge growth in cloud security threats and attacks. Security becomes primary computing. Many popular web apps such as VoIP (Skype, concern as services are accessed through Internet. In our Google Voice), content distribution (BitTorrent), media study, we identified number of critical and severe security services (Picassa, YouTube, Flickr) and other social challenges in cloud computing. In this paper, we discussed applications (Facebook, Twitter, LinkedIn) are the examples and analyzed security threats and attacks in cloud computing. of world wide acceptance of cloud computing. Moreover, after analyzing, we also proposed some feasible The National Institute of Standards and Technology mitigations techniques to overcome these attacks. (NIST)[1] defines cloud computing as:"Cloud computing is a Rest of the paper is organized as follows. Section II model for enabling ubiquitous, convenient, on-demand describes security threats and attacks in cloud computing. network access to a shared pool of configurable computing Some ttechniques to mitigate the electiveness of attacks are resources (e.g. networks, servers, storage, applications and © 2018, IJCSE All Rights Reserved 473 International Journal of Computer Sciences and Engineering Vol.6(5), May 2018, E-ISSN: 2347-2693 discussed in section III. Finally, section IV concludes work identified following security threats in cloud: Abuse and in this paper. Nefarious Use of Cloud Computing, Insecure Interfaces and APIs, Malicious Insiders, Shared Technology Issues, Data II. SECURITY THREATS AND ATTACKS Loss or Leakage, Account or Service Hijacking and Security, Performance and Availability are three biggest Unknown Risk Profile. issues in cloud computing. Due to its characteristics such as Nature of cloud exposes it to several serious threats such multi-tenancy, virtualization, scalability, Internet-based etc, as unauthorized access of data, data theft and intrusions. Key numbers of security threats and attacks are found in cloud elements in cloud security are found in cloud infrastructure service delivery model. The Cloud Security Alliance (CSA) such as in data storage and networks. Data Confidentiality Data Integrity Data Availability Data Security Data Segregation Identity Management Data Breaches AAA Management Cloud Security Data Recovery Threats in Virtualization Network Attacks Web Application Threats Fig.1: Key Elements in cloud Security © 2018, IJCSE All Rights Reserved 474 International Journal of Computer Sciences and Engineering Vol.6(5), May 2018, E-ISSN: 2347-2693 A. Data Security issues: 1) Data Confidentiality: Confidentiality has always been primary requirement; since data are stored on remote server. Data are stores on remote servers; hence data require security Data confidentiality ensures the customers that data remain in aspect of confidentiality, integrity and availability. confidential and will not be accessed by any unauthorized Following are the security issues while user storing data on user. cloud server. 2) Data Integrity: Data Integrity refers to protecting data D. Threats in Virtualization: from unauthorized modification. There must be proper Virtualization technology creates multiple virtual copies of implementation of data integrity on cloud so that data cannot resources of a single instance resource. Number of be altered illegitimately. virtualization technologies includes Storage virtualization, 3) Data Availability: Goal of data availability is to ensure Server virtualization, Operating System-level virtualization, customers that data on cloud can be accessed anytime from Network virtualization and Application virtualization. anywhere through Internet securely. Virtual machines increases scalability to the cloud resources. Virtualization provides the features of resource utilization, 4) Data Segregation: Multi-tenancy is one of the isolation among hardware, operating system and software. characteristics of cloud computing. Data segregation refers to Virtualization allows multi-tenancy to access resources storing data from multiple users on a cloud server. Cloud simultaneously on a single physical machine. Following are service providers use multi-tenant infrastructures to common threats in virtualization identified by Cloud Security maximize cost-effectiveness. There are two issues with Alliance: VM sprawl, sensitive data within a VM, security of multi-tenancy: data separation and geo-location. offline & dormant VMs, security of pre-configured 5) Data Breaches: Data Breaches is another issue in data VM/active VMs, lack of visibility and control over virtual security. Various users store large amount of data in the networks, resource exhaustion, hypervisor security, cloud. Hence, there is a possibility that malicious users may unauthorized access to hypervisor, account or service also store their infected data or viruses etc. into cloud. This hijacking through the self-service portal, workloads of infected data can steal the users’ data and send outside and different trust levels located on the same server and Risk due also infect whole cloud server. to APIs. 6) Data Recovery: There are possibilities of failure of E. Network Attacks: software and hardware or physically damages of hardware Cloud computing is an Internet based technology which due to some accident such as fire or catastrophic. Therefore enables users to access services/resources on network. users can lose their data. Data recoveries become another During data transmission, there are possibilities of data issue in data security. interception and modification. On the other hand, network attacks like eavesdropping,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us