Nothing Special   »   [go: up one dir, main page]

skip to main content
survey

Secure the Cloud: From the Perspective of a Service-Oriented Organization

Published: 17 February 2015 Publication History

Abstract

In response to the revival of virtualized technology by Rosenblum and Garfinkel [2005], NIST defined cloud computing, a new paradigm in service computing infrastructures. In cloud environments, the basic security mechanism is ingrained in virtualization—that is, the execution of instructions at different privilege levels. Despite its obvious benefits, the caveat is that a crashed virtual machine (VM) is much harder to recover than a crashed workstation. When crashed, a VM is nothing but a giant corrupt binary file and quite unrecoverable by standard disk-based forensics. Therefore, VM crashes should be avoided at all costs. Security is one of the major contributors to such VM crashes. This includes compromising the hypervisor, cloud storage, images of VMs used infrequently, and remote cloud client used by the customer as well as threat from malicious insiders. Although using secure infrastructures such as private clouds alleviate several of these security problems, most cloud users end up using cheaper options such as third-party infrastructures (i.e., private clouds), thus a thorough discussion of all known security issues is pertinent. Hence, in this article, we discuss ongoing research in cloud security in order of the attack scenarios exploited most often in the cloud environment. We explore attack scenarios that call for securing the hypervisor, exploiting co-residency of VMs, VM image management, mitigating insider threats, securing storage in clouds, abusing lightweight software-as-a-service clients, and protecting data propagation in clouds. Wearing a practitioner's glasses, we explore the relevance of each attack scenario to a service company like Infosys. At the same time, we draw parallels between cloud security research and implementation of security solutions in the form of enterprise security suites for the cloud. We discuss the state of practice in the form of enterprise security suites that include cryptographic solutions, access control policies in the cloud, new techniques for attack detection, and security quality assurance in clouds.

References

[1]
Mohamed Almorsy, John Grundy, and Amani Ibrahim. 2011. Collaboration-based cloud computing security management framework. In Proceedings of CLOUD. IEEE, Los Alamitos, CA, 364--371.
[2]
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, and Nathan C. Skalsky. 2010. HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity. In Proceedings of CCS. ACM, New York, NY, 38--49.
[3]
Andrew Baumann, Marcus Peinado, and Galen Hunt. 2014. Shielding applications from an untrusted cloud with Haven. In Proceedings of OSDI. 267--283.
[4]
Sebastian Biedermann, Martin Mink, and Stefan Katzenbeisser. 2012. Fast dynamic extracted honeypots in cloud computing. In Proceedings of CCSW. ACM, New York, NY, 13--18.
[5]
Kevin D. Bowers, Ari Juels, and Alina Oprea. 2009. HAIL: A high-availability and integrity layer for cloud storage. In Proceedings of CCS. ACM, New York, NY, 187--198.
[6]
Shakeel Butt, H. Andrés Lagar-Cavilla, Abhinav Srivastava, and Vinod Ganapathy. 2012. Self-service cloud computing. In Proceedings of CCS. ACM, New York, NY, 253--264.
[7]
Jose M. Alcaraz Calero, Nigel Edwards, Johannes Kirschnick, Lawrence Wilcock, and Mike Wray. 2010. Toward a multi-tenancy authorization system for cloud services. IEEE Security and Privacy 8, 6, 48--55.
[8]
Andrew T. Campbell, Hermann G. De Meer, Michael E. Kounavis, Kazuho Miki, John Vicente, and Daniel A. Villela. 1999. The Genesis Kernel: A virtual network operating system for spawning network architectures. In Proceedings of OPENARCH. IEEE, Los Alamitos, CA, 115--127.
[9]
Martim Carbone, Matthew Conover, Bruce Montague, and Wenke Lee. 2012. Secure and robust monitoring of virtual machines through guest-assisted introspection. In Research in Attacks, Intrusions, and Defenses. Lecture Notes in Computer Science, Vol. 7462. Springer, 22--41.
[10]
Yanpei Chen, Vern Paxson, and Randy H. Katz. 2010. What's New about Cloud Computing Security. Technical Report No. UCB/EECS-2010-5. University of California, Berkeley.
[11]
Mihai Christodorescu, Reiner Sailer, Douglas Schales, Daniele Sgandurra, and Diego Zamboni. 2009. Cloud security is not (just) virtualization security. In Proceedings of CCSW. ACM, New York, NY, 97--102.
[12]
William R. Claycomb and Alex Nicoll. 2012. Insider threats to cloud computing: Directions for new research challenges. In Proceedings of COMPSAC. IEEE, Los Alamitos, CA, 387--394.
[13]
EMC Corporation. 2014. EMC2 Home Page. Retrieved December 26, 2014, from http://www.emc.com/security/rsa-envision.htm.
[14]
Loek Essers. 2012. Cloud Failures Cost More Than $71 Million since 2007. Retrieved December 26, 2014, from http://www.infoworld.com/d/cloud-computing/cloud-failures-cost-more-71-million-2007-195895.
[15]
Ariel J. Feldman, William P. Zeller, Michael J. Freedman, and Edward W. Felten. 2010. SPORC: Group collaboration using untrusted cloud resources. In Proceedings of OSDI. 337--350.
[16]
Deng-Guo Feng, Min Zhang, Yan Zhang, and Zhen Xu. 2011. Study on cloud computing security. Journal of Software 22, 1, 71--83.
[17]
Bryan Ford. 2012. Icebergs in the clouds: The other risks of cloud computing. In Proceedings of HotCloud. 2--7.
[18]
Armando Fox, Rean Griffith, Anthony Joseph, Randy Katz, Andrew Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, and Ion Stoica. 2009. Above the Clouds: A Berkeley View of Cloud Computing. Technical Report 28. Department of EECS, University of California, Berkeley.
[19]
Rajeshwari Ganesan, Santonu Sarkar, and Naveen Tewari. 2012. An independent verification of errors and vulnerabilities in SaaS cloud. In Proceedings of the DSN Workshops. IEEE, Los Alamitos, CA, 1--6.
[20]
Tal Garfinkel and Mendel Rosenblum. 2003. A virtual machine introspection based architecture for intrusion detection. In Proceedings of NDSS. 191--206.
[21]
Joseph Idziorek, Mark Tannian, and Doug Jacobson. 2012. Attribution of fraudulent resource consumption in the cloud. In Proceedings of CLOUD. IEEE, Los Alamitos, CA, 99--106.
[22]
Infosys Limited. 2014. Infosys WalletEdge. Retrieved December 26, 2014, http://www.infosys.com/products-and-platforms/.
[23]
Seny Kamara and Kristin Lauter. 2010. Cryptographic cloud storage. In Financial Cryptography and Data Security. Lecture Notes in Computer Science, Vol. 6054. Springer, 136--149.
[24]
Seny Kamara, Charalampos Papamanthou, and Tom Roeder. 2011. CS2: A Searchable Cryptographic Cloud Storage System. Technical Report MSR-TR-2011-58. Microsoft Research.
[25]
Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. 2003. The EigenTrust algorithm for reputation management in p2p networks. In Proceedings of WWW. ACM, New York, NY, 640--651.
[26]
Lori M. Kaufman 2010. Can public-cloud security meet its unique challenges? IEEE Security and Privacy 8, 4, 55--57.
[27]
Safwan Mahmud Khan and Kevin W. Hamlen. 2012. Hatman: Intra-cloud trust management for Hadoop. In Proceedings of CLOUD. IEEE, Los Alamitos, CA, 494--501.
[28]
Taesoo Kim, Marcus Peinado, and Gloria Mainar-Ruiz. 2012. STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud. In Proceedings of the USENIX Security Symposium. 11--27.
[29]
Ryan Ko, Stephen Lee, and Veerappa Rajan. 2013. Cloud computing vulnerability incidents: A statistical overview.
[30]
Ronald L. Krutz and Russell Dean Vines. 2010. Cloud Security: A Comprehensive Guide to Secure Cloud Computing. John Wiley & Sons.
[31]
Lorenzo Martignoni, Pongsin Poosankam, Matei Zaharia, Jun Han, Stephen McCamant, Dawn Song, Vern Paxson, Adrian Perrig, Scott Shenker, and Ion Stoica. 2012. Cloud Terminal: Secure access to sensitive applications from untrusted systems. In Proceedings of USENIX ATC. 14--25.
[32]
Tim Mather, Subra Kumaraswamy, and Shahed Latif. 2009. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O'Reilly Media Inc.
[33]
Peter Mell and Timothy Grance. 2011. The NIST definition of cloud computing (draft). NIST Special Publication 800, 145.
[34]
Microsoft. 2014. Security Development Lifecycle. Retrieved December 26, 2014, from http://www.microsoft.com/security/sdl/.
[35]
Jeffrey Naruchitparames and Mehmet H. Gunes. 2011. Enhancing data privacy and integrity in the cloud. In Proceedings of HPCS. IEEE, Los Alamitos, CA, 427--434.
[36]
Ricardo Neisse, Dominik Holling, and Alexander Pretschner. 2011. Implementing trust in cloud infrastructures. In Proceedings of CCGrid. IEEE, Los Alamitos, CA, 524--533.
[37]
Anh Nguyen, Himanshu Raj, Shravan Rayanchu, Stefan Saroiu, and Alec Wolman. 2012. Delusional boot: Securing hypervisors without massive re-engineering. In Proceedings of EuroSys. ACM, New York, NY, 141--154.
[38]
Masayuki Okuhara, Tetsuo Shiozaki, and Takuya Suzuki. 2010. Security architecture for cloud computing. Fujitsu Sci. Tech. J. 46, 4, 397--402.
[39]
Ioannis Papagiannis and Peter Pietzuch. 2012. CloudFilter: Practical control of sensitive data propagation to the cloud. In Proceedings of CCSW. ACM, New York, NY, 97--102.
[40]
David A. Patterson, Garth Gibson, and Randy H. Katz. 1988. A case for redundant arrays of inexpensive disks (RAID). In Proceedings of SIGMOD. ACM, New York, NY, 109--116.
[41]
Diego Perez-Botero, Jakub Szefer, and Ruby B. Lee. 2013. Characterizing hypervisor vulnerabilities in cloud computing servers. In Proceedings of SCCW. ACM, New York, NY, 3--10.
[42]
Raluca Ada Popa, Jacob R. Lorch, David Molnar, Helen J. Wang, and Li Zhuang. 2011. Enabling security in cloud storage SLAs with CloudProof. In Proceedings of USENIX ATC. 31--44.
[43]
Brian Prince. n.d. Trojan Blocks Cloud Antivirus Security Technology. Retrieved December 26, 2014, from http://usa.kaspersky.com/about-us/press-center/in-the-news/trojan-blocks-cloud-antivirus-security-technology.
[44]
Costin Raiciu, Mihail Ionescu, and Drago Niculescu. 2012. Opening up black box networks with CloudTalk. In Proceedings of HotCloud. 8--13.
[45]
Sumant Ramgovind, Mariki Eloff, and Elme Smith. 2010. The management of security in cloud computing. In Proceedings of ISSA. IEEE, Los Alamitos, CA, 1--7.
[46]
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. 2009. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of CCS. ACM, New York, NY, 199--212.
[47]
Mendel Rosenblum and Tal Garfinkel. 2005. Virtual machine monitors: Current technology and future trends. Computer 38, 5, 39--47.
[48]
Mark D. Ryan. 2013. Cloud computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software 86, 9, 2263--2268.
[49]
P. Saripalli and B. Walters. 2010. Quirc: A quantitative impact and risk assessment framework for cloud security. In Proceedings of CLOUD. IEEE, 280--288.
[50]
Farzad Sabahi. 2011. Cloud computing security threats and responses. In Proceedings of ICCSN. IEEE, Los Alamitos, CA, 245--249.
[51]
Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues. 2009. Towards trusted cloud computing. In Proceedings of HotCloud. 3.
[52]
Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi, and Stefan Saroiu. 2012. Policy-sealed data: A new abstraction for building trusted cloud services. In Proceedings of the USENIX Security Symposium. 10--23.
[53]
Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, and Patrick McDaniel. 2009. Justifying integrity using a virtual machine verifier. In Proceedings of ACSAC. IEEE, Los Alamitos, CA, 83--92.
[54]
Aashish Sharma, Zbigniew Kalbarczyk, James Barlow, and Ravishankar Iyer. 2011. Analysis of security data from a large computing organization. In Proceedings of DSN. IEEE, Los Alamitos, CA, 506--517.
[55]
Abhinav Srivastava, Himanshu Raj, Jonathon Giffin, and Paul England. 2012. Trusted VM snapshots in untrusted cloud infrastructures. In Research in Attacks, Intrusions, and Defenses. Lecture Notes in Computer Science, Vol. 7462. Springer, 1--21.
[56]
Emil Stefanov, Marten van Dijk, Ari Juels, and Alina Oprea. 2012. Iris: A scalable cloud file system with efficient integrity checks. In Proceedings of ACSAC. ACM, New York, NY, 229--238.
[57]
Marianthi Theoharidou, Nikolaos Tsalis, and Dimitris Gritzalis. 2013. In cloud we trust: Risk-assessment-as-a-service. In Trust Management VII. IFIP Advances in Information and Communication Technology, Vol. 401. 100--110.
[58]
Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, and Changzhen Hu. 2012. Kruiser: Semi-synchronized non-blocking concurrent kernel heap buffer overflow monitoring. In Proceedings of NDSS.
[59]
Marten Van Dijk and Ari Juels. 2010. On the impossibility of cryptography alone for privacy-preserving cloud computing. In Proceedings of HotSec. 1--8.
[60]
Marten Van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest, Emil Stefanov, and Nikos Triandopoulos. 2012. Hourglass schemes: How to prove that cloud files are encrypted. In Proceedings of CCS. ACM, New York, NY, 265--280.
[61]
Luis Vaquero, Luis. Rodero-Merino, and Daniel. Morán. 2011. Locking the sky: A survey on IaaS cloud security. Computing 91, 1, 93--118.
[62]
Venkatanathan Varadarajan, Thawan Kooburat, Benjamin Farley, Thomas Ristenpart, and Michael M Swift. 2012. Resource-freeing attacks: Improve your cloud performance (at your neighbor's expense). In Proceedings of CCS. ACM, New York, NY, 281--292.
[63]
Yao Wang and G. Edward Suh. 2012. Efficient timing channel protection for on-chip networks. In Proceedings of NoCS. IEEE, Los Alamitos, CA, 142--151.
[64]
Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, and Peng Ning. 2009. Managing security of virtual machine images in a cloud environment. In Proceedings of CCSW. ACM, New York, NY, 91--96.
[65]
Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, and Athanasios Vasilakos. 2014. Security and privacy for storage and computation in cloud computing. Information Sciences 258, 371--386.
[66]
Zhenyu Wu, Zhang Xu, and Haining Wang. 2012. Whispers in the hyper-space: High-speed covert channel attacks in the cloud. In Proceedings of the USENIX Security Symposium. 9--25.
[67]
Zhi W. Chiachih Wu and Xuxian Jiang. 2013. Taming hosted hypervisors with (mostly) deprivileged execution. In Proceedings of NDSS. 141--154.
[68]
Yunjing Xu, Michael Bailey, Farnam Jahanian, Kaustubh Joshi, Matti Hiltunen, and Richard Schlichting. 2011. An exploration of L2 cache covert channels in virtualized environments. In Proceedings of CCSW. ACM, New York, NY, 29--40.
[69]
Sara Yin. 2011. Google wallet aims to take mobile payments mainstream. PCMag. com, 1--2.
[70]
Younis A. Younis, Madjid Merabti, and Kashif Kifayat. 2013. Secure Cloud Computing for Critical Infrastructure: A Survey. Technical Report. Liverpool John Moores University, Liverpool, England.
[71]
Fengzhe Zhang, Jin Chen, Haibo Chen, and Binyu Zang. 2011. CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In Proceedings of SOSP. ACM, New York, NY, 203--216.
[72]
Xinwen Zhang, Joshua Schiffman, Simon Gibbs, Anugeetha Kunjithapatham, and Sangoh Jeong. 2009. Securing elastic applications on mobile devices for cloud computing. In Proceedings of CCSW. ACM, New York, NY, 127--134.
[73]
Wu Zhou, Peng Ning, Xiaolan Zhang, Glenn Ammons, Ruowen Wang, and Vasanth Bala. 2010a. Always up-to-date: Scalable offline patching of VM images in a compute cloud. In Proceedings of the 26th Annual Computer Security Applications Conference. ACM, 377--386.
[74]
Wenchao Zhou, Micah Sherr, William R. Marczak, Zhuoyao Zhang, Tao Tao, Boon Thau Loo, and Insup Lee. 2010b. Towards a data-centric view of cloud security. In Proceedings of CDMW. ACM, New York, NY, 25--32.
[75]
Wenchao Zhou, Yun Mao, Boon Thau Loo, and Martín Abadi. 2009. Unified declarative platform for secure networked information systems. In Proceedings of ICDE. IEEE, Los Alamitos, CA, 150--161.

Cited By

View all
  • (2024)Identification of a Person Based on Block Processing of a Signature Image2024 International Russian Smart Industry Conference (SmartIndustryCon)10.1109/SmartIndustryCon61328.2024.10515930(522-526)Online publication date: 25-Mar-2024
  • (2022)Attendance as a Service: A multi-layered system design in attendance applications for Covid-19Celal Bayar Üniversitesi Fen Bilimleri Dergisi10.18466/cbayarfbe.102824218:3(265-273)Online publication date: 29-Sep-2022
  • (2019)Comparative Analysis of Cloud Security Classifications, Taxonomies, and OntologiesProceedings of the 2019 International Conference on Artificial Intelligence and Computer Science10.1145/3349341.3349487(666-672)Online publication date: 12-Jul-2019
  • Show More Cited By
  1. Secure the Cloud: From the Perspective of a Service-Oriented Organization

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Computing Surveys
      ACM Computing Surveys  Volume 47, Issue 3
      April 2015
      602 pages
      ISSN:0360-0300
      EISSN:1557-7341
      DOI:10.1145/2737799
      • Editor:
      • Sartaj Sahni
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 February 2015
      Accepted: 01 November 2014
      Revised: 01 October 2014
      Received: 01 March 2014
      Published in CSUR Volume 47, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Cloud security
      2. attack scenarios
      3. enterprise security suites
      4. open problems
      5. service-oriented organization

      Qualifiers

      • Survey
      • Research
      • Refereed

      Funding Sources

      • Infosys Limited, India

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)51
      • Downloads (Last 6 weeks)5
      Reflects downloads up to 28 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Identification of a Person Based on Block Processing of a Signature Image2024 International Russian Smart Industry Conference (SmartIndustryCon)10.1109/SmartIndustryCon61328.2024.10515930(522-526)Online publication date: 25-Mar-2024
      • (2022)Attendance as a Service: A multi-layered system design in attendance applications for Covid-19Celal Bayar Üniversitesi Fen Bilimleri Dergisi10.18466/cbayarfbe.102824218:3(265-273)Online publication date: 29-Sep-2022
      • (2019)Comparative Analysis of Cloud Security Classifications, Taxonomies, and OntologiesProceedings of the 2019 International Conference on Artificial Intelligence and Computer Science10.1145/3349341.3349487(666-672)Online publication date: 12-Jul-2019
      • (2019)Systematic identification of threats in the cloud: A SurveyComputer Networks10.1016/j.comnet.2018.12.009150(46-69)Online publication date: Feb-2019
      • (2018)Monitoring Data Security in the Cloud: A Security SLA-Based ApproachSecurity and Resilience in Intelligent Data-Centric Systems and Communication Networks10.1016/B978-0-12-811373-8.00011-2(235-259)Online publication date: 2018
      • (2017)A Multi-layered Cloud Protection FrameworkCompanion Proceedings of the10th International Conference on Utility and Cloud Computing10.1145/3147234.3148098(233-238)Online publication date: 5-Dec-2017
      • (2017)A Taxonomy and Survey of Cloud Resource Orchestration TechniquesACM Computing Surveys10.1145/305417750:2(1-41)Online publication date: 10-May-2017
      • (2017)Network-Based Secret Communication in Clouds: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2017.265964619:2(1112-1144)Online publication date: 1-Apr-2017
      • (2015)DoS Protection in the Cloud through the SPECS ServicesProceedings of the 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)10.1109/3PGCIC.2015.25(677-682)Online publication date: 4-Nov-2015

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media