Cloud Infrastructure Security at Different Laevels
Cloud Infrastructure Security at Different Laevels
Cloud Infrastructure Security at Different Laevels
Kavita M. Sunchu
ME *(Computer Science and Engineering )
Shriram Intitute of Engineering and Technology Center,
Paniv, Malshiras. India Kavita4.kamuni@gmail.com
ABSTRACT
Cloud Computing is the collection of different types of hardware and software which delivers many services to the
end-user over a network (typically the Internet). With cloud computing, users can access files and use applications
from any device that can access the Internet. Now a day’s cloud computing becomes more popular due to its few
important attributes: multitenancy (single instance of software is used to run a service for multiple clients), massive
scalability, elasticity, pay-per-use, and self-provisioning of resources. Cloud computing also delivers different types
of services like Software-as-a-Service (SaaS), Platform-as-a-Services (PaaS) and Infrastructure-as-a-Services (IaaS).
The current paper discussed infrastructure security at different levels: such as Application level, Host level and
network level [1][6][9]l.
KEY WORDS — Saas, Paas, Iaas, Private, Public, Hybrid cloud, Application level, Network level, Host level,
Computing, Cloud Computing Security.
INTRODUCTION
The cloud is a collection of different types of hardware and software resources that work combinelly to deliver many
services of computing to the user as an online service (typically over the Internet). Through cloud computing, users
can access any files and use different applications from any device that can connected to the Internet. Today’s small
and medium scale companies are moving towards cloud computing due to many reason like reduction in hardware,
maintenance cost, pay-as-per-use, scalability, accessible location independent, on-demand security controls facility ,
fast deployment, flexibility and the highly motorized process [1].
Cloud Computing refers to creating, organizing, and accessing the applications over a internet. It provides a facility
of infrastructure, data storage, and application online [8].
1|P a g e www.ijiert.org
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATION IN ENGINEERING, RESEARCH AND TECHNOLOGY [IJIERT]
NATIONAL CONFERENCE ON INNOVATIVE TRENDS IN ENGINEERING & TECHNOLOGY-2016
11TH & 12TH MARCH 2016
CONFERENCE PROCEEDINGS ISSN NO - 2394-3696
________________________________________________________________________________________________________________
1. Multitenancy : It is depends on a business model in which resources are shared i.e. Multiple users can use
the same resource at the network, host, and application level [9].
2. Massive scalability: Many organizations might have hundreds or thousands of systems, cloud computing
provides the ability to scale to tens of thousands of systems, as well as it scales bandwidth and storage
space [9] [6].
3. Elasticity : Users can rapidly add and remove their processing resources as per their need and release
resources for other uses when they are no longer required [9] [6].
4. Pay-as-per-use: Users can pay for only the resources they are actually used and time they require resources
[6] [9].
5. Self-provisioning of resources: Users add additional systems and network resources [9].
SPI FREAMEWORK
1. Software-as-a-service (SaaS)
2. Platform-as-a-service (PaaS)
3. Infrastructure-as-a-service (IaaS).
A. SOFTWARE-AS- A- SERVICE(SAAS )
This model provides software application as a service to the end users. There are several SaaS applications; some of
them are listed below:
APPLICATIONS
CHARACTERISTICS
2|P a g e www.ijiert.org
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATION IN ENGINEERING, RESEARCH AND TECHNOLOGY [IJIERT]
NATIONAL CONFERENCE ON INNOVATIVE TRENDS IN ENGINEERING & TECHNOLOGY-2016
11TH & 12TH MARCH 2016
CONFERENCE PROCEEDINGS ISSN NO - 2394-3696
________________________________________________________________________________________________________________
They can be scaled up or down on demand.
They are automatically upgraded and updated.
SaaS offers share data model. Therefore, multiple users can share single instance of infrastructure.
All users are running same version of the software[1][6].
BENEFITS
SaaS provides benefits in terms of efficiency, scalability, performance and much more. Some of the benefits are as
below:
Modest Software Tools
Efficient use of Software Licenses
Centralized Management & Data
Platform responsibilities managed by provider
Multitenant solutions [1] [6].
B. PLATFORM-AS-A-SERVICE (PAAS)
PaaS offers the runtime environment for applications. It also offers development & deployment tools, required to
develop applications [1] [6].
BENEFITS
LOWER ADMINISTRATIVE OVERHEAD
LOWER TOTAL COST OF OWNERSHIP
SCALABLE SOLUTIONS
MORE CURRENT SYSTEM SOFTWARE
Paas Enables developers to write Scripting Coding ,Coding AppEngine Azure Engine Scalability, Reliability
(build on it) applications without installing any and integration Yard Force.com and security Pay-per-
tools in local system but run on the use
cloud.
Iaas Computing infrastructure is rented to Infrastructure Scalability Amazon EC2,S3 GoGrid Scalability Pay as you
(Migrate to the user & Linode Rackspace go
it) Availability Best-of-breed
technology and
resources
C. INFRASTRUCTURE-AS-A-SERVICE (IAAS)
IaaS provides access to necessary resources such as physical machines, virtual machines, virtual storage, etc., Apart
from these resources, the IaaS also offers:
Virtual machine disk storage
Virtual local area network (VLANs) [1] [6] [9]
BENEFITS
Full Control of the computing resources through Administrative Access to VMs.
Flexible and Efficient renting of Computer Hardware.
Portability, Interoperability with Legacy Applications [1] [6] [9].
3|P a g e www.ijiert.org
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATION IN ENGINEERING, RESEARCH AND TECHNOLOGY [IJIERT]
NATIONAL CONFERENCE ON INNOVATIVE TRENDS IN ENGINEERING & TECHNOLOGY-2016
11TH & 12TH MARCH 2016
CONFERENCE PROCEEDINGS ISSN NO - 2394-3696
________________________________________________________________________________________________________________
DEPLOYMENT MODEL
A. Private Cloud: A private cloud involves a distinct and secure cloud based environment in which only the
specified client can operate. However, private cloud model is only accessible by a single organization. So private
clouds provides benefits like higher security and privacy, more control, cost and energy efficiency, improved
reliability. [12]
B. Public Cloud: According to the document SP800-145, from NIST. “A public Cloud infrastructure is provisioned
for open use by the general public which may be processed, managed and operated by commercial businessman,
academic or government organization and exists in the place of cloud provider”[8].
C. Hybrid Cloud: This type of cloud is a combination of two or more distinct cloud infrastructures (private,
community, or public) that remain unique entities but can share data if required.
D. Community Cloud: The cloud infrastructure is shared by many organizations and supports a specific community
that has shared concerns (E.g.: mission, policy, security required). It may be managed by organization or trusted
third party [8].
The below figure 4 shows the basic structure of Deployment Models [8].
4|P a g e www.ijiert.org
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATION IN ENGINEERING, RESEARCH AND TECHNOLOGY [IJIERT]
NATIONAL CONFERENCE ON INNOVATIVE TRENDS IN ENGINEERING & TECHNOLOGY-2016
11TH & 12TH MARCH 2016
CONFERENCE PROCEEDINGS ISSN NO - 2394-3696
________________________________________________________________________________________________________________
Host Level hypervisor Single hardware unit is difficult to monitor multiple Malicious Hook safe that can provide generic protection
. operating systems. code get control of the system against kernel mode root kits
and block other guest OS
Securing Self-provisioning new virtual servers on an IaaS Operational security procedures need to be followed
virtual platform creates a risk that insecure virtual servers
server
Cookie Unauthorized person can Cookie should be avoided, or regular Cookie Cleanup is
Poisoning change or modify the content of cookies necessary.
Backdoor Debug options are left enabled unnoticed, it provide Scan the system periodically for SUID/SGID files
and debug an easy entry to a hacker into Permissions and ownership of important files and
options the web-site and let him make changes at the web- directories periodically
site level
Hidden field Certain fields are hidden in the web-site and it’s Avoid putting parameters into a query string
Application manipulation used by the developers. Hacker can easily modify
level on the web page.
Dos Attack Services used by the authorized user unable to be Intrusion Detection System (IDS) is the most popular
used by them. method of defence against this type of attacks .Preventive
tools are
Firewalls,Switches,Routers,
DDoS DDoS attack results in making the service Preventive tools are firewalls, Switches, Routers,
unavailable to the authorized. Application front-end hardware, IPS based Prevention, etc.
Google Google search engine Best option for the hacker to Prevent sharing of any sensitive information
Hacking:- access the sensitive information Software solution such as Web Vulnerability Scanner
SQL Malicious code is inserted into a standard SQL code Avoiding the usage of dynamically generated SQL in the
injection and gain unauthorized access to a database code
Cross site Inject the malicious scripts into web contents. Various techniques to detect the security flaws like: Active
Scripting attak Content Filtering, Content Based
attacks Data Leakage Prevention Technology.
As network level of infrastructure security is concerned , it is important to distinguish between public clouds and
private clouds. With private clouds, there are no new attacks, vulnerabilities, or changes in risk specific to this
topology that information security personnel need to consider. If public cloud services are chosen, changing security
requirements will require changes to the network topology and the manner in which the existing network topology
interacts with the cloud provider's network topology should be taken into account [2].
5|P a g e www.ijiert.org
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATION IN ENGINEERING, RESEARCH AND TECHNOLOGY [IJIERT]
NATIONAL CONFERENCE ON INNOVATIVE TRENDS IN ENGINEERING & TECHNOLOGY-2016
11TH & 12TH MARCH 2016
CONFERENCE PROCEEDINGS ISSN NO - 2394-3696
________________________________________________________________________________________________________________
When reviewing host security and assessing risks, the context of cloud services delivery models (SaaS, PaaS, and
IaaS) and deployment models public, private, and hybrid) should be considered [2]. The host security
responsibilities in SaaS and PaaS services are transferred to the provider of cloud services. IaaS customers are
primarily responsible for securing the hosts provisioned in the cloud (virtualization
software security, customer guest OS or virtual server security) [2].
Software security or applications should be a crucial element of a security program. Most enterprises with
information security programs have yet to introduce an application security program to address this domain.
Designing and implementing applications aims at deployment on a cloud platform will require existing application
security programs to reexamine current practices and standards. The application security spectrum ranges from
single-user applications to multiuser e-commerce applications used by many users.
This section describes the impact of cloud computing on different types of users:
• Individual consumers
• Individual businesses
• Start-ups
• Small and medium-size businesses (SMBs)
• Enterprise businesses [9]
A. Business Applications: Mail Chimp, Chatter, Google Apps for business, and Quickbooks.
B. Data Storage and Backup : Box.com, Mozy, Joukuu
C. Management Applications:time tracking, organizing notes.
D. Social Applications: Facebook, Twitter, etc.
E. Entertainment Applications :Audio box.fm, music files
F. Art Applications: Moo offers art services such as designing and printing business cards, postcards and mini cards.
[7]
6|P a g e www.ijiert.org
NOVATEUR PUBLICATIONS
INTERNATIONAL JOURNAL OF INNOVATION IN ENGINEERING, RESEARCH AND TECHNOLOGY [IJIERT]
NATIONAL CONFERENCE ON INNOVATIVE TRENDS IN ENGINEERING & TECHNOLOGY-2016
11TH & 12TH MARCH 2016
CONFERENCE PROCEEDINGS ISSN NO - 2394-3696
________________________________________________________________________________________________________________
CONCLUSION
This paper discussed about various services provided by cloud and Infrastructure security at different levels. In order
to provide security to cloud at different levels the security threads must be controlled. Today, security is mainly
considered due to increasing availability of cloud. Security in cloud computing covers security threats and
challenges in network level, host level and application level are identified and finds the solution to prevent from the
attacks. So regularly checking should be performed to secure the cloud from external attacks. Table II listed
different types of attacks at different levels and their preventive methods.
REFERENCES
[1] R. Charanya, M.Aramudhan, K. Mohan, S. Nithya, “Levels of Security Issues in Cloud Computing”
International Journal of Engineering and Technology (IJET), ISSN: 0975-4024, Vol 5 No 2 Apr-May 2013,Page-
1912.
[2] Dimiter Velev1 and Plamena Zlateva2,” Cloud Infrastructure Security”,page 1- 9.
[3] Sonali Ghodke,” An Overview of Application Security in the Cloud “,International Journal of Advanced
Research in Computer Science and Software Engineering, Volume 5, Issue 12, December 2015 ISSN: 2277 128X.
[4] Raj Kumar,” Research on Cloud Computing Security Threats using Data Transmission”, International Journal of
Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 1, January 2015 ISSN: 2277
128X.
[5] Pankaj Arora, Rubal Chaudhry Wadhawan ,Er. Satinder Pal Ahuja,” Cloud Computing Security Issues in
Infrastructure as a Service “, International Journal of Advanced Research in Computer Science and Software
Engineering, Volume 2, Issue 1, January 2012 ISSN: 2277 128X .
[6] http://www.tutorialspoint.com//cloud_computing/index.htm.
[7]http://www.tutorialspoint.com/cloud_computing/cloud_computing _applications.htm.
[8]http://www.tutorialspoint.com/cloud_computing/cloud_computing_quick_guide.htm.
[9] Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and
Compliance. O'Reilly Media, Inc., 2009.
[10] Reese, G.: Cloud Application Architectures: Building Applications and Infrastructure in the Cloud. O'Reilly
Media, Inc., 2009.
[11] Rittinghouse, J.W., Ransome, J.F.: Cloud Computing: Implementation, Management and Security. CRC Press,
2009.
[12]http://www.interoute.com/cloud-article/what-private-cloud.
7|P a g e www.ijiert.org