SEMINAR Final
SEMINAR Final
SEMINAR Final
Seminar report submitted in partial fulfillment of the requirement for the award of the degree
BY
SHRAVYA BADAVATH
20251A3603
Department of IT
(AUTONOMOUS)(for Women)
FEBRUARY, 2023.
i.
CERTIFICATE
This is to certify that the Seminar Report entitled Cloud computing security is
requirement for the award of degree in B.Tech III-II, Information Technology, from
The satisfaction and euphoria that accompany a successful completion of any task would be
incomplete without the mention of people who made it possible and whose constant guidance and
encouragement crowned with all efforts with success. So, I would like to take this opportunity to
express my sincere and heart full thanks to everyone.
I sincerely thank our internal guides K Sridevi Ma’am , Associate Professor and
Ammannamma Ma’am, Associate Professor for extending their guidance towards the fulfillment
of this seminar work. They helped me in preparing the seminar and gave valuable feedback.
Also I extend my gratitude for the panel who gave me constructed feedback and
supported in completing the seminar. I also thank Dr. I. Ravi Prakash Reddy Sir, Head of the
section for providing all facilities to complete the seminar successfully.
Shravya Badavath
ii.
ABSTRACT
Cloud computing is the way of computing in which IT Users share the resources and services that
are distributed over the different organizations or sites. As cloud computing share distributed
resources through the network in the open environment, therefore the security problems are
important for the development of cloud computing application. In traditional Models an individual
has full control on data and processes in his/her computer. Whereas, On the other hand in cloud
computing environment, the service and data maintenance is provided by some provider in which
the client/customer is unaware of where the processes is running or where the data is stored. So the
client has no control over it. The cloud computing uses internet as the communication media. The
provider has to give some assurance for security of data in the cloud computing. Organizations that
use cloud computing as a service infrastructure would certainly like to examine the security and
confidentiality issues for their business critical insensitive applications. Yet, guaranteeing the
security of corporate data in the “cloud” is difficult, if not impossible, as they provide different
services like Software as a service(SaaS), platform as a service(PaaS), and infrastructure as a
service(IaaS). Each service has their own security issues. Business Data protection application,
security and privacy are important security issues must be incorporated in cloud computing. Here,
apart from addressing various security issues a model system has been proposed in which hybrid
cloud computing suitable for high risk data transaction environment.
iii.
LIST OF FIGURES
SL NO. FIGURES PAGE
No.
1. INTRODUCTION 1
TO CLOUD
COMPUTING
2. DEPLOYEMENT 4
MODELS
3. CLASSIFICATIO 7
N OF MODELS
4. MULTITENANCY 10
iv.
CHAPTERS
3.1 Benefits
3.2 Characteristics
References…………………………………………………………………………….18
1.
1. INTRODUCTION
2. What is cloud?
The term cloud refers to a network or internet. In other words we can say that cloud is something,
which is present at remote location. Cloud can provide services over network that is on public
networks or on private networks i.e; WAN,LAN or VPN. Applications such as e-mail, web
conferencing, customer relationship management(CRM), all run in cloud.
2.
1. Scalability
The IT needs of every company are different. For example, a big tech company with thousands of
employees needs different resources than a startup with only three. Cloud providers are a perfect
solution for either company because their services can be scaled to meet their needs.This scaling
can be done in a matter of seconds or minutes, which is great for a company that’s growing quickly.
As demands increase, a business can quickly scale its cloud-based infrastructure without investing
in physical components.
2. Cost
While the initial migration of existing infrastructure may take planning, money, and time, most
businesses see cost savings in using cloud services right away. Since cloud computing resources
can be sized to a business’s needs, they never pay for more than they use. It’s a pay-as-you-go
system.
3. Speed
Along with saving time and resources, cloud computing has also sped up software development.
Setting up a new development environment or virtual machine on a cloud can be done in seconds
with the click of a few buttons. With a traditional data center, you’d have to purchase, install, and
maintain all the required hardware. Cloud services are fast. With a traditional data center, users
have to connect to that one data center no matter where they’re located in the world. A cloud
service, on the other hand, can be distributed across the world, so users get a fast connection close
to their geographical location.
4. Performance
Because providing modern IT infrastructure is their business, cloud providers keep data centers
updated with the latest high-performance hardware and technologies. This enables better
connectivity and performance.
5. Security
Cybersecurity is a big concern of any business. Cloud services resolve this by managing
permissions and access to the services and resources they provide. For example, you could restrict
access to an important file to a specific set of users.
3.
On-Demand Self-Service
A consumer can unilaterally provision computing capabilities, such as server time and network
storage, as needed automatically without requiring human interaction with each service provider.
Resource Pooling
The providers computing resources are pooled to serve multiple consumers using a multi-tenant
model, with different physical and virtual resources dynamically assigned and reassigned according
to consumer demand.
Rapid Elasticity
Capabilities can be elastically provisioned and released, in some cases automatically, to scale
rapidly outward and inward commensurate with demand. To the consumer, the capabilities
available for provisioning often appear to be unlimited and can be appropriated in any quantity at
any time.
Measured Service
Cloud systems automatically control and optimize resource use by leveraging a metering capability
at some level of abstraction appropriate to the type of service (e.g. storage, processing, bandwidth,
and active user accounts). Resource usage can be monitored, controlled, and reported, providing
transparency for both the provider and consumer of the utilized service
4.
There are certain services and models working behind the scene making the cloud computing
feasible and accessible to end users. The following are the working models for cloud computing:
-deployment models
-service models
4. DEPLOYMENT MODELS
Deployment models defines the type of access to the cloud, i.e; how the cloud is located?
Cloud can have four types of access: public, private, hybrid and community.
The name says it all. It is accessible to the public. Public deployment models in the cloud are
perfect for organizations with growing and fluctuating demands. It also makes a great choice for
companies with low-security concerns. Thus, you pay a cloud service provider for networking
services, compute virtualization & storage available on the public internet. It is also a great delivery
model for the teams with development and testing. Its configuration and deployment are quick and
easy, making it an ideal choice for test environments.
.
5.
No Infrastructure Management - This does not require an in-house team to utilize the public cloud
Data Security and Privacy Concerns - Since it is accessible to all, it does not fully protect against
cyber-attacks and could lead to vulnerabilities.
Reliability Issues - Since the same server network is open to a wide range of users, it can lead to
malfunction and outages
Service/License Limitation - While there are many resources you can exchange with tenants, there
is a usage cap.
Now that you understand what the public cloud could offer you, of course, you are keen to know
what a private cloud can do. Companies that look for cost efficiency and greater control over data
& resources will find the private cloud a more suitable choice.
It means that it will be integrated with your data center and managed by your IT team.
Alternatively, you can also choose to host it externally. The private cloud offers bigger
opportunities that help meet specific organizations' requirements when it comes to customization.
It's also a wise choice for mission-critical processes that may have frequently changing
requirements.
6.
Data Privacy - It is ideal for storing corporate data where only authorized personnel gets access
Security - Segmentation of resources within the same Infrastructure can help with better access and
higher levels of security.
Supports Legacy Systems - This model supports legacy systems that cannot access the public cloud.
Higher Cost - With the benefits you get, the investment will also be larger than the public cloud.
Here, you will pay for software, hardware, and resources for staff and training.
Fixed Scalability - The hardware you choose will accordingly help you scale in a certain direction
High Maintenance - Since it is managed in-house, the maintenance costs also increase.
7.
Smaller Investment - A community cloud is much cheaper than the private & public cloud and
provides great performance
Setup Benefits - The protocols and configuration of a community cloud must align with industry
standards, allowing customers to work much more efficiently.
Shared Resources - Due to restricted bandwidth and storage capacity, community resources often
pose challenges.
Not as Popular - Since this is a recently introduced model, it is not that popular or available across
industries
As the name suggests, a hybrid cloud is a combination of two or more cloud architectures. While
each model in the hybrid cloud functions differently, it is all part of the same architecture. Further,
as part of this deployment of the cloud computing model, the internal or external providers can
offer resources.
Let's understand the hybrid model better. A company with critical data will prefer storing on a
private cloud, while less sensitive data can be stored on a public cloud. The hybrid cloud is also
frequently used for 'cloud bursting'. It means, supposes an organization runs an application on-
premises, but due to heavy load, it can burst into the public cloud.
Cost-Effectiveness - The overall cost of a hybrid solution decreases since it majorly uses the public
cloud to store data.
8.
Security - Since data is properly segmented, the chances of data theft from attackers are significantly
reduced.
Flexibility - With higher levels of flexibility, businesses can create custom solutions that fit their
exact requirements
Complexity - It is complex setting up a hybrid cloud since it needs to integrate two or more cloud
architectures
Specific Use Case - This model makes more sense for organizations that have multiple use cases or
need to separate critical and sensitive data
5. SERVICE MODELS
IaaS is also known as Hardware as a Service (HaaS). It is a computing infrastructure managed over
the internet. The main advantage of using IaaS is that it helps users to avoid the cost and
complexity of purchasing and managing the physical servers.
Characteristics of IaaS
Example: DigitalOcean, Linode, Amazon Web Services (AWS), Microsoft Azure, Google Compute
Engine (GCE), Rackspace, and Cisco Metacloud.
PaaS cloud computing platform is created for the programmer to develop, test, run, and manage the
applications.
Characteristics of PaaS
o Builds on virtualization technology, so resources can easily be scaled up or down as per the
organization's need.
o Support multiple languages and frameworks.
Example: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine,
Apache Stratos, Magento Commerce Cloud, and OpenShift.
10.
SaaS is alsO known as "on-demand software". It is a software in which the applications are hosted
by a cloud service provider. Users can access these applications with the help of internet connection
and web browser.
Characteristics of SaaS
o Users are not responsible for hardware and software updates. Updates are applied automatically.
6. CLOUD CONCERNS
Malicious insider:
Malicious insider
A malicious insider is a person motivated to create a bad impact on the organization’s mission by
taking action that compromises information confidentiality, integrity, and/or availability. The
malicious activities often insider could potentially have an impact on: the confidentiality, integrity
and availability of all kind of data and services with impact on the internal activities, organization’s
reputation and customer trust. This is especially important in the case of cloud computing due to the
fact that cloud architectures require certain roles, like cloud administrators, cloud auditors, cloud
security personnel, which are extremely high-risk.
Lack of Trust
Trust between the Service provider and the customer is one of the main issues cloud computing
faces today. There is no way for the customer to be sure whether the management of the Service is
trustworthy, and whether there is any risk of insider attacks. This is a major issue and has received
strong attention by companies. The only legal document between the customer and service provider
is the Service Level Agreement (SLA). This document contains all the agreements between the
customer and the service provider; it contains what the service provider is doing and is willing to
do. However, there is currently no clear format for the SLA, and as such, there may be services not
documented in the SLA that the customer may be unaware that it will need these services at some
later time.
Data Confidentiality:
Privacy and security of data is crucial for users to store their private or confidential
information in the cloud.To ensure security of the records, authentication and access control
techniques are used.
Cloud storage could resolve authentication , data security and access control problems by
increasing cloud trustworthiness and reliability .Owing to the non-
12.
trustworthy cloud service providers (CSP), confidentiality may also be compromised. Better
encryption techniques will guarantee confidentiality.
Data Integrity:
Data integrity is useful for data authenticity, and guarantees data consistency and reliability as
well. Lack of credibility is a big challenge in the cloud world, because of data privacy
problems, there are many security threats and attacks. Data integrity ensures
that the data is not modified or altered without the knowledge of the user. When the intruder or
unauthorized person has control to the stored data , data privacy is at stake. The user data can be
attacked by data modification, Tag forgery attack and data leakage attack. Monitoring data
integrity is important to prevent data manipulation and data crashing in cloud providers.
Data Availability :
when incidents such as hard disk destruction, IDC fire, and network errors occur, the
degree to which customer data can be accessed or retrieved and how users validate their data
using methods rather than relying solely on the Cloud storage provider's credit guarantee.
13.
7. THREATS IN CLOUD:
Multitenancy is a type of software architecture where a single software instance can serve
multiple distinct user groups. It means that multiple customers of cloud vendor are using the same
computing resources. As they are sharing the same computing resources but the data of each
Cloud customer is kept totally separate and secure. It is very important concept of Cloud
Computing.
In cloud computing Multitenancy also refer as shared host where same resources are divided
among different customers.
14.
Malicious insiders
they can be employees, former employees, contractors or business associates who have legitimate
access to your systems and data, but use that access to destroy data, steal data or sabotage your
systems. It does not include well-meaning staff who accidentally put your cyber security at risk or
spill data.
There are many reasons an insider can be or become malicious including revenge, coercion,
ideology, ego or seeking financial gain through intellectual property theft or espionage.
They could:
Data Breaches:
A data breach is a security incident in which sensitive, private, or confidential data related to a
person or organization has been accessed, copied, or transmitted by an unauthorized party.
Data breach is a threat with severe risk and is ranked as number one among the threats in cloud
computing. Over 1.4 billion records were lost to data breaches in 2017 alone, many of which
involved
cloud servers.
Data breaches can be caused due to targeted attacks, simple human error,
application vulnerabilities, or poor security practices.
Data Loss :
It is corruption or unavailability of data which results due to natural disasters like floods,
earthquakes; and simple human errors like when a cloud administrator accidentally deletes
files, hard drive failure, power failure, or due to malware infection. To avoid data loss, the
most efficient strategy is to backup data to multiple locations so that even when data gets corrupted
or lost at one location, it can be replaced with a copy available at another location.
Denial of Service :
A DoS (Denial of Service) attack, effects the availability of a system. In a DoS attack, there is
only one source machine from which the attack originates and it is susceptible to mitigate. DoS
attacks are designed to prevent legitimate users of a service from
being able to access their data or applications.
A DDoS (Distributed Denial of Service) attack on the other hand, employs several systems to
attack a cloud service. In a DDoS attack, the attacker takes control of several victim systems
known as zombies or slaves by spreading different kinds of malware.
16.
This collection of slaves is known as a botnet. Now, the attacker can take down a cloud service by
ordering the slaves in the botnet to send fake traffic which fabricates data
or applications or other resources in cloud unavailable to legitimate users.
Both DoS and DDoS attacks are easy to execute, especially if the attacker has control over a
botnet. Now-a-days, these services are available online for a modest fee and there is no need to
make your own botnet. One high-profile example of DDoS occurred in October 2016, when an
attack on Internet DNS (Domain Name Service) company.
Account Hijacking:
Cloud services add a new threat to the landscape of account or service hijacking. Account
hijacking is compromising the account credentials of a legitimate user and utilizing them for
nefarious purposes. With stolen credentials, attackers might compromise the confidentiality,
integrity, or availability of the cloud services.
Techniques like phishing and fraud allow attackers to hijack account credentials.
Enterprises should mitigate the sharing of account credentials between users and cloud services
and enable multifactor authentication where ever possible.
17.
8. CONCLUSION:
The cloud computing model is one of the promising computing models for service providers, cloud
providers and cloud consumers. But to best utilize the model we need to block the existing security
holes. Based on the details explained above, we can summarize the cloud security problem
as follows:
-some of the security problems are inherited from the used technologies.
-multi-tenancy and isolation is a major dimension in the cloud security problem that requires a
vertical solution from the SaaS layer down to physical infrastructure (to develop physical alike
boundaries among tenants instead of virtual boundaries currently applied).
-security management is very critical to control and manage this number of requirements and
controls.
Based on this discussion we recommend that cloud computing security solutions should:
-focus on the problem abstraction, using model-based approaches to capture different security
views and link such views in a holistic cloud security model.
-support for multi-tenancy where each user can see only his security configurations, elasticity, to
scale up and down based on the current context.
-support integration and coordination with other security controls at different layers to deliver
integrated security.
-be adaptive to meet continuous environment changes and stakeholders needs.
18.
REFERENCES
[3] Lee, K. (2012). Security Threats in Cloud Computing Environments. International Journal of
Security and Its Application
[4] Iyer, B. & Henderson, J.C. (2010). Preparing for the future: understanding the seven capabilities
of cloud computing. MIS Quarterly Executive, 9, 117-131.
[5] Kandukuri, B.R., Paturi, R., Rakshit, A.: Cloud Security Issues. In: The Proceedings of IEEE
International Conference on Service Computing, pp. 517–520 (2009)