Professional Documents
Culture Documents
Chapter 6
Security in the Cloud
Outline
Introduction
Security and Privacy Issues in Cloud Computing
Possible Solutions
1
2/1/2023
Introduction
Introduction
2
2/1/2023
Delivery Models
3
2/1/2023
7
From [6] Cloud Security and Privacy by Mather and Kumaraswamy
4
2/1/2023
10
5
2/1/2023
11
12
6
2/1/2023
13
John Chambers
CISCO CEO
(http://www.exforsys.com/tutorials/cloud-computing/cloud-computing-security.html)
14
7
2/1/2023
Unavailability
• Problems in the Internet – relatively frequent
– Congestion
– Problems in the equipment of client or ISP (routers, etc.)
– More global problems (Cisco bug + RIPE NCC test Aug. 2010)
• Problems at the cloud (e.g., Google App Engine, Apr. 2011)
• Denial of service attacks (e.g., Amazon EC2 2009)
8
2/1/2023
9
2/1/2023
Confidentiality/Privacy Violation
• Data is in the cloud provider’s machines
– The provider may be trusted; there are legal defenses; but
• There can be a malicious insider
– Can capture passwords, private keys, software, etc.
• Data can’t be encrypted (or it can’t be processed)
10
2/1/2023
Confidentiality/Privacy Violation
• Some administration operations: This is what can be
available to a malicious
– Instantiate VM, delete VM insider!
– Login in the management VM of the servers
– Migrate VMs to other servers
– Take memory snapshots (needed for migration)
– Mount file systems (needed for backups)
Privacy Breaches
• How do you know that a breach has occurred?
• How do you ensure that the CSP notifies you when a
breach occurs?
• Who is responsible for managing the breach notification
process (and costs associated with the process)?
• If contracts include liability for breaches resulting from
negligence of the CSP?
– How is the contract enforced?
– How is it determined who is at fault?
11
2/1/2023
Integrity
• How do I know that the cloud provider is doing the
computations correctly?
• How do I ensure that the cloud provider really stored my
data without tampering with it?
12
2/1/2023
26
13
2/1/2023
27
• What?
– Listen to network traffic (passive)
– Insert malicious traffic (active)
– Probe cloud structure (active)
– Launch DoS
• Goal?
– Intrusion
– Network analysis
– Man in the middle
14
2/1/2023
29
15
2/1/2023
16
2/1/2023
17
2/1/2023
Possible Solutions
35
36
18
2/1/2023
19
2/1/2023
40
20
2/1/2023
42
21
2/1/2023
22
2/1/2023
Minimize Multi-tenancy
46
23
2/1/2023
Minimize Multi-tenancy
• A public cloud is a shared cloud infrastructure
– Multiple customers of the cloud vendor access that same
infrastructure, although their data is not shared – just like every person
in a restaurant orders from the same kitchen, but they get different
dishes
– The technical term for multiple separate customers accessing the same
cloud infrastructure is "multitenancy"
– Public cloud service providers include AWS, Google Cloud Platform, and
Microsoft Azure, among others
• A private cloud, however, is single-tenant
– A private cloud is a cloud service that is exclusively offered to one
organization
Minimize Multi-tenancy
• A virtual private cloud (VPC) is a private cloud within a public
cloud
– No one else shares the VPC with the VPC customer
– VPC customers can run code, store data, host websites, and do
anything else they could do in an ordinary private cloud, but the private
cloud is hosted remotely by a public cloud provider
• Analogy
– Public cloud as a crowded restaurant, and a virtual private cloud as a
reserved table in that crowded restaurant
24
2/1/2023
Minimize Multi-tenancy
• A VPC isolates computing resources from the other computing
resources available in the public cloud
• The key technologies for isolating a VPC from the rest of the
public cloud are:
– Subnets: A subnet is a range of IP addresses within a network that are
reserved so that they're not available to everyone within the network
– VLAN: A LAN is a local area network, or a group of computing devices
that are all connected to each other without the use of the Internet.
– Like a subnet, a VLAN is a way of partitioning a network, but the
partitioning takes place at a different layer within the OSI model (layer
2 instead of layer 3)
Minimize Multi-tenancy
• The key technologies for isolating a VPC from the rest of the
public cloud are:
– VPN: A virtual private network (VPN) uses encryption to create a
private network over the top of a public network
– VPN traffic passes through publicly shared Internet infrastructure –
routers, switches, etc. – but the traffic is scrambled and not visible to
anyone
25
2/1/2023
Minimize Multi-tenancy
• Can’t really force the provider to accept less tenants
– Can try to increase isolation between tenants
• Strong isolation techniques (VPC to some degree)
– VM Side channel attacks
• QoS requirements need to be met
• Policy specification
26
2/1/2023
Conclusion
• Cloud computing is sometimes viewed as a reincarnation of
the classic mainframe client-server model
– However, resources are ubiquitous, scalable, highly virtualized
– Contains all the traditional threats, as well as new ones
• In developing solutions to cloud computing security issues it
may be helpful to identify the problems and approaches in
terms of
– Loss of control
– Lack of trust
– Multi-tenancy problems
54
27