Cloud Computing
Cloud Computing
3.4.Outline
• Cloud Computing
• Cloud Security Concepts
• Cloud Security Approaches
• The Internet of Things
• IoT Security
Cloud Computing:
• NIST defines cloud computing, in NIST SP-800-145 (The
NIST Definition of Cloud Computing, September 2011) as
follows:
Esse n t ia l
N e t w or k Acce ss Ela st icit y Se r vice Se lf- Se r vice
Re sou r ce Poolin g
Soft w a r e a s a Se r vice ( Sa a S)
Pla t for m a s a Se r vice ( Pa a S)
Se r vice
M ode ls
I n fr a st r uct ur e a s a Se r vice ( I a a S)
D e ploym e nt
M ode ls
Infrastructure as a service
(IaaS)
Software as a Service
(SaaS)
It enables the
customer to use the
cloud provider’s
SaaS provides applications running
on the provider’s
service to
cloud infrastructure
customers in Examples of
• The applications are The use of SaaS
this service are
the form of accessible from various avoids the
Google Gmail,
software, client devices through a complexity of
simple interface, such
Microsoft 365,
software
specifically as a Web browser installation,
Salesforce,
application • Instead of obtaining Citrix
maintenance,
desktop and server GoToMeeting,
software, licenses for software
upgrades, and
and Cisco
patches
running on and products it uses, an WebEx
enterprise obtains the
accessible in same functions from
the cloud the cloud service
Platform as a Service
(PaaS)
A PaaS cloud provides useful
software building blocks, plus a
A PaaS cloud provides service to PaaS enables the customer to
number of development tools,
customers in the form of a deploy onto the cloud
such as programming language
platform on which the customer’s infrastructure customer-created
tools, run-time environments,
applications can run or acquired applications
and other tools that assist in
deploying new applications
The organization may choose to manage the cloud in house or contract the management function to a third
party
The cloud servers and storage devices may exist on premise or off premise
Private clouds can deliver IaaS internally to employees or busines units through an intranet or the
Internet via a virtual private network (VPN), as well as software or storage as services to its branch
offices
Examples of services delivered through the private cloud include database on demand, email on demand,
and storage on demand
Other benefits include easy resource sharing and rapid deployment to organizational entities
Community Cloud
•Has restricted access like a private
A community cloud shares cloud
characteristics of private and •The cloud resources are shared
public clouds among a number of independent
organizations like a public cloud
Security Most secure option Very secure Moderately secure Very secure
Security
Privacy
I aaS Service
Security Aggregation
Resource Abstraction Provisioning/
Audit
and Control Layer Configuration Service
Privacy Physical Resource Layer Arbitrage
I mpact Audit
Hardware Portability/
Performance I nteroperability
Facility
Audit
Cloud Carrier
Compliance
Understand the various types of laws and regulations that impose security and privacy obligations
on the organization and potentially impact cloud computing initiatives, particularly those involving data
location, privacy and security controls, records management, and electronic discovery requirements.
Review and assess the cloud provider’s offerings with respect to the organizational requirements to
be met and ensure that the contract terms adequately meet the requirements. NIST Guidelines
Ensure that the cloud provider’s electronic discovery capabilities and processes do not compromise the
privacy or security of data and applications. on
Trust
Ensure that service arrangements have sufficient means to allow visibility into the security and
Cloud Security
privacy controls and processes employed by the cloud provider, and their performance over time.
Establish clear, exclusive ownership rights over data.
and
Institute a risk management program that is flexible enough to adapt to the constantly evolving and
shifting risk landscape for the lifecycle of the system.
Privacy Issues
Continuously monitor the security state of the information system to support ongoing risk
management decisions.
and
Architecture Recommendations
Understand the underlying technologies that the cloud provider uses to provision services, including
the implications that the technical controls involved have on the security and privacy of the system, over
the full system lifecycle and across all system components. (Page 1 of 2)
I dentity and access management
Ensure that adequate safeguards are in place to secure authentication, authorization, and other
identity and access management functions, and are suitable for the organization.
Software isolation
Understand virtualization and other logical isolation techniques that the cloud provider employs in
its multi-tenant software architecture, and assess the risks involved for the organization.
Data protection
Evaluate the suitability of the cloud provider’s data management solutions for the organizational
data concerned and the ability to control access to data, to secure data while at rest, in transit, and in use,
and to sanitize data.
Take into consideration the risk of collating organizational data with those of other organizations
whose threat profiles are high or whose data collectively represent significant concentrated value.
Fully understand and weigh the risks involved in cryptographic key management with the facilities
available in the cloud environment and the processes established by the cloud provider.
Availability
Understand the contract provisions and procedures for availability, data backup and recovery, and
disaster recovery, and ensure that they meet the organization’s continuity and contingency planning
requirements.
Ensure that during an intermediate or prolonged disruption or a serious disaster, critical operations
can be immediately resumed, and that all operations can be eventually reinstituted in a timely and
organized manner.
I ncident response
Understand the contract provisions and procedures for incident response and ensure that they meet
the requirements of the organization.
Ensure that the cloud provider has a transparent response process in place and sufficient
mechanisms to share information during and after an incident.
Ensure that the organization can respond to incidents in a coordinated fashion with the cloud
provider in accordance with their respective roles and responsibilities for the computing environment.
(Page 2 of 2)
Security Issues for Cloud
Computing
• Security is a major consideration when augmenting or replacing on-premises
systems with cloud services
• Allaying security concerns is frequently a prerequisite for further discussions
about migrating part or all of an organization’s computing architecture to the
cloud
• Availability is another major concern
• Auditability of data must be ensured
• Businesses should perform due diligence on security threats both from outside
and inside the cloud
• Cloud users are responsible for application-level security
• Cloud vendors are responsible for physical security and some software security
• Security for intermediate layers of the software stack is shared between users and vendors
For data at rest, the ideal security The client can employ encryption to
measure is for the client to encrypt the protect data in transit, though this
database and only store encrypted data in involves key management
the cloud, with the CSP having no access responsibilities for the CSP
to the encryption key
E-mail security
Web security
I ntrusion
management
It provides multi-tenant IaaS, and aims to meet the needs of public and private
clouds, regardless of size, by being simple to implement and massively
scalable
OpenStack
• The OpenStack OS consists of a number of independent
modules, each of which has a project name and a
functional name
• The security module for OpenStack is Keystone
• Keystone provides the shared security services essential
for a functioning cloud computing infrastructure
o It provides the following main services:
• Identity
• Token
• Service catalog
• Policies
The Internet of Things
(IoT)
• IoT is a term that refers to the expanding interconnection of smart
devices, ranging from appliances to tiny sensors
• A dominant theme is the embedding of short-range mobile transceivers into a
wide array of gadgets and everyday items, enabling new forms of
communication between people and things, and between things themselves
• The Internet supports the interconnectivity usually through cloud systems
It is the fourth generation that is usually thought of as the IoT, and which is
marked by the use of billions of embedded devices
Edge
A gateway interconnects the
IoT-enabled devices with the
higher-level communication
networks
•It performs the necessary translation
At the edge of a typical between the protocols used in the
communication networks and those
enterprise network is a network used by devices
of IoT-enabled devices consisting •It may also perform a basic data
of sensors and perhaps actuators aggregation function
•These devices may communicate with
one another
•A cluster of sensors may all transmit their
data to one sensor that aggregates the
data to be collected by a higher-level
entity
Fog
• In many IoT deployments, massive amounts of data may be generated by a
distributed network of sensors
• Rather than store all of that data permanently (or at least for a long period) in central
storage accessible to IoT applications, it is often desirable to do as much data
processing close to the sensors as possible
• The purpose of what is sometimes referred to as the edge computing level is to
convert network data flows into information that is suitable for storage and higher-
level processing
• Processing elements at these levels may deal with high volumes of data and perform
data transformation operations, resulting in the storage of much lower volumes of
data
• The following are examples of fog computing operations:
The end user may have no The result is that the hundreds
The device manufacturers
means of patching the system of millions of Internet-
focus is the functionality of
or, if so, little information connected devices in the IoT
the device itself
about when and how to patch are vulnerable to attack
Authentication
secure data transfer
Internet or
enterprise
network
Security, privacy
Gateways of data at rest
Authentication
secure data transfer
Devices
Resilient
to lost Confidentiality
messages
MiniSec is
designed to
meet the
following
requirements:
Low
Replay
energy
protection
overhead
Freshness