CLOUD COMPUTING AND NETWORK SECURITY ISSUES(Z5140305)
Executive Summary
In this fast-paced technology era, organizations are always looking for new innovative ways to increase productivity and efficiency. One emerging technology adopted by many organisations is cloud computing. Cloud computing is a model that uses internet and remote servers for maintaining data and applications (Association of Modern Technologies Professionals 2017). It replaces expensive infrastructure and need of maintenance. Cloud provides access to data anytime, anywhere over the internet. However, like any cyber technology cloud computing is vulnerable to various kinds of cyber-attacks (Amna Riaz 2017).
The large scale of cloud computing and virtualization
…show more content…
HIDS and NIDS have their own strength and limitations. HIDS is not well suited to provide visibility in the Virtual machines (VMs) (Amna Riaz 2017). NIDS can be employed within the Virtual machines but would be incapable of detecting attacks occurring within the network (C. Modi 2013, p.49).
Various other techniques have been studied where NIDS can be provided at the Virtual switch to collects inbound and outbound traffic from all VMs and log it. Use of security onion tools such as SNORT could help to detect DoS or DDoS attack. However, processing all packets in large virtual network could create issue and it may fail to detect attacks in time (Amna Riaz 2017). Using OSSEC as HIDS in the cloud computing could help to resolve analysing and integrating the huge log files. OSSEC is an open source host-based intrusion detection system (HIDS). It has a powerful association and analysis mechanism, active response and real-time alerting (C. Ambikavathi and S. K. Srivatsa 2016, p. 4).
Software-defined networking (SDN) is next evolving technology for the cloud computing as it provides a centralized system to manage the network. Scalable monitoring and dynamic reconfiguration requirements of the network makes SDN a perfect choice (Amna Riaz 2017).
Our aim in this document is to provide an informative primer on security issues of the cloud computing and various IDS tools to combat the security issues. We concluded the document after analysing that every process has its
The cloud computing has more security threats from the cyber hackers, to avoid the cyber-attacks on the cloud the organization must take concerning the cloud security problems like privacy, trust, authentication, data loss. Though the cloud anyone can access the computing technology and the storage of data from the network, as it used for the network cause
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Cloud technologies revolve heavily around virtual machines that reside on physical servers (Talbot, 2009). One physical server could be the home of a slew of virtual machines; should an attacker interrupt the normal operations of a physical server it could result in the inoperability of the virtual machines also. One of the techniques can be used is an attacker implanting a virtual machine on a physical server (Talbot, 2009). Once the
Abstract—Cloud Computing is a shared Information Technology infrastructure in which computing resources are shared among several systems that are connected together, using a network of servers. This type of resource sharing is facilitated by the Virtualization technology that enables multiple operating systems to run simultaneously on a single server (Multi-tenancy). Although this method provides optimization in hardware utilization, it may also result in unauthorized interactions which could lead to a number of risks such as jeopardizing the resource access control, denial of service attacks, Inter-VM (Virtual Machine) attacks and so on. In this paper, such possible challenges and risks and their corresponding effects will be studied, after which, several techniques and strategies will also be examined in order to tackle the Virtualization vulnerabilities. Possible architectural changes that can be made at the application and infrastructural levels will also be taken into consideration to enhance security in Cloud Computing.
Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security [1]. With the extensive use of virtualization technologies combined with self-service potentialities cloud service providers are providing services to their customers through the Internet. In these service provider surroundingses, virtual machines from different multiple organizations have to be co-located on the same physical server in order to optimally maximize the effectiveness and efficiencies of virtualization. Cloud service
The primary objective of this project is to detect and mitigate various network attacks using new and effective modern day technologies.
ABSTRACT: Cloud computing is nothing but an internet based connection to remote servers which allows to store data and access to all services. These services are provided by the third party who owns the infrastructure. Cloud computing is classified into public, private or hybrid. It is a kind of grid computing. It is flexible and easy to adapt. Apart from advantages organizations are very slow in processing the customer resources because it has some security issues and challenges associated with it. Security is the main issue which is becoming a big hurdle for the growth of cloud computing. The companies are worrying to handle some important data to other companies due to these security challenges. This paper is going to give brief
Despite the growth in cloud computing, many enterprises adopted the model, several security issues raise severe concerns about the performance which requires us to cast a wider net to find practical solutions to cloud security that work with technology that is available today. Various techniques need to be used making cloud computing secure and it will improve service delivery. The major concern is how to protect data from illegal access by hackers. The goal of this research is to help in educating organizations and individuals on how to protect themselves from hackers. Developing counter-measures can help in ensuring the safety of data in cloud computing. This will mean more organizations will trust cloud computing companies. Key areas for security concerns are (1) Data in server/rest, (2) data in transit, (3) authentication, (4) separation between customers, (5) cloud legal and regulatory issues and (6) incident response.
Considering both the gains and harms related to the cloud world, Cloud Security Alliance(CSA) has set some cloud security standards throughout the industry. The report “Treacherous 12 - Top Threats” is an important research artifact done by the CSA. Though there are
These controller-based applications will serve the same roles that physical appliances play in the network today, Forster said. For example, network architects who are building software-defined networks could deploy applications like a virtual load balancer, a virtual intrusion detection system (IDS), or a virtual firewall on a controller. The application could tap into information the controller possesses about traffic patterns, application data, and capacity. If the IDS application recognizes malware traffic based on the flows tracked by a controller, it could automatically isolate those packets before they infect the network.
In this paper, the authors survey many sources and literature on cloud security issues, namely vulnerabilities, threats, and attacks. A total of 504 articles were look at to gather the data used in this paper. While the authors use this number to say that the research trend is up on mitigating security risks, they also suggest that security is the main priority of most research to the detriment of other areas. They offer no concrete numbers to back up this claim..
Another solution that has been studied is Virtual Machine Introspection (VMI) based technique (Amna Riaz 2017). Virtual machine introspection (VMI) is the main idea behind out-of-box intrusion detection. VMI is a technique of inspecting VM state by moving the inspection module outside of the VM. The software running inside the guest system is analysed externally to detect any intrusion. One advantage of this technique is that malware detection continues to work unaffectedly even in the
This section of paper includes why we need cloud computing as a security control tool against the cyber criminal activities and in how many ways it can be implemented. As we are living in a technical era, many aspects of our lives rely on the Internet and computers, including transportation, communications, government, medicine, finance and education. Consider how much of our personal information is stored either on our own computer or on someone else’s system.
Infrastructure as a service is a form virtual cloud computing that provides virtualized computing services over internet [1]. In model, a third party provider gives hardware, software, servers, storage and other infrastructure components on behalf of its users. Providers also host user’s applications and handle tasks including system maintenance, backup and resiliency planning. Environments include the automation of administrative talks, dynamic scaling, desktop virtualization and policy based services. Leading service providers are amazon web services, windows azure, Google compute engine, Rackspace open cloud, and IBM smart cloud enterprise.
DB-14-0054 Project Proposal4Security of cloud computing. Cloud computing and cloud computing securityhavehad a massiveimpact on computingsystems inthe last fewyears. Thereis no doubtthat