SlideShare a Scribd company logo
Cloud Computing Security
By: Ahmed Banafa, Distinguished Tenured Staff | Faculty | SME | E-Learning Expert | Four-time
winner of instructor of the year award
A broad set of policies, technologies, and controls deployed to protect data, applications, and the
associated infrastructure of cloud computing.
Because of the cloud's very nature as a shared resource, identity management, privacy ,access
control , are of particular concern. With more organizations using cloud computing and
associated cloud providers for data operations, proper security in these and other potentially
vulnerable areas have become a priority for organizations contracting with a cloud computing
provider.
Cloud computing security processes should address the security controls the cloud provider will
incorporate to maintain the customer's data security, privacy andcompliance with necessary
regulations. The processes will also likely include a business continuity and data backup plan in
the case of a cloud security breach.
In the second half of 2013, Forrester Research conducted its usual Forrsights Hardware Survey
and found enterprise hardware buyers more than willing to make use of cloud servers, but they
were limiting their use because of unresolved concerns over security. In that survey, 73% of IT
decision makers were concerned about public cloud security, and 51% were concerned about
their own private cloud security.
Cloud Security Threats
According to CSA’s Report of 2013the biggest threats:
 Data Breaches
Cloud computing introduces significant new avenues of attack. The absolute security of
hypervisor operation and virtual machine operations is still to be proved. Clouds
represent concentrations of corporate applications and data, and if any intruder penetrated
far enough, who knows how many sensitive pieces of information will be exposed. "If a
multitenant cloud service database is not properly designed, a flaw in one client's
application could allow an attacker access not only to that client's data, but every other
client's data as well," the report concluded.
 Data Loss
a data breach is the result of a malicious and probably intrusive action.Small amounts of
data were lost for some Amazon Web Service customers as its EC2 cloud suffered "a
remirroring storm" due to human operator error on Easter weekend in 2011. And a data
loss could occur intentionally in the event of a malicious attack.
 Account Or Service Traffic Hijacking
Account hijacking sounds too elementary to be a concern in the cloud. Phishing,
exploitation of software vulnerabilities such as buffer overflow attacks, and loss of
passwords and credentials can all lead to the loss of control over a user
account.Compromising the confidentiality, integrity, and availability of the services
 Insecure APIs
The cloud era has brought about the contradiction of trying to make services available to
millions while limiting any damage all these largely anonymous users might do to the
service. The answer has been Application Programming Interface, or API, that defines
how a third party connects an application to the service and providing verification that the
third party producing the application is who he says he is. Leading web developers,
including ones from Twitter and Google, collaborated on specifying an open
authorization service for web services that controls third party access. But security
experts warn that there is no perfectly secure public API.
 Denial Of Service
Denial of service attacks are an old disrupter of online operations, but they remain a
threat nevertheless. For cloud customers, "experiencing a denial-of-service attack is like
being caught in rush-hour traffic gridlock: there's no way to get to your destination, and
nothing you can do about it except sit and wait," according to the report. When a denial
of service attacks a customer's service in the cloud, it may impair service without shutting
it down.”
 Malicious Insiders
Malicious insiders might seem to be a common threat. If one exists inside a large cloud
organization, the hazards are magnified. One tactic cloud customers should use to protect
themselves is to keep their encryption keys on their own premises, not in the cloud.
 Abuse Of Cloud Services
Cloud computing brings large-scale, elastic services to enterprise users and hackers alike.
It might take an attacker years to crack an encryption key using his own limited
hardware. But using an array of cloud servers, he might be able to crack it in minutes,.
 Insufficient Due Diligence
"Too many enterprises jump into the cloud without understanding the full scope of the
undertaking," said the report. Without an understanding of the service providers'
environment and protections, customers don't know what to expect in the way of incident
response, encryption use, and security monitoring. Not knowing these factors means
organizations are taking on unknown levels of risk in ways they may not even
comprehend, but that are a far departure from their current risks.
 Shared Technology
In a multi-tenant environment, the compromise of a single component, such as the
hypervisor, exposes more than just the compromised customer; rather, it exposes the
entire environment to a potential of compromise and breach. The same could be said
other shared services, including CPU caches, a shared database service, or shared storage.
The Future
The cloud now represents not only concentrations of compute power and storage, but also a
concentration of security, given the potential for mischief or disaster if those centralized
resources fall into the wrong hands. Whether it's a private cloud in the virtualized enterprise
datacenter or a public cloud, new levels of "layered" security will need to be built in. Such
security will need to operate in a highly automated fashion and be driven by well-crafted and
relentlessly applied policies.
Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software
library. This weakness allows stealing the information protected, under normal conditions, by
encryption used to secure the Internet. Encryption provides communication security and privacy
over the Internet for applications such as web, email, instant messaging (IM) and some virtual
private networks (VPNs).
 Heartbleed bug allows cybercriminals to access website data and visitors' personal
information, including credit cards, e-mails and passwords that are stored in the cloud.
 Heartbleed leaves no record in an attacked Web server’s logs, which makes it impossible
to tell exactly how many websites may have been exploited by it.
 Heartbleed went undetected for more than two years, and it could have affected
thousands of OpenSSL Web servers across the globe.
 According to The Economist, up to two-thirds of the world's websites are vulnerable to
Heartbleed attacks. While OpenSSL has been available since March 2012, it contained a
serious coding error that allowed a computer at one end of an encrypted link to send a
signal to the computer at the other end of it to check that it is still online. Google found
that hackers could exploit this coding error, duplicate its signal and access an OpenSSL
Web server's memory.
 The Heartbleed bug allows anyone on the Internet to read the memory of the systems
protected by the vulnerable versions of the OpenSSL software. This compromises the
secret keys used to identify the service providers and to encrypt the traffic, the names and
passwords of the users and the actual content. This allows attackers to eavesdrop on
communications, steal data directly from the services and users and to impersonate
services and users.
Why it is called the Heartbleed Bug?
 Bug is in the OpenSSL's implementation of the (transport layer security protocols)
heartbeat extension. When it is exploited it leads to the leak (bleeding) of memory
contents from the server to the client and from the client to the server.
 Bugs in single software or library come and go and are fixed by new versions. However
this bug has left large amount of private keys and other secrets exposed to the Internet.
Considering the long exposure, ease of exploitation and attacks leaving no trace this
exposure should be taken seriously.
References
http://www.informationweek.com/cloud/infrastructure-as-a-service/cloud-security-needs-more-
layers-hytrust/d/d-id/1114025?itc=edit_in_body_cross
http://en.wikipedia.org/wiki/Cloud_computing_security
http://searchcompliance.techtarget.com/definition/cloud-computing-security
http://www.informationweek.com/cloud/infrastructure-as-a-service/9-worst-cloud-security-
threats/d/d-id/1114085?page_number=2
http://talkincloud.com/cloud-computing-security/040914/heartbleed-openssl-security-flaw-puts-
corporate-cloud-data-risk
http://heartbleed.com/

More Related Content

PDF
MIST Effective Masquerade Attack Detection in the Cloud
PDF
Implementation of user authentication as a service for cloud network
PDF
Identified Vulnerabilitis And Threats In Cloud Computing
PPT
Cloud computing present
PDF
iaetsd Shared authority based privacy preserving protocol
PDF
Law firms keep sensitive client data secure with CloudMask
DOCX
4.authentication and key agreement based on anonymous identity for peer to-pe...
PDF
Global Security Certification for Governments
MIST Effective Masquerade Attack Detection in the Cloud
Implementation of user authentication as a service for cloud network
Identified Vulnerabilitis And Threats In Cloud Computing
Cloud computing present
iaetsd Shared authority based privacy preserving protocol
Law firms keep sensitive client data secure with CloudMask
4.authentication and key agreement based on anonymous identity for peer to-pe...
Global Security Certification for Governments

What's hot (16)

PDF
F5 networks the_expectation_of_ssl_everywhere
PDF
A Comparative Review on Data Security Challenges in Cloud Computing
PDF
Securing Cloud Using Fog: A Review
PDF
Cloud Computing Security
PDF
Abuse_in_the_Cloud_Palani_Ashwin
PDF
Securing sensitive data for the health care industry
PDF
New Approaches to Security and Availability for Cloud Data
 
PDF
Hindering data theft attack through fog computing
PPTX
Packt publishing book proposal api and mobile access management
PDF
An efficient and secure data storage in cloud computing using modified RSA pu...
PPTX
Cloud security and services
PDF
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
Encryption Technique for a Trusted Cloud Computing Environment
PDF
Design and implement a new cloud security method based on multi clouds on ope...
PDF
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
F5 networks the_expectation_of_ssl_everywhere
A Comparative Review on Data Security Challenges in Cloud Computing
Securing Cloud Using Fog: A Review
Cloud Computing Security
Abuse_in_the_Cloud_Palani_Ashwin
Securing sensitive data for the health care industry
New Approaches to Security and Availability for Cloud Data
 
Hindering data theft attack through fog computing
Packt publishing book proposal api and mobile access management
An efficient and secure data storage in cloud computing using modified RSA pu...
Cloud security and services
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
Encryption Technique for a Trusted Cloud Computing Environment
Design and implement a new cloud security method based on multi clouds on ope...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Ad

Similar to Cloud Computing Security (20)

PDF
Internal & External Attacks in cloud computing Environment from confidentiali...
PDF
N017259396
PDF
A017130104
PPTX
9 Things You Need to Know Before Moving to the Cloud
PDF
Seclud it polesc_sjuly7
PDF
Cloud servers-new-risk-considerations
PDF
Cloud_security_v2_chpater_9_s_version.pdf
PPTX
Myppt1.pptx on ics subject for 6th semester
PDF
Cloud Security - Emerging Facets and Frontiers
DOCX
What is the future of cloud security linked in
DOCX
Cloud computing seminar report
PPTX
Cloud Cmputing Security
PPTX
Cloud Security in 2025_ Top Challenges, Daily Risks & Key Threats You Need to...
PPT
CyberCrime in the Cloud and How to defend Yourself
PDF
Investigative analysis of security issues and challenges in cloud computing a...
PDF
Seven deadly threats and vulnerabilities in cloud
PDF
Seven Deadly Threats and Vulnerabilities in Cloud Computing
PPTX
Practical Security for the Cloud
PPTX
Security on Cloud Computing
PPTX
Unit -3.pptx cloud Security unit -3 notes
Internal & External Attacks in cloud computing Environment from confidentiali...
N017259396
A017130104
9 Things You Need to Know Before Moving to the Cloud
Seclud it polesc_sjuly7
Cloud servers-new-risk-considerations
Cloud_security_v2_chpater_9_s_version.pdf
Myppt1.pptx on ics subject for 6th semester
Cloud Security - Emerging Facets and Frontiers
What is the future of cloud security linked in
Cloud computing seminar report
Cloud Cmputing Security
Cloud Security in 2025_ Top Challenges, Daily Risks & Key Threats You Need to...
CyberCrime in the Cloud and How to defend Yourself
Investigative analysis of security issues and challenges in cloud computing a...
Seven deadly threats and vulnerabilities in cloud
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Practical Security for the Cloud
Security on Cloud Computing
Unit -3.pptx cloud Security unit -3 notes
Ad

More from Ahmed Banafa (20)

PPTX
IoT and 5G convergence
PPTX
Quantum Computing and AI
PPTX
The convergence of IoT and Quantum Computing
PPTX
Quantum Internet Explained
PPTX
IoT and Covid 19
PPTX
Quantum Teleportation
PPTX
What is zero trust model (ztm)
PPTX
How blockchain is revolutionizing crowdfunding
PPTX
Blockchain technology and supply chain management
PPTX
8 key tech trends in a post covid-19 world edited
PPTX
Blockchain Technology and COVID19
PPTX
Ten trends of blockchain in 2020
PPTX
Quantum Computing and Blockchain: Facts and Myths
PPTX
Ten Blockchain Applications
PPTX
Hot technologies of 2019
PPTX
Blockchain and AI
PPTX
The Blockchain Wave in 2019 and Beyond - SJSU
PPTX
9 IoT predictions for 2019
PDF
Secure and Smart IoT using Blockchain and AI
PPTX
The Blockchain Wave in 2019 and Beyond
IoT and 5G convergence
Quantum Computing and AI
The convergence of IoT and Quantum Computing
Quantum Internet Explained
IoT and Covid 19
Quantum Teleportation
What is zero trust model (ztm)
How blockchain is revolutionizing crowdfunding
Blockchain technology and supply chain management
8 key tech trends in a post covid-19 world edited
Blockchain Technology and COVID19
Ten trends of blockchain in 2020
Quantum Computing and Blockchain: Facts and Myths
Ten Blockchain Applications
Hot technologies of 2019
Blockchain and AI
The Blockchain Wave in 2019 and Beyond - SJSU
9 IoT predictions for 2019
Secure and Smart IoT using Blockchain and AI
The Blockchain Wave in 2019 and Beyond

Recently uploaded (20)

PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
innovation process that make everything different.pptx
PPTX
Introduction to Information and Communication Technology
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Digital Literacy And Online Safety on internet
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
Funds Management Learning Material for Beg
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
presentation_pfe-universite-molay-seltan.pptx
Slides PPTX World Game (s) Eco Economic Epochs.pptx
innovation process that make everything different.pptx
Introduction to Information and Communication Technology
Job_Card_System_Styled_lorem_ipsum_.pptx
Digital Literacy And Online Safety on internet
Design_with_Watersergyerge45hrbgre4top (1).ppt
introduction about ICD -10 & ICD-11 ppt.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Paper PDF World Game (s) Great Redesign.pdf
Unit-1 introduction to cyber security discuss about how to secure a system
Triggering QUIC, presented by Geoff Huston at IETF 123
Funds Management Learning Material for Beg
Tenda Login Guide: Access Your Router in 5 Easy Steps
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Introuction about WHO-FIC in ICD-10.pptx
SAP Ariba Sourcing PPT for learning material
The Internet -By the Numbers, Sri Lanka Edition
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
QR Codes Qr codecodecodecodecocodedecodecode
presentation_pfe-universite-molay-seltan.pptx

Cloud Computing Security

  • 1. Cloud Computing Security By: Ahmed Banafa, Distinguished Tenured Staff | Faculty | SME | E-Learning Expert | Four-time winner of instructor of the year award A broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. Because of the cloud's very nature as a shared resource, identity management, privacy ,access control , are of particular concern. With more organizations using cloud computing and associated cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations contracting with a cloud computing provider. Cloud computing security processes should address the security controls the cloud provider will incorporate to maintain the customer's data security, privacy andcompliance with necessary regulations. The processes will also likely include a business continuity and data backup plan in the case of a cloud security breach. In the second half of 2013, Forrester Research conducted its usual Forrsights Hardware Survey and found enterprise hardware buyers more than willing to make use of cloud servers, but they were limiting their use because of unresolved concerns over security. In that survey, 73% of IT decision makers were concerned about public cloud security, and 51% were concerned about their own private cloud security. Cloud Security Threats According to CSA’s Report of 2013the biggest threats:
  • 2.  Data Breaches Cloud computing introduces significant new avenues of attack. The absolute security of hypervisor operation and virtual machine operations is still to be proved. Clouds represent concentrations of corporate applications and data, and if any intruder penetrated far enough, who knows how many sensitive pieces of information will be exposed. "If a multitenant cloud service database is not properly designed, a flaw in one client's application could allow an attacker access not only to that client's data, but every other client's data as well," the report concluded.  Data Loss a data breach is the result of a malicious and probably intrusive action.Small amounts of data were lost for some Amazon Web Service customers as its EC2 cloud suffered "a remirroring storm" due to human operator error on Easter weekend in 2011. And a data loss could occur intentionally in the event of a malicious attack.  Account Or Service Traffic Hijacking Account hijacking sounds too elementary to be a concern in the cloud. Phishing, exploitation of software vulnerabilities such as buffer overflow attacks, and loss of passwords and credentials can all lead to the loss of control over a user account.Compromising the confidentiality, integrity, and availability of the services  Insecure APIs The cloud era has brought about the contradiction of trying to make services available to millions while limiting any damage all these largely anonymous users might do to the service. The answer has been Application Programming Interface, or API, that defines how a third party connects an application to the service and providing verification that the third party producing the application is who he says he is. Leading web developers, including ones from Twitter and Google, collaborated on specifying an open authorization service for web services that controls third party access. But security experts warn that there is no perfectly secure public API.  Denial Of Service Denial of service attacks are an old disrupter of online operations, but they remain a threat nevertheless. For cloud customers, "experiencing a denial-of-service attack is like being caught in rush-hour traffic gridlock: there's no way to get to your destination, and nothing you can do about it except sit and wait," according to the report. When a denial
  • 3. of service attacks a customer's service in the cloud, it may impair service without shutting it down.”  Malicious Insiders Malicious insiders might seem to be a common threat. If one exists inside a large cloud organization, the hazards are magnified. One tactic cloud customers should use to protect themselves is to keep their encryption keys on their own premises, not in the cloud.  Abuse Of Cloud Services Cloud computing brings large-scale, elastic services to enterprise users and hackers alike. It might take an attacker years to crack an encryption key using his own limited hardware. But using an array of cloud servers, he might be able to crack it in minutes,.  Insufficient Due Diligence "Too many enterprises jump into the cloud without understanding the full scope of the undertaking," said the report. Without an understanding of the service providers' environment and protections, customers don't know what to expect in the way of incident response, encryption use, and security monitoring. Not knowing these factors means organizations are taking on unknown levels of risk in ways they may not even comprehend, but that are a far departure from their current risks.  Shared Technology In a multi-tenant environment, the compromise of a single component, such as the hypervisor, exposes more than just the compromised customer; rather, it exposes the entire environment to a potential of compromise and breach. The same could be said other shared services, including CPU caches, a shared database service, or shared storage. The Future The cloud now represents not only concentrations of compute power and storage, but also a concentration of security, given the potential for mischief or disaster if those centralized resources fall into the wrong hands. Whether it's a private cloud in the virtualized enterprise datacenter or a public cloud, new levels of "layered" security will need to be built in. Such security will need to operate in a highly automated fashion and be driven by well-crafted and relentlessly applied policies.
  • 4. Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by encryption used to secure the Internet. Encryption provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).  Heartbleed bug allows cybercriminals to access website data and visitors' personal information, including credit cards, e-mails and passwords that are stored in the cloud.  Heartbleed leaves no record in an attacked Web server’s logs, which makes it impossible to tell exactly how many websites may have been exploited by it.  Heartbleed went undetected for more than two years, and it could have affected thousands of OpenSSL Web servers across the globe.  According to The Economist, up to two-thirds of the world's websites are vulnerable to Heartbleed attacks. While OpenSSL has been available since March 2012, it contained a serious coding error that allowed a computer at one end of an encrypted link to send a signal to the computer at the other end of it to check that it is still online. Google found that hackers could exploit this coding error, duplicate its signal and access an OpenSSL Web server's memory.  The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users. Why it is called the Heartbleed Bug?  Bug is in the OpenSSL's implementation of the (transport layer security protocols) heartbeat extension. When it is exploited it leads to the leak (bleeding) of memory contents from the server to the client and from the client to the server.  Bugs in single software or library come and go and are fixed by new versions. However this bug has left large amount of private keys and other secrets exposed to the Internet. Considering the long exposure, ease of exploitation and attacks leaving no trace this exposure should be taken seriously.