SlideShare a Scribd company logo
Cloud Security: Issues and Concerns
- P. Samarati, S. De Capitani di Vimercati, in Encyclopedia on Cloud
Computing, S. Murugesan, I. Bojanova (eds.), Wiley, 2016
SNHCC Program, IIS, Academia Sinica,
Taiwan
Prepared By
Mrinal Kanti Baowaly
TIGP PhD Fellow
Presentation Outline
• Summary
• Introduction
• Confidentiality, Integrity, and Availability in the
Cloud
• Issues and Challenges
• Conclusion
Summary
• The cloud has emerged as a successful computing
paradigm
• Cloud allows user to rely on external providers for
storing and processing data
• But an important priority is to have enforcing and
assessing security guarantees.
• This paper presents
 main security issues and concerns arising in the cloud
scenario w.r.t storage, management, and processing of
data
Introduction
• With significant benefits of scalability and elasticity, the
cloud paradigm has appealed companies as well as
individuals
• Loss of control of the owners, and consequent security
threats can limit the adoption and acceptance of the
cloud computing
• ENISA lists loss of control and governance as top risks of
cloud computing
• CSA lists data breaches and data loss as two of the top
nine threats in cloud computing
Deployment & Service Models of
Cloud Computing
• Deployment Models of Cloud Computing
o Private Cloud
o Public Cloud
o Community Cloud
o Hybrid Cloud
• Service Models of Cloud Computing
o Infrastructure as a Service (IaaS) e.g. storage, network, servers,
virtual machine
o Platform as a Service (PaaS) e.g. OS, web servers, development
tools
o Software as a Service (SaaS) e.g. Different application
software: CRM, Email, Word Processing, Games
This Chapter Highlights..
• The security and privacy issues to be addressed and the
challenges involved can vary in different deployment
and service models
• In this chapter the authors highlights security issues and
its variations in the different models
• This chapter is organized by two main sections:
1. how the classical confidentiality, integrity, and availability
properties translate in the cloud
2. presents an overview of the security issues and concerns to be
addressed to ensure confidentiality, integrity, and availability
Confidentiality, Integrity, and
Availability in the Cloud
• Security problems can be classified with the classical CIA
paradigm
o confidentiality
o integrity and
o availability
Confidentiality in the Cloud
• It requires guaranteeing proper protection to
confidential or sensitive data stored or processed in the
cloud
• This can relate to:
o data externally stored
o identity/properties of the users accessing the data or
o the actions that users perform over the data
Integrity in the Cloud
• Integrity requires guaranteeing the authenticity of:
o the parties (users and providers) interacting in the cloud
o the data stored at external providers and
o the response returned from queries and computations
Availability in the Cloud
• Availability requires providing the ability to:
o define and verify that providers satisfy requirements
expressed in Service Level Agreements (SLAs) established
between data owners/users and providers
Some aspects that affect
the security issues…
• The issues to be tackled, the challenges to be addressed,
and the specific guarantees to be provided for ensuring
satisfaction of the security properties (CIA) depend on
the characteristics of the different scenarios:
o Simple Scenario
o Complex Scenario
• Trust assumptions & potential
threats on the providers:
o fully trusted, curious, lazy,
or malicious
Data Security
Lifecycle
Summary of Cloud Security Issues
• It clear that there is not a one-size-fits-all solution
I. Protection of data at rest
• Guarantee protection (i.e. confidentiality, integrity,
and availability of data)
 The first basic problem, need to be addressed
• Data confidentiality needs to be guaranteed even to
the provider's eyes.
What are the solutions?
I. Protection of data at rest (Cont..)
(a) “Honest-but-curious” (b) “Two can keep a secret”
Encryption Fragmentation
BoxCryptor
I. Protection of data at rest (Cont..)
(c) “Multiple-unlinkable-fragments” (d) “Keep a few”
No Encryption
II. Fine-grained access to data in the
cloud
• When confidentiality is ensured with encryption,
providers cannot decrypt data for query execution
• Fine-grained access, typically query execution, needs to
be supported
Two lines of approaches for providing
fine-grained access
II. Fine-grained access to data in the
cloud(Cont..)
First Approach:
• Performing queries directly on the encrypted data
• This is made by specific cryptographic techniques
o e.g. homomorphic encryption, CryptDB
• The main drawbacks:
o applicable typically for keyword searches or very basic
operations
o limited kinds of accesses and the computational complexity of
the execution
o not applicable in many real life scenarios
II. Fine-grained access to data in the
cloud(Cont..)
Second Approach:
• Attaching some metadata(indexes) to the encrypted
data
• These indexes are then used for fine-grained
information retrieval and query execution
o e.g. relational table in database
• Different kinds of indexes have been investigated
o direct indexing (one-to-one correspondence between plaintext
and index values)
o bucket- or hash-based indexing (many-to-one correspondence
between plaintext and index values)
o and flat indexing (one-to-many correspondence between
plaintext and index values)
II. Fine-grained access to data in the
cloud(Cont..)
III. Selective access to data in the cloud
• Access to data is selective at times: different users or
groups should enjoy different views and access
• How to enforce access control on data in the cloud is
crucial
• The enforcement of such access control policy is
however delegated to the cloud provider but sometimes
it doesn’t possible ‘coz of confidentiality
• Also, outsourcing of access control needs complete trust
to providers
• But, having the data owner mediate every access
request to ensure only authorized accesses is clearly
impractical and inapplicable
III. Selective access to data in the cloud
(cont..)
• Combining access control and encryption, encrypt data
with different keys, depending on the authorizations
holding on them
III. Selective access to data in the cloud
(cont..)
• Over Encryption: having the providers apply a further
level of encryption
IV. User Privacy
• Support Privacy of users accessing data and performing
computations
• In cloud, it might be need to grant access to data to
users not registered in the system without their identity
• Access control authorizations and enforcement should
be based on properties of users
o typically provided by means of attributes within digitally
signed certificates
• Several proposals have investigated different issues to
be addressed in this context
• language, access control engine, possible dialog and
negotiation to be supported between providers and users
V. Query Privacy
• Support Privacy of users’ actions in the cloud
• In some scenarios what is confidential is not (or not
only) data, or users’ identities/properties, but also the
accesses that users make on such data.
• In particular, confidentiality should be guaranteed, even
from the provider’s eyes w.r.t the fact that:
o an access aims at a specific data (access confidentiality)
or the fact that two accesses aim at the same data
(pattern confidentiality)
• Traditional approaches for protecting access and pattern
confidentiality are based on Private Information
Retrieval (PIR) techniques
VI. Query and Computation Integrity
• Enable assessment of correctness, completeness, and
freshness of queries and computations
• In scenarios where queries/computations are performed
by providers that are not fully trustworthy
• The problem arises of providing data owners and/or
users with the ability to assess that the result returned
from a query/computation is correct, complete, and
fresh
• Current solutions can be roughly classified in two
categories: deterministic and probabilistic
VII. Collaborative query execution with
multiple providers
• Enable controlled data sharing for collaborative queries
and computations involving multiple providers
• Data stored and managed by different cloud providers
may need to be selectively shared and accessed in a
cooperative way
• This scenario may see the presence of different
providers as well as of different data owners
• Exchange of data and collaborative computations should
be controlled to ensure that information is not
improperly accessed, released, or leaked
• Solutions: distributed query computation
VIII. SLA and Auditing
• Specification and assessment of security requirements
to be satisfied by providers
• A Service Level Agreement (SLA) is a contractual
agreement
• It specifies the performance and availability guarantees
that a cloud provider promises to deliver as well as
penalties in the case of violations of the SLA.
• for example, whether cloud providers are correctly
storing data or correctly executing computation-
intensive tasks on behalf of the users
IX. Multi-tenancy and virtualization
• Provide confinement of different users data and
activities in the shared cloud environment
• Multi-tenancy refers to the ability to provide computing
services to different users by using a common cloud
infrastructure
• It can reduce the costs and improving the utilization of
resources as well as the scalability and reliability
• A basic mechanism enabling multi-tenancy in the cloud
is virtualization
• It creates a virtual version of, for example, an operating
system, a storage device, or network resources, within a
single physical system
• It also introduces several security concerns
Conclusion
• Cloud security has become a key priority
• In this paper authors presented
o an overview of security issues and concerns in cloud and
o their impact on the confidentiality, integrity, and availability
and
o describe current solutions and possible challenges and
directions
Thank You

More Related Content

PDF
G0314043
PDF
International journal of computer science and innovation vol 2015-n2-paper4
PDF
Secure Multi Authority Data Access Control System in Cloud Computing
PPTX
Security in cloud computing
PDF
PDF
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
PPS
CloudSecurity
PPTX
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
G0314043
International journal of computer science and innovation vol 2015-n2-paper4
Secure Multi Authority Data Access Control System in Cloud Computing
Security in cloud computing
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
CloudSecurity
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]

What's hot (18)

PPTX
Cloud Security Mechanisms
PDF
A Study of Data Storage Security Issues in Cloud Computing
PDF
1784 1788
PDF
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
PPT
Attaining data security in cloud computing
DOC
Security threats in cloud computing
PDF
Cloud Auditing
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
Cloud Computing Using Encryption and Intrusion Detection
PDF
Lecture26 cc-security1
PDF
A survey on cloud security issues and techniques
PPT
Unit 3 -Data storage and cloud computing
PDF
A robust and verifiable threshold multi authority access control system in pu...
PDF
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
PPTX
multiple encryption in clouud computing
PDF
SecRBAC: Secure data in the Clouds
PDF
Analysis of classical encryption techniques in cloud computing
PDF
Encryption based multi user manner secured data sharing and storing in cloud
Cloud Security Mechanisms
A Study of Data Storage Security Issues in Cloud Computing
1784 1788
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
Attaining data security in cloud computing
Security threats in cloud computing
Cloud Auditing
Secure Data Sharing In an Untrusted Cloud
Cloud Computing Using Encryption and Intrusion Detection
Lecture26 cc-security1
A survey on cloud security issues and techniques
Unit 3 -Data storage and cloud computing
A robust and verifiable threshold multi authority access control system in pu...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
multiple encryption in clouud computing
SecRBAC: Secure data in the Clouds
Analysis of classical encryption techniques in cloud computing
Encryption based multi user manner secured data sharing and storing in cloud
Ad

Viewers also liked (6)

PPTX
Cloud Security Issues 1.04.10
PPTX
Security Issues in Cloud Computing
PPT
Cloud computing-security-issues
PPT
Security issues in cloud
PPT
Cloud Computing Security Issues
PPTX
Cloud computing security issues and challenges
Cloud Security Issues 1.04.10
Security Issues in Cloud Computing
Cloud computing-security-issues
Security issues in cloud
Cloud Computing Security Issues
Cloud computing security issues and challenges
Ad

Similar to Cloud security issues and concerns (20)

PPTX
PPTX
Transforming cloud security into an advantage
PDF
Cloud Security
PPTX
Guide to security patterns for cloud systems and data security in aws and azure
PPT
security Issues of cloud computing
PDF
Cloud Security
PPTX
Data_Security_inrefef_CloudComputing.pptx
PPT
Cloud Security.ppt
PPT
Security Issues of Cloud Computing
PPTX
chapitre1-cloud security basics-23 (1).pptx
PPTX
Security issues in cloud database
PPTX
Cloud Computing Security
PPTX
Unit -3.pptx cloud Security unit -3 notes
PPTX
Cloud Security_Module_1_Module_2_3_4.pptx
PDF
Software Defined Networking in the ATMOSPHERE project
PPT
cloud-complete.ppt
PPTX
Security in Cloud Computing
PPT
Cloud computing final show
PPT
cloud-complete.ppt
PPT
Cloud complete
Transforming cloud security into an advantage
Cloud Security
Guide to security patterns for cloud systems and data security in aws and azure
security Issues of cloud computing
Cloud Security
Data_Security_inrefef_CloudComputing.pptx
Cloud Security.ppt
Security Issues of Cloud Computing
chapitre1-cloud security basics-23 (1).pptx
Security issues in cloud database
Cloud Computing Security
Unit -3.pptx cloud Security unit -3 notes
Cloud Security_Module_1_Module_2_3_4.pptx
Software Defined Networking in the ATMOSPHERE project
cloud-complete.ppt
Security in Cloud Computing
Cloud computing final show
cloud-complete.ppt
Cloud complete

Recently uploaded (20)

PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
DOCX
Unit-3 cyber security network security of internet system
PPTX
Introduction to Information and Communication Technology
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
innovation process that make everything different.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPT
tcp ip networks nd ip layering assotred slides
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
The Internet -By the Numbers, Sri Lanka Edition
PptxGenJS_Demo_Chart_20250317130215833.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Unit-3 cyber security network security of internet system
Introduction to Information and Communication Technology
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Design_with_Watersergyerge45hrbgre4top (1).ppt
SASE Traffic Flow - ZTNA Connector-1.pdf
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
innovation process that make everything different.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
international classification of diseases ICD-10 review PPT.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
tcp ip networks nd ip layering assotred slides
Job_Card_System_Styled_lorem_ipsum_.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...

Cloud security issues and concerns

  • 1. Cloud Security: Issues and Concerns - P. Samarati, S. De Capitani di Vimercati, in Encyclopedia on Cloud Computing, S. Murugesan, I. Bojanova (eds.), Wiley, 2016 SNHCC Program, IIS, Academia Sinica, Taiwan
  • 2. Prepared By Mrinal Kanti Baowaly TIGP PhD Fellow
  • 3. Presentation Outline • Summary • Introduction • Confidentiality, Integrity, and Availability in the Cloud • Issues and Challenges • Conclusion
  • 4. Summary • The cloud has emerged as a successful computing paradigm • Cloud allows user to rely on external providers for storing and processing data • But an important priority is to have enforcing and assessing security guarantees. • This paper presents  main security issues and concerns arising in the cloud scenario w.r.t storage, management, and processing of data
  • 5. Introduction • With significant benefits of scalability and elasticity, the cloud paradigm has appealed companies as well as individuals • Loss of control of the owners, and consequent security threats can limit the adoption and acceptance of the cloud computing • ENISA lists loss of control and governance as top risks of cloud computing • CSA lists data breaches and data loss as two of the top nine threats in cloud computing
  • 6. Deployment & Service Models of Cloud Computing • Deployment Models of Cloud Computing o Private Cloud o Public Cloud o Community Cloud o Hybrid Cloud • Service Models of Cloud Computing o Infrastructure as a Service (IaaS) e.g. storage, network, servers, virtual machine o Platform as a Service (PaaS) e.g. OS, web servers, development tools o Software as a Service (SaaS) e.g. Different application software: CRM, Email, Word Processing, Games
  • 7. This Chapter Highlights.. • The security and privacy issues to be addressed and the challenges involved can vary in different deployment and service models • In this chapter the authors highlights security issues and its variations in the different models • This chapter is organized by two main sections: 1. how the classical confidentiality, integrity, and availability properties translate in the cloud 2. presents an overview of the security issues and concerns to be addressed to ensure confidentiality, integrity, and availability
  • 8. Confidentiality, Integrity, and Availability in the Cloud • Security problems can be classified with the classical CIA paradigm o confidentiality o integrity and o availability
  • 9. Confidentiality in the Cloud • It requires guaranteeing proper protection to confidential or sensitive data stored or processed in the cloud • This can relate to: o data externally stored o identity/properties of the users accessing the data or o the actions that users perform over the data
  • 10. Integrity in the Cloud • Integrity requires guaranteeing the authenticity of: o the parties (users and providers) interacting in the cloud o the data stored at external providers and o the response returned from queries and computations
  • 11. Availability in the Cloud • Availability requires providing the ability to: o define and verify that providers satisfy requirements expressed in Service Level Agreements (SLAs) established between data owners/users and providers
  • 12. Some aspects that affect the security issues… • The issues to be tackled, the challenges to be addressed, and the specific guarantees to be provided for ensuring satisfaction of the security properties (CIA) depend on the characteristics of the different scenarios: o Simple Scenario o Complex Scenario • Trust assumptions & potential threats on the providers: o fully trusted, curious, lazy, or malicious Data Security Lifecycle
  • 13. Summary of Cloud Security Issues • It clear that there is not a one-size-fits-all solution
  • 14. I. Protection of data at rest • Guarantee protection (i.e. confidentiality, integrity, and availability of data)  The first basic problem, need to be addressed • Data confidentiality needs to be guaranteed even to the provider's eyes. What are the solutions?
  • 15. I. Protection of data at rest (Cont..) (a) “Honest-but-curious” (b) “Two can keep a secret” Encryption Fragmentation BoxCryptor
  • 16. I. Protection of data at rest (Cont..) (c) “Multiple-unlinkable-fragments” (d) “Keep a few” No Encryption
  • 17. II. Fine-grained access to data in the cloud • When confidentiality is ensured with encryption, providers cannot decrypt data for query execution • Fine-grained access, typically query execution, needs to be supported Two lines of approaches for providing fine-grained access
  • 18. II. Fine-grained access to data in the cloud(Cont..) First Approach: • Performing queries directly on the encrypted data • This is made by specific cryptographic techniques o e.g. homomorphic encryption, CryptDB • The main drawbacks: o applicable typically for keyword searches or very basic operations o limited kinds of accesses and the computational complexity of the execution o not applicable in many real life scenarios
  • 19. II. Fine-grained access to data in the cloud(Cont..) Second Approach: • Attaching some metadata(indexes) to the encrypted data • These indexes are then used for fine-grained information retrieval and query execution o e.g. relational table in database • Different kinds of indexes have been investigated o direct indexing (one-to-one correspondence between plaintext and index values) o bucket- or hash-based indexing (many-to-one correspondence between plaintext and index values) o and flat indexing (one-to-many correspondence between plaintext and index values)
  • 20. II. Fine-grained access to data in the cloud(Cont..)
  • 21. III. Selective access to data in the cloud • Access to data is selective at times: different users or groups should enjoy different views and access • How to enforce access control on data in the cloud is crucial • The enforcement of such access control policy is however delegated to the cloud provider but sometimes it doesn’t possible ‘coz of confidentiality • Also, outsourcing of access control needs complete trust to providers • But, having the data owner mediate every access request to ensure only authorized accesses is clearly impractical and inapplicable
  • 22. III. Selective access to data in the cloud (cont..) • Combining access control and encryption, encrypt data with different keys, depending on the authorizations holding on them
  • 23. III. Selective access to data in the cloud (cont..) • Over Encryption: having the providers apply a further level of encryption
  • 24. IV. User Privacy • Support Privacy of users accessing data and performing computations • In cloud, it might be need to grant access to data to users not registered in the system without their identity • Access control authorizations and enforcement should be based on properties of users o typically provided by means of attributes within digitally signed certificates • Several proposals have investigated different issues to be addressed in this context • language, access control engine, possible dialog and negotiation to be supported between providers and users
  • 25. V. Query Privacy • Support Privacy of users’ actions in the cloud • In some scenarios what is confidential is not (or not only) data, or users’ identities/properties, but also the accesses that users make on such data. • In particular, confidentiality should be guaranteed, even from the provider’s eyes w.r.t the fact that: o an access aims at a specific data (access confidentiality) or the fact that two accesses aim at the same data (pattern confidentiality) • Traditional approaches for protecting access and pattern confidentiality are based on Private Information Retrieval (PIR) techniques
  • 26. VI. Query and Computation Integrity • Enable assessment of correctness, completeness, and freshness of queries and computations • In scenarios where queries/computations are performed by providers that are not fully trustworthy • The problem arises of providing data owners and/or users with the ability to assess that the result returned from a query/computation is correct, complete, and fresh • Current solutions can be roughly classified in two categories: deterministic and probabilistic
  • 27. VII. Collaborative query execution with multiple providers • Enable controlled data sharing for collaborative queries and computations involving multiple providers • Data stored and managed by different cloud providers may need to be selectively shared and accessed in a cooperative way • This scenario may see the presence of different providers as well as of different data owners • Exchange of data and collaborative computations should be controlled to ensure that information is not improperly accessed, released, or leaked • Solutions: distributed query computation
  • 28. VIII. SLA and Auditing • Specification and assessment of security requirements to be satisfied by providers • A Service Level Agreement (SLA) is a contractual agreement • It specifies the performance and availability guarantees that a cloud provider promises to deliver as well as penalties in the case of violations of the SLA. • for example, whether cloud providers are correctly storing data or correctly executing computation- intensive tasks on behalf of the users
  • 29. IX. Multi-tenancy and virtualization • Provide confinement of different users data and activities in the shared cloud environment • Multi-tenancy refers to the ability to provide computing services to different users by using a common cloud infrastructure • It can reduce the costs and improving the utilization of resources as well as the scalability and reliability • A basic mechanism enabling multi-tenancy in the cloud is virtualization • It creates a virtual version of, for example, an operating system, a storage device, or network resources, within a single physical system • It also introduces several security concerns
  • 30. Conclusion • Cloud security has become a key priority • In this paper authors presented o an overview of security issues and concerns in cloud and o their impact on the confidentiality, integrity, and availability and o describe current solutions and possible challenges and directions