SlideShare a Scribd company logo
A SURVEY ON THE SECURITY OF CLOUD COMPUTING
Intensive Study ofAttacks and Possible Threats at Different Layers of Cloud Computing
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 1
For Contact:
Lubna.henaki@gmail.com
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 2
Outlines
 Introduction
 Cloud Computing Overview
 Security in Cloud
 Threats on Cloud Computing Environment and their Countermeasures.
 Attacks on Cloud Computing Environment and their Countermeasures.
 Conclusion
Introduction to Cloud Computing
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 3
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 4
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Introduction
 Cloud Computing technology has been broadly utilized in many fields.
 Cloud Computing add more convenience at several levels.
 Cloud Computing security is an essential subdomain of computer security
 The fact that cloud computing services are based on Internet connection
makes them vulnerable to a variety of attacks and security threats.
 Security of the provided services makes a primary concern to both the
cloud users and the service providers.
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 5
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Percentage of Cloud Workloads (Today versus 2020)
Percentage of Cloud Workloads (Today versus 2020)
LogicMonitor SurveyResults:
 The enterprises workloads moving to
the cloud will increase to 83% by 2020.
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 6
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Major Cloud Challenges in 2018
Cloud Challenges (RightScale Statistics)
Overview on Cloud Computing
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 7
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 8
Cloud Computing (NIST) Definition
 Cloud Computing is defined by NIST (National Institute of
Standards and Technology) as:
“A model for enabling ubiquitous, convenient, on-demand network
access to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal management effort or
service provider interaction.”
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 9
Cloud Computing Characteristics
 On-demand self-service: any user can comfortably obtain any computing
capabilities, without actually the need for human assistance.
 Broad network access: cloud capabilities and resources that are broadly
accessible over the network.
 Resource pooling: Computing resources are exhibiting a multi-tenant
model, it serves plenty of consumers.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 10
Cloud Computing Characteristics Cont.
 Rapid elasticity: Cloud Computing capabilities can be efficiently
provided in any quantity at any time.
 Measured service: Resources are continuously monitored and
controlled by cloud systems, which allows the services to be optimized
later at different levels.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 11
Architecture of Cloud Computing
1. Software-as-a-service (SaaS): This service allows the
customers to utilize applications that are hosted in the
cloud server and delivered to them over the internet.
2. Platform-as-a-service (PaaS): This layer allows developers
to efficiently write and develop applications like SaaS. It
makes an economic option for developers.
3. Infrastructure-as-a-service (IaaS): Provides fundamental
infrastructure to the above layers. it provides services like
networking hardware, servers, operating systems, storage
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Cloud Service Models
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 12
Deployment Model of Cloud Computing
1. Public Cloud
Hardware and software resources are
publicly shared among different users.
2. Private Cloud
all the clouds systems and services are
only accessible within the boundary of
that organization
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 13
Deployment Model of Cloud Computing
3. Hybrid Cloud
Hybrid cloud is a combination of two or
more clouds that have different types
4. Community Cloud
Cloud services are usually intended for
specific individuals or organizations who
share the same Cloud requirements.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 14
Advantages of Cloud Computing
 Cost efficiency
Enterprises and organizations need not to worry about the
expenses of software or hardware and all related maintenance.
 High Speed
acquiring the desired services quickly, without the need for long
time waits for service deployment.
 Back-up and restore data
Saving data from being lost.
 Accessibility
Resources accessible anywhere, all the time.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 15
Disadvantages of Cloud Computing
 Security issues: Confidentiality of information might get
violated when an unauthorized access to the cloud resources
occur due to multiple causes like hacking.
 Limited Control: sometimes the services do not match the
requirements and it is not possible for the users of Public
Clouds or similar to control the hardware or the software.
 Low bandwidth: Low bandwidth affects the accessibility to
Cloud resources.
Security on Cloud Computing
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 16
Cloud Computing Security Requirements
8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 17
SecurityRequirements
Confidentiality
Integrity
Availability
Accountability
• The main objective of the CC system is to reduce the cost of
the hardware and provides services for each client needs.
• The CC system challenges scalability for both infrastructure
and data platform.
• In CC there is four main security requirements to ensure
privacy and serve a secure cloud services, then will be
illustrate each of them.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Confidentiality
 Confidentiality concerns to the blocking of unauthorized exposure of the user information of
the CC service
 Many approaches to protecting user sensitive data in the cloud based on encryption and data
segmentation which restrict the confidentiality violation
 Provider should guarantee confidential entrance to the data by ensuring the trusted data
sharing or use authorized entrance to the data.
8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 18
 focus on authentication to use the cloud resources by having username and password for each user.
 data segment will reduce the amount of user sensitive data disclosure.
 A cover channel is also extra confidentiality issue, cause information leak by the unauthorized
transmission path.
1. Service level agreement (SLA)
2. Combine the Clouds system with a trustworthy computing
3. 3D technique
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Integrity
 Since many users own the ability to change, update and add new data to the clouds, the access
should be controlled to achieve and ensure the data integrity.
 To defeat this huge challenge many approach would work:
8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 19
1. The virtualization based dynamic integrity
2. cloud-based governance design
3. using the SLA agreement
4. Trusted computing method
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Availability
 Availability meaning the ability to utilize the system as expected therefore one of the
significant advantages of the clouds system is the data availability.
Availability can be ensured for the client through: terms of a contract, and huge capacity with
great architecture supported by the provider.
 Grantees the availability in clouds' by using many approach's:
8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 20
 enhance the availability by the internet authorized entree.
1. The OVMP mechanism
2. Partitioned computing.
3. Collection of small-clouds
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Accountability
 Accountability is the technique of verifying the clients' various activities behind the data
clouds.
 The achievement of accountability happens by recognizing information of each client requires
to be logged at various places of the information clouds.
Evidence transaction for each activity is created once the activity starts processing.
8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 21
 provide equipment for collecting transactions
 The transaction is used during the examination to the aptness of the activities evaluation.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Classification of Cloud Security Issues
 Cloud Computing contains many categories in its environment and each of these categories
have many security concerns .
 The security issue discussed in a wide area of clouds:
8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 22
 Hardware.
 Software
 Communication.
1. Embedded Security
2. Application
3. Client Management
4. Cloud Data Storage
5. Clustering Computing
6. Operating System Based
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Embedded Security
 Clouds main security issues in the embedded system created by the using of virtualizations.
 The virtual machine would imply a real security thread when a problem with deployment
occurred.
 Virtualizations have the advantages of the strength of isolation.
 Data leakage could rise by the implementation of separated virtual machine workload.
 The virtual machine monitoring from the host computer works as a controlling point.
8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 23
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Application
 The most sensitive vulnerable area of any system is the software application.
A huge number of lines of the software code cause primary security concerns.
With the several application programmers and coding languages rises a lot of vulnerabilities.
The front end of software could allow a high possibility of an authorized access and insufficient
configuration.
8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 24
 Injection attacked to gain the advantages of the software backend weakness from the development
to the testing
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Client Management
Clint management is simply protecting the information of the public could verse
the information of the client system.
 User-owned few experiences on cloud security field will face a struggle when
choosing which cloud provider.
Part of cloud service is the ability to access cloud service from many locations
thru many devices
Some security problems like unintentionally stops security events auditing by
the provider cause to ignore the response alert of an important vendor.
8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 25
 the providers must ensure legitimate user access.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Cloud Data Storage
 The most significant components of CC are the data storage of the clouds.
 Data warehouse deployment needs for a high-security requirement, which reflect the quality
of cloud service.
Cloud storage could get malware injected by an attacker to take control over the Cloud storage.
8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 26
 Multi-tier architect that carries the balanced running on
many servers helps to prevent DDoS.
 A technique called Inference which attacks the database
system .
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Clustering Computing
 A computer cluster is an idea of utilizes multiple computers, VMs, and servers that connected
together and runs as a single system.
Cloud computing uses the idea of clustering for parallel processing in industries.
Clustering in CC could be a:
8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 27
 cause security challenges with the increase in user number in each cluster.
1.Physical
2.Virtual cluster
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Operating System Based
 Many security issues rise within CC system because of many VMs, many servers in the different
network and multiple operating systems work together.
The security issue for such a service is the limited default installation setting, unpatched
machines
8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 28
1. Desktop operating system virtualization.
2. Remote desktop virtualization.
3. Network operating system virtualization.
4. Smartphones operating system .
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Threats on Cloud Computing Environment and
Countermeasures
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 29
Threats on Cloud Computing Environment
Data loss.
Data breaches.
Insecure Interfaces and APIs.
Malicious Insiders.
Account, service and traffic hijacking.
 Shared technology vulnerabilities.
Abuse of Cloud services.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 30
Data Loss
 Losing the data can be occurred from various reasons.
 Data can be lost due to applying operations by-mistake of deletion or alteration.
 Natural causes are also considered, e.g. earthquakes, fires etc.
 Sidekick smart phones suffered from this threat.
In Cloud Computing, this threat affects the IaaS, PaaS, SaaS Cloud services.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 31
Data Loss
Organizations should apply the following mitigation techniques to be
protected against this type of threats:
 Provide data storage and backup mechanisms.
 Using proper encryption techniques.
Legally indicating supplier support and maintenance techniques.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 32
Data Loss causes
44%
32%
32%
7% 3%
Hardware Software Human Viruuses Natural causes
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 33
Data Breaches
 Data breach is the leakage of critical information to unauthorized parties, so that those
malicious people would have access to the network and its sensitive data.
 It occurs due to many causes such as incorrect authentication and authorization mechanisms,
reviewing controls, undependable use of encryption keys and operating system failure.
 Unfortunately, although data leakage is a critical threat to Cloud Computing, the solutions to
mitigate it can cause other threats to be raised.
 Sony PlayStation Network suffered from this threat.
In Cloud Computing, this threat affects the IaaS, PaaS, SaaS Cloud services.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 34
Data Breaches
Organizations should apply the following mitigation techniques to be
protected against this type of threats:
Analyze data at both design and runtime for protection.
 Employing strong encryption key generation, storage, and management.
 Indicating Cloud provider and ensuring the safety of their files and communications.
 Implementing strong Application Programming Interfaces (API).
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 35
Insecure Interfaces and APIs
 API refers to Application Programming Interfaces, which are used by the Cloud users to
communicate properly with the Cloud services. Cloud providers usually publish a number of
APIs that permit the Cloud users to develop their own interfaces for communication.
 The security and availability of the Cloud services are reliant on the security of these APIs.
From the early stages of authentication and access control, to the encryption and monitoring
processes, these interfaces need to be designed to defend against both unintentional and
malicious attempts to attack.
 Password reset message is an example of this threat.
In Cloud Computing, this threat affects the IaaS, PaaS, SaaS Cloud services.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 36
Insecure Interfaces and APIs
Organizations should apply the following mitigation techniques to be
protected against this type of threats:
 Strong authentication and access control methods.
 Encryption of the transmitted data.
 Analysis of the Cloud provider interfaces and using a proper security model for these interfaces.
 Detailed understanding of the dependency chain related to APIs.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 37
Malicious Insiders
 The malicious insider threat raised from trusted people within the Cloud organization who
have authorized access to the organization assets and items of value.
 These people can apply unprivileged operations to cause harm to the organization’s assets.
 The harm can be financial, technical failure or resources losing by applying what seems to be
legal activities e.g. developing malicious firewalls.
 It is a well-known fact that most security threats arise from the inside of an organization.
In Cloud Computing, this threat affects the IaaS, PaaS, SaaS Cloud services.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 38
Malicious Insiders
Insider threats are the highest price threats and they are hard to be
detected and deal with due to the following reasons:
 Malicious Insider threats can be hidden for a long time.
 It is tough to distinguish harmful actions from normal work.
 It is easy for employees to cover their actions.
 It is hard to prove guilt.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 39
Malicious Insiders
Organizations should apply the following mitigation techniques to be
protected against this type of threats:
 Apply human resource management as part of a legal agreement.
 A compliance reporting system will help determine the security breach notification so that,
appropriate action may be taken against a person who has committed a fraud.
 Non-disclosure of the employees’ privileges and how they are monitored.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 40
Account, Service and Traffic Hijacking
 Account or service hijacking happens if an attacker gains the login information of some
account, which made the hacked account a launching base for the attacker.
 In Cloud account hijacking, a malicious intruder can use the stolen credentials to hijack the
Cloud services and then they can enter on other’s transactions, add incorrect information and
divert users to illegal websites causing legal issues for Cloud service providers.
 Amazon suffered from this threat.
In Cloud Computing, this threat affects the IaaS, PaaS, SaaS Cloud services.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 41
Organizations should apply the following mitigation techniques to be
protected against this type of threats:
 Appropriate understanding of security policies and service level agreement.
 Using a strong multi-factor authentication will form extra security check for the identification of
users.
 Strict and continuous monitoring to detect unauthorized activities.
 Prevent sharing credentials among customers and services.
Account, Service and Traffic Hijacking
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 42
 This threat raises from the fact of the shared environment of Cloud.
 Cloud services are provided by sharing the cloud infrastructure, applications and platforms.
Underlying components (IaaS), re-arranged platforms (PaaS) or applications of several
customers (SaaS) are all exposed to vulnerabilities that will spread the threat of shared
technology vulnerabilities in all delivery models.
 As a result, compromising any piece of shared technology exposes not just the customer
involved, it also exposes the whole environment to a possible harm.
In Cloud Computing, this threat affects the IaaS, PaaS, SaaS Cloud services.
Shared Technology Vulnerabilities
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 43
Shared Technology Vulnerabilities
Organizations should apply the following mitigation techniques to be
protected against this type of threats:
 Apply good authentication and access control methods.
 Monitor the Cloud environment for unauthorized activities.
 Use of Service-Level Agreement (SLA) to cover the weaknesses scanning process and solutions.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 44
Abuse of Cloud Services
 The Cloud has the great benefit of allowing even small organizations or individuals to use large
and huge services.
 This solves the issue of purchasing expensive components for non-capable sectors by renting
these expensive services from the Cloud as they needed.
 However, this benefit can be used for malicious reasons.
In Cloud Computing, this threat affects the IaaS, PaaS Cloud services.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 45
Abuse of Cloud Services
Organizations should apply the following mitigation techniques to be
protected against this type of threats:
 Strong authorization and authentication mechanisms.
 Continuous examination of the network traffic.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 46
Challenges of Threat Remediation
Threat Challenges
Data loss and Data breaches  Trust issue with the Cloud providers.
 Absence of knowledge.
Insecure Interfaces and APIs  Incapability to review events associated with API use.
 The APIs complexity.
Malicious insiders  Providers hide their company strategies of employing staffs.
 Lateness of solutions, in which they developed after the incident happens.
 Incapability of monitoring the employees by the Cloud providers.
Account, Service and Traffic Hijacking  Current way of digital identity management isn’t good enough for hybrid Clouds.
Shared Technology Vulnerabilities  Development of shared components are not guaranteed.
 Mapping between the manufacturing process and allotment process of shared
components.
Abuse of Cloud Services  Cloud providers limited ability of monitoring due to privacy laws.
 Different interests of stakeholders.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 47
Attacks on Cloud Computing Environment and
Countermeasures
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 48
Attacks in a Cloud Computing Environment and Countermeasures
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 49
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Attacks in a Cloud Computing Environment and Countermeasures
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 50
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Denial of Service (DoS) Attacks
 Attacker sends a superfluous request and make the server down and overloaded.
 Distributed DoS attack (DDoS) which is extended from DoS attacks that attacker use numerous
network hosts to inflict more devastating effects to its victim.
 European Network and Information Security Agency (ENISA) reported that Dropbox was attacked
by DDoS attacks and suffered a substantial loss of service for more than 15 hours affecting all
users.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 518/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Countermeasures of Denial of Service Attacks
 Reduce the privileges of the user that connected to a server.
 Using the filter-based approach.
 Using the signature-based approach.
 Using Intrusion Detection System (IDS)/Intrusion Prevention System (IPS).
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 528/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Attacks in a Cloud Computing Environment and Countermeasures
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 53
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Authentication Attacks
 The attackers target the mechanism and methods used by the user to
authenticate the system.
 The mechanism used for authentication is captured and attackers tries to
access the confidential information.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 548/14/2019
Password:
94Gah4562834
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Countermeasures of Authentication Attacks
 Using strong password policies.
 Using a better authentication mechanism.
 Using advanced authentication attacks such as One-Time Password (OTP).
 Encrypt communication channels to secure authentication tokens.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 558/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Attacks in a Cloud Computing Environment and Countermeasures
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 56
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Structured Query Language (SQL) Injection Attacks
 SQL attack is used to steal user information from the web application by inserting malicious
code to inject into the web application as a user input.
 According to the Open Web Application Security Project (OWASP) which lists the SQL injection
attack as the top 10 most critical web application security risks.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 578/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Countermeasures of SQL Injection Attacks
A proper validation of input data can mitigate SQL Injection attack.
Access Control permission on the database must be strictly defined.
Avoid using dynamically generated SQL into the code.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 588/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Attacks in a Cloud Computing Environment and Countermeasures
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 59
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Cross Site Scripting (XSS) Attacks
The attacker inserts malicious code like Hypertext Markup Language (HTML)
and JavaScript into a dynamic web application in the form of browser-side
script in order to gather important information from different user's machine
in the shared environment.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 608/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Countermeasures of Cross Site Scripting Attacks
Using anti malware software.
Proper Secure Socket Layer (SSL) configuration.
Using of Browser Collaboration.
Using of Active Content Filtering.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 618/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Attacks in a Cloud Computing Environment and Countermeasures
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 62
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Phishing Attacks
 Hacker creates the same script as like the trusted cloud site to steal passwords and email from you.
 Phishing attack applied by making the same page like cloud site page then registered a domain that is
similar to your cloud provides like www.droppbox.com, then retrieve your personal information.
 200 million of users in Facebook are targeted by the phishing attack.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 638/14/2019
Lubna
Hi Lubna,
We just need to verify your email address before you sign up
Is complete!
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Countermeasures of Phishing Attacks
Using secure web link Hypertext Transfer Protocol Secure(HTTPS).
Identifying the spam emails.
Don’t click on short Uniform Resource Locator (URL).
Don’t click when someone force you to click.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 648/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Attacks in a Cloud Computing Environment and Countermeasures
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 65
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Port Scanning Attacks
 The attacker use open ports that belong to a connection to gain exact
information about the working environment and running application
processes.
The attacker can seize information with the help of open ports like services
that run on a system, IP and Medium Access Control (MAC) addresses.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 668/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Countermeasures of Port Scanning Attacks
 Close all unused ports.
 Remove all unnecessary services.
 Filter out all unnecessary traffic.
 Firewall.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 678/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Attacks in a Cloud Computing Environment and Countermeasures
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 68
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Man in the Middle (MITM) Attacks
An attacker splits connection and rejoins with the attackers own computer
system.
Man in the Middle Attacks happens if secure socket layer is not properly
configured.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 698/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Countermeasures of Man in the Middle Attacks
Using encryption and decryption algorithm.
Required a proper Secure Socket Layer architecture.
Using Intrusion Detection system.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 708/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Attacks in a Cloud Computing Environment and Countermeasures
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 71
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Metadata Spoofing Attacks
 Web Services Description Language (WSDL) stored the descriptions about service functionality
and details.
The attacker manipulates / re-engineers the metadata content of a web service so that the web
service's intended operation is replaced by another operation.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 728/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Countermeasures of Metadata Spoofing Attacks
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 738/14/2019
 Encrypted information about service functionality and other details.
 Strong authentication should be required to access the file.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Attacks in a Cloud Computing Environment and Countermeasures
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 74
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Side Channel Attacks
 It occurs when an attacker places a malicious Virtual Machine (VM) on the same physical
machine as the victim machine so that he can access all the confidential information on the
victim's machine.
 Placement and extraction are the main steps of side channel attacks.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 758/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Countermeasures of Side Channel Attacks
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 768/14/2019
Using virtual firewall.
Using encryption and decryption.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Attacks in a Cloud Computing Environment and Countermeasures
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 77
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Virtual Machines Rollback Attacks
 The attacker takes advantage of VM from an old snapshot and run it without the user’s
awareness.
The attacker can get the password for VM through launches a brute-force attack.
This attack can prevent by using suspend and resume.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 788/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Attacks in a Cloud Computing Environment and Countermeasures
8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 79
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Virtual Machines Escape Attacks
 The attacker’s program running in a VM breaks the isolation layer.
 This allows an attacker to interact directly with the hypervisor.
 Therefore, VM Escape from the isolation is provided by the virtual layer.
 As results, an attacker gets access to the host OS and the other VMs running on the physical
machine.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 808/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Countermeasures of Virtual Machines Escape Attacks
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 818/14/2019
 Using of secure hypervisor.
 Configuring the host/guest interactions.
 Monitor hypervisor activities.
 VM Isolation is required.
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 828/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Conclusion
Conclusion
 Cloud Computing has witnessed significant advances and become widely adopted in different
areas.
 Security poses a major challenge to its widespread adoption.
 We reviewed the significant attacks threatening the security of Cloud Computing.
 Solutions and countermeasures are pointed out to serve as a reference for comparative analysis.
 Understanding the various Cloud security issues and the means possible to overcome them.
 Similar studies helps to mitigating the risk associated with the adoption of Cloud Computing
technology.
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 838/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
Thank You! … Any Questions?
A SURVEY ON THE SECURITY OF CLOUD COMPUTING 848/14/2019
Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion

More Related Content

PPTX
Hybrid Cloud and Its Implementation
PPTX
Cloud computing
PPTX
Cloud computing
PPTX
Presentation on samba server
PPTX
Content Delivery Network
PPT
Virtualization in cloud computing ppt
PPTX
Cloud Computing
PDF
VMware NSX 101: What, Why & How
Hybrid Cloud and Its Implementation
Cloud computing
Cloud computing
Presentation on samba server
Content Delivery Network
Virtualization in cloud computing ppt
Cloud Computing
VMware NSX 101: What, Why & How

What's hot (20)

PDF
La virtualisation de_serveurs
PPTX
What is Virtualization
PPS
Cloud Computing
PPT
Cloud computing
PDF
Cloud Security - Security Aspects of Cloud Computing
PPSX
Classless subnetting
PPTX
Windows Server 2019.pptx
PPT
Cloud Computing - Benefits and Challenges
PDF
An Introduction to VMware NSX
PPTX
Optimal load balancing in cloud computing
PPTX
AWS solution Architect Associate study material
PPTX
Security in Cloud Computing
PPTX
Vitualisation
PPTX
Cloud Computing Principles and Paradigms: 2 migration into a cloud
PDF
삼성전자 5G Core CNF를 위한 클라우드 여정 이야기 - 최우형 AWS 솔루션즈 아키텍트 / 구동영 프로, 삼성전자 :: AWS Su...
PPTX
Cloud security ppt
PPTX
Presentation on Databases in the Cloud
PDF
A Seminar on Cloud Computing
PPTX
Network virtualization
La virtualisation de_serveurs
What is Virtualization
Cloud Computing
Cloud computing
Cloud Security - Security Aspects of Cloud Computing
Classless subnetting
Windows Server 2019.pptx
Cloud Computing - Benefits and Challenges
An Introduction to VMware NSX
Optimal load balancing in cloud computing
AWS solution Architect Associate study material
Security in Cloud Computing
Vitualisation
Cloud Computing Principles and Paradigms: 2 migration into a cloud
삼성전자 5G Core CNF를 위한 클라우드 여정 이야기 - 최우형 AWS 솔루션즈 아키텍트 / 구동영 프로, 삼성전자 :: AWS Su...
Cloud security ppt
Presentation on Databases in the Cloud
A Seminar on Cloud Computing
Network virtualization
Ad

Similar to Security of Cloud Computing Survey (20)

PPTX
A survey on the security of cloud computing
PDF
Slide 01 - Cloud Computing Introduction (1).pdf
PDF
Review on Security Techniques using Cloud Computing
PDF
A brief review: security issues in cloud computing and their solutions
PPTX
Cloud Computing_presentation.pptx
PDF
The Security and Privacy Threats to Cloud Computing
PDF
Cloud data security and various cryptographic algorithms
PDF
A Survey on Cloud Computing Security – Challenges and Trust Issues
PDF
A220113
PDF
G033030035
PDF
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
PDF
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
PDF
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
PPTX
Presentation cloud computing
PDF
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
PDF
Solutions of cloud computing security issues
DOCX
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
PDF
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
PDF
Security policy enforcement in cloud infrastructure
PPT
Chapter 1 Introduction To Cloud Computing_Part 1.ppt
A survey on the security of cloud computing
Slide 01 - Cloud Computing Introduction (1).pdf
Review on Security Techniques using Cloud Computing
A brief review: security issues in cloud computing and their solutions
Cloud Computing_presentation.pptx
The Security and Privacy Threats to Cloud Computing
Cloud data security and various cryptographic algorithms
A Survey on Cloud Computing Security – Challenges and Trust Issues
A220113
G033030035
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
Presentation cloud computing
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Solutions of cloud computing security issues
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
Security policy enforcement in cloud infrastructure
Chapter 1 Introduction To Cloud Computing_Part 1.ppt
Ad

Recently uploaded (20)

PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
master seminar digital applications in india
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Lesson notes of climatology university.
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Cell Types and Its function , kingdom of life
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Classroom Observation Tools for Teachers
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
2.FourierTransform-ShortQuestionswithAnswers.pdf
master seminar digital applications in india
Microbial disease of the cardiovascular and lymphatic systems
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Microbial diseases, their pathogenesis and prophylaxis
Lesson notes of climatology university.
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
human mycosis Human fungal infections are called human mycosis..pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Weekly quiz Compilation Jan -July 25.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Cell Types and Its function , kingdom of life
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Classroom Observation Tools for Teachers
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE

Security of Cloud Computing Survey

  • 1. A SURVEY ON THE SECURITY OF CLOUD COMPUTING Intensive Study ofAttacks and Possible Threats at Different Layers of Cloud Computing 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 1 For Contact: Lubna.henaki@gmail.com
  • 2. 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 2 Outlines  Introduction  Cloud Computing Overview  Security in Cloud  Threats on Cloud Computing Environment and their Countermeasures.  Attacks on Cloud Computing Environment and their Countermeasures.  Conclusion
  • 3. Introduction to Cloud Computing Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 3
  • 4. 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 4 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion Introduction  Cloud Computing technology has been broadly utilized in many fields.  Cloud Computing add more convenience at several levels.  Cloud Computing security is an essential subdomain of computer security  The fact that cloud computing services are based on Internet connection makes them vulnerable to a variety of attacks and security threats.  Security of the provided services makes a primary concern to both the cloud users and the service providers.
  • 5. 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 5 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion Percentage of Cloud Workloads (Today versus 2020) Percentage of Cloud Workloads (Today versus 2020) LogicMonitor SurveyResults:  The enterprises workloads moving to the cloud will increase to 83% by 2020.
  • 6. 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 6 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion Major Cloud Challenges in 2018 Cloud Challenges (RightScale Statistics)
  • 7. Overview on Cloud Computing Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 7
  • 8. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 8 Cloud Computing (NIST) Definition  Cloud Computing is defined by NIST (National Institute of Standards and Technology) as: “A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
  • 9. 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 9 Cloud Computing Characteristics  On-demand self-service: any user can comfortably obtain any computing capabilities, without actually the need for human assistance.  Broad network access: cloud capabilities and resources that are broadly accessible over the network.  Resource pooling: Computing resources are exhibiting a multi-tenant model, it serves plenty of consumers. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 10. 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 10 Cloud Computing Characteristics Cont.  Rapid elasticity: Cloud Computing capabilities can be efficiently provided in any quantity at any time.  Measured service: Resources are continuously monitored and controlled by cloud systems, which allows the services to be optimized later at different levels. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 11. 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 11 Architecture of Cloud Computing 1. Software-as-a-service (SaaS): This service allows the customers to utilize applications that are hosted in the cloud server and delivered to them over the internet. 2. Platform-as-a-service (PaaS): This layer allows developers to efficiently write and develop applications like SaaS. It makes an economic option for developers. 3. Infrastructure-as-a-service (IaaS): Provides fundamental infrastructure to the above layers. it provides services like networking hardware, servers, operating systems, storage Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion Cloud Service Models
  • 12. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 12 Deployment Model of Cloud Computing 1. Public Cloud Hardware and software resources are publicly shared among different users. 2. Private Cloud all the clouds systems and services are only accessible within the boundary of that organization
  • 13. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 13 Deployment Model of Cloud Computing 3. Hybrid Cloud Hybrid cloud is a combination of two or more clouds that have different types 4. Community Cloud Cloud services are usually intended for specific individuals or organizations who share the same Cloud requirements.
  • 14. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 14 Advantages of Cloud Computing  Cost efficiency Enterprises and organizations need not to worry about the expenses of software or hardware and all related maintenance.  High Speed acquiring the desired services quickly, without the need for long time waits for service deployment.  Back-up and restore data Saving data from being lost.  Accessibility Resources accessible anywhere, all the time.
  • 15. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 15 Disadvantages of Cloud Computing  Security issues: Confidentiality of information might get violated when an unauthorized access to the cloud resources occur due to multiple causes like hacking.  Limited Control: sometimes the services do not match the requirements and it is not possible for the users of Public Clouds or similar to control the hardware or the software.  Low bandwidth: Low bandwidth affects the accessibility to Cloud resources.
  • 16. Security on Cloud Computing Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 16
  • 17. Cloud Computing Security Requirements 8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 17 SecurityRequirements Confidentiality Integrity Availability Accountability • The main objective of the CC system is to reduce the cost of the hardware and provides services for each client needs. • The CC system challenges scalability for both infrastructure and data platform. • In CC there is four main security requirements to ensure privacy and serve a secure cloud services, then will be illustrate each of them. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 18. Confidentiality  Confidentiality concerns to the blocking of unauthorized exposure of the user information of the CC service  Many approaches to protecting user sensitive data in the cloud based on encryption and data segmentation which restrict the confidentiality violation  Provider should guarantee confidential entrance to the data by ensuring the trusted data sharing or use authorized entrance to the data. 8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 18  focus on authentication to use the cloud resources by having username and password for each user.  data segment will reduce the amount of user sensitive data disclosure.  A cover channel is also extra confidentiality issue, cause information leak by the unauthorized transmission path. 1. Service level agreement (SLA) 2. Combine the Clouds system with a trustworthy computing 3. 3D technique Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 19. Integrity  Since many users own the ability to change, update and add new data to the clouds, the access should be controlled to achieve and ensure the data integrity.  To defeat this huge challenge many approach would work: 8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 19 1. The virtualization based dynamic integrity 2. cloud-based governance design 3. using the SLA agreement 4. Trusted computing method Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 20. Availability  Availability meaning the ability to utilize the system as expected therefore one of the significant advantages of the clouds system is the data availability. Availability can be ensured for the client through: terms of a contract, and huge capacity with great architecture supported by the provider.  Grantees the availability in clouds' by using many approach's: 8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 20  enhance the availability by the internet authorized entree. 1. The OVMP mechanism 2. Partitioned computing. 3. Collection of small-clouds Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 21. Accountability  Accountability is the technique of verifying the clients' various activities behind the data clouds.  The achievement of accountability happens by recognizing information of each client requires to be logged at various places of the information clouds. Evidence transaction for each activity is created once the activity starts processing. 8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 21  provide equipment for collecting transactions  The transaction is used during the examination to the aptness of the activities evaluation. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 22. Classification of Cloud Security Issues  Cloud Computing contains many categories in its environment and each of these categories have many security concerns .  The security issue discussed in a wide area of clouds: 8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 22  Hardware.  Software  Communication. 1. Embedded Security 2. Application 3. Client Management 4. Cloud Data Storage 5. Clustering Computing 6. Operating System Based Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 23. Embedded Security  Clouds main security issues in the embedded system created by the using of virtualizations.  The virtual machine would imply a real security thread when a problem with deployment occurred.  Virtualizations have the advantages of the strength of isolation.  Data leakage could rise by the implementation of separated virtual machine workload.  The virtual machine monitoring from the host computer works as a controlling point. 8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 23 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 24. Application  The most sensitive vulnerable area of any system is the software application. A huge number of lines of the software code cause primary security concerns. With the several application programmers and coding languages rises a lot of vulnerabilities. The front end of software could allow a high possibility of an authorized access and insufficient configuration. 8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 24  Injection attacked to gain the advantages of the software backend weakness from the development to the testing Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 25. Client Management Clint management is simply protecting the information of the public could verse the information of the client system.  User-owned few experiences on cloud security field will face a struggle when choosing which cloud provider. Part of cloud service is the ability to access cloud service from many locations thru many devices Some security problems like unintentionally stops security events auditing by the provider cause to ignore the response alert of an important vendor. 8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 25  the providers must ensure legitimate user access. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 26. Cloud Data Storage  The most significant components of CC are the data storage of the clouds.  Data warehouse deployment needs for a high-security requirement, which reflect the quality of cloud service. Cloud storage could get malware injected by an attacker to take control over the Cloud storage. 8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 26  Multi-tier architect that carries the balanced running on many servers helps to prevent DDoS.  A technique called Inference which attacks the database system . Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 27. Clustering Computing  A computer cluster is an idea of utilizes multiple computers, VMs, and servers that connected together and runs as a single system. Cloud computing uses the idea of clustering for parallel processing in industries. Clustering in CC could be a: 8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 27  cause security challenges with the increase in user number in each cluster. 1.Physical 2.Virtual cluster Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 28. Operating System Based  Many security issues rise within CC system because of many VMs, many servers in the different network and multiple operating systems work together. The security issue for such a service is the limited default installation setting, unpatched machines 8/14/2019 A REVIEW OF CURRENT RESEARCH ON THE PRIVACY PARADOX PHENOMENON 28 1. Desktop operating system virtualization. 2. Remote desktop virtualization. 3. Network operating system virtualization. 4. Smartphones operating system . Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 29. Threats on Cloud Computing Environment and Countermeasures Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 29
  • 30. Threats on Cloud Computing Environment Data loss. Data breaches. Insecure Interfaces and APIs. Malicious Insiders. Account, service and traffic hijacking.  Shared technology vulnerabilities. Abuse of Cloud services. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 30
  • 31. Data Loss  Losing the data can be occurred from various reasons.  Data can be lost due to applying operations by-mistake of deletion or alteration.  Natural causes are also considered, e.g. earthquakes, fires etc.  Sidekick smart phones suffered from this threat. In Cloud Computing, this threat affects the IaaS, PaaS, SaaS Cloud services. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 31
  • 32. Data Loss Organizations should apply the following mitigation techniques to be protected against this type of threats:  Provide data storage and backup mechanisms.  Using proper encryption techniques. Legally indicating supplier support and maintenance techniques. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 32
  • 33. Data Loss causes 44% 32% 32% 7% 3% Hardware Software Human Viruuses Natural causes Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 33
  • 34. Data Breaches  Data breach is the leakage of critical information to unauthorized parties, so that those malicious people would have access to the network and its sensitive data.  It occurs due to many causes such as incorrect authentication and authorization mechanisms, reviewing controls, undependable use of encryption keys and operating system failure.  Unfortunately, although data leakage is a critical threat to Cloud Computing, the solutions to mitigate it can cause other threats to be raised.  Sony PlayStation Network suffered from this threat. In Cloud Computing, this threat affects the IaaS, PaaS, SaaS Cloud services. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 34
  • 35. Data Breaches Organizations should apply the following mitigation techniques to be protected against this type of threats: Analyze data at both design and runtime for protection.  Employing strong encryption key generation, storage, and management.  Indicating Cloud provider and ensuring the safety of their files and communications.  Implementing strong Application Programming Interfaces (API). Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 35
  • 36. Insecure Interfaces and APIs  API refers to Application Programming Interfaces, which are used by the Cloud users to communicate properly with the Cloud services. Cloud providers usually publish a number of APIs that permit the Cloud users to develop their own interfaces for communication.  The security and availability of the Cloud services are reliant on the security of these APIs. From the early stages of authentication and access control, to the encryption and monitoring processes, these interfaces need to be designed to defend against both unintentional and malicious attempts to attack.  Password reset message is an example of this threat. In Cloud Computing, this threat affects the IaaS, PaaS, SaaS Cloud services. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 36
  • 37. Insecure Interfaces and APIs Organizations should apply the following mitigation techniques to be protected against this type of threats:  Strong authentication and access control methods.  Encryption of the transmitted data.  Analysis of the Cloud provider interfaces and using a proper security model for these interfaces.  Detailed understanding of the dependency chain related to APIs. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 37
  • 38. Malicious Insiders  The malicious insider threat raised from trusted people within the Cloud organization who have authorized access to the organization assets and items of value.  These people can apply unprivileged operations to cause harm to the organization’s assets.  The harm can be financial, technical failure or resources losing by applying what seems to be legal activities e.g. developing malicious firewalls.  It is a well-known fact that most security threats arise from the inside of an organization. In Cloud Computing, this threat affects the IaaS, PaaS, SaaS Cloud services. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 38
  • 39. Malicious Insiders Insider threats are the highest price threats and they are hard to be detected and deal with due to the following reasons:  Malicious Insider threats can be hidden for a long time.  It is tough to distinguish harmful actions from normal work.  It is easy for employees to cover their actions.  It is hard to prove guilt. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 39
  • 40. Malicious Insiders Organizations should apply the following mitigation techniques to be protected against this type of threats:  Apply human resource management as part of a legal agreement.  A compliance reporting system will help determine the security breach notification so that, appropriate action may be taken against a person who has committed a fraud.  Non-disclosure of the employees’ privileges and how they are monitored. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 40
  • 41. Account, Service and Traffic Hijacking  Account or service hijacking happens if an attacker gains the login information of some account, which made the hacked account a launching base for the attacker.  In Cloud account hijacking, a malicious intruder can use the stolen credentials to hijack the Cloud services and then they can enter on other’s transactions, add incorrect information and divert users to illegal websites causing legal issues for Cloud service providers.  Amazon suffered from this threat. In Cloud Computing, this threat affects the IaaS, PaaS, SaaS Cloud services. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 41
  • 42. Organizations should apply the following mitigation techniques to be protected against this type of threats:  Appropriate understanding of security policies and service level agreement.  Using a strong multi-factor authentication will form extra security check for the identification of users.  Strict and continuous monitoring to detect unauthorized activities.  Prevent sharing credentials among customers and services. Account, Service and Traffic Hijacking Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 42
  • 43.  This threat raises from the fact of the shared environment of Cloud.  Cloud services are provided by sharing the cloud infrastructure, applications and platforms. Underlying components (IaaS), re-arranged platforms (PaaS) or applications of several customers (SaaS) are all exposed to vulnerabilities that will spread the threat of shared technology vulnerabilities in all delivery models.  As a result, compromising any piece of shared technology exposes not just the customer involved, it also exposes the whole environment to a possible harm. In Cloud Computing, this threat affects the IaaS, PaaS, SaaS Cloud services. Shared Technology Vulnerabilities Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 43
  • 44. Shared Technology Vulnerabilities Organizations should apply the following mitigation techniques to be protected against this type of threats:  Apply good authentication and access control methods.  Monitor the Cloud environment for unauthorized activities.  Use of Service-Level Agreement (SLA) to cover the weaknesses scanning process and solutions. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 44
  • 45. Abuse of Cloud Services  The Cloud has the great benefit of allowing even small organizations or individuals to use large and huge services.  This solves the issue of purchasing expensive components for non-capable sectors by renting these expensive services from the Cloud as they needed.  However, this benefit can be used for malicious reasons. In Cloud Computing, this threat affects the IaaS, PaaS Cloud services. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 45
  • 46. Abuse of Cloud Services Organizations should apply the following mitigation techniques to be protected against this type of threats:  Strong authorization and authentication mechanisms.  Continuous examination of the network traffic. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 46
  • 47. Challenges of Threat Remediation Threat Challenges Data loss and Data breaches  Trust issue with the Cloud providers.  Absence of knowledge. Insecure Interfaces and APIs  Incapability to review events associated with API use.  The APIs complexity. Malicious insiders  Providers hide their company strategies of employing staffs.  Lateness of solutions, in which they developed after the incident happens.  Incapability of monitoring the employees by the Cloud providers. Account, Service and Traffic Hijacking  Current way of digital identity management isn’t good enough for hybrid Clouds. Shared Technology Vulnerabilities  Development of shared components are not guaranteed.  Mapping between the manufacturing process and allotment process of shared components. Abuse of Cloud Services  Cloud providers limited ability of monitoring due to privacy laws.  Different interests of stakeholders. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 47
  • 48. Attacks on Cloud Computing Environment and Countermeasures Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 48
  • 49. Attacks in a Cloud Computing Environment and Countermeasures 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 49 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 50. Attacks in a Cloud Computing Environment and Countermeasures 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 50 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 51. Denial of Service (DoS) Attacks  Attacker sends a superfluous request and make the server down and overloaded.  Distributed DoS attack (DDoS) which is extended from DoS attacks that attacker use numerous network hosts to inflict more devastating effects to its victim.  European Network and Information Security Agency (ENISA) reported that Dropbox was attacked by DDoS attacks and suffered a substantial loss of service for more than 15 hours affecting all users. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 518/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 52. Countermeasures of Denial of Service Attacks  Reduce the privileges of the user that connected to a server.  Using the filter-based approach.  Using the signature-based approach.  Using Intrusion Detection System (IDS)/Intrusion Prevention System (IPS). A SURVEY ON THE SECURITY OF CLOUD COMPUTING 528/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 53. Attacks in a Cloud Computing Environment and Countermeasures 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 53 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 54. Authentication Attacks  The attackers target the mechanism and methods used by the user to authenticate the system.  The mechanism used for authentication is captured and attackers tries to access the confidential information. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 548/14/2019 Password: 94Gah4562834 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 55. Countermeasures of Authentication Attacks  Using strong password policies.  Using a better authentication mechanism.  Using advanced authentication attacks such as One-Time Password (OTP).  Encrypt communication channels to secure authentication tokens. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 558/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 56. Attacks in a Cloud Computing Environment and Countermeasures 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 56 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 57. Structured Query Language (SQL) Injection Attacks  SQL attack is used to steal user information from the web application by inserting malicious code to inject into the web application as a user input.  According to the Open Web Application Security Project (OWASP) which lists the SQL injection attack as the top 10 most critical web application security risks. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 578/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 58. Countermeasures of SQL Injection Attacks A proper validation of input data can mitigate SQL Injection attack. Access Control permission on the database must be strictly defined. Avoid using dynamically generated SQL into the code. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 588/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 59. Attacks in a Cloud Computing Environment and Countermeasures 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 59 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 60. Cross Site Scripting (XSS) Attacks The attacker inserts malicious code like Hypertext Markup Language (HTML) and JavaScript into a dynamic web application in the form of browser-side script in order to gather important information from different user's machine in the shared environment. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 608/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 61. Countermeasures of Cross Site Scripting Attacks Using anti malware software. Proper Secure Socket Layer (SSL) configuration. Using of Browser Collaboration. Using of Active Content Filtering. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 618/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 62. Attacks in a Cloud Computing Environment and Countermeasures 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 62 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 63. Phishing Attacks  Hacker creates the same script as like the trusted cloud site to steal passwords and email from you.  Phishing attack applied by making the same page like cloud site page then registered a domain that is similar to your cloud provides like www.droppbox.com, then retrieve your personal information.  200 million of users in Facebook are targeted by the phishing attack. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 638/14/2019 Lubna Hi Lubna, We just need to verify your email address before you sign up Is complete! Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 64. Countermeasures of Phishing Attacks Using secure web link Hypertext Transfer Protocol Secure(HTTPS). Identifying the spam emails. Don’t click on short Uniform Resource Locator (URL). Don’t click when someone force you to click. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 648/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 65. Attacks in a Cloud Computing Environment and Countermeasures 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 65 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 66. Port Scanning Attacks  The attacker use open ports that belong to a connection to gain exact information about the working environment and running application processes. The attacker can seize information with the help of open ports like services that run on a system, IP and Medium Access Control (MAC) addresses. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 668/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 67. Countermeasures of Port Scanning Attacks  Close all unused ports.  Remove all unnecessary services.  Filter out all unnecessary traffic.  Firewall. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 678/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 68. Attacks in a Cloud Computing Environment and Countermeasures 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 68 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 69. Man in the Middle (MITM) Attacks An attacker splits connection and rejoins with the attackers own computer system. Man in the Middle Attacks happens if secure socket layer is not properly configured. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 698/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 70. Countermeasures of Man in the Middle Attacks Using encryption and decryption algorithm. Required a proper Secure Socket Layer architecture. Using Intrusion Detection system. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 708/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 71. Attacks in a Cloud Computing Environment and Countermeasures 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 71 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 72. Metadata Spoofing Attacks  Web Services Description Language (WSDL) stored the descriptions about service functionality and details. The attacker manipulates / re-engineers the metadata content of a web service so that the web service's intended operation is replaced by another operation. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 728/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 73. Countermeasures of Metadata Spoofing Attacks A SURVEY ON THE SECURITY OF CLOUD COMPUTING 738/14/2019  Encrypted information about service functionality and other details.  Strong authentication should be required to access the file. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 74. Attacks in a Cloud Computing Environment and Countermeasures 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 74 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 75. Side Channel Attacks  It occurs when an attacker places a malicious Virtual Machine (VM) on the same physical machine as the victim machine so that he can access all the confidential information on the victim's machine.  Placement and extraction are the main steps of side channel attacks. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 758/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 76. Countermeasures of Side Channel Attacks A SURVEY ON THE SECURITY OF CLOUD COMPUTING 768/14/2019 Using virtual firewall. Using encryption and decryption. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 77. Attacks in a Cloud Computing Environment and Countermeasures 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 77 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 78. Virtual Machines Rollback Attacks  The attacker takes advantage of VM from an old snapshot and run it without the user’s awareness. The attacker can get the password for VM through launches a brute-force attack. This attack can prevent by using suspend and resume. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 788/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 79. Attacks in a Cloud Computing Environment and Countermeasures 8/14/2019 A SURVEY ON THE SECURITY OF CLOUD COMPUTING 79 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 80. Virtual Machines Escape Attacks  The attacker’s program running in a VM breaks the isolation layer.  This allows an attacker to interact directly with the hypervisor.  Therefore, VM Escape from the isolation is provided by the virtual layer.  As results, an attacker gets access to the host OS and the other VMs running on the physical machine. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 808/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 81. Countermeasures of Virtual Machines Escape Attacks A SURVEY ON THE SECURITY OF CLOUD COMPUTING 818/14/2019  Using of secure hypervisor.  Configuring the host/guest interactions.  Monitor hypervisor activities.  VM Isolation is required. Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 82. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 828/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion Conclusion
  • 83. Conclusion  Cloud Computing has witnessed significant advances and become widely adopted in different areas.  Security poses a major challenge to its widespread adoption.  We reviewed the significant attacks threatening the security of Cloud Computing.  Solutions and countermeasures are pointed out to serve as a reference for comparative analysis.  Understanding the various Cloud security issues and the means possible to overcome them.  Similar studies helps to mitigating the risk associated with the adoption of Cloud Computing technology. A SURVEY ON THE SECURITY OF CLOUD COMPUTING 838/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion
  • 84. Thank You! … Any Questions? A SURVEY ON THE SECURITY OF CLOUD COMPUTING 848/14/2019 Introduction Overview on CC CC Security CC Threats CC Attacks Conclusion