Broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing
Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.
Cloud computing and storage provide users with capabilities to store and process their data in third-party data centers.[1] Organizations use the cloud in a variety of different service models (with acronyms such as SaaS, PaaS, and IaaS) and deployment models (private, public, hybrid, and community).[2]
Security concerns associated with cloud computing are typically categorized in two ways: as security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers (companies or organizations who host applications or store data on the cloud).[3] The responsibility is shared, however, and is often detailed in a cloud provider's "shared security responsibility model" or "shared responsibility model."[4][5][6] The provider must ensure that their infrastructure is secure and that their clients data and applications are protected, while the user must take measures to fortify their application and use strong passwords and authentication measures.[5][6]
When an organization elects to store data or host applications on the public cloud, it loses its ability to have physical access to the servers hosting its information. As a result, potentially sensitive data is at risk from insider attacks. According to a 2010 Cloud Security Alliance report, insider attacks are one of the top seven biggest threats in cloud computing.[7] Therefore, cloud service providers must ensure that thorough background checks are conducted for employees who have physical access to the servers in the data center. Additionally, data centers are recommended to be frequently monitored for suspicious activity.
In order to conserve resources, cut costs, and maintain efficiency, cloud service providers often store more than one customer's data on the same server. As a result, there is a chance that one user's private data can be viewed by other users (possibly even competitors). To handle such sensitive situations, cloud service providers should ensure proper data isolation and logical storage segregation.[2]
The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud service.[8] Virtualization alters the relationship between the OS and underlying hardware be it computing, storage or even networking. This introduces an additional layer virtualization that itself must be properly configured, managed and secured.[9] Specific concerns include the potential to compromise the virtualization software, or "hypervisor". While these concerns are largely theoretical, they do exist.[10] For example, a breach in the administrator workstation with the management software of the virtualization software can cause the whole datacenter to go down or be reconfigured to an attacker's liking.
Cloud security architecture is effective only if the correct defensive implementations are in place. An efficient cloud security architecture should recognize the issues that will arise with security management.[11] The security management addresses these issues with security controls. These controls are put in place to safeguard any weaknesses in the system and reduce the effect of an attack. While there are many types of controls behind a cloud security architecture, they can usually be found in one of the following categories:[11]
It is generally recommended that information security controls be selected and implemented according and in proportion to the risks, typically by assessing the threats, vulnerabilities and impacts. Cloud security concerns can be grouped in various ways; Gartner named seven[12] while the Cloud Security Alliance identified twelve areas of concern.[13] Cloud access security brokers (CASBs) are software that sits between cloud users and cloud applications to provide visibility into cloud application usage, data protection and governance to monitor all activity and enforce security policies.[14]
Scanning the cloud from outside and inside using free or commercial products is crucial because without a hardened environment your service is considered a soft target. Virtual servers should be hardened just like a physical server against data leakage, malware, and exploited vulnerabilities. "Data loss or leakage represents 24.6% and cloud related malware 3.4% of threats causing cloud outages[16]
Scanning and penetration testing from inside or outside the cloud must be authorized by the cloud provider. Since the cloud is a shared environment with other customers or tenants, following penetration testing rules of engagement step-by-step is a mandatory requirement. Violation of acceptable use policies can lead to termination of the service.[17]
There are numerous security threats associated with cloud data services. This includes traditional threats and non-traditional threats. Traditional threats include: network eavesdropping, illegal invasion, and denial of service attacks, but also specific cloud computing threats, such as side channel attacks, virtualization vulnerabilities, and abuse of cloud services. The following security requirements limit the threats.[18]
Data confidentiality is the property that data contents are not made available or disclosed to illegal users. Outsourced data is stored in a cloud and out of the owners' direct control. Only authorized users can access the sensitive data while others, including CSPs, should not gain any information of the data. Meanwhile, data owners expect to fully utilize cloud data services, e.g., data search, data computation, and data sharing, without the leakage of the data contents to CSPs or other adversaries.
Access controllability means that a data owner can perform the selective restriction of access to their data outsourced to the cloud. Legal users can be authorized by the owner to access the data, while others can not access it without permissions. Further, it is desirable to enforce fine-grained access control to the outsourced data, i.e., different users should be granted different access privileges with regard to different data pieces. The access authorization must be controlled only by the owner in untrusted cloud environments.
Data integrity demands maintaining and assuring the accuracy and completeness of data. A data owner always expects that her or his data in a cloud can be stored correctly and trustworthily. It means that the data should not be illegally tampered, improperly modified, deliberately deleted, or maliciously fabricated. If any undesirable operations corrupt or delete the data, the owner should be able to detect the corruption or loss. Further, when a portion of the outsourced data is corrupted or lost, it can still be retrieved by the data users.
Some advanced encryption algorithms which have been applied into cloud computing increase the protection of privacy. In a practice called crypto-shredding, the keys can simply be deleted when there is no more use of the data.
Attribute-based encryption is a type of public-key encryption in which the secret key of a user and the ciphertext are dependent upon attributes (e.g. the country in which he lives, or the kind of subscription he has). In such a system, the decryption of a ciphertext is possible only if the set of attributes of the user key matches the attributes of the ciphertext.
In the CP-ABE, the encryptor controls access strategy. The main research work of CP-ABE is focused on the design of the access structure.[19]
In the KP-ABE, attribute sets are used to describe the encrypted texts and the private keys are associated to specified policy that users will have.[20][21][22]
Fully homomorphic encryption allows computations on encrypted data, and also allows computing sum and product for the encrypted data without decryption.[23]
Searchable encryption is a cryptographic system which offer secure search functions over encrypted data.[24][25] SE schemes can be classified into two categories: SE based on secret-key (or symmetric-key) cryptography,and SE based on public-key cryptography. In order to improve search efficiency, symmetric-key SE generally builds keyword indexes to answer user queries. This has the obvious disadvantage of providing multimodal access routes for unauthorized data retrieval, bypassing the encryption algorithm by subjecting the framework to alternative parameters within the shared cloud environment.[26]
Numerous laws and regulations pertain to the storage and use of data. In the US these include privacy or data protection laws, Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Sarbanes-Oxley Act, the Federal Information Security Management Act of 2002 (FISMA), and Children's Online Privacy Protection Act of 1998, among others. Similar standards exist in other jurisdictions, eg Singapore's Multi-Tier Cloud Security Standard.
Similar laws may apply in different legal jurisdictions and may differ quite markedly from those enforced in the US. Cloud service users may often need to be aware of the legal and regulatory differences between the jurisdictions. For example, data stored by a cloud service provider may be located in, say, Singapore and mirrored in the US.[27]
Many of these regulations mandate particular controls (such as strong access controls and audit trails) and require regular reporting. Cloud customers must ensure that their cloud providers adequately fulfill such requirements as appropriate, enabling them to comply with their obligations since, to a large extent, they remain accountable.
Aside from the security and compliance issues enumerated above, cloud providers and their customers will negotiate terms around liability (stipulating how incidents involving data loss or compromise will be resolved, for example), intellectual property, and end-of-service (when data and applications are ultimately returned to the customer). In addition, there are considerations for acquiring data from the cloud that may be involved in litigation.[30] These issues are discussed in service-level agreements (SLA).
Legal issues may also include records-keeping requirements in the public sector, where many agencies are required by law to retain and make available electronic records in a specific fashion. This may be determined by legislation, or law may require agencies to conform to the rules and practices set by a records-keeping agency. Public agencies using cloud computing and storage must take these concerns into account.
See the original post:
Cloud computing security - Wikipedia
- How Do You Define Cloud Computing? - Data Center Knowledge [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- RCom arm in tie-up for cloud computing - Moneycontrol.com [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Roundup Of Cloud Computing Forecasts, 2017 - Forbes [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Cloud Computing Continues to Influence HPC - insideHPC [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- 5 Cloud Computing Stocks to Buy - TheStreet.com [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Adobe bets big on cloud computing for marketing, creative professionals - Livemint [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Red Hat's New Products Centered Around Cloud Computing, Containers - Virtualization Review [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Verizon sells cloud services to IBM in 'unique cooperation between ... - Cloud Tech [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Hospital CIOs see benefits of healthcare cloud computing - TechTarget [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- How Cloud Computing Is Turning the Tide on Heart Attacks - Fortune [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- What is Cloud Computing Technology?: Cloud Definition ... [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Daily Report: Cloud Computing Asserts Itself - New York Times [Last Updated On: May 4th, 2017] [Originally Added On: May 4th, 2017]
- Verizon sells cloud services to IBM in 'unique cooperation between two tech leaders' - Cloud Tech [Last Updated On: May 4th, 2017] [Originally Added On: May 4th, 2017]
- CIOs embrace the value of cloud computing in healthcare - TechTarget [Last Updated On: May 4th, 2017] [Originally Added On: May 4th, 2017]
- Heptio's Joe Beda: Before embracing cloud computing, make sure your culture is ready - GeekWire [Last Updated On: May 4th, 2017] [Originally Added On: May 4th, 2017]
- CLOUD COMPUTING Cisco Expands Cloud IoT Services with $610M Viptela Acquisition - CIO Today [Last Updated On: May 6th, 2017] [Originally Added On: May 6th, 2017]
- A prepaid wallet that helps start-ups access cloud-computing services - The Hindu [Last Updated On: May 6th, 2017] [Originally Added On: May 6th, 2017]
- Google: No to Price War Over Cloud Computing - Investopedia [Last Updated On: May 6th, 2017] [Originally Added On: May 6th, 2017]
- 3 things to know about the cloud v. data center decision - ZDNet [Last Updated On: May 8th, 2017] [Originally Added On: May 8th, 2017]
- OpenStack Foundation cites 'capabilities, compliance and cost' as Summit kicks off - Cloud Tech [Last Updated On: May 9th, 2017] [Originally Added On: May 9th, 2017]
- Profit From Cloud Computing Boom With This ETF - Seeking Alpha [Last Updated On: May 9th, 2017] [Originally Added On: May 9th, 2017]
- Autonomous Driving Market Focuses on Artificial Intelligence and ... - PR Newswire (press release) [Last Updated On: May 9th, 2017] [Originally Added On: May 9th, 2017]
- The cloud computing tidal wave - BetaNews [Last Updated On: May 9th, 2017] [Originally Added On: May 9th, 2017]
- Aruba predicts a hybrid future for edge and cloud computing - The Internet of Business (blog) [Last Updated On: May 9th, 2017] [Originally Added On: May 9th, 2017]
- China Says Draft Rules on Cloud Computing Have Been Misunderstood - Wall Street Journal (subscription) [Last Updated On: May 9th, 2017] [Originally Added On: May 9th, 2017]
- Oracle launches cloud computing service for India | Business Line - Hindu Business Line [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- Microsoft is on the edge: Windows, Office? Naah. Let's talk about cloud, AI - The Register [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- IBM touts its cloud platform as quickest for AI with benchmark tests - Cloud Tech [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- Enterprise-owned data centres still 'essential' despite cloud growth, research notes - Cloud Tech [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- You really should know what the Andrew File System is - Network World [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- Microsoft launches Android app to manage its Azure cloud computing platform - Android Police [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- 3 Cloud Computing Stocks To Buy Right Now - May 10, 2017 ... - Zacks.com [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- Virtustream Adds Enterprise Cloud to Global Dell EMC Partner Program - Cloud Computing Intelligence (registration) (blog) [Last Updated On: May 13th, 2017] [Originally Added On: May 13th, 2017]
- Trump signs cybersecurity executive order, mandating a move to cloud computing - GeekWire [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- Cloud Computing, Term of Art Complete Preakness Works - BloodHorse.com (press release) (registration) (blog) [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- IBM Announces The Defense Calculator And A Cloud Computing Service - Forbes [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- Achieving compliance in the cloud - CSO Online [Last Updated On: May 17th, 2017] [Originally Added On: May 17th, 2017]
- Boston schools CIO Mark Racine takes hybrid approach to cloud computing - EdScoop News (press release) (registration) (blog) [Last Updated On: May 17th, 2017] [Originally Added On: May 17th, 2017]
- Benefit-risk 'tipping point' for cloud computing now passed, says ... - Out-Law.com [Last Updated On: May 17th, 2017] [Originally Added On: May 17th, 2017]
- Cloud Computing puts in work for Preakness before deluge - Daily Racing Form [Last Updated On: May 17th, 2017] [Originally Added On: May 17th, 2017]
- How telecom is shifting its strategy to support cloud computing - SiliconANGLE (blog) [Last Updated On: May 17th, 2017] [Originally Added On: May 17th, 2017]
- Cloud computing - Simple English Wikipedia, the free encyclopedia [Last Updated On: May 17th, 2017] [Originally Added On: May 17th, 2017]
- How Alphabet Views the Cloud Computing Price Wars - Market Realist [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Keying Longshot Cloud Computing in the Preakness - America's Best Racing [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Microsoft Extends Cloud-Computing Arms Race to Africa - Fox Business [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Firms Face Decelerating Cloud Spending: Analyst - Investopedia [Last Updated On: May 20th, 2017] [Originally Added On: May 20th, 2017]
- Is edge computing set to blow away the cloud? - Cloud Tech [Last Updated On: May 20th, 2017] [Originally Added On: May 20th, 2017]
- Microsoft Extends Cloud-Computing Arms Race to Africa - Wall Street Journal (subscription) [Last Updated On: May 20th, 2017] [Originally Added On: May 20th, 2017]
- Rested and ready: 13-1 shot Cloud Computing wins Preakness - Fairfield Daily Republic [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Watch Cloud Computing's thrilling come-from-behind finish at the Preakness Stakes - For The Win [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Cloud Computing wins the 142nd Preakness Stakes in front of a record crowd [Photos] - Baltimore Business Journal [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- 13-1 shot Cloud Computing edges Classic Empire, springs upset in Preakness - News3LV [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Cloud Computing Wins Preakness Stakes, and Techies Are Stoked - Fortune [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Cloud Computing wins Preakness Stakes, dashing Always ... [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Cloud computing, Galeria Inno and change at Deka - Delano.lu [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Roundup Of Cloud Computing Forecasts, 2017 - Enterprise Irregulars (blog) [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Cloud Computing Does Not Need Help From Washington - Cramer's ... - Seeking Alpha [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- CTOvision Assessment on The Megatrend of Cloud Computing - CTOvision (blog) [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Cloud Computing's Trainer Wins One for His Mentor at Preakness - New York Times [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Make sense of edge computing vs. cloud computing | InfoWorld - InfoWorld [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Cloud Computing Takes the Preakness - RFD-TV [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Cloud Computing takes Preakness - CNN.com [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Make Sense of Edge Computing vs. Cloud Computing - Linux.com (blog) [Last Updated On: May 26th, 2017] [Originally Added On: May 26th, 2017]
- How will cloud computing and analytics affect Citrix shops? - TechTarget [Last Updated On: May 26th, 2017] [Originally Added On: May 26th, 2017]
- Red Hat to acquire cloud computing firm - Triangle Business Journal [Last Updated On: May 26th, 2017] [Originally Added On: May 26th, 2017]
- Cloud computing streamlines oil field monitoring - Williston Daily Herald [Last Updated On: May 26th, 2017] [Originally Added On: May 26th, 2017]
- Fans should appreciate Cloud Computing's Preakness win - ESPN [Last Updated On: May 26th, 2017] [Originally Added On: May 26th, 2017]
- Cray Takes the Plunge into Cloud Computing - TOP500 News [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Baidu to leverage cloud computing, artificial intelligence, in effort to ramp up behavioural analysis - South China Morning Post [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Cloud computing will change the nature of hospital IT shops - Healthcare IT News [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Microsoft's weapon in high-stakes cloud-computing battle with Amazon? Freebies - The Seattle Times [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Amazon Shares Hit $1000, Showing Dominance of E-Commerce, Cloud - The VAR Guy [Last Updated On: May 30th, 2017] [Originally Added On: May 30th, 2017]
- Oracle set to expand cloud reach with Tencent alliance - South China Morning Post [Last Updated On: May 30th, 2017] [Originally Added On: May 30th, 2017]
- Cloud Computing to Skip Belmont as Field Comes into Focus - America's Best Racing [Last Updated On: May 30th, 2017] [Originally Added On: May 30th, 2017]
- Movers: Amazon's Stock Price Hits $1000 - New York Times [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Mary Meeker: Healthcare technology is booming thanks to cloud computing and wearables - SiliconANGLE (blog) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Will Amazon's Web Services Business Get Hurt by Cloud Computing Commodification? - HuffPost [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Box CEO Aaron Levie: Artificial intelligence to revolutionize cloud computing - MarketWatch [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Cloud computing takes off as top new discipline on campus - Education Dive [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- CIOs and factors overlooked when changing your cloud - Cloud Tech [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]