Secure the Cloud

Author:

Roy Arpan1,Sarkar Santonu2,Ganesan Rajeshwari3,Goel Geetika4

Affiliation:

1. Infosys Labs, Dependability Center of Excellence, Infosys Ltd., Electronic City, Bangalore 560100, India

2. Dept. of Computer Science and Information Systems, BITS Pilani K.K. Birla Goa Campus, Goa India

3. Edgeverve Systems Limited, Systems Engineering Group, Electronic City, Bangalore 560100, India

4. Jigsaw Academy, Bangalore 560038, India

Abstract

In response to the revival of virtualized technology by Rosenblum and Garfinkel [2005], NIST defined cloud computing, a new paradigm in service computing infrastructures. In cloud environments, the basic security mechanism is ingrained in virtualization—that is, the execution of instructions at different privilege levels. Despite its obvious benefits, the caveat is that a crashed virtual machine (VM) is much harder to recover than a crashed workstation. When crashed, a VM is nothing but a giant corrupt binary file and quite unrecoverable by standard disk-based forensics. Therefore, VM crashes should be avoided at all costs. Security is one of the major contributors to such VM crashes. This includes compromising the hypervisor, cloud storage, images of VMs used infrequently, and remote cloud client used by the customer as well as threat from malicious insiders. Although using secure infrastructures such as private clouds alleviate several of these security problems, most cloud users end up using cheaper options such as third-party infrastructures (i.e., private clouds), thus a thorough discussion of all known security issues is pertinent. Hence, in this article, we discuss ongoing research in cloud security in order of the attack scenarios exploited most often in the cloud environment. We explore attack scenarios that call for securing the hypervisor, exploiting co-residency of VMs, VM image management, mitigating insider threats, securing storage in clouds, abusing lightweight software-as-a-service clients, and protecting data propagation in clouds. Wearing a practitioner's glasses, we explore the relevance of each attack scenario to a service company like Infosys. At the same time, we draw parallels between cloud security research and implementation of security solutions in the form of enterprise security suites for the cloud. We discuss the state of practice in the form of enterprise security suites that include cryptographic solutions, access control policies in the cloud, new techniques for attack detection, and security quality assurance in clouds.

Funder

Infosys Limited, India

Publisher

Association for Computing Machinery (ACM)

Subject

General Computer Science,Theoretical Computer Science

Cited by 13 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Attendance as a Service: A multi-layered system design in attendance applications for Covid-19;Celal Bayar Üniversitesi Fen Bilimleri Dergisi;2022-07-04

2. Cloud computing security taxonomy: From an atomistic to a holistic view;Future Generation Computer Systems;2020-06

3. Comparative Analysis of Cloud Security Classifications, Taxonomies, and Ontologies;Proceedings of the 2019 International Conference on Artificial Intelligence and Computer Science;2019-07-12

4. Systematic identification of threats in the cloud: A survey;Computer Networks;2019-02

5. A Taxonomy and Survey of Cloud Resource Orchestration Techniques;ACM Computing Surveys;2018-03-31

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3