BCS601 Module 4 PDF
BCS601 Module 4 PDF
Module-4
Cloud Security:Top concern for cloud users, Risks, Privacy Impact Assessment, Cloud DataEncryption,
Securityof Database Services, OS security, VM Security, Security Risks Posed by Shared Images and
Management OS,XOAR ,A Trusted Hypervisor, Mobile Devices and Cloud Security
Cloud Security and Trust Management: Cloud Security Defense Strategies, Distributed
Intrusion/Anomaly Detection, Data and Software Protection Techniques, Reputation-Guided Protection of
Data Centers.
Textbook2:Cloud Computing Theory and Practice by Dan C. Marinescu
Chapter11: 11.1to 11.3, 11.5 to 11.8, 11.10 to 11.14
Textbook1: Chapter4:4.6
vtucircle.com pg. 1
BCS601 Cloud Computing Module-4
• Risks:
o Deleted records might still exist in backups.
o Attackers could recover residual data.
Lack of Standardization & Interoperability
• No global security standards for cloud computing.
• Unanswered questions:
o How to recover data if the CSP shuts down?
o What happens if prices increase unexpectedly?
o How difficult is switching CSPs?
Auditing & Compliance Challenges
• Full security audits on cloud infrastructure are nearly impossible.
• Legal compliance issues:
o Data laws differ across countries.
o Users don’t know where data is stored.
Emerging Threats from Autonomic Computing
• Autonomic features (self-repair, self-optimization) introduce new vulnerabilities:
o Harder to track and investigate security breaches.
o Automated systems may fail unpredictably.
Multi-Tenancy Security Concerns
• Shared cloud environments → Data breaches affect multiple users.
• Example: A hacked database can expose millions of user records.
Legal & Jurisdiction Issues
• Cloud data centers exist in multiple countries.
• Unclear jurisdiction:
o Which country's laws apply?
o What about data that crosses multiple borders?
• Data outsourcing risks:
o CSPs may subcontract data handling, making security compliance difficult.
o Example: Microsoft subpoenaed to provide Hotmail user emails.
vtucircle.com pg. 2
BCS601 Cloud Computing Module-4
3. Threats from third-party data control (loss of transparency and control over data
management).
A. Traditional Security Threats
• Increased Impact: Due to the large user base and shared resources.
• Responsibility Gaps: Unclear boundaries of security responsibility between the
cloud provider and the user.
• Key Attack Vectors:
o Distributed Denial of Service (DDoS) attacks → Overloading cloud services
to block legitimate access.
o Phishing → Tricking users into providing sensitive credentials.
o SQL Injection → Exploiting web applications to manipulate databases.
o Cross-Site Scripting (XSS) → Injecting malicious scripts into web pages.
• Authentication & Authorization Risks:
o Assigning different privilege levels to enterprise users is complex.
o Merging internal security policies with cloud security models is challenging.
B. System Availability Threats
• Disruptions can be caused by:
o System failures, power outages, or cyberattacks.
o Data lock-in → Customers may be unable to move data when needed.
o Phase transitions in complex cloud systems → Unexpected failures due to
rapid demand shifts.
o Unverified application results → Users cannot always trust the accuracy of
cloud computations.
C. Third-Party Data Control Risks
• Lack of Transparency:
o Users do not have full visibility into how data is handled.
o Cloud providers may subcontract services to untrusted third parties.
• Data Loss Risks:
o Poor storage quality or hardware failures can lead to irretrievable data loss.
o Legal challenges in proving whether cloud data has been deleted.
• Cloud Provider Espionage:
o Cloud providers may access or misuse user data.
o Example: AWS Terms of Service
▪ Disclaims liability for data breaches, losses, and service outages.
3. Cloud Security Alliance (CSA) Reports on Security Threats
A. 2010 CSA Report - Seven Major Cloud Threats
1. Abuse of cloud resources (e.g., using AWS for cyberattacks).
2. Insecure APIs (exposing cloud services to unauthorized access).
3. Malicious insiders (employees misusing privileged access).
4. Shared technology vulnerabilities (hypervisor and VM isolation flaws).
5. Account hijacking (stolen credentials granting attackers full access).
6. Data loss and leakage (accidental or intentional data deletion or exposure).
7. Unknown risk profiles (inadequate risk assessment by users).
B. 2016 CSA Report - Top Twelve Cloud Security Threats
vtucircle.com pg. 3
BCS601 Cloud Computing Module-4
vtucircle.com pg. 4
BCS601 Cloud Computing Module-4
vtucircle.com pg. 5
BCS601 Cloud Computing Module-4
vtucircle.com pg. 6
BCS601 Cloud Computing Module-4
vtucircle.com pg. 7
BCS601 Cloud Computing Module-4
vtucircle.com pg. 8
BCS601 Cloud Computing Module-4
vtucircle.com pg. 9
BCS601 Cloud Computing Module-4
• Private cloud data is safer from outsiders, but still vulnerable to insider threats.
• Potential Risks:
o Insiders accessing log files can:
▪ Infer database hot spots (frequently accessed areas).
▪ Copy sensitive data selectively.
▪ Use extracted data for malicious activities.
• Countermeasures:
o Role-based access control (RBAC): Restricts insider access.
o Audit logging & monitoring: Detects suspicious behavior.
o Data partitioning & protection rings: Limits access to critical data.
vtucircle.com pg. 10
BCS601 Cloud Computing Module-4
vtucircle.com pg. 11
BCS601 Cloud Computing Module-4
Operating System (OS) security ensures the protection of applications, data, and hardware
against unauthorized access, manipulation, and malicious attacks. The OS acts as an
intermediary between applications and hardware, making it a critical component in securing
cloud computing environments.
Key Security Aspects of an OS
1. Access Control - Policies that define how users and applications interact with system
resources.
2. Authentication Mechanisms - Validating user identities before granting access.
3. Data Protection - Encrypting sensitive files and securing storage.
4. System Integrity - Preventing unauthorized modifications to the OS.
5. Application Security - Isolating and securing applications to prevent exploitation.
Major Security Threats to Operating Systems
1. Unauthorized Access and Privilege Escalation
• Attackers exploit weak passwords, misconfigured permissions, and software
vulnerabilities to gain higher privileges.
• Insider threats can misuse admin privileges to manipulate system settings.
2. Malware Attacks
• Viruses, worms, Trojans, ransomware, and spyware target OS vulnerabilities.
• Rootkits allow attackers to maintain persistent access while hiding malicious
activities.
3. Application Vulnerabilities
• Buffer Overflows - Attackers execute arbitrary code by injecting excessive data into
application buffers.
• Code Injection Attacks - Malicious scripts injected into applications to execute
harmful commands.
4. OS Configuration and Patch Management Issues
• Unpatched OS software allows attackers to exploit known vulnerabilities.
• Default configurations may have insecure settings, leading to unauthorized access.
5. Lack of Secure Communication
• Unencrypted network connections expose data in transit to interception and
modification.
• Man-in-the-Middle Attacks compromise authentication and data integrity.
Security Measures for Operating Systems
1. Mandatory Access Control (MAC) Policies
• Prevent unauthorized processes from accessing sensitive system resources.
• Example: SELinux (Security-Enhanced Linux) enforces strict access policies.
2. Strong Authentication and User Management
• Implement password complexity rules and MFA.
• Use least privilege principles (LPP) to restrict admin privileges.
3. Regular Patch Management
• Automate OS updates to address vulnerabilities.
• Use vulnerability scanners to identify and patch security loopholes.
4. Secure File Systems and Encryption
• Encrypt sensitive files using BitLocker (Windows) or LUKS (Linux).
vtucircle.com pg. 12
BCS601 Cloud Computing Module-4
vtucircle.com pg. 13
BCS601 Cloud Computing Module-4
vtucircle.com pg. 14
BCS601 Cloud Computing Module-4
vtucircle.com pg. 15
BCS601 Cloud Computing Module-4
▪ Linux: 11
o Outdated AMIs:
▪ 145 Windows AMIs were 2+ years old.
▪ 1,197 Linux AMIs were 2+ years old.
vtucircle.com pg. 16
BCS601 Cloud Computing Module-4
vtucircle.com pg. 17
BCS601 Cloud Computing Module-4
vtucircle.com pg. 18
BCS601 Cloud Computing Module-4
1. VM creation.
2. VM execution.
vtucircle.com pg. 19
BCS601 Cloud Computing Module-4
11.12 Xoar – Breaking the Monolithic Design of the Trusted Computing Base (TCB)
1. Introduction
• Xoar is a modified version of Xen designed to enhance system security.
• Security model assumptions:
o System is professionally managed.
o Only system administrators have privileged access.
o Administrators are trusted and do not have incentives to violate user trust.
• Sources of Security Threats:
o Malicious guest VMs attempting to compromise:
▪ Data integrity.
▪ Confidentiality of other guest VMs.
▪ Guest VM execution processes.
o Bugs in initialization code of the management VM.
• Key Innovation:
o Xoar follows microkernel design principles to increase security.
o Unlike Xen, Xoar is modular, explicitly defining exposure risks.
vtucircle.com pg. 20
BCS601 Cloud Computing Module-4
A. Permanent Components
XenStore-State – Maintains the state of the system.
Critical component → Must be hardened against attacks.
B. Self-Destructing Components (Used during boot, then removed)
PCIBack – Virtualizes access to the PCI bus configuration.
Bootstrapper – Coordinates hardware initialization and booting.
Removed before any user VM starts → Reduces security risks.
C. Components Restarted on Request (Loaded only when needed)
vtucircle.com pg. 21
BCS601 Cloud Computing Module-4
•
Guest VMs only share essential services (Figure 11.6).
Users can choose to share service VMs only with their own VMs (tagging system).
Benefit:Reduces security risks by restricting unnecessary interactions between
components.
vtucircle.com pg. 22
BCS601 Cloud Computing Module-4
vtucircle.com pg. 23
BCS601 Cloud Computing Module-4
vtucircle.com pg. 24
BCS601 Cloud Computing Module-4
vtucircle.com pg. 25
BCS601 Cloud Computing Module-4
7. Summary
A. Trusted Hypervisor (Terra)
• Provides higher security guarantees than traditional hypervisors.
• Supports custom security levels per application (Open-box & Closed-box).
vtucircle.com pg. 26
BCS601 Cloud Computing Module-4
vtucircle.com pg. 27