Explore 1.5M+ audiobooks & ebooks free for days

From $11.99/month after trial. Cancel anytime.

Cybersecurity in Cloud Computing
Cybersecurity in Cloud Computing
Cybersecurity in Cloud Computing
Ebook483 pages5 hours

Cybersecurity in Cloud Computing

Rating: 0 out of 5 stars

()

Read preview

About this ebook

"Cybersecurity in Cloud Computing" delves into the security challenges and solutions in the rapidly evolving world of cloud technology. We explore key concepts such as data protection, threat detection, and risk management within cloud environments. The book highlights how cloud services can enhance scalability and flexibility, while also presenting new security risks that need to be addressed.
Readers will gain insights into the latest cybersecurity practices, including encryption methods, identity management, and multi-factor authentication. We also discuss the importance of developing a comprehensive security policy to safeguard cloud infrastructure. Whether you are an IT professional or a business owner, this book equips you with the tools to secure your digital assets and maintain data integrity in the cloud.

LanguageEnglish
PublisherEducohack Press
Release dateJan 23, 2025
ISBN9789361525438
Cybersecurity in Cloud Computing

Read more from Akula Achari

Related to Cybersecurity in Cloud Computing

Related ebooks

Computers For You

View More

Reviews for Cybersecurity in Cloud Computing

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Cybersecurity in Cloud Computing - Akula Achari

    Cybersecurity in Cloud Computing

    Cybersecurity in Cloud Computing

    Author

    Akula Achari

    Cybersecurity in Cloud Computing

    Akula Achari

    ISBN - 9789361525438

    COPYRIGHT © 2025 by Educohack Press. All rights reserved.

    This work is protected by copyright, and all rights are reserved by the Publisher. This includes, but is not limited to, the rights to translate, reprint, reproduce, broadcast, electronically store or retrieve, and adapt the work using any methodology, whether currently known or developed in the future.

    The use of general descriptive names, registered names, trademarks, service marks, or similar designations in this publication does not imply that such terms are exempt from applicable protective laws and regulations or that they are available for unrestricted use.

    The Publisher, authors, and editors have taken great care to ensure the accuracy and reliability of the information presented in this publication at the time of its release. However, no explicit or implied guarantees are provided regarding the accuracy, completeness, or suitability of the content for any particular purpose.

    If you identify any errors or omissions, please notify us promptly at [email protected] & [email protected] We deeply value your feedback and will take appropriate corrective actions.

    The Publisher remains neutral concerning jurisdictional claims in published maps and institutional affiliations.

    Published by Educohack Press, House No. 537, Delhi- 110042, INDIA

    Email: [email protected] & [email protected]

    Cover design by Team EDUCOHACK

    Preface

    "Cloud Computing offers digital infrastructure and services over the Internet. Internet use has increased quite steadily in the last few years, increasing the cost of hardware and software. Cloud computing has been doing for the better part of a decade, but we still need to see an efficient, robust security policy in place. As a result, the new technology known as cloud computing used to solve these problems by providing service as users demand over the Internet and undoubtedly lowering the cost of hardware and software services provided in cloud computing has various features such as high scalability, efficiency, flexibility and dynamic properties. The security problem of cloud computing is very critical and may prevent the rapid growth of cloud computing.

    This book discusses several cloud computing solutions and analyzes cloud computing security issues and techniques based on cloud computing principles and characters. Security and availability of resources in cloud computing are main security issues. The Single Security Approach cannot solve the cloud computing security problem and many conventional and modern techniques and approaches must be used together to secure the overall cloud computing environment. Achieving cloud protection is not a simple issue to address. Developing and applying good security controls in the cloud are necessary criteria if this is to succeed. The very design of cloud computing will add additional cloud security problem layers to an already complex problem area. The literature in this book explores why this is a problem, examines what the desirable characteristics should be and suggests a novel means of achieving these objectives effectively and efficiently through the use of well-designed systems."

    Table of contents

    List of contributors ix

    Chapter 1 1

    Cloud Cyber Security: Finding an Effective Approach

    with Unikernels

    Chapter 2 45

    Fog Computing Security: A Review of Current

    Applications and Security Solutions

    Chapter 3 103

    The Role and Security of Firewalls in Cyber-physical

    Cloud Computing

    Chapter 4 147

    Security Through Block Vault in a Blockchain Enabled

    Federated Cloud Framework

    Chapter 5 177

    Security Governance as a Service on the Cloud

    Chapter 6 203

    Enhancing the Cloud Computing Performance by

    Labeling the Free Node Services as Ready-To-Execute Tasks

    Chapter 7 227

    Cloud Cover: Protecting Innovations

    Chapter 8 247

    Searchable Data Vault: Encrypted Queries in Secure

    Distributed Cloud Storage

    Chapter 9 276

    Aligning a Cybersecurity Strategy with

    Communication Management in Organizations

    Chapter 10 297

    Trust in the Balance: Data Protection Laws as

    Tools for Privacy and Security in the Cloud

    Citation 319

    Index 321

    List of contributors

    Bob Duncan

    Computing Science, University of Aberdeen, Aberdeen, UK

    Saad Khan

    Equal contributors Department of Informatics, School of Computing and Engineering, University of Huddersfield, Queensgate, Huddersfield, UK

    Johanna Ullrich

    SBA Research, Favoritenstraße 16, 1040 Wien, Vienna, Austria

    Olumide Malomo

    Department of Electrical Engineering and Computer Science College of Engineering and Architecture Howard University, Washington, DC, USA

    Ciarán Bryce

    University of Applied Sciences and Arts of Western Switzerland, Geneva School of Business Administration – HES-SO, Geneva, 1227, Switzerland

    Radwan S. Abujassar

    Information Technology and Computing, Arab Open University, Kuwait Branch, Al-Ardiya, Kuwait

    Susan Keston

    Harrison Goddard Foote LLP, Delta House, Glasgow, United Kingdom

    Geong Sen Poh

    Information Security Lab, MIMOS Berhad, 57000 Kuala Lumpur, Malaysia; [email protected] (M.S.M.); [email protected] (K.W.L.); [email protected] (D.M.)

    Ileana Hamburg

    Institute of Work and Technology, WH Gelsenkirchen, Gelsenkirchen, Germany Aligning a Cybersecurity Strategy with Communication Management in Organizations http://dx.doi.org/10.5772/intechopen.75952 55

    Darra Hofman

    School of Library, Archival and Information Studies, University of British Columbia, Vancouver, BC V6T 1Z1, Canada; [email protected] (D.H.); [email protected] (E.H.)

    Chapter 1

    Cloud Cyber Security: Finding an Effective Approach with Unikernels

    Bob Duncan¹*, Andreas Happe² and Alfred Bratterud³

    * Address all correspondence to: [email protected]

    ¹ Computing Science, University of Aberdeen, Aberdeen, UK

    ² Department of Digital Safety & Security, Austrian Institute of Technology GmbH, Vienna, Austria

    ³ Department of Computer Science, Oslo and Akershus University, Oslo, Norway

    Abstract

    Achieving cloud security is not a trivial problem to address. Developing and enforcing good cloud security controls are fundamental requirements if this is to succeed. The very nature of cloud computing can add additional problem layers for cloud security to an already complex problem area. We discuss why this is such an issue, consider what desirable characteristics should be aimed for and propose a novel means of effectively and efficiently achieving these goals through the use of well-designed unikernel-based systems. We have identified a range of issues, which need to be dealt with properly to ensure a robust level of security and privacy can be achieved. We have addressed these issues in both the context of conventional cloud-based systems, as well as in regard to addressing some of the many weaknesses inherent in the Internet of things. We discuss how our proposed approach may help better address these key security issues which we have identified.

    Keywords: cloud security and privacy, unikernels, Internet of things

    1. Introduction

    There are a great many routes into an information system for the attacker, and while many of these routes are well recognized by users, many others do not see the problem, meaning limited work is being carried out on defense, resulting in a far weaker system. This becomes much more difficult to solve in the cloud, due to the multi-tenancy nature of cloud computing, where users are less aware of the multiplicity of companies and people who can access their systems and data. Cloud brings a far higher level of complexity than is the case with traditional distributed systems, in terms of both the additional complexity of managing new relationships in cloud, and in the additional technical complexities involved in running systems within the cloud. It runs on other people’s systems, and instances can be freely spooled up and down, as needed.

    Add to this the conception, or rather the misconception, that users can take the software, which runs on their conventional distributed systems network and run it successfully on the cloud without modification, thus missing the point that their solid company firewall does not extend to the cloud, and that they thus lose control over who can access their systems and data. Often, users also miss the point that their system is running on someone’s hardware, over which they have limited or no control. While cloud service providers may promise high levels of security, privacy and vetting of staff, the same rigorous standards often do not apply to their subcontractors.

    There are many barriers that must be overcome before cloud security can be achieved [1]. A great deal of research has been conducted toward resolving this problem, mostly through technical means alone, but this presents a fundamental flaw. The business architecture of an enterprise comprises people, process and technology [2], and any solution, which will focus on a technological solution alone, will be doomed to failure. People present a serious weakness to enterprise security [3], and while process may be very well documented within an organization, often it is out of date due to the rapid pace of evolution of technology [4]. Technology can benefit enterprises due to the ever improving nature and sophistication of software, which is a good thing, but at the same time can present a greater level of complexity, making proper and secure implementation within enterprise systems much more difficult. Another major concern is that the threat environment is also developing at a considerable pace [5].

    Cloud computing has been around for the best part of a decade, yet we still have to see an effective, comprehensive security standard in existence. Those that do exist tend to be focussed on a particular area, rather than the problem as a whole, and as stated above, they are often out of date [4]. Legislators and regulators are not much further advanced. The usual practice is to state what they are seeking to achieve with the legislation or regulatory rules. Usually, they are very light on the detail of how to achieve these goals. To some extent, this is deliberate—if they specify the principles to apply to achieve their desired objective rather than the exact details, they do not have to keep updating the legislation/regulations as circumstances change. Often, they have no clue as to how to achieve these goals anyway, leaving it up to the users to work it out. This is the approach favored by the UK authorities, and it can be argued that it generally works well. In the US, they favor the rules-based approach, which, of necessity, requires far more work on the part of the government and regulators to keep the rules up to date. It also spawns an active industry of specialists who constantly probe the boundaries to see how far they can be pushed. Global enterprises often have to deal with both types of approach. In addition, the methodology deployed to achieve compliance is often flawed [6]. To this complex environment, we must now, of necessity, add the impact of both Industry 4.0, which encompasses mostly high-value targets, e.g. factories, and the Internet of things (IoT), which is likely to see a massive global explosion, to the mix.

    The IoT has been around now for a considerable time, but it did not get much traction until the arrival of cloud computing and big data. In 2007, Gantz et al. [7] suggested that global data collection would double every 18 months, a prediction that looks like being very light when compared to the reality of data creation coming from the expansion of the IoT. Cisco noted that the IoT had really come of age in 2008, when there were now more things connected to the Internet than people [8]. The massive impact arising from this enabling of the IoT by cloud computing brings some exciting new applications and future possibilities in the areas of defense, domestic and home automation, eHealth, industrial control, logistics, retail, security and emergencies, smart airports, smart agriculture, smart animal farming, smart cars, smart cities, smart environment, smart metering, smart parking, smart roads, smart trains, smart transport and smart water, but also brings some serious challenges surrounding issues of security and privacy. Due to the proliferation of emerging and cheaply made technology for use in the IoT, it is well known that the technology is particularly vulnerable to attack. When we combine the IoT and big data, we compound this problem further. This area is poorly regulated, with few proper standards yet in place, which would suggest it might be more vulnerable than existing cloud systems, which have been around for some time now.

    We are concerned with achieving both good security and good privacy, and while it is possible to have security without privacy, it is not possible to have privacy without security. Thus, our approach is to first ensure a good level of security can be achieved, and in Section 2, we discuss from our perspective how we have set about developing and extending this idea. In Section 3, we identify the issues that need to be addressed. In Section 4, we discuss why these issues are important, and what the potential implications for security and privacy are likely to be. In Section 5, we consider some current solutions proposed to address some of these issues and consider why they do not really address all the issues. In Section 6, we outline our proposed approach to resolve these issues, and in Section 7, we discuss our conclusions.

    2. Development of the idea

    The authors have developed a novel approach to addressing these problems through the use of unikernel-based systems, which can offer a lightweight, green and secure approach to solving these challenging issues. Duncan et al. [9] started by outlining a number of issues faced and explained how a unikernel-based approach might be used to provide a better solution. Bratterud et al. [10] provide a foundation for the development of formal methods, and to provide some clarity on the identification and use of good clear definitions in this space.

    A unikernel is by default a single threaded, single address space mechanism taking up minimal resources, and [11] look at how the concept of single responsibility might be deployed through the use of unikernels in order to reduce complexity, thus reducing the attack surface and allowing for a better level of security to be achieved. Given the worrying expansion of security exploits in IoT, as exemplified by recent DDoS attacks facilitated by the inherent security weaknesses present in IoT architecture, Duncan et al. [12] looked at how the unikernel approach might be useful when used for IoT and big data applications. Duncan and Whittington [13] consider how to develop an immutable database system using existing database software, thus providing the basis for a possible solution for one of the major needs of the framework.

    Unikernels use the concepts of both single address space and single execution flow. A monolithic application could be converted into a single large unikernel, but this would forfeit any real benefits to be gained from this architecture. To prevent this, we propose a framework that aids the deconstruction of business processes into multiple connected unikernels. This would allow us to develop complex systems, albeit in a much more simple, efficient, secure and private way. We must also develop a framework to handle the automated creation and shutting down of multiple unikernels, possibly carrying out a multiplicity of different functions at the same time. This concept is likely to be far more secure than conventional approaches. During runtime, the framework will be responsible for creation, monitoring and stopping of different unikernel services. While unikernels themselves do provide good functional service isolation, external monitoring is essential to prevent starvation attacks, such as where one unikernel effectively performs a denial-of-service attack by consuming all available host resources.

    We have identified a number of other areas, which will need further work. We are currently working on developing a means to achieve a secure audit trail, a fundamental requirement to ensure we can retain as complete a forensic trail as possible, for which we require to understand how to properly configure an immutable database system, capable of withstanding penetration by an attacker. This work follows on from Ref. [13]. However, in order to run such a system, we will need to develop a control system to co-ordinate multiple unikernel instances operating in concert. We will also have to develop a proper access control system to ensure we can achieve confidentiality of the system and to maintain proper privacy. To help with the privacy aspects, we will also require to develop a strong, yet efficient approach to encryption.

    In addition, the framework must provide means of input/output for managed unikernels, including facilities for communication and data storage.

    Communication is both concerned with inter-unikernel communication as well as with providing interfaces for managed unikernels to the outside world. As we foresee a message-passing infrastructure, this should provide means for validating passed messages including deep packet inspection. This allows for per-unikernel network security policies and further compartmentalization, which should minimize the impact of potential security breaches.

    In real-world use cases, we require the framework to be capable of handling mutable data, such as the ability to record temporary states, logging information or ensuring that persistent application and or user data can be maintained. Unikernels themselves by definition are immutable. In order to resolve this conflict, the framework must provide a means to persist and QUERY data in a race-free manner. It may be necessary to provide specialized data storage, depending on the use case. For example, system log and audit trail data require special treatment to prevent loss of a complete forensic record, thus requiring an append-only approach. Since persistent data storage is inherently contrary to our immutable unikernel approach, we do not enforce data storage to be implemented within unikernels. Being pragmatic, we defer this functionality to the framework, i.e. a means of storage is provided by the framework, rather than by the unikernels themselves.

    We also believe it may be possible to develop a unikernel-based system to work with the serverless paradigm. With those frameworks, source code is directly uploaded to the cloud service. Execution is triggered in response to events; resources are automatically scaled. Developers do not have any system access except through the programming language and provided libraries. We see unikernel and serverless frameworks as two solutions to a very similar problem, reducing the administrative overhead and allowing developers to focus their energy on application development. Serverless stacks signify the corporate-cloud aspect: developers upload their code to external services and thus invoke vendor lock-in in the long run. Unikernels also allow users to minimize the non-application code, but in contrast to serverless architectures, this approach maintains flexibility with regard to hosting. Users can provide on-site hosting or move toward third-party cloud offerings. We expect serverless architecture providers to utilize unikernels within their own offerings. They are well suited to encapsulate the user provided applications and further increase the security of the host’s infrastructure.

    We are also developing penetration testing approaches, using fuzzing techniques, adapting tools and sanitizers, hardening tools and whatever else we can do to strengthen the user environment to achieve our aims. The ultimate goal is to make life so difficult for the attacker that they will be forced to give up and move on to easier pickings elsewhere. We have also been applying all the usual attack methods to our test systems to assess whether our approach will work. This should allow us to be sure that each component will be fit for purpose before we move on to the next component. In this way, by developing each component of the system to automatically integrate with the rest, the system should ultimately become far more robust as a result.

    We now have a good idea of how the concept needs to be developed, and what future plans are needed to progress the development toward a highly secure and efficient system for cloud users. In the next section, we consider what exactly the issues are that we need to address in more detail.

    3. What are the issues?

    The fundamental concepts of information security are confidentiality, integrity, and availability (CIA), which is also true for cloud security. The business environment is constantly changing [14], as are corporate governance rules and this would clearly imply changing security measures would be required to keep up to date. More emphasis is now being placed on responsibility and accountability [15], social conscience [16], sustainability [17, 18], resilience [19] and ethics [20]. Responsibility and accountability are, in effect, mechanisms we can use to help achieve all the other security goals. Since social conscience and ethics are very closely related, we can expand the traditional CIA triad to include sustainability, resilience and ethics. These, then, must be the main goals for information security.

    We now consider a list of ten key management security issues identified in Ref. [1], which provide detailed explanations for each of these items on the list. These items represent management-related issues, which are often not properly thought through by enterprise management.

    The 10 key management security issues identified are:

    »the definition of security goals,

    »compliance with standards

    »audit issues,

    »management approach,

    »technical complexity of cloud,

    »lack of responsibility and accountability,

    »measurement and monitoring,

    »management attitude to security,

    »security culture in the company,

    »the threat environment.

    These are not the only issues to contend with. There are a host of technical issues to address, as well as other, less obvious issues, such as social engineering attacks, insider threats (especially dangerous when perpetrated in collaboration with outside parties), state-sponsored attacks, advanced persistent threats, hacktivists, professional criminals, and amateurs, some of whom can be very talented. There are many known technical weaknesses, particularly in web-based systems, but the use of other technology such as mobile access, bring your own device (BYOD) access, and IoT can all have an adverse impact on the security and privacy of enterprise data.

    In spite of what is known about these issues, enterprises often fail to take the appropriate action to defend against them, or do not understand how to implement or configure this protection properly, leading to further weakness. Staff laziness can be an issue. Failure to adhere to company security and privacy policies can also be an issue. Use of passwords, which are too simple, is an issue. Simple things, such as the use of yellow stickies can be a dangerous weakness when stuck on computer screens, with the user password in full view for the world to see.

    Lack of training for staff on how to properly follow security procedures can lead to weakness. Failure to patch systems can be a serious issue. Poor configuration of complex systems is often a major area of weakness. Poor staff understanding of the dangers in email systems presents a major weakness for enterprises. Failure to implement simple steps to protect against many known security issues presents another problem. Lack of proper monitoring of systems presents a serious weakness, with many security breaches being notified by third-party outsiders, usually long after the breach has occurred.

    We will take a look at some of these technical vulnerabilities next, starting with one of the most obvious. Since cloud is enabled through the Internet, and web-based systems play a huge role in providing the fundamental building blocks for enterprise systems architecture, it makes sense to look at the vulnerabilities inherent in web-based systems.

    3.1. Web vulnerabilities

    Security breaches have a negative monetary and publicity impact on enterprises, thus are seldom publicly reported. This limits the availability of empirical study data on actively exploited vulnerabilities. However, web vulnerabilities are well understood, and we can source useful information on the risks faced through this medium by using data from the work of the Open Web Application Security Project (OWASP) [21], who publish a top 10 list of web security vulnerabilities every 3 years.

    The OWASP Top 10 report [21] provides a periodic list of exploited web application vulnerabilities, ordered by their prevalence. OWASP focuses on deliberate attacks, each of which might be based upon an underlying programming error—for example, an injection vulnerability might be the symptom of an underlying buffer overflow programming error. OWASP also provides the most comprehensive list of the most dangerous vulnerabilities and a number of very good mitigation suggestions. The last three OWASP lists for 2007, 2010 and 2013 are provided in Table 1.

    Table 1. OWASP top ten web vulnerabilities—2013 to 2007 [21].

    This list, based on the result of analysis of successful security breaches across the globe, seeks to highlight the worst areas of weakness in web-based systems. It is not meant to be exhaustive, but instead merely illustrates the worst 10 vulnerabilities in computing systems globally. It is clearly concerning that the same vulnerabilities continue to recur year after year, which clearly demonstrates the failure of enterprises to adequately protect their resources properly.

    Thus in any cloud-based system, these vulnerabilities are likely to be present. However, there are likely to be additional potential vulnerabilities, which will also need to be considered. We group the different vulnerabilities into three classes based on their impact on software development. Low-level vulnerabilities can be solved by applying local defensive measures, such as using a library at a vulnerable spot. High-level vulnerabilities cannot be solved by local changes, but instead need systematic architectural treatment. The last class of vulnerability is application workflow-specific and cannot be solved automatically but instead depends on thoughtful developer intervention.

    Two of the top three vulnerabilities, A1 and A3, are directly related to either missing input validation or output sanitation. Those issues can be mitigated by consistently utilizing defensive security libraries. Another class of attack that can similarly be solved through a low-level library approach is A8. By contrast, high-level vulnerabilities should be solved at an architectural level. Examples of these are A2, A5 and A7. The software architecture should provide generic means for user authentication and authorization, and should enforce these validations for all operations. Some vulnerability classes, i.e. A4, A6 and A10, directly depend on the implemented application logic and are hard to protect against in a generic manner. Some other vulnerabilities can be prevented by consistently using security libraries, while other vulnerabilities can be reduced by enforcing architectural decisions during software development.

    New software projects are often based upon existing frameworks. Those frameworks bundle both default configuration settings as well as a preselection of libraries providing either features or defensive mechanisms. Software security is mostly regarded as a non-functional requirement and thus can be hard to get funding for. Those opinionated frameworks allowed software developers to focus on functional requirements while the frameworks took care of some security vulnerabilities.

    Over the years, those very security frameworks have grown in size and functionality, and as they themselves are software products, they can introduce additional security problems into otherwise secure application code. For example, while the Ruby on Rails framework, properly used, prevents many occurrences of XSS-, SQLi- and CSRF-attacks, recent problems with network object serialization introduced remotely exploitable injection attacks [22]. The affected serialization capability was not commonly used but was included in every affected Ruby on Rails

    Enjoying the preview?
    Page 1 of 1