Mobile Computing (KCS 713) unit-4
Mobile Computing (KCS 713) unit-4
CLOUD COMPUTING
UNIT-4
RESOURCE MANAGEMENT AND SECURITY IN CLOUD
Inter Cloud Resource Management
Resource Provisioning
available to users and systems. Once something has been provisioned, the next
step is configuration.
Discover the best workload: the pair of resources based on the application
requirements of cloud users is an optimization problem. Acceptable quality of
service cannot be provided to cloud users until the provision of resources is
offered as a critical capability.
card. The provider's resources are available for customer use within hours, if not
minutes.
Sivadon Chaisiri et al., 2012 has proposed the optimal cloud resource
provisioning algorithm for the virtual machine management. The optimization
formulation of stochastic integer programming is proposed to obtain the decision
of the OCRP algorithm as such the total cost of resource provisioning in cloud
computing environments is minimized.
The optimal solution obtained from OCRP is obtained by formulating and solving
stochastic integer programming with multistage resource.
Cloud Computing (KCS-713)
GA algorithm Alok Gautam Kumbhare et al., 2015 has developed the concept of
“dynamic data flows” which utilize alternate tasks as additional control over the
data flow’s cost and QoS. They formalize an optimization problem to represent
deployment and runtime resource provisioning that allows balancing the
application’s QoS, value, and the resource cost.
They proposed two greedy heuristics, centralized and shared, based on the
variable-sized bin packing algorithm and compare against a Genetic Algorithm
(GA) based heuristic that gives a near-optimal solution.
4. SPRNT Strategy
SPRNT limits the SLO violation rate up to 1.3 % even when dealing with rapidly
increasing workload.
As user demands are difficult to predict and the prices of the VMs vary in
different time and region, optimizing the number of VMs of each type rented from
datacenters located in different regions in a given time frame becomes essential
to achieve cost effectiveness for VSPs.
Comparison Table
Global Cloud Xchange (GCX) provides network services for enterprises, new
GCX provides connectivity throughout the Emerging Markets Corridor into Asia
via the vast GCX global network (the world’s largest private submarine cable
network), with extensions available into more than 200 countries worldwide.
Cloud Computing (KCS-713)
the world, cloud infrastructure providers (i.e., IaaS providers) have established
reliability in case of site failures. For example, Amazon has data centers in the
United States (e.g., one on the East Coast and another on the West Coast) and
Europe.
However, currently Amazon expects its cloud customers (i.e., SaaS providers) to
In addition, no single cloud infrastructure provider will be able to establish its data
expectations for all their consumers. Hence, they would like to make use of
services of multiple cloud infrastructure service providers who can provide better
This kind of requirement often arises in enterprises with global operations and
applications such as Internet services, media hosting, and Web 2.0 applications.
To realize this, the Cloud bus Project at the University of Melbourne has
negotiated SLA contracts driven by competitive market prices; and deliver on-
technologies while ensuring high QoS standards and minimizing service costs.
They need to be able to utilize market based utility models as the basis for
They consist of client brokering and coordinator services that support utility-
a single resource leasing abstraction. The system will ease the cross domain
The Cloud Exchange (CEx) acts as a market maker for bringing together service
application brokers and evaluates them against the available supply currently
allows participants to locate providers and consumers with fitting offers. Such
markets enable services to be commoditized, and thus will pave the way for
agreed upon by all parties, and incentives and penalties for meeting and violating
Lacking trust between service providers and cloud users has hindered the
trust models have been developed to protect mainly e-commerce and online
For web and cloud services, trust and security become even more demanding,
because leaving user applications completely to the cloud providers has faced
Cloud platforms become worrisome to some users for lack of privacy protection,
pure technical issue. However, the social problem can be solved with a technical
approach. Common sense dictates that technology can enhance trust, justice,
As a virtual environment, the cloud poses new security threats that are more
difficult to contain than traditional client and server configurations. To solve these
cases, one can extend the trust models for P2P networks and grid systems to
cheating, hacking, viruses, rumors, spam, and privacy and copyright violations.
Cloud Computing (KCS-713)
The security demands of three cloud service models, IaaS, PaaS, and SaaS, are
described in this section. These security models are based on various SLAs
Three basic cloud security enforcements are expected. First, facility security in
data centers demands on-site security year round. Biometric readers, CCTV
(close-circuit TV), motion detection, and man traps are often deployed.
security demands SSL and data decryption, strict password policies, and system
trust certification.
Servers in the cloud can be physical machines or VMs. User interfaces are
applied to request services. The provisioning tool carves out the systems from
based attacks such as network worms, viruses, and DDoS attacks exploit system
vulnerabilities.
access to critical information. Thus, security defenses are needed to protect all
cluster servers and data centers. Here are some cloud components that demand
vulnerabilities
• Protection of VMs and monitors from service disruption and DoS attacks
Cloud Computing (KCS-713)
disasters
services
attacks may result from hypervisor malware, guest hopping and hijacking, or VM
rootkits.
general, passive attacks steal sensitive data or passwords. Active attacks may
manipulate kernel data structures which will cause major damage to cloud
servers.
and verify code execution. Other defense technologies include using the RIO
security compliance for hypervisors, and Intel vPro technology. Others apply a
software that could become a single point of failure. With virtualization, a single
physical machine can be divided or partitioned into multiple VMs (e.g., server
consolidation).
Cloud Computing (KCS-713)
This provides each VM with better security isolation and each partition is
protected from DoS attacks by other partitions. Security attacks in one VM are
the guest OS, with complete guest isolation. Fault containment and failure
may stop cloud services. Trust negotiation is often done at the SLA level.
establish security in the cloud because all data and software are shared by
default.
SaaS Security
SaaS providers handle much of the security for a cloud application. The SaaS
provider is responsible for securing the platform, network, applications, operating
system, and physical infrastructure. However, providers are not responsible for
securing customer data or user access to it. Some providers offer a bare
minimum of security, while others offer a wide range of SaaS security options.
By 2022, Gartner projects that 95% of cloud security failures will be the
customer's fault. To avoid security breaches, customers can implement improved
security practices and technologies. Below are SaaS security practices that
organizations can adopt to protect data in their SaaS applications.
and Risk Report. Moreover, nearly 9% of those cloud services were rated as
high-risk services. Organizations can use tools, such as cloud access security
brokers (CASB) to audit their networks for unauthorized cloud services and
compromised accounts.
Apply identity and access management (IAM). A role-based identity and access
management solution can ensure that end users do not gain access to more
resources than they require for their jobs. IAM solutions use processes and
user access policies to determine what files and applications a particular user
can access. An organization can apply role-based permissions to data so that
end users will see only the data they're authorized to view.
Encrypt cloud data. Data encryption protects both data at rest (in storage) and
data in transit between the end user and the cloud or between cloud
applications. Government regulations usually require encryption of sensitive
data. Sensitive data includes financial information, healthcare data, and
personally identifiable information (PII). While a SaaS vendor may provide
some type of encryption, an organization can enhance data security by
applying its own encryption, such as by implementing a cloud access security
broker (CASB).
Enforce data loss prevention (DLP). DLP software monitors for sensitive data
within SaaS applications or outgoing transmissions of sensitive data and
blocks the transmission. DLP software detects and prevents sensitive data
from being downloaded to personal devices and blocks malware or hackers
from attempting to access and download data.
Monitor collaborative sharing of data. Collaboration controls can detect granular
permissions on files that are shared with other users, including users outside
the organization who access the file through a web link. Employees may
inadvertently or intentionally share confidential documents through email, team
spaces, and cloud storage sites such as Dropbox.
Check provider's security. The Cloud Adoption and Risk Report surveyed
respondents on their trust of cloud providers' security. It found that nearly 70%
Cloud Computing (KCS-713)
of them trust their providers to secure their data. However, only 8% of cloud
services actually meet the data security requirements defined in
the CloudTrust Program. Only 1 in 10 providers encrypt data at rest, and just
18% support multifactor authentication. Clearly, not all of that customer trust is
deserved. An audit of a SaaS provider can include checks on its compliance
with data security and privacy regulations, data encryption policies, employee
security practices, cyber-security protection, and data segregation policies.
Several types of security solutions can help organizations improve SaaS security. The
solutions can be implemented separately or together as part of a CASB.
CASB solutions, which are typically SaaS applications, may provide additional
capabilities. These may include:
File encryption
Pre-built policy templates to guide IT staff through the process of policy creation
User entity behavior analytics (UEBA) backed by machine learning
In-application coaching to help end users learn improved security practices
Security configuration audits to suggest changes to security settings based on
best practices
Strategic alignment, value delivery, risk mitigation, effective use of resources and
performance measurement are key objectives of any IT-related governance
model, security included.
To successfully pursue and achieve these objectives, it is important to
understand the operational culture and business and customer profiles of an
enterprise, so that an effective security governance model can be customized for
the enterprise.
procedures as they should be, for purposes of optimizing value and reducing
day-to-day operational risks.
This lack of embedded controls may result in operational risks that may not be
apparent to the enterprise. For example, the security configuration of a device
may be modified (change event) by a staffer without proper analysis of the
business impact (control) of the modification. The net result could be the
introduction of exploitable security weaknesses that may not have been apparent
with this modification.
The enterprise would now have to live with an inherent operational risk that could
have been avoided if the control had been embedded in the change execution
process.
Lack of operating model, roles, and responsibilities: Many enterprises moving
into the cloud environment tend to lack a formal operating model for security, or
do not have strategic and tactical roles and responsibilities properly defined and
operationalized. This situation stifles the effectiveness of a security management
and operational function/organization to support security in the cloud.
Simply, establishing a hierarchy that includes designating an accountable official
at the top, supported by a stakeholder committee, management team,
operational staff, and third-party provider support (in that order) can help an
enterprise to better manage and control security in the cloud, and protect
associated investments in accordance with enterprise business goals. This
hierarchy can be employed in an in-sourced, out-sourced, or co-sourced model
depending on the culture, norms, and risk tolerance of the enterprise.
Lack of metrics for measuring performance and risk : Another major challenge for
cloud customers is the lack of defined metrics to measure security performance
and risks – a problem that also stifles executive visibility into the real security
risks in the cloud.
This challenge is directly attributable to the combination of other challenges
discussed above. For example, a metric that quantitatively measures the number
Cloud Computing (KCS-713)
of exploitable security vulnerabilities on host devices in the cloud over time can
be leveraged as an indicator of risk in the host device environment.
Similarly, a metric that measures the number of user-reported security incidents
over a given period can be leveraged as a performance indicator of staff
awareness and training efforts. Metrics enable executive visibility into the extent
to which security tone and expectations (per established policy) are being met
within the enterprise and support prompt decision-making in reducing risks or
rewarding performance as appropriate.
The challenges described above clearly highlight the need for cloud customers to
establish a framework to effectively manage and support security in cloud
management, so that the pursuit of business targets is not potentially
compromised.
Unless tone and expectations for cloud security are established (via an
enterprise policy) to drive operational processes and procedures with embedded
management controls, it is very difficult to determine or evaluate business value,
performance, resource effectiveness, and risks regarding security operations in
the cloud. Cloud security governance facilitates the institution of a model that
helps enterprises explicitly address the challenges described above.
Value Delivery
Enterprises should define, operationalize, and maintain an appropriate security
function/organization with appropriate strategic and tactical representation, and
charged with the responsibility to maximize the business value (Key Goal
Indicators, ROI) from the pursuit of security initiatives in the cloud.
Risk Mitigation
Security initiatives in the cloud should be subject to measurements that
gauge effectiveness in mitigating risk to the enterprise (Key Risk Indicators).
These initiatives should also yield results that progressively demonstrate a
reduction in these risks over time.
Sustained Performance
Security initiatives in the cloud should be measurable in terms of performance,
value and risk to the enterprise (Key Performance Indicators, Key Risk
Indicators), and yield results that demonstrate attainment of desired targets
(Key Goal Indicators) over time.
how roles are identified in a system and how they are assigned to individuals;
Protecting the sensitive data within the system and securing the system itself.
Cloud Computing (KCS-713)
IAM systems should do the following: capture and record user login information,
manage the enterprise database of user identities, and orchestrate the
assignment and removal of access privileges.
That means systems used for IAM should provide a centralized directory service
with oversight and visibility into all aspects of the company user base.
Digital identities are not just for humans; IAM can manage the digital identities of
devices and applications to help establish trust.
Benefits of IAM
IAM technologies can be used to initiate, capture, record and manage user
identities and their related access permissions in an automated manner. This
brings an organization the following IAM benefits:
Cloud Computing (KCS-713)
Access privileges are granted according to policy, and all individuals and
services are properly authenticated, authorized and audited.
IAM technologies are designed to simplify the user provisioning and account
setup process. These systems should reduce the time it takes to complete these
processes with a controlled workflow that decreases errors and the potential for
abuse while allowing automated account fulfillment.
Cloud Computing (KCS-713)
These systems should balance the speed and automation of their processes with
the control that administrators need to monitor and modify access rights.
Consequently, to manage access requests, the central directory needs an
access rights system that automatically matches employee job titles, business
unit identifiers and locations to their relevant privilege levels.
IAM systems should be used to provide flexibility to establish groups with specific
privileges for specific roles so that access rights based on employee job
functions can be uniformly assigned. The system should also provide request
and approval processes for modifying privileges because employees with the
same title and job location may need customized, or slightly different, access.
There is a series of ten steps that cloud service customers should take to
evaluate and manage the security of their cloud environment with the goal of
mitigating risk and delivering an appropriate level of support. The following steps
are discussed in detail:
1. Ensure effective governance, risk and compliance processes exist
2. Audit operational and business processes
3. Manage people, roles and identities
4. Ensure proper protection of data and information
5. Enforce privacy policies
6. Assess the security provisions for cloud applications
7. Ensure cloud networks and connections are secure
8. Evaluate security controls on physical infrastructure and facilities
9. Manage security terms in the cloud service agreement
10. Understand the security requirements of the exit process