Cloud Computing Notes Unit -5
Cloud Computing Notes Unit -5
Unit -5th
(Security, Standards and Applications)
5. Insecure APIs
Application Programming Interfaces (APIs) are used to manage and integrate
cloud services. However, insecure APIs can serve as entry points for attackers if
not properly designed and protected.
Common API vulnerabilities include:
Lack of authentication
Improper input validation
Exposed sensitive data in responses
Poorly documented or unpatched APIs
Secure API development practices include using OAuth 2.0, rate limiting, and
continuous API monitoring for anomalies.
Mitigation Strategies:
Use open standards and APIs
Ensure providers support data export tools
Review contractual terms regarding data ownership and portability
Security Audit and Monitoring in SaaS
Security audits and monitoring are essential to detect and prevent security
incidents in SaaS platforms.
Auditing Includes:
Review of access logs, configuration settings, and user activity
Vulnerability assessments and penetration testing
Compliance checks with industry standards like ISO 27001, SOC 2, GDPR
Monitoring Tools and Techniques:
Real-time alert systems for abnormal activity
Integration with Security Information and Event Management (SIEM) tools
Automated logging of user access, file sharing, and permission changes
Cloud Security
Authentication and Authorization
Authentication verifies the identity of a user or system, while authorization
determines what resources they are allowed to access.
Encryption Techniques and Key Management
Encryption Techniques:
Symmetric Encryption: Same key for encryption and decryption (e.g., AES)
Asymmetric Encryption: Uses public and private key pairs (e.g., RSA)
Hashing: Irreversible transformation used for password storage (e.g., SHA-256)
Key Management:
Use Key Management Services (KMS) like AWS KMS, Azure Key Vault
Rotate encryption keys regularly
Separate duties: those who manage keys should not access the data
Use Hardware Security Modules (HSM) for higher protection
Role of Firewalls and Intrusion Detection Systems (IDS)
Firewalls and IDS provide a line of defense against unauthorized access and
threats.
Cloud Firewalls (Web Application Firewalls - WAF): Protect web applications
from common exploits such as SQL injection, XSS
Network Firewalls: Control inbound/outbound traffic based on rules
Intrusion Detection Systems (IDS): Monitor for suspicious activity, raise alerts
Intrusion Prevention Systems (IPS): Actively block threats in real-time
Cloud-native tools: AWS Shield, Azure Defender, Google Cloud Armor
Introduction to Hadoop
MapReduce Framework
Components of MapReduce
Map Function: Takes input data and converts it into key-value pairs.
Shuffle and Sort: Intermediate key-value pairs are grouped and sorted by keys.
Reduce Function: Aggregates and processes the sorted data to produce the final
output.
How MapReduce Works
Input: Data is divided into blocks and processed in parallel.
Mapping Phase: Each block is handled by a mapper which outputs intermediate
key-value pairs.
Shuffling Phase: The framework collects and distributes the mapper output to
appropriate reducers.
Reducing Phase: Reducers process the data and generate the final result.
MapReduce is highly scalable, fault-tolerant, and efficient for batch processing
of big data.
Applications and Use Cases
Log analysis for large web applications
Data mining and recommendation engines
Bioinformatics and scientific data processing
Retail analytics, search indexing, and social media sentiment analysis
VirtualBox: Overview and Use in Cloud
What is VirtualBox?
VirtualBox is an open-source virtualization software developed by Oracle that
allows users to run multiple operating systems on a single physical machine. It
provides a platform to create and manage virtual machines (VMs), enabling test
environments, development setups, and isolated instances of OSes.