Unit-5: Security, Standards, and Applications
Unit-5: Security, Standards, and Applications
Authorized to
Know Availability
Customer
Data
Customer
Customer
Code
Provider Premises
Why Cloud Computing
brings new threats?
– Loss of control
– Lack of trust (mechanisms)
– Multi-tenancy
Multi-tenancy :
Insider?
•Malicious employees at client
•Malicious employees at Cloud
provider
•Cloud provider itself
Outsider?
• Intruders
• Network attackers?
Attacker Capability:
Malicious Insiders
• At client
– Learn passwords/authentication information
– Gain control of the VMs
• At cloud provider
– Log client communication
Attacker Capability: Cloud
Provider
• What?
– Can read unencrypted data
– Can possibly peek into VMs, or make copies of
VMs
– Can monitor network communication, application
patterns
Attacker Capability:
Outside attacker
• What?
– Listen to network traffic (passive)
– Insert malicious traffic (active)
– Probe cloud structure (active)
– Launch DoS
Challenges for the
attacker
How to find out where the target is located
• Spoofing identity
• Tampering with data
• Repudiation
• Information disclosure
• Denial of service
• Elevation of privilege
Concerns
• Architectural Framework
• Governance, Enterprise Risk Mgt
• Legal, e-Discovery
• Compliance & Audit
• Information Lifecycle Mgt
• Portability & Interoperability
Cloud Domains
• Supports the development of standards for cloud computing and frameworks for
interoperating between clouds;
• develops benchmarks for cloud computing; and
• supports reference implementations for cloud computing, preferably open source reference
implementations.
• The OCC has a particular focus in large data clouds. It has developed the MalStone
Benchmark for large data clouds and is working on a reference model for large data
clouds.
Organization for the Advancement of Structured Information Standards
(OASIS)
OASIS drives the development, convergence and adoption of open standards for
the global information society. The source of many of the foundational standards
in use today, OASIS sees Cloud Computing as a natural extension of SOA and
network management models. The OASIS technical agenda is set by members,
many of whom are deeply committed to building Cloud models, profiles, and
extensions on existing standards, including:
• Security, access and identity policy standards -- e.g., OASIS SAML,
XACML, SPML, WS-SecurityPolicy, WS-Trust, WS-Federation, KMIP,
and ORMS.
• Content, format control and data import/export standards -- e.g., OASIS
ODF, DITA, CMIS, and SDD.
• Registry, repository and directory standards -- e.g., OASIS ebXML and
UDDI.
• SOA methods and models, network management, service quality and
interoperability -- e.g., OASIS SCA, SDO, SOA-RM, and BPEL
Distributed Management Task Force (DMTF)
of resources.
• Cloud Security Alliance, CSA, lays out the best practices for
According to InfoWorld, the IEEE has set up two working groups for cloud
various interfaces and file formats. The P2302 Workgroup, will focus on
• LDAP
• SAML 2.0
• OAUTH 2.0
• WS-Federation
• OpenID Connect
• XAMCL