Narendran Calluru Rajasekar
November 30th, 2009
Supervised by
Dr Chris Imafidon
(formerly Queen Mary University of London)
MSC Internet Systems Engineering
University of East London,
Docklands.
Acknowledgements
Anne-Marie Imafidon
University of Oxford.
Table of Contents 1 Abstract
2 Cloud Computing
2.1 Definition
2.2 Understanding Cloud Computing
3 Security Implications
3.1 Security Components
3.1.1 Encryption
3.1.2 Intrusion Detection/Prevention Systems
3.1.3 Antivirus
3.1. 4Firewall
3.2 Security Threat
3.3 Authentication and Access
3.4 Data Security
3.5 Tempting Target for Cybercrime
3.6 Benefit to Risk Ratio
3.7 Legal Issues
4 Conclusion
5 Appendix - Glossary
6 References
1 Abstract
This paper is focussed on the security implications of cloud computing. Before analysing the security implications, the definition of cloud computing and brief discussion to under cloud computing is presented. The actual analysis of this paper focuses on the basic security components of cloud computing and security threats involved in various aspects of cloud computing.
There are many leading providers in the market like Google, Amazon, Microsoft, HP and IBM. They provide different services and call it with their own names. What exactly is cloud computing? It isn 't new; it already exists in different forms such as Virtualisation, Software as a Service, Utility Computing etc. The major aspect in cloud computing is that it is exploited based on the pay per usage charging model.
Though cloud provides many benefits one of which is moving the capital expense to operational expense, the security and legal issues are very high and an organisation can decide to adopt cloud only on based on benefits to risk ratio.
The security implications in cloud computing is discussed in detail in this paper.
Keywords: Cloud Computing, Cloud Security, Cloud Legal
References: [1] Kaufman, L. M. (2009)."Data Security in the World of Cloud Computing." IEEE Security andPrivacy 7(4): 61-64. [2] Kim, W. (2009). "Cloud Computing: Today and Tomorrow."Journal of object technology 8(1): 65-72. [3] Grossman, R. (2009). "The Case for Cloud Computing." ITPROFESSIONAL 11(2): 23-27. [4] Rash, W. (2009). Is cloud computing secure? Prove it. tech in-depth,eWeek. 2009: 8-10. [5] Computing, D. and M. Creeger (2009). "Cloud Computing: AnOverview." Distributed Computing 7(5). [6] Weiss, A. (2007). "Computing in the clouds." COMPUTING 16. [7] Saran, C. (2009). Cryptography breakthrough could secure cloudservices. Computer Weekly. 2009: 20. [8] Hawthorn, N. (2009). "Finding security in the cloud."Computer Fraud & Security 2009(10): 19-20. [9] Everett, C. (2009). "Cloud computing - A question oftrust." Computer Fraud & Security 2009(6): 5-7. [10] (2009). "Data in the cloud might be seized by governmentagencies without you knowing." Computer Fraud & Security 2009(8): 1. [11] (2009). "Industry to Google: encrypt your cloud." ComputerFraud & Security 2009(6): 3-20. [12] Hewitt, C. (2008). "ORGsfor scalable, robust, privacy-friendly client cloud computing." IEEEInternet Computing 12(5): 96-99. [13] Viega, J. (2009). "Cloud Computing and the Common Man."Computer 42(8): 106-108. [14] Vaquero, L., L. Rodero-Merino, et al. (2008). "A break in theclouds: towards a cloud definition." ACM SIGCOMM Computer CommunicationReview 39(1): 50-55. [15] Wang, C., Q. Wang, et al. (2009). Ensuring data storage security incloud computing. [16] Vieira, K., A. Schulter, et al. (2009). "Intrusion DetectionTechniques in Grid and Cloud Computing Environment." [17] Napper, J [18] Mowbray, M. and S. Pearson (2009). A client-based privacy managerfor cloud computing, ACM. [19] Herrick, D. (2009). Google this!: using Google apps forcollaboration and productivity, ACM. [20] de Assunao, M., A. di Costanzo, et al. (2009). Evaluating thecost-benefit of using cloud computing to extend the capacity of clusters, ACMNew York, NY, USA. [21] Cloud_Security_Alliance (2009, April). "Security Guidance forCritical Areas of Focus in Cloud Computing." Retrieved Nov 25, 2009, from http://www.cloudsecurityalliance.org/guidance/csaguide.pdf [22] Christensen, J [23] Dikaiakos, M., D. Katsaros, etal. (2009). "Cloud Computing: Distributed Internet Computing for IT andScientific Research." IEEE Internet Computing 13(5): 10-13. [24] Brantner, M., D. Florescu, et al. (2008). Building a database on S3,ACM. [25] Greene, T. (2009). "Cloudsecurity fears cast shadow at RSA." Network World 26(16). [26] Joint, A., E. Baker, et al.(2009). "Hey, you, get off of that cloud?" Computer Law and SecurityReview: The International Journal of Technology and Practice 25(3): 270-274. [27] Walsh, P. J. (2009). "Thebrightening future of cloud security." Network Security 2009(10): 7-10. [28] Sloan, K. (2009)."Security in a virtualised world." Network Security 2009(8): 15-18. [29] Mansfield-Devine, S. (2008)."Danger in the clouds." Network Security 2008(12): 9-11. [30] Abraham, D. (2009). "Why2FA in the cloud?" Network Security 2009(9): 4-5.