Secure Architecture for Cloud Environment

Secure Architecture for Cloud Environment

Kashif Munir (Malaysia University of Science and Technology, Malaysia) and Sellapan Palaniappan (Malaysia University of Science and Technology, Malaysia)
Copyright: © 2015 |Pages: 15
DOI: 10.4018/978-1-4666-8387-7.ch004
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Cloud computing is set of resources and services offered through the internet. Cloud services are delivered from data centers located throughout the world. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. In this chapter we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing and propose relevant solution directives to strengthen security in the cloud environment. This chapter also discusses secure cloud architecture for organizations to strengthen the security.
Chapter Preview
Top

Introduction

With Cloud Computing becoming a popular term on the Information Technology (IT) market, security and accountability has become important issues to highlight. There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing Software-, Platform-, or Infrastructure-as-a-Service via the cloud) and security issues faced by their customers.[1] In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information(Philip Wik, 2011).

Cloud computing has emerged as a way for IT businesses to increase capabilities on the fly without investing much in new infrastructure, training of personals or licensing new software.

NIST defines Cloud computing as a “model for enabling ubiquitous, convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and delivered with minimal managerial effort or service provider interaction”(Mell P, Grance T, 2011) . It follows a simple “pay as you go” model, which allows an organization to pay for only the service they use. It eliminates the need to maintain an in-house data center by migrating enterprise data to a remote location at the Cloud provider’s site. Minimal investment, cost reduction, and rapid deployment are the main factors that drive industries to utilize Cloud services and allow them to focus on core business concerns and priorities rather than dealing with technical issues. According to (Ponemon, 2011), 91% of the organizations in US and Europe agreed that reduction in cost is a major reason for them to migrate to Cloud environment.

Figure 1.

Cloud Computing represented as a stack of service (Kashif & Sellapan, 2012)

As shown in Figure. 1, Cloud services are offered in terms of Infrastructure-as-a- service (IaaS), Platform-as-a-service (PaaS), and Software-as-a-service (SaaS). It follows a bottom-up approach wherein at the infrastructure level; machine power is de- livered in terms of CPU consumption to memory allocation. On top of it, lies the layer that delivers an environment in terms of framework for application development, termed as PaaS. At the top level resides the application layer, delivering software outsourced through the Internet, eliminating the need for in-house maintenance of sophisticated software [6]. At the application layer, the end users can utilize software running at a remote site by Application Service Providers (ASPs). Here, customers need not buy and install costly software. They can pay for the usage and their concerns for maintenance are removed (Kashif & Sellapan, 2012).

Top

Security Concerns Of Cloud Computing

While the benefits of the cloud increase with experience, the challenges of cloud show a sharp decrease as organizations gain expertise with cloud.

Security remains the most-often cited challenge among Cloud Beginners (31 percent) but decreases to the fifth most cited (13 percent) among Cloud Focused organizations as shown in figure 2. As organizations become more experienced in cloud security options and best practices, the less of a concern cloud security becomes. Concerns about cloud security declined in 2014 among both Cloud Beginners and Cloud Focused respondents (Kim Weins, 2014).

Key Terms in this Chapter

Privacy: The ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.

Cloud Computing: A computing term or metaphor that evolved in the late 2000s, based on utility and consumption of computer resources.

Single Sign-On: ( SSO): A property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them.

Threat: A possible danger that might exploit a vulnerability to breach security and thus cause possible harm.

Protocol: In information technology, a protocol is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols specify interactions between the communicating entities.

Security: The degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization.

Vulnerability: A weakness which allows an attacker to reduce a system's information assurance.

Secure Architecture: Focusing on information security throughout the enterprise.

Complete Chapter List

Search this Book:
Reset