CFP last date
20 May 2024
Reseach Article

A Survey on Security Mechanisms of Leading Cloud Service Providers

by Deepak Panth, Dhananjay Mehta, Rituparna Shelgaonkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 1
Year of Publication: 2014
Authors: Deepak Panth, Dhananjay Mehta, Rituparna Shelgaonkar
10.5120/17149-7184

Deepak Panth, Dhananjay Mehta, Rituparna Shelgaonkar . A Survey on Security Mechanisms of Leading Cloud Service Providers. International Journal of Computer Applications. 98, 1 ( July 2014), 34-37. DOI=10.5120/17149-7184

@article{ 10.5120/17149-7184,
author = { Deepak Panth, Dhananjay Mehta, Rituparna Shelgaonkar },
title = { A Survey on Security Mechanisms of Leading Cloud Service Providers },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 1 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 34-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number1/17149-7184/ },
doi = { 10.5120/17149-7184 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:25:05.370271+05:30
%A Deepak Panth
%A Dhananjay Mehta
%A Rituparna Shelgaonkar
%T A Survey on Security Mechanisms of Leading Cloud Service Providers
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 1
%P 34-37
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With an unprecedented pace of developments in Cloud computing technology, there has been an exponential increase of users of these services and an equal rise of cloud services providers. Clouding Computing is a virtual pool of resources provided to users as service through a web interface. These resources may include Software, Infrastructure, Storage, Network, Platform etc. With more and more organizations migrating their data over cloud, it is imperative to ensure security and integrity of their data. In this paper we 1) discuss the security challenges posed to data on the cloud computing. 2) Survey cryptographic algorithms that can be used to overcome these challenges. 3) Survey Security designs of 5 leading cloud service providers. 4) Perform a comparative study of security and features of these providers.

References
  1. Cloud computing, Wikipedia. At: http://en. wikipedia. org/wiki/Cloud_computing
  2. Gordon Haff. 2013. INTRODUCTION TO CLOUD COMPUTING, Red Hat Inc.
  3. Introduction to Cloud Computing, 2010 Dialogic Corporation, pp 4-5.
  4. Kuyoro S. O. , Ibikunle F. &AwodeleO. 2011. Cloud Computing Security Issues and Challenges. International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011, pp 252-253 .
  5. Jaydip Sen, Security and Privacy Issues in Cloud Computing. Innovation Labs, Tata Consultancy Services Ltd. , Kolkata, India, pp 10-12.
  6. Cloud Security Alliance (February, 2013). The Notorious Nine, Cloud Computing Top Threats in 2013.
  7. Securosis (November 7, 2012). Defending Against Denial of Service Attacks V 1. 3
  8. Bryan Sullivan, Said Tabet, Edward Bonver, Judith Furlong, Steve Orrin & Peleus Uhley (December 5, 2013). Practices for Secure Development of Cloud Applications. SAFECode & Cloud Security Alliance.
  9. Mather T, Kumaraswamy S, Latif S (2009) Cloud Security and Privacy. O'Reilly Media, Inc. , Sebastopol, CA
  10. Cloud Security Alliance (2010), Top Threats to Cloud Computing V1. 0.
  11. Ertaul L, Singhal S, Gökay S (2010) Security challenges in Cloud Computing. In: Proceedings of the 2010 International conference on Security and Management SAM'10. CSREA Press, Las Vegas, US, pp 36-42.
  12. Grobauer B, Walloschek T, Stocker E (2011) Understanding Cloud Computing vulnerabilities. IEEE Security Privacy 9(2), pp 50-57.
  13. Muhammad Imran Tariq, University of Lahore, Pakistan (2012). Towards Information Security Metrics Framework for Cloud Computing, International Journal of Cloud Computing and Services Science (IJ-CLOSER). Vol. 1, No. 4, October 2012, pp 210-211.
  14. Reuben JS (2007) A survey on virtual machine Security. Seminar on Network Security. Technical report, Helsinki University of Technology, October 2007.
  15. Keiko Hashizume, David G Rosado, Eduardo Fernandez-Medina and Eduardo B Fernandez (2013), An analysis of security issues for cloud computing. Hashizume et al. Journal of Internet Services and Applications 2013.
  16. Cloud Security Alliance (2012) SecaaS implementation guidance, category 1: identity and Access management.
  17. Xiao S, Gong W (2010) Mobility Can help: protect user identity with dynamic credential. In: Eleventh International conference on Mobile data Management (MDM). IEEE Computer Society, Washington, DC, USA, pp 378-380.
  18. Somani U, Lakhani K, Mundra M (2010) Implementing digital signature withRSA encryption algorithm to enhance the data Security of Cloud in Cloud Computing. In: 1st International conference on parallel distributed and grid Computing (PDGC). IEEE Computer Society Washington, DC, USA, pp 211-216.
  19. Harnik D, Pinkas B, Shulman-Peleg A (2010) Side channels in Cloud services:deduplication in Cloud Storage. IEEE Security Privacy 8(6), pp 40-47.
  20. Tebaa M, El Hajji S, El Ghazi A (2012) Homomorphic encryption method applied to Cloud Computing. In: National Days of Network Security and Systems (JNS2). IEEE Computer Society, Washington, DC, USA, pp 86-89
  21. DIRECTIVE 2002/58/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications Sector (Directive on privacy and electronic communications).
  22. Wu H, Ding Y, Winer C, Yao L (2010)Network Security for virtual machine in Cloud Computing. 5th International conference on computer sciences and convergence information technology (ICCIT). IEEE Computer Society Washington, DC, USA, pp 18-21
  23. Wang Z, Jiang X (2010) HyperSafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of the IEEE symposium on Security and privacy. IEEE Computer Society, Washington, DC, USA pp 380-395.
  24. Berger S, Caceres R, Pendarakis D, Sailer R, Valdez E, Perez R, Schildhauer W, Srinivasan D (2008) TVDc: managing Security in the trusted virtual datacenter. SIGOPS Oper. Syst. Rev. 42(1), pp 40-47.
  25. Berger S, Caceres R, Goldman K, Pendarakis D, Perez R, Rao JR, Rom E, SailerR, Schildhauer W, Srinivasan D, Tal S, Valdez E (2009) Security for the Cloud infrastructure: trusted virtual data center implementation. IBM J Res Dev, pp 560-571.
  26. ShafiGoldwasser, & MihirBellare (July,2008). Lecture Notes on Cryptography.
  27. Public-key cryptography, Wikipedia. At: http://en. wikipedia. org/wiki/Public-key_cryptography
  28. Global Cloud Computing Market Forecast 2015-2020, Market Research Media.
  29. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of , Official Journal L 281, 23/11/1995
  30. DIRECTIVE 2002/58/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications Sector (Directive on privacy and electronic communications).
  31. National Institute of Standards and Technology (November 2011), US Government Cloud Computing Technology Roadmap Volume II (Release 1. 0). Useful Information for Cloud Adopters.
  32. Cloud Security Alliance (2009) Security best practices for cloud computing.
  33. Cloud Computing Security (May, 2010), A Trend Micro Whitepaper.
  34. Amazon S2, Amazon web services. At: http://aws. amazon. com/ec2/
  35. Amazon S3, Amazon web services. At: http://aws. amazon. com/s3/
  36. Amazon RDS, Amazon web services. At: http://aws. amazon. com/rds/
  37. Amazon DynamoDB, Amazon web services. At: http://aws. amazon. com/dynamodb/
  38. Amazon ElastiCache, Amazon web services. At: http://aws. amazon. com/elasticache/
  39. AWS ISO 27001 FAQs, Amazon Web Services. At: http://aws. amazon. com/security/iso-27001-certification-faqs/
  40. AWS GovCloud (US) Region – Government Cloud Computing. At: http://aws. amazon. com/govcloud-us/
  41. Amazon Web Services: Overview of Security Processes (November 2013), At: http://media. amazonwebservices. com/pdf/AWS_Security_Whitepaper. pdf
  42. US Patriot Act, US Government Information. 107th Congress.
  43. Vulnerability Reporting, Amazon web services. At: http://aws. amazon. com/security/vulnerability-reporting/
  44. Penetration Testing, Amazon Web Services. At: http://aws. amazon. com/security/penetration-testing/
  45. AWS Identity and Access Management (IAM), At: http://aws. amazon. com/iam/
  46. AWS PGP Public Key, Amazon Web Services, At: https://aws. amazon. com/security/aws-pgp-public-key/
  47. AWS GovCloud (US) Region – Government Cloud Computing. At: http://aws. amazon. com/govcloud-us/
  48. Security Bulletins, Amazon Web services. At: https://aws. amazon. com/security/security-bulletins/
  49. Google App Engine, Wikipedia. At: http://en. wikipedia. org/wiki/Google_App_Engine
  50. Google App Engine, At: https://developers. google. com/appengine/docs/whatisgoogleappengine
  51. Google Cloud Storage – a simple way to store, protect, and share data (2012). Google Inc.
  52. An Inside Look at Google BigQuery(2012), Google Inc.
  53. Google, data centers. At: https://www. google. com/about/datacenters/inside/locations/index. html
  54. Google Apps Administrator, Google Inc.
  55. Google Cloud Storage, Google Inc.
  56. Google Cloud SQL, Google Inc. At: https://developers. google. com/cloud-sql/faq#whatissql
  57. Microsoft Azure, Wikipedia. At: http://en. wikipedia. org/wiki/Microsoft_Azure
  58. Deb Shinder(2009,Nov 11), Microsoft Azure: Security in the Cloud, WindowSecurity. com.
  59. Tata Consultancy Services, Windows Azure – The Cloud Computing Platform.
  60. Microsoft Security Development Lifecycle (SDL), Microsoft.
  61. Charlie Kaufman and Ramanathan Venkatapathy(2010, August), Windows Azure Security Overview, Windows Azure.
  62. Jonathan Wiggs (2010, January) Crypto Services and Data Security in Microsoft Azure, MSDN Magazine.
  63. Pedro Hernandez(2013-10-01),Microsoft's Windows Azure Meets Federal Security Standards. eWEEK. com
  64. Security Best Practices Windows Azure, Microsoft.
  65. Storage, Backup, and Recovery, Microsoft Azure, Microsoft.
  66. Azure Active Directory, Microsoft Azure, Microsoft.
  67. David Chappel (2010, October) Introducing the Windows Azure Platform. David and Chappel Associates.
  68. Microsoft Azure, Microsoft. http://www. microsoft. com/windowsazure
  69. Karin Beaty and Chris Bode(2012, September). A "how-to" guide on using cloud services for security-rich data backup. IBM Global Technology Services.
  70. IBM solutions for cloud and virtualization in enterprise environments(2013, May), IBM Software.
  71. Rackspace. http://www. rackspace. com/
  72. OpenStack, http://www. rackspace. com/cloud/openstack/
  73. OpenStack, http://www. openstack. org/
  74. Joe Burke, Rackspace Private Cloud Security, Rackspace US, Inc.
  75. Rackspace Bolsters Expanding List of Security Credentials (March 13, 2013), Rackspace Hosting, Rackspace.
  76. RACKSPACE SECURITY & COMPLIANCE , Rackspace US, Inc.
  77. Information Age (21 May 2012), Exposing the cracks in cloud security, Information-age. com.
  78. Rackspace Private Cloud, Rackspace US, Inc. At: http://www. rackspace. com/cloud/private/
  79. Alex Pucher, Stratos Dimopoulos, A Survey on Cloud Provider Security Measures.
  80. Products & Services, Amazon Web Services. At: https://aws. amazon. com/products/
  81. JR Raphael, InfoWorld, July 1, 2013. The worst cloud outages of 2013. JR Raphael (July 1, 2013) The worst cloud outages of 2013- slide4. InfoWorld.
  82. Top Threats Working Group (Feb, 2013). The Notorious Nine, Cloud Computing Top Threats in 2013. Cloud Security Alliance.
  83. Carl Bagh (May16, 2014). Sony PlayStation Network attack shows Amazon EC2 a hackers' paradise. Ibtimes. com
  84. By Pavel Alpeyev, Joseph Galante and Mariko Yasu (May 15, 2011). Amazon. com Server Said to Have Been Used in Sony Attack, Bloomberg. com.
  85. Google Cloud Platform, At: https://cloud. google. com/
  86. JR Raphael (July 1, 2013) The worst cloud outages of 2013- slide12. InfoWorld.
  87. Twitter breach revives security issues with cloud computing, CloudCenter News Article, ClearCenter Corp.
  88. Microsoft Azure. At: http://azure. microsoft. com/en-us/services/
  89. Charles Babcock (May 14, 2014). Social Science Site Using Azure Loses Data. Informationweek. com
  90. JR Raphael (July 1, 2013), The worst cloud outages of 2013- Slide 8, InfoWorld.
  91. SmartCloud, Infrastructure and platform services. IBM Inc.
  92. SmartCloud, Cloud Applications (SaaS , PaaS). IBM Inc.
  93. Rackspace. At: http://www. rackspace. com/
  94. Ben Greiner(December 23, 2013), Rackspace Email Security Breach. Source: forgetcomputers. zendesk. com
  95. Google Encryption Standard. At: https://developers. google. com/cloud-sql/faq
  96. Gramm–Leach–Bliley Act, PUBLIC LAW 106–102—NOV. 12, 1999, 106th Congress
  97. ] Zhang F, Huang Y, Wang H, Chen H, Zang B (2008) PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection. In:Trusted Infrastructure Technologies Conference, 2008. APTC'08, Third Asia-Pacific. IEEE Computer Society, Washington, DC, USA, pp 9–18
  98. Xiaopeng G, Sumei W, Xianqin C (2010) VNSS: a Network Security sandbox for virtual Computing environment. In: IEEE youth conference on information Computing and telecommunications (YC-ICT). IEEE Computer Society, Washington DC, USA, pp 395 –398.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cryptography Encryption AES DES TDES Blowfish RSA DSA ELGAMAL ECC AWS SmartCloud Azure Google Cloud Platform Rackspace.