Security of Cloud-Based Systems
Security of Cloud-Based Systems
Security of Cloud-Based Systems
Edited by:
Jovan Pehcevski
ARCLER
P r e s s
www.arclerpress.com
Security of Cloud-based Systems
Jovan Pehcevski
Arcler Press
224 Shoreacres Road
Burlington, ON L7L 2H2
Canada
www.arclerpress.com
Email: [email protected]
This book contains information obtained from highly regarded resources. Reprinted
material sources are indicated. Copyright for individual articles remains with the au-
thors as indicated and published under Creative Commons License. A Wide variety of
references are listed. Reasonable efforts have been made to publish reliable data and
views articulated in the chapters are those of the individual contributors, and not neces-
sarily those of the editors or publishers. Editors or publishers are not responsible for
the accuracy of the information in the published chapters or consequences of their use.
The publisher assumes no responsibility for any damage or grievance to the persons or
property arising out of the use of any materials, instructions, methods or thoughts in the
book. The editors and the publisher have attempted to trace the copyright holders of all
material reproduced in this publication and apologize to copyright holders if permission
has not been obtained. If any copyright holder has not been acknowledged, please write
to us so we may rectify.
Notice: Registered trademark of products or corporate names are used only for explana-
tion and identification without intent of infringement.
Arcler Press publishes wide variety of books and eBooks. For more information about
Arcler Press and its products, visit our website at www.arclerpress.com
DECLARATION
Some content or chapters in this book are open access copyright free
published research work, which is published under Creative Commons
License and are indicated with the citation. We are thankful to the
publishers and authors of the content and chapters as without them this
book wouldn’t have been possible.
ABOUT THE EDITOR
x
Conclusion............................................................................................. 113
References.............................................................................................. 114
xi
In The Building Of Could Platform, The Work That I Had
Done Includes: Cloud Platform Framework Design Objectives...... 178
Security Issues In The Using Of The Cloud Platform................................ 183
Conclusion............................................................................................. 187
Acknowledgements................................................................................ 187
References.............................................................................................. 188
xii
Key Components.................................................................................... 271
XML Signature Element Wrapping........................................................... 271
Mobile Terminal Security Issues.............................................................. 273
Proposed Work....................................................................................... 275
Implementation...................................................................................... 278
Deployed Application............................................................................. 279
Conclusions............................................................................................ 280
Acknowledgements................................................................................ 280
Future Work............................................................................................ 280
References.............................................................................................. 281
Chapter 15 Cloud Security: Services, Risks, and a Case Study on Amazon Cloud
Services.................................................................................................. 319
Abstract.................................................................................................. 319
xiii
Introduction............................................................................................ 320
Amazon’s Cloud Storage......................................................................... 321
Data Security.......................................................................................... 322
Cloud Risks and API Concerns................................................................ 324
Service And Account Hijacking.............................................................. 326
The Future Of Cloud Security................................................................. 328
Conclusion............................................................................................. 329
References.............................................................................................. 330
Chapter 17 Block Level Data Integrity Assurance Using Matrix Dialing Method
towards High Performance Data Security on Cloud Storage.................. 353
Abstract.................................................................................................. 353
Introduction............................................................................................ 354
Proposed Methodology........................................................................... 356
Comparison Of Results And Analysis...................................................... 371
Conclusion............................................................................................. 372
References ............................................................................................. 374
Chapter 18 Current Status of the Use of Cloud Computing in SMEs in the City of
Latacunga, Ecuador................................................................................ 377
Abstract.................................................................................................. 377
Introduction............................................................................................ 378
Theoretical Framework........................................................................... 380
Methodology.......................................................................................... 385
xiv
Results.................................................................................................... 387
Conclusions............................................................................................ 392
Index...................................................................................................... 399
xv
LIST OF CONTRIBUTORS
Arif Sari
Department of Management Information Systems, European University of Lefke,
Lefke, Cyprus
Sabah Alzahrani
Department of Electrical & Computer Engineering, Tennessee State University,
Nashville, TN, USA
Liang Hong
Department of Electrical & Computer Engineering, Tennessee State University,
Nashville, TN, USA
Sachin Shetty
Department of Electrical & Computer Engineering, Tennessee State University,
Nashville, TN, USA
Liang Hong
Department of Electrical & Computer Engineering, Tennessee State University,
Nashville, TN, USA
Rodziah Atan
Faculty of Computer Science & IT, University Putra Malaysia UPM, Serdang, Malaysia
Rusli Abdullah
Faculty of Computer Science & IT, University Putra Malaysia UPM, Serdang, Malaysia
xvii
Masrah Azrifah Azmi Murad
Faculty of Computer Science & IT, University Putra Malaysia UPM, Serdang, Malaysia
Harshit Srivastava
Information Technology, Maharaja Agrasen Institute of Technology, New Delhi, India
Jassim R. Mlgheit
Faculty of Computers and Informatics, Benha University, Benha, Egypt
Essam H. Houssein
Faculty of Computers and Information, Minia University, Minia, Egypt
Hala H. Zayed
Faculty of Computers and Informatics, Benha University, Benha, Egypt
Guoqiang Hu
Network and Education Technology Center, Northwest A&F University, Yangling,
China
Yanrong Yang
Network and Education Technology Center, Northwest A&F University, Yangling,
China
Li Li
Network and Education Technology Center, Northwest A&F University, Yangling,
China
Ahsan Ullah
Department of Computer Science and Engineering, World University of Bangladesh,
Dhaka, Bangladesh
xviii
Md Feroz Alam
Department of Computer Science and Engineering, World University of Bangladesh,
Dhaka, Bangladesh
Hassan Reza
School of Aerospace Sciences, Department of Computer Science, University of North
Dakota, Grand Forks, ND, USA
Madhuri Sonawane
School of Aerospace Sciences, Department of Computer Science, University of North
Dakota, Grand Forks, ND, USA
Mohammad Waseem
Department of Computer Science and Engineering, Southeast University, Nanjing,
China
Abdullah Lakhan
Department of Computer Science and Engineering, Southeast University, Nanjing,
China
Fawaz S. Al-Anzi
Compute Engineering Department, Kuwait University, Kuwait City, Kuwait
Ayed A. Salman
Compute Engineering Department, Kuwait University, Kuwait City, Kuwait
Noby K. Jacob
Compute Engineering Department, Kuwait University, Kuwait City, Kuwait
J. Athena
Department of ECE, Government College of Technology, Coimbatore, India
V. Sumathy
Department of ECE, Government College of Technology, Coimbatore, India
Patrick Mosca
Department of Computer Science, Gonzaga University, Spokane, USA
xix
Yanping Zhang
Department of Computer Science, Gonzaga University, Spokane, USA
Zhifeng Xiao
Department of Computer Science & Software Engineering, Penn State Erie, Erie, USA
Yun Wang
Department of Computer Science and Information Systems, Bradley University, Peoria,
USA
Michael Perez
Department of Electrical and Computer Engineering, University of Texas-RGV,
Edinburg, TX, USA
Sanjeev Kumar
Department of Electrical and Computer Engineering, University of Texas-RGV,
Edinburg, TX, USA
P. Premkumar
Department of Computer Science and Engineering, K.L.N. College of Engineering,
Pottapalayam, India
D. Shanthi
Department of Computer Science and Engineering, PSNA College of Engineering &
Technology, Dindigul, India
Gabriela Cajamarca-Palomo
Facultad de Ciencias Administrativas, Universidad Técnica de Ambato, Ambato,
Ecuador.
Mauricio Quisimalin-Santamaría
Facultad de Ciencias Administrativas, Universidad Técnica de Ambato, Ambato,
Ecuador.
Patricio Medina-Chicaiza
Facultad de Ciencias Administrativas, Universidad Técnica de Ambato, Pontificia
Universidad Católica del Ecuador, Ambato, Ecuador.
xx
LIST OF ABBREVIATIONS
xxii
TVDs Trusted Virtual Domains
VCCI Virtualized Cloud Computing Infrastructure
VMI Virtual Machine Image
VMM Virtual Machine Monitor
VPC Virtual private cloud
WRT Web response time
xxiii
PREFACE
xxvi
SECTION 1
THREATS DETECTION IN
CLOUD ENVIRONMENTS
CHAPTER
1
Analyzing Security Threats to Virtual
Machines Monitor in Cloud
Computing Environment
ABSTRACT
The data and applications in cloud computing reside in cyberspace, that
allowing to users access data through any connection device, when you need
to transfer information over the cloud, you will lose control of it. There are
multi types of security challenge must be understood and countermeasures.
One of the major security challenges is resources of the cloud computing
infrastructures are provided as services over the Internet, and entire data in
the cloud computing are reside over network resources, that enables the data
to be access through VMs. In this work, we describe security techniques for
securing a VCCI, VMMs such as Encryption and Key Management (EKM),
Access Control Mechanisms (ACMs), Virtual Trusted Platform Module
(vTPM), Virtual Firewall (VF), and Trusted Virtual Domains (TVDs). In
this paper we focus on security of virtual resources in Virtualized Cloud
Computing Infrastructure (VCCI), Virtual Machine Monitor (VMM) by
describing types of attacks on VCCI, and vulnerabilities of VMMs and we
describe the techniques for securing a VCCI.
Keywords: Cloud Computing, Security Threats, Virtual Machine
Monitors, Cloud Security
INTRODUCTION
Deploying cloud computing in an enterprise infrastructure brings significant
security concerns. Monitoring of the virtual machines with high security and
minimal overhead is always very important, especially in those environments
where hundreds of Virtual Machines VMs are running on dozens of physicals
servers. In this paper we focus on security of virtual resources in Virtualized
Cloud Computing Infrastructure (VCCI), Virtual Machine Monitor (VMM)
by describing types of attacks on VCCI, and vulnerabilities of VMMs and we
describe the techniques for securing a VCCI. Also it is identified that either
monitoring hypervisor only will be enough to collect detailed resources
consumptions or VMMs will also be required. To complete the experiment
of resource monitoring, techniques for securing a VCCI, VMMs such as
Encryption and Key Management (EKM), Access Control Mechanisms
(ACMs), Virtual Trusted Platform Module (vTPM), Virtual Firewall (VF),
and Trusted Virtual Domains (TVDs) is required [1] [2] [3] .
VF can use the same hooks to then perform all firewall functions like packet
inspection, dropping, and forwarding but without actually touching the virtual
network at any point. Hypervisor resident VFs can be faster as compared to
bridge-mode VFs because they are not performing packet inspection in VFs, but
rather from within the kernel at native hardware speeds.
REFERENCES
1. Kulkarni, G., et al. (2012) Cloud Security Challenges. 7th International
Conference on Telecommunication Systems, Services, and Applications
(TSSA), India, October 2012, 88-91.
2. Zhang, L.J., et al. (2009) CCOA: Cloud Computing Open Architecture.
IEEE International Conference on Web Services, IBM T.J. Watson
Research Center, New York, 6-10 July 2009, 607-616.
3. Mehra, P., Katsaros, D., Vakali, A., Pallis, G. and Dikaiakos, M.D.
(2009) Cloud Computing: Distributed Internet Computing for IT and
Scientific Research. IEEE Internet Computing, 13, 10-13.
4. Shengmei, L., et al. (2011) Virtualization Security for Cloud Computing
Service. International Conference on Cloud and Service Computing,
China, 174-179.
5. Fu, W. and Li, X. (2011) The Study on Data Security in Cloud
Computing Based on Virtualization. International Symposium on IT
in Medicine and Education (ITME), Chongqing College of Electronic
Engineering, 9-11 December 2011, 257-261.
6. Buyya, R., Garg, S.K. and Calheiros, R.N. (2011) SLA-Oriented
Resource Provisioning for Cloud Computing: Challenges, Architecture,
and Solutions. International Conference on Cloud and Service
Computing, IEEE Computer Society, Washington DC, 1-10.
7. Liang, C., Zhang, Y. and Han, Z.H. (2013) Quantitatively Measure
Access Control Mechanisms across Different Operating Systems. 7th
International Conference on Software Security and Reliability, Beijing,
18-20 June 2013, 50-59. https://doi.org/10.1109/sere.2013.12
8. Berger, S., et al. (2006) vTPM: Virtualizing the Trusted Platform
Module. Security’06: 15th USENIX Security Symposium, Vancouver,
BC, 31 July-4 August 2006, 305-320.
9. Brohi, S.N., Bamiah, M., Brohi, M.N. and Kamran, R. (2012)
Identifying and Analyzing Security Threats to Virtualized Cloud
Computing Infrastructures. Proceedings of International of Cloud
Computing, Technologies, Applications & Management, 151-155.
10. Griffin, J.L., Jaeger, T., Perez, R., Sailer, R., van Doorn, L. and Cáceres,
R. (2005) Trusted Virtual Domains: Toward Secure Distributed
Services. The 1st Workshop on Hot Topics in System Dependability,
Yokohama, 30 June 2005, 1-6.
11. Iqbal, A., Pattinson, C. and Kor, A.-L. (2015) Performance Monitoring
Analyzing Security Threats to Virtual Machines Monitor in ... 11
2
A Review of Anomaly Detection
Systems in Cloud Networks and
Survey of Cloud Security Measures
in Cloud Storage Applications
Arif Sari
Department of Management Information Systems, European University of
Lefke, Lefke, Cyprus
ABSTRACT
Cloud computing has become one of the most projecting words in the IT
world due to its design for providing computing service as a utility. The
typical use of cloud computing as a resource has changed the scenery
of computing. Due to the increased flexibility, better reliability, great
scalability, and decreased costs have captivated businesses and individuals
alike because of the pay- per-use form of the cloud environment. Cloud
computing is a completely internet dependent technology where client data
are stored and maintained in the data center of a cloud provider like Google,
Amazon, Apple Inc., Microsoft etc. The Anomaly Detection System is one
of the Intrusion Detection techniques. It’s an area in the cloud environment
that is been developed in the detection of unusual activities in the cloud
networks. Although, there are a variety of Intrusion Detection techniques
available in the cloud environment, this review paper exposes and focuses
on different IDS in cloud networks through different categorizations and
conducts comparative study on the security measures of Dropbox, Google
Drive and iCloud, to illuminate their strength and weakness in terms of
security.
Keywords: Anomaly Detection Systems, Cloud Computing, Cloud
Environment, Intrustion Detection Systems, Cloud Security
INTRODUCTION
Cloud computing is not a promise but a fulfillment in the IT world. The
benefits of cloud computing have no infinite end as to what can’t be done
using the cloud environment due to a variety of deployment model such as
Software as a Service, Platform as a Service, and Infrastructure as a Service.
The cloud computing technology allows for much more efficient computing
by centralizing storage, memory, processing and bandwidth. This allows
flexibility in accessing of data over the cloud network.
Network traffic analysis in cloud environments is one of the most
important tasks in cloud management to guarantee the quality of services,
validate performance of new applications and services, build accurate
network models and detect anomalies in the cloud. The flow of network
that is been created by cloud computing systems shows users’ behavior in
service operation or use. Traffic analysis and the recognition of all significant
application flows are important tools for modeling service usage, building
up patterns for identifying normal system operations [1] .
The cloud computing environment has faced numbers of security
challenges. Most of them have been fixed up to an extent, other security
aspects spring up and it’s vital to know before organizations switch fully.
Intrusion detection system in cloud networks plays a very important role
as the active security defense against intruders. IDS needs to be employed
properly in the cloud networks, because it requires scalability, efficiency
and virtualized-based approach in implementation. Sabastian Roschke et al.
A Review of Anomaly Detection Systems in Cloud Networks and ... 15
proposed that the users of cloud computing have a limited control over its
data and resources that have been hosted on a cloud service provider remote
servers [2] . Due to this proposed theory, it automatically becomes the
responsibility of the cloud service provider to oversee the IDS in the cloud
environment. Additionally, network communication between cloud provider
and its customers affects significantly the performance of most cloud-based
applications [3] . Analyzing the flow of network traffic provides insights on
how applications behave and also their performance in cloud environment.
Therefore, it is necessary to develop network traffic measurement and
analysis techniques to improve availability, performance and security in
cloud computing environments.
On the other hand, managing and analyzing network traffic of large
scale cloud systems is a challenging task. The techniques used to monitor
and analyze traffic in conventional distributed systems differ from cloud
computing systems. In conventional approaches, assumptions are made
that network flows follow some patterns, which is acceptable for corporate
applications, but cloud applications may have significant changes in traffic
patterns [4] .
In the first section of this paper the concept of anomaly detection is
described and taxonomies of anomalies are discussed broadly. Additionally,
separate sections discuss security measures and comparison among basic
cloud storage applications such as Google Drive, ICloud and Dropbox to
highlight their security preferences and mechanisms.
TAXONOMY OF ANOMALIES
Anomaly detection aspires at finding the presence of anomalous patterns
in network traffic and usual detection of such outline can provide network
administrator with extra information source to identify network behavior
or tracing and locating the root cause of faults in a network [8] . Anomalies
can be classified into three categories: as Point Anomalies, Contextual
Anomalies and Collective Anomalies [9] [10] .
Point Anomalies
This is when an individual data instance deviates from its normal activity or
form it is said to be anomalous, because other data are normal. This shows
that the anomalous activity lies outside the boundaries of the normal region.
This is the easiest type of anomaly amongst the 3 types or categories and it
is the strength or importance of anomaly detection. Figure 2 illustrates the
point anomalies.
18 Security of Cloud-based systems
Contextual Anomalies
The contextual anomalies occur when the occurrence of information is or
shows traces of anomalous character in an exact or precise context, which
is the unwanted behavior of activities that surrounds an individual data
instance. Figure 3 illustrates the Contextual Anomaly.
As it is shown on Figure 3, when this occurs it is characterized as a related
anomaly. This requires an idea or notion of context in the data instance. It is
also referred to as conditional anomalies.
Collective Anomaly
This is when related data instances collected acts as anomalous or show
unwanted activities related to the entire data set. In collective anomaly,
the individual data instance with collective anomaly are not otherwise said
to be anomalous on their own because the collective anomaly requires a
relationship between or among data instances; Sequential, Spatial, and
Graph data to cause a collective anomaly. But their occurrence as a whole
or collection is or can be anomalous. Figure 4 illustrates the Collective
anomaly.
the cloud network. There’s also an added level of focus in this technique
for anomaly detection. Data mining techniques are more flexible and easily
to deploy at any point. Putting data mining into effect in the cloud network
makes available the opportunity to extract meaningful information from data
warehouse that are integrated into the cloud, this reduces the infrastructure
storage costs. Customers or users of a cloud service only have to pay for
the data mining tool that’s been used [19] .Data mining is typically used
by Cloud Service Providers to provide a much better service for their users
or clients using their cloud service [19] . The downside in this is that if the
clients are not informed of the information that’s been collected and used for
mining, there’s a violation of their privacy and it’s illegal. There are varieties
of issues available in data mining detection in cloud based networks which
are the priority replacement of preserving privacy and setting the wrong
parameters of these privacy settings while using different rules and strategy
to enhance cloud network security.
Dropbox
Dropbox is a public cloud storage, which was developed by 2 graduate of
MIT who always forget or misplace their USB devices holding information
that they need to use momentarily. Due to this Dropbox was brought to
light in the IT world. In 2007 Dropbox Inc. was founded, it provides cloud
storage, client software and file synchronization [21] . Dropbox allows it
users to upload their files or folders into the Dropbox folder where it can
be viewed or shared on any device at any time as long as the device has
Dropbox installed along with a username and password and also internet
connection for synchronization.
Dropbox was developed for personal use that was the intention of the
two MIT graduate, but as of 2011 the cloud application have housed over 50
million users worldwide storing over 20 billion files and occupying petabyte
of storage. Dropbox gives a 2 GB cloud storage space for free, but additional
space can be purchased. Dropbox application is available for windows,
Apple OS X, Android, and Linux [21] .
24 Security of Cloud-based systems
Dropbox uses SQLite 3 database for ensuring data integrity and no data
redundancy when users communicate with the database. The network traffic
is fully transported over HTTPS, Proper certificate checking is done during
the authentication process and OpenSSL is used to tackle with security
issues in Dropbox services [17] .
The usage of OpenSSL increase security for authentication and
authorization of Dropbox users. NCrypt wrapper is used by the Dropbox.
The NCrypt wrapper creates security where there’s none. The NCrypt is a
file encyptor/decryptor and uses AES as its encryption algorithm [17] [18] .
It minimizes the exposure of plaintext password in memory and converts
the plaintext to a SHA-1 hash before erasing the plaintext from hard drive
immediately, and once the SHA-1 is used to make a key for encryption it is
wiped form the memory too [17] -[19] . RSYNC (Remote Synchronization)
Protocol is used, which allows a user to synchronize files between two or more
computer device making sure that the same file is available in all connected
device. Remote device unlinking is another technology used in Dropbox [24] .
Google Drive
The “Google Drive” is the Google version of cloud storage, and it is one of
the popular cloud services. It supports photos, videos, documents and other
files. There’s a 15 GB free storage given that can be increased at any time
by the user. Google drive provides generic applications for viewing of more
than 30 file types without having to install the corresponding application
into your computer system for viewing the corresponding file type. The
Google drive provides unlimited file size upload quotation for uploading
files into corresponding user drive.
iCloud
iCloud is cloud storage from Apple Inc. It was launched on October 12,
2011 [30] . iCloud offers its users with the means to store data such as;
documents, images, videos, etc. users can also backup their iOS devices
directly to the iCloud wirelessly. As of July 2013, the iCloud service had 320
million users [31] [32] . The iCloud was first branded as iTools in 2000, Mac
in 2002, and MobileMe in 2008 [32] .
Contents that are stored in Dropbox can be viewed and accessed using
a web interface like a browser. Different set of domain names are used to
identify public and private operations; URLs that contain dl-web.dropbox.
com are associated with the private contents, while the dl.dropbox.com is
associated with the public shared files [37] .
Google Drive is best for creating of documents and sharing of files.
You can create spreadsheets, presentations, drawing, a new document
etc. and stored files can be accessed anywhere with smartphones having
Google Drive apps installed and desktop applications are available for PCs
and Mac. Synchronization of files between PC and Google Drive is done
automatically [37] .
As it is shown on Figure 7, Google Drive supports Microsoft Word
documents, PowerPoint presentations, Adobe InDesign, Adobe Illustrator,
28 Security of Cloud-based systems
Microsoft Excel, Adobe Photoshop, Wave Audio files, Adobe Reader, etc.
with these applications installed in the Google Drive by the cloud service
provider, it makes it may easy for users to edit, create and view respective
documents without having to install corresponding application on every
device.In Table 1 shown, the various security measures of the Dropbox,
Google Drive, and iCloud shows that the security infrastructure of various
cloud services differs in the perspective of data security, availability, and
control.In Table 2, Dropbox gives 2 GB of free storage to a subscribed user
of its cloud services; additional storage space can be added by buying a
premium package. Google Drive gives 15 GB free storage space to its users,
also additional storage can be purchased to increase the storage capacity,
finally iCloud gives 5 GB free storage to its users and additional storage
is available to users for a price. For users going for a free large storage
capacity Google Drive has a better offer. Dropbox, Google Drive and iCloud
allow any file type to be stored in their cloud server by their clients. Offline
feature is also available so users can download a file to view later even when
there’s no internet connection.
Dropbox, Google Drive and iCloud allow any file type to be stored in
their cloud server by their clients. Offline feature is also available so users
can download a file to view later even when there’s no internet connection.
As it is shown in Table 3, the cloud services differ also in terms of price,
storage and performance. Table 3 shows the price difference in services of
Dropbox, Google Drive, and iCloud. However, it depends on the user and
its choice of product.
Table 4 indicates the overall capability of Cloud storage applications.
As it can be seen from the table, the Dropbox is the only cloud storage
application that allows all features while iCloud and Google Drive does not.
CONCLUSION
Arif Sari Anomaly detection in could networks is a wide area of research,
and it holds a good number of developments and proposing of detection
systems. Anomalous activities occur always in our networks cloud based
or non- cloud based. With the different types of methods or techniques in
anomaly detection in cloud based network, detection of unwanted behavior
can be traced, detected, stopped. These techniques have their limitations
that create a gap between their performance metrics. In cloud based network
hybrid anomaly detection system or method should be used so as to have a
more efficient and high performance system. In this paper, we have discussed
30 Security of Cloud-based systems
REFERENCES
1. Oliveira, A.C., Chagas, H., Spohn, M., Gomes, R. and Duarte, B.J.
(2014) Efficient Network Service Level Agreement Monitoring for
Cloud Computing Systems. 2014 IEEE Symposium on Computers and
Communications (ISCC), Funchal, 23-26 June 2014, 1-6.
2. Roschke, S., Cheng, F. and Meinel, C. (2009) Intrusion Detection in
Cloud. Eight IEEE International Conference on Dependable Automatic
and Secure Computing, Liverpool, 729-734.
3. Zhang, Q., Cheng, L. and Boutaba, R. (2010) Cloud Computing: State-
of-the-Art and Research Challenges. Journal of Internet Services and
Applications, 1, 7-18. http://www.springerlink.com/index/10.1007/
s13174-010-0007-6
4. Wang, C. (2009) Ebat: Online Methods for Detecting Utility
Cloud Anomalies. Proceedings of the 6th Middleware Doctoral
Symposium, ser. MDS ’09. New York, ACM, 4:1-4:6. http://doi.acm.
org/10.1145/1659753.1659757
5. Hussain, M. (2011) Distributed Cloud Intrusion Detection Model.
International Journal of Advanced Science and Technology, 34, 71-82.
6. Gul, I. and Hussain, M. (2011) Distributed Cloud Intrusion Detection
Model. International Journal of Advanced Science and Technology, 34,
71-81.
7. Shelke, P.K., Sontakke, S. and Gawande, A.D. (2012) Intrusion
Detection System for Cloud Computing. International Journal of
Scientific & Technology Research, 1, 67-71.
8. Denning, D.E. (1987) An Intrusion Detection Model. IEEE Transactions
on Software Engineering, Vol. SE-13, 222- 232.
9. Marhas, M.K., Bhange, A. and Ajankar, P. (2012) Anomaly Detection
in Network Traffic: A Statistical Approach. International Journal of IT,
Engineering and Applied Sciences Research (IJIEASR), 1, 16-20.
10. Gu, Y., McCallum, A. and Towsley, D. (2005) Detecting Anomalies in
Network Traffic Using Maximum Entropy Estimation. Proceedings of
Internet Measurement Conference, October 2005.
11. IBM Security Network Intrusion Prevention System. Technical Report.
http://www-01.ibm.com/software/tivoli/products/security-network-
intrusion-prevention/
12. Cisco Intrusion Prevention System. Technical Report, Cisco.
32 Security of Cloud-based systems
24. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J. and Brandic, I. (2009)
Cloud Computing and Emerging IT Platforms: Vision, Hype, and
Reality for Delivering Computing as the 5th Utility. Future Generation
Computer Systems, 25, 599- 616. http://dx.doi.org/10.1016/j.
future.2008.12.001
25. Sara, T., Vance, C., Fenger, T., Brunty, J. and Price, J. (2013) Forensic
Analysis of Dropbox Application File Artifacts Recovered on Android
and iOS Mobile Devices.
26. Bermudez, I., Mellia, M., Munafo, M.M., Keralapura, R. and Nucci,
A. (2012) DNS to the Rescue: Discerning Content and Services in a
Tangled Web. Proceedings of the 12th ACM SIGCOMM Conference
on Internet Measurement, IMC’12, Boston, 14-16 November 2012,
413-426. http://dx.doi.org/10.1145/2398776.2398819
27. Ruff, N. and Ledoux, F. A Critical Analysis of Dropbox Software
Security.
28. Wallen, J. (2014) Easy Steps for Better Google Drive Security. www.
techrepublic.com/article/easy-steps-for-better-google-drive-security
29. www.hongkiat.com/blog/dropbox-gdrive-skydrive/
30. Singh, J. and Jha, A. (2014) Cloud Storage Issues and Solutions.
International Journal of Engineering and Computer Science, 3, 5499-
5506.
31. Barth, D. (2013) Google Cloud Storage now Provides Server-Side
Encryption. www.googlecloudplatform.blogspot.com/2013/08/
google-cloud-storage-now-provides.html
32. GBacom News. http://GBaom.com/apple/apple-may-have-snapped-
up-icloud-com
33. CNET News. http://news.cnet.com/8301-13579_3-20068165-37.html
34. Computerworld Report Articles, on iCloud. http://www.computerworld.
com/s/article/9216301/Reports_Apple_acquires_icloud.com_domain
35. Voo, B. (2014) Cloud Storage Face-Off: Dropbox vs Google Drive vs
SkyDrive. http://www.hongkiat.com/blog/dropbox-gdrive-skydrive/
36. http://www.whois.net/whois/icloud.de
37. Marshall, G. (2014) Best Cloud Services Compared: Google Drive vs
OneDrive vs Amazon vs iCloud vs Dropbox. http://www.techradar.
com/news/internet/cloud-services/best-cloud-storage-dropbox-vs-
skydrive-vs-google-drive-vs-icl oud-1120024/2#articleContent
34 Security of Cloud-based systems
38. Drago, I., Mellia, M., Munafo, M.M., Sperotto, A., Sadre, R. and
Pras, A. (2012) Inside Dropbox: Understanding Personal Cloud
Storage Services. Proceedings of the 12th ACM Internet Measurement
Conference, IMC’12, Boston, 14-16 November 2012, 481-494. http://
dx.doi.org/10.1145/2398776.2398827
39. Halevi, S., Harnik, D., Pinkas, B. and Shulman-Peleg, A. (2011)
Proofs of Ownership in Remote Storage Systems. Proceedings of the
18th ACM Conference on Computer and Communications Security,
CCS’11, Chicago, 17-21 October 2011, 491-500. http://dx.doi.
org/10.1145/2046707.2046765
40. Harnik, D., Pinkas, B. and Shulman-Peleg, A. (2010) Side Channels in
Cloud Services: Deduplication in Cloud Storage. IEEE Security and
Privacy, 8, 40-47. http://dx.doi.org/10.1109/MSP.2010.187.
CHAPTER
3
A Survey of Cloud Computing
Detection Techniques Against
DDoS Attacks
ABSTRACT
A Distributed Denial of Service Attack (DDoS) is an attack in which
multiple systems compromised by a Trojan are maliciously used to target
a single system. The attack leads to the denial of a certain service on the
target system. In a DDoS attack, both the target system and the systems
used to perform the attack are all victims of the attack. The compromised
systems are also called Botnets. These attacks occur on networked systems,
among them the cloud computing facet. Scholars have tried coming up
with separate mechanisms for detecting and preventing such attacks long
before they occur. However, as technology progresses in advancement so do
the attack mechanisms. In cloud computing, security issues affect various
stakeholders who plan on cloud adoption. DDoS attacks are such serious
concerns that require mitigation in the cloud. This paper presents a survey
of the various mechanisms, both traditional and modern, that are applied in
detecting cloud-based DDoS attacks.
Keywords: DDoS, IDS, Signature, Anomaly, Hybrid, SVM, Neural
Network, Cloud, Machine Learning, Big Data
INTRODUCTION
Internet has led to cloud computing which constitutes three major services
namely platform as a service, infrastructure as a service, and software as a
service [1] . This increase in data and information storage within the cloud
environment has raised cloud security concerns on the safety of data and
information. It has also led to distributed attacks such as ICMP flood, the
Ping of Death, the slowloris, the SYN flood attack, the UDP flood attack,
malformed packet attacks, protocol vulnerability exploitation, and the HTTP
flood molest [2] [3] . The choice on any attack type depends on the ease of
such exploitation or its mastery by the attacker.
Previous researchers have expounded on how Distributed attacks in the
cloud can be detected, prevented and mitigated. These techniques greatly
apply two major detection mechanisms of signature or anomalies. They can
use one, both, or be intelligent enough to learn new attacks based on set
rules. The next section offers a review of various traditional based intrusion
detection techniques. Further, it reviews the various classes of cloud
computing based detection methods and offers examples. The underlying
purpose being to compare the various detection methods and point out the
strengths and limitations they pose. Beyond the review, the paper will show
how specific techniques by specific scholars were successful or failed in
the detection process against DDoS attacks in the cloud. In the analysis, the
performance evaluation metrics used in a given technique will be shown.
Additionally, the analysis will point out the various data sets and tools used
by these techniques. As such, it will be possible to decide which of the
techniques is efficient or has potential for future enhancement.
A Survey of Cloud Computing Detection Techniques ... 37
LITERATURE REVIEW
Existing techniques utilize different forms of algorithms to detect and
determine attack levels within the cloud. HTTP-DoS and XML-Dos attacks
are known to lead to exhaustion of resources [4]. Cloud-based intrusion
detection techniques are an improved version of traditional intrusion
detection system. The first section of this paper discusses various traditional
intrusion detection techniques that are as well applied in the cloud. The
second section will show cloud-specific intrusion detection techniques.
HTTP based DDoS attacks is proposed by [10] . It entails a five step filter
tree approach of cloud defense. These steps include filtering of sensors and
Hop Counts, diverging IP frequencies, Double signatures, and puzzle solving
[10] . The approach helped in determining anomalies with the various Hop
Counts and treating the sources of such anomaly as attack source.
it, the victim client requests for message reconstruction in order to pull out
the CTM which helps in retracing the source of the attacking request [16]
[17] .Ismail presented the covariance matrix approach to detect flood based
denial of service attacks. A statistical method scrutinizes the correlativity
aspects of network traffic and evaluates the resulting covariance matrix
to the already preset one as exhibited by normal traffic. The covariance
approach proved to be very effective and accurate in the Neptune and Smurf
attack simulation experiments [16] . A separate variation that utilizes both
the covariance approach and entropy based system is proposed by [18] that
offers in-depth detection at the host and network levels.A table illustrating
the discussed traditional intrusion detection techniques and as presented in
the works of [8] [10] and [11] alongside their advantages and limitations is
depicted in Table 1.
Anomaly- 1) Higher the false alarm rate for 1) While building profile, a net-
based IDS unknown attacks work is left in an unmanaged state
2) New threats are easily detectable hence prone to attack
without updating the database 2) When malicious activities as-
3) System is self learning. It gradu- sume the features of normal traffic
ally learns the network and builds it is untraceable.
profile 3) Collected behavior and features
4) The more it is used the higher determine the accuracy of detec-
the accuracy level tion
Fuzzy 1) Increased flexibility in address- 1) Offers low accuracy levels
logic IDS ing uncertain problems compared to ANN
SVM 1) Correctly classifies intrusions 1) Classifies only distinct features
based IDS even with limited sample data hence the features have to be pre-
2) Ability to handle huge number processed before their application
of features
Genetic 1) Offers best detection features 1) Very complex
algorithm 2) Has better efficiency 2) Its usage is of specific pattern
IDS as opposed to a general pattern
ANN 1) Effectively classifies unstruc- 1) Requires a lot of time at the
based IDS tured network packets training phase
2) Classification efficiency 2) Has lesser flexibility
achieved by introducing multiple 3) Effective training requires
hidden layers larger data samples
Hybrid 1) Efficient as it combines multiple 1) Its computational costs are high
Tech- techniques to accurately classify
niques rules
Using the HDE, the authors were able to calculate the attack probability
by combining both the anomaly and signature-based detectors. Using the
penetration test data, 99% accuracy on True Positive rate (TPR) was attained
while DARPA dataset produced a 92.1% accuracy level on TPR [38] .
data into CSV file which is then converted into UDP stream by a streamgen.
A Naive Bayes Classifier present through MapReduce job writes records
into an output file which is then read by a java program into disk. The
results are graphically presented on a web interface using a D3 render. An
architecture of this system is presented in Figure 6. Their approach proved
a proof-of-concept technique with 90% success in detecting intrusions
through the use of Hadoop and Naives classifier. But then, their results were
based on comparison with another technique which is a small percentage of
all available techniques and parameters for analyzing and detecting attacks.
The key and value pair is basically the source IP and port and the destina-
tion IP and port. This approach utilized the key and value pair mechanism as
the great interest was determining problems based on raw data packet flow.
By using the Ranker algorithm, the authors were able to determine from
the entire feature set for the most influential features. The method measures
Information Gain as described in the equation below.
Information Gain (Class, Attribute)= H(Class)− H(Class/Attribute)
Capture files from existing Bot attacks such as those of Keliho-Hlux, Con-
ficker, Storm, Zeus, and Waledac were used to train the system’s classifica-
tion module. The datasets were PCAP captures. 90% of the dataset was used
as training set while 10% formed the testing set. The classifier validity was
tested by comparing results of the predicted against those of the experiments
using the Pearson product-moment coefficient derived by the formula below
[42] .
A DDoS attack
detection algorithm based on MDRA is shown in Figure 9. Using Precision,
FPR, TNR, and DR formulae, this approach helps in DDoS attack detection
using MDRA and MCA [43] .
Table 4. TP, FP, TN, and FN Results using MDRA and MCA.
Author/ Detection Technique Performance Evalu- Datasets Tools used Advantages Disadvantages Limitations
Date ation metrics
Csubak, Big data Testbed for Network Packets per second Simulated 1) Snort 1) Using Snort, a 1) Since the 1) The technique
Szucs, Attack detection rate network traffic 2) NS3 user defines their technique has not been
Voros, using NS3, 3) Wireshark, own rules for which checks the applied on large
and Kiss, Normal traffic 4) Python-dpkt network traffic is already set scale rather only
2016 data ranging package analyzed against packet rates tested via simula-
from MBs to 2) Snort can analyze threshold, at- tion
GBs and log network tacks occurring
packets in real time. below the set
3) Big data testbed is threshold are
capable of handling undetectable
hundreds of GB
network traffic
Chen Xu, Cloud computing based net- Traffic volume per Uses real Large 1) Hadoop 1) Three-fold 1) Accuracy 1) Accuracy of
Mahalin- work monitoring and threat minute to detect traffic data 2) Spark solution of network level relies on the detection
gam Ge, detection system for critical abnormal behavior from logs 3) Mysql data- monitoring, threat collected data greatly relies on
Nguyen, infrastructures base detection, and system samples. collected traffic
Yu, and 4) PHP with performance 2) Cannot information
Lu, 2016 AJAX 2) Fast data process- detect dynamic 2) The technique
ing by concurrently attacks is only suitable
running Hadoop and 3) New for analyzing
Spark components static data
3) Easy for network require extra
administrators to monitoring
detect any abnormal agents
network behaviors
A Survey of Cloud Computing Detection Techniques ...
55
56
Osanaiye, Conceptual Packet inter-arrival Conceptual 1) CUSUM 1) Easily detects 1) Abnormally 1) There is
Choo, Cloud DDoS change-point time (IAT) network traf- algorithm abnormal packet based attacks no standard
and detection framework fic data. No pattern by comparing cannot learn mechanism
Dlodlo, simulation or with normal packet new attack to determine
2016 real data tests behavior types the optimal
done. 2) Able to detect 2) Leads to threshold for
DDoS attacks using a lot of false determining
statistical anomaly positives and abnormal traffic
3) IAT feature helps false negatives
determine the prob- and no optimal
ability of a DDOS threshold is set
attack long before it
occurs
Boris- DDOS attack detection in Incoming network Uses Hping 1) Real Service 1) The technique 1) For attack 1) The tech-
enko, cloud computing using Data traffic data vectors to simulate in Virtual Net- performs test on real detection, nique has no
Smirnov, Mining Techniques SYN, NTP, and work Framework and virtual nodes powers have capacity for
Noviko- HTTP-based (RSVNet) 2) RSVNet is used to be set to act complex at-
va, and traffic data, 2) Ansible to implement and as threshold tacks
Shorov, source IP and 3) Siege 3.1.0 create new protection and hence the
Security of Cloud-based systems
Hameed, Live DDOS Detection with File size, number of Real-time Live 1) HADEC 1) Ability to analyze 1) Hadoop 1) Using small
Ali, and Hadoop files before detec- network traffic 2) Apache huge volume of does not offer log files implies
IT Secu- tion, path to save Hadoop DDOS flood attacks parallelism for reduced num-
rity Labs, captured file in less time small log files ber of attackers
June 2) Capturing
2015 consumes over
half of the
overall detec-
tion
eetil and Real-time Intrusion Pack- 10% KDD 1) Snort 1) Increased parallelism due to 1) This 1) The technique may not
Gao, 2013 Detection System by using ets per intrusion 2) Tshark the Naive Bayes algorithm ap- perform well in a distributed
Hadoop and Naive Bayes sec- detection 3) D3 2) Using Hadoop-based Naive proach environment since its ineffective
Classification ond, data- Bayes algorithm training speed com- in a heterogenous cluster
packets set, Live increases implying faster detec- pared
per network tion rates its
minute stream 3) High detection rate of perfor-
packets as over 434 network packets per mance
training minute to a
data previ-
ous ap-
proach
rather
than
testing
new at-
tacks
Cepheli, Hybrid Intrusion Detection Pro- DARPA 1) Gaussian 1) Combines the power of 1) 1) Training data does not reflect
Buyuk- System (H-IDS) for DDOS tocol 2000 Mixture Model anomaly and signature based Cannot real network data implying
corak, attacks fre- dataset, 2) SNORT techniques for a more accurate detect reduced performance
and Kurt, quen- Real train- detection com-
2016 cies, ing data 2) Combining anomaly and plex
packet from a past rule-based detection reduces DDoS
sizes, penetra- detection delays attacks
packet tion test of 3) Easily integrates as a mod- 2)
inter- commercial ule with other IDS Cannot
arrival bank in detect
times Turkey attacks
inter-
nally
gener-
ated
attacks
A Survey of Cloud Computing Detection Techniques ...
57
58
Singh, Using Random Forests for Packet CAIDA 1) Hadoop 1) Usable for predictive data 1) 1) Inability to block traffic from
Guntuku, Big Data Analytics in Peer- buffer datasets. 2) Mahout modeling as Mahout ensures High botnets or isolate compromised
Thakur, to-Peer Botnet detection sizes 84,030 3) MapReduce high data accuracy and time com- machines
and Hota, instances 4) Tshark using efficacy puta-
2014 of mixed Libpcap library 2) Ease of detecting peer-to- tional
traffic peer attacks due to ability to costs
process high bandwidths in due to
real-time with 30 seconds delay the use
of Ma-
pRe-
duce
jobs
2) Can-
not run
with
non-
distrib-
uted
clas-
sifiers
Security of Cloud-based systems
due
to the
large
space
re-
quired
by data
and
JVM
Korad, Using Hadoop on Live Packet Simulation 1) Hadoop 1) Ability to handle and ana- 1) Can- 1) Ineffective with few nodes due
Kadam, Network to detect DDOS file of Live 2) Wireshark lyze petabytes of data with ease not be to the high computational costs
Deore, sizes HTTP GET 2) Hadoop clustering help used to
Jadhav, and packet, in harnessing the processing detect
and Patil, packet UDP, TCP, power of many computer as inter-
2016 pairs and ICMP one nal
packet. 3) Ease of management and attacks
Masked paremeter setting through a such as
timestamp web interface from
mem-
ory
corrup-
tion
2)
High
com-
puta-
tional
costs
from
com-
bining
mul-
tiple
nodes
Jia, Ma, Novel Real-Time DDoS At- Preci- Knowledge 1) High precision rates of 1) The 1) Since the approach is theo-
Huang, tack Detection Mechanism sion Discovery and almost 100% for True Negative tech- retical, it may not be possible to
Lin, and Based on MDRA Algorithm rate, Data Mining Rates (TNR) nique ascertain its effectiveness
Sun, 2016 in Big Data TNR, (KDD) Cup 2) Reduced CPU computation only
mem- 1999 data set cost depicts
ory re- for training and 3) Reduced memory consump- abnor-
source, testing. The tion compared to MCA based mal
com- data set is real techniques net-
puting 4) Network DDoS attacks in work
com- real-time traffic
plex- after
ity, and it has
A Survey of Cloud Computing Detection Techniques ...
time been
cost pre-
defined
59
60 Security of Cloud-based systems
Figure 10. Using precision to compare detection based on MDRA and MCA.9
Figure 11. Using TNR to compare detection based on MDRA and MCA.10
CONTRASTIVE ANALYSIS
Each discussed technique possesses its strengths and limitations. Their
strengths are based on the need to fill a certain limitation offered by a previous
technique. Before a scholar assumes the feasibility of their technique they
make comparisons of their methods to those of their predecessors. To study
an ideology, a researcher has to consider all the variants and objects making
it up and their interrelation [44] . Further, they need to apply objective
research to analyze and contrast their findings.
A Survey of Cloud Computing Detection Techniques ... 61
NOTES
Cepheli, O., Buyukcorak, S. and Kurt, K., G. (2016) Hybrid Intrusion
1
REFERENCES
1. Subramaniam, T. and Bethany, D. (2016) Preventing Distributed Denial
of Service Attacks in Cloud Environments. International Journal of
Information Technology, Control and Automation, 6, 23-32. https://
doi.org/10.5121/ijitca.2016.6203
2. Sivamohan, S., Veeramani, R., Liza, K., Krishnaveni, S. and Jothi, B.
(2016) Data Mining Technique for DDoS Attack in Cloud Computing.
International Journal of Computer Technology and Applications, 9,
149-156.
3. Masdari, M. and Marzie, J. (2016) A Survey and Taxonomy of DoS
Attacks in Cloud Computing. Security and Communication Networks,
2, 3274-3751. https://doi.org/10.1002/sec.1539
4. Bonquet, A. and Martine, B. (2017) A Survey of Denial-of-Service
and Distributed Denial of Service Attacks and Defense in Cloud
Computing. Future Internet, 9, 1-9. https://doi.org/10.3390/fi9030043
5. Kaur, A. and Anupama, K. (2015) A Review on Various Attack
Detection Techniques in Cloud Architecture. International Journal of
Advanced Research in Computer Engineering & Technology, 4, 3861-
3867.
6. Kene, S.G. and Deepti, P.T. (2015) A Review on Intrusion Detection
Techniques for Cloud Computing and Security Challenges. 2nd
International Conference on Electronics and Communication Systems,
Coimbatore, 26-27 Februaty 2015, Vol. 2, 227-231. https://doi.
org/10.1109/ECS.2015.7124898
7. Deshmukh, R.V. and Kailas, K.D. (2015) Understanding DDoS Attack
& Its Effect in Cloud Environment. Procedia Computer Science, 49,
202-210. https://doi.org/10.1016/j.procs.2015.04.245
8. Sattar, I., et al. (2015) A Review of Techniques to Detect and Prevent
Distributed Denial of Service (DDoS) Attack in Cloud Computing
Environment. International Journal of Computer Applications, 115,
23-27. https://doi.org/10.5120/20173-2370
9. Navaz, S., et al. (2013) Entropy Based Anomaly Detection System to
Prevent DDoS Attacks in Cloud. International Journal of Computer
Applications, 15, 42-47.
10. Ankita, P. and Fenil, K. (2015) Survey on DDoS Attack Detection and
Prevention in Cloud. International Journal of Engineering Technology,
Management, and Applied Sciences, 3, 43-47.
A Survey of Cloud Computing Detection Techniques ... 65
11. Modi, C., Dhiren, P., Bhavesh, B., Avi, P. and Muttukrishnan, R. (2013)
A Survey on Security Issues and Solutions at Different Layers of Cloud
Computing. The Journal of Supercomputing, 63, 561-592. https://doi.
org/10.1007/s11227-012-0831-5
12. Kacha, C.C., et al. (2013) Improved Snort Intrusion Detection System
using Modified Pattern Matching Technique. International Journal of
Emerging Technology and Advanced Engineering, 3, 81-88.
13. Parwani, D., et al. (2015) Various Techniques of DDoS Attacks
Detection and Prevention at Cloud: A Survey. Oriental Journal of
Computer Science & Technology, 8, 110-120.
14. Dewal, P., et al. (2016) A Survey of Intrusion Detection Systems and
Secure Routing Protocols in Wireless Sensor Networks. International
Journal for Research in Emerging Science and Technology, 3, 16-20.
15. Modi, K. and Abdul, Q. (2014) Detection and Prevention of DDoS
Attacks on the Cloud using Double-TCP Mechanism and HMM-Based
Architecture. International Journal of Cloud Computing and Services
Science, 3, 113-120.
16. Chawla, I., et al. (2015) DDoS Attacks in Cloud and Mitigation
Techniques. International Journal of Innovative Science, Engineering
& Technology, 2, 596-600.
17. Reddy, S.V., et al. (2012) Efficient Detection of Ddos Attacks by
Entropy Variation. IOSR Journal of Computer Engineering, 7, 45-67.
https://doi.org/10.9790/0661-0711318
18. Girma, A., et al. (2015) Analysis of DDoS Attacks and an Introduction
of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud
Computing Environment. 12th International Conference on Information
Technology—New Generations, Las Vegas, 13-15 April 2015, 212-
217. https://doi.org/10.1109/ITNG.2015.40
19. Nitesh, B., et al. (2017) Mitigating Distributed Denial of Service Attack
in Cloud Computing Environment using Threshold based Technique.
Indian Journal of Science and Technology, 3, 1-7.
20. Iyengar, N. and Gopinath, G. (2015) Trilateral Trust Based Defense
Mechanism against DDoS Attacks in Cloud Computing Environment.
Cybernetics and Information Technologies, 15, 122. https://doi.
org/10.1515/cait-2015-0033
21. Al-Hemairy, M., et al. (2009) Towards More Sophisticated ARP
Spoofing Detection/Prevention Systems in LAN Networks.
66 Security of Cloud-based systems
org/10.5120/12579-9201
32. Subapriya, S. and Nathan, R. (2014) DNIDPS: Distributed Network
Intrusion Detection and Prevention System. International Journal of
Innovative Science, Engineering & Technology, 6, 56-67.
33. Lonea, A.M., et al. (2012) Detecting DDoS Attacks in Cloud Computing
Environment. International Journal of Computers Communications &
Control, 8, 70. https://doi.org/10.15837/ijccc.2013.1.170
34. Patel, S. and Fenil, K. (2016) A Review Paper of an Encryption
Scheme using Network Coding for Energy Optimization in MANET.
International Conference on Wireless Communications, Signal
Processing and Networking, Chennai, 23-25 March 2016, Vol. 34, 45-
67. https://doi.org/10.1109/WiSPNET.2016.7566298
35. Csubak, D., Szucs, K., Voros, P. and Kiss, A. (2016) Big Data Testbed
for Network Attack Detection. Acta Polytechnica Hungarica, 13, 47-
57.
36. Chen, Z., Xu, G., Mahalingam, V., Ge, L., Nguyen, J., Yu, W. and Lu,
C. (2016) A Cloud Computing Based Network Monitoring and Threat
Detection System for Critical Infrastructures. Big Data Research, 3,
10-23. https://doi.org/10.1016/j.bdr.2015.11.002
37. Osanaiye, O., Choo, K.R. and Dlodlo, M. (2016) Distributed Denial of
Service (DDoS) Resilience in Cloud: Review and Conceptual Cloud
DDoS Mitigation Framework. Journal of Network and Computer
Applications, 67, 147-165. https://doi.org/10.1016/j.jnca.2016.01.001
38. Cepheli, O., Buyukcorak, S. and Kurt, K.G. (2016) Hybrid Intrusion
Detection System for DDoS Attacks. Journal of Electrical and
Computer Engineering, 2016, Article ID: 1075648. https://doi.
org/10.1155/2016/1075648
39. Hameed, S. and Ali, U. (2016) Efficacy of Live DDoS Detection with
Hadoop. IEEE/IFIP Network Operations and Management Symposium,
Istanbul, 25-29 April 2016. https://arxiv.org/pdf/1506.08953.pdf
40. Korad, S., Kadam, S., Deore, P., Jadhav, M. and Patil, R. (2016)
Detection of Distributed Denial of Service Attack with Hadoop on Live
Network. International Journal of Innovative Research in Computer
and Communication Engineering, 4, 92-98.
41. Veetil, S. and Gao, Q. (2014) Real-Time Network Intrusion Detection
using Hadoop-Based Bayesian Classifier. In: Akhgar, B. and Arabnia,
H.R., Eds., Emerging Trends in ICT Security, Elsevier Inc., 281-299.
68 Security of Cloud-based systems
https://doi.org/10.1016/B978-0-12-411474-6.00018-9
42. Singh, K., Guntuku, S.C., Thakur, A. and Hota, C. (2014) Big Data
Analytics Framework for Peer-to-Peer Botnet Detection using Random
Forests. Information Sciences, 278, 488-497. https://doi.org/10.1016/j.
ins.2014.03.066
43. Jia, B., Ma, Y., Huang, X., Lin, Z. and Sun, Y. (2016) A Novel Real-
Time DDoS Attack Detection Mechanism Based on MDRA Algorithm
in Big Data. Mathematical Problems in Engineering, 2016, Article ID:
1467051. https://doi.org/10.1155/2016/1467051
44. Jin, W. and Yu, Z. (2016) The Analysis of Information System Security
Issue Based on Economics. International Conference on Information
Engineering and Communications Technology, Kunming, 21-22 2016.
https://doi.org/10.12783/dtetr/iect2016/3801
45. Prasad, K.M., Reddy, R.A. and Rao, K.V. (2014) DoS and DDoS
Attacks: Defense, Detection and Traceback Mechanisms—A Survey.
Global Journal of Computer Science and Technology: E Network Web
& Security, 14, 16-32.
CHAPTER
4
Generation of Labelled Datasets
to Quantify the Impact of
Security Threats to Cloud Data
Centers
ABSTRACT
Anomaly based approaches in network intrusion detection suffer from
evaluation, comparison and deployment which originate from the scarcity of
adequate publicly available network trace datasets. Also, publicly available
datasets are either outdated or generated in a controlled environment.
Due to the ubiquity of cloud computing environments in commercial
INTRODUCTION
Intrusion detection is a very interesting topic among the researchers. In
particular, anomaly detection is of high interest since it helps in detecting many
novel attacks. However, there has not been a proper application of this system
in the real world due to the complexity of these systems, as these require
continuous testing and evaluation and proper tuning prior to deployment [1]
. The most ideal methodology for running these systems is to train them with
real labeled network traces which consist of comprehensive set of intrusions
and abnormal behavior. Anomaly-based network intrusion detection systems
(IDS) model patterns of normal activity and detect novel network attacks [2]
[3] . However, these systems depend on the availability of normal profile
pattern. But these patterns can change over a period of time due to various
changes [2] [3] . This is a major challenge in itself as the availability of such
datasets is very rare and the systems have to depend on one or more available
datasets which lack understanding as they are heavily anonymized.
Another challenge is the comparison of IDS systems against one another.
The lack of appropriate public dataset severely affects the evaluation of IDSs
mainly affecting anomaly based detectors. Many existing datasets (KDD
& DARPA etc.) [4] - [6] are static making them obsolete, unmodifiable,
and irreproducible, despite being used widely. As with any other emerging
internet technology, security is a major challenge for clouds especially for the
migrating organizational data. These security risks can be well understood
if we have access to the network traces in the cloud. To the best of our
knowledge; there is no publicly available dataset which captures the normal
and anomalous network traces in the interactions between cloud users and
cloud data centers. Due to the ubiquity of cloud computing environments
Generation of Labelled Datasets to Quantify the Impact of Security ... 71
RELATED WORK
Cloud security issues have recently gained traction in the research
community where the focus has primarily been on protecting servers on
cloud providers (securing the low level operating systems or virtual machine
implementations). Unsecured cloud servers have been proven to be crippled
with novel denial-of-service attacks. Most existing work on network traffic
generation has not focused on applicability in the area of network security
and evaluation of anomaly based techniques. The authors in Sommer and
Paxson [7] have made observations on anomaly based network intrusion
detection mechanisms and have provided recommendations to further
improve research in this field [7] . They indicate that in order to improve
the intrusion detection systems, datasets play a crucial role to know the
system behavior. They also acknowledge that to obtain these datasets is very
difficult and to do so it must be done with some collaboration with network
operators. We have tried to implement the same in our work.
DHS Predict is a distributed repository of many hosts and providers at
major universities and other institutions. Datasets mainly include Domain
Name System (DNS) data, Internet Traffic Flow, Border Gateway Protocol
(BGP), Internet Topology Data, Intrusion Detection System (IDS) and
Firewall Data, and Botnet Behavior. Access to this dataset is available to
certain verified accounts at some locations. Despite the major contributions
by DARPA (Lincoln laboratory) [6] and KDD (UC Irvine) [4] datasets, they
have not been able to reproduce the real world scenarios which is criticized in
72 Security of Cloud-based systems
McHugh (2000) [8] and Brown et al. (2009) [9] . All these datasets are static
making them obsolete, unmodifiable, and irreproducible, despite being used
widely. Also the authors of the ISCX (2011) [10] dataset suggest a dynamic
approach for generating the dataset, but this does not reflect the real world
scenarios as the target servers they use are within the lab under the human
assistance. Also, not much research has been done on the implication of
vulnerabilities on the datacenter connecting the cloud user. In order to do so,
datasets play a key role in demonstrating how well a system behaves. To the
best of our knowledge, there is no publicly available dataset which captures
the normal and anomalous network traces in the interactions between cloud
users and cloud data centers. The systematic approach in this work addresses
the flaws in the ISCX [10] dataset for generating a dataset dynamically and
also shows the need for addressing the security issues in the cloud.
Amazon Datacenters
AWS is located in 9 geographical regions : US East (Northern Virginia),
US West (Northern California), US West (Oregon), AWS GovCloud (US)
Region, Sao Paulo (Brazil), Ireland, Singapore, Tokyo and Sydney [17] as
Generation of Labelled Datasets to Quantify the Impact of Security ... 73
AWS EU (Ireland)
AWS Asia Pacific (Singapore)
AWS Asia Pacific (Tokyo)
AWS Asia Pacific (Sydney)
Google Central US (Council Bluffs, IA)
Google Central US (Pryor Creek, OK)
Google Europe (Europe)
Microsoft Azure North-central US (Chicago, IL)
Microsoft Azure South-central US (San Antonio, TX)
Microsoft Azure West US (California)
Microsoft Azure East US (Boydton, Virginia)
Microsoft Azure East Asia (Hong Kong, China)
Microsoft Azure South East Asia (Singapore)
Microsoft Azure Northern Europe (Dublin, Ireland)
Microsoft Azure West Europe (Amsterdam, Nether-
lands)
Cloud Users
Users access cloud computing using networked client devices, such as
smartphones, desktop computers, laptops, tablets. The users are classified into
two categories: Mobile cloud user’s & Stationary cloud users. Mobile cloud
users are the clients with access to mobile devices like smartphone, tablet
etc. which use the resources of the cloud provider. Stationary users are the
ones like desktop computers for accessing the cloud and also for performing
research related to it. There are two main examples of stationary cloud users
Generation of Labelled Datasets to Quantify the Impact of Security ... 75
that are used for the research: PlanetLab, EmuLab. For our experiments we
use PlanetLab nodes which mimic stationary cloud users. PlanetLab is a group
of computers available as a test bed for computer networking and distributed
systems research. PlanetLab is a great tool for performing large-scale Internet
studies. Its power lies in that it runs over the common routes of the Internet and
spans nodes across the world, making it far more realistic than a simulation.
PlanetLab nodes utilize virtualization software, allowing applications to have
full access to the system kernel [20] .
DDoS in Cloud
Distributed denial of service (DDoS) is an attack which many nodes systems
attack one node all at the same time with a flood of messages. A distributed
denial-of-service (DDoS) attack is one in which a multitude of compromised
systems attack a single target, thereby causing denial of service for users
of the targeted system [22] [23] . There are two types of DDoS attacks: a
network-centric attack which overloads a service by using up bandwidth
and an application-layer attack which overloads a service or database with
application calls. For our experiments we use H-DOS in which we exploit
seemingly-legitimate HTTP GET or POST requests to attack a web server.
On July 17th 2013 a Distributed Denial-of-Service attack crippled the
servers at hosting services firm Network Solutions, disrupting thousands of
websites for several hours. DDoS attackers overwhelm servers by flooding
a company’s pipeline with unwanted network packets. Herndon, Va.-based
Network Solutions, which manages more than 6 million domains, said on
Facebook that its network security team was forced to respond to the attack.
The outage is one of at least a dozen outages at cloud hosting providers
impacting users in 2013. DDoS attacks are a common occurrence at hosting
providers, e-commerce businesses and financial institutions [24] . In June,
Network Solutions had its DNS servers hijacked and reconfigured to a
malicious website after it botched efforts to thwart a DDoS attack.
used to launch the attacks and few to generate normal traces. To perform
the experiments we have rented an Amazon EC2 instance with Windows
server 2008 as the operating system. Amazon provides various instances
which vary based on price, performance etc. There are various kinds like
General, Compute, Memory, Storage & GPU. Out of this we have selected
the General category. In the general category we chose t1.micro for our
experiments. T1 Micro instances (t1.micro) provide a small amount of
consistent CPU resources and allow you to increase CPU capacity in short
burst when additional cycles are available. They are well suited for lower
throughput applications and websites that require additional compute cycles
periodically [18] .
The rented instance is located in US-east region. The instance has the
following configuration: Processor: Intel(R) Xeon(R) CPU E5430 @ 2.66
GHz RAM: 595 MB Cache: 6MB Address sizes: 38 bits physical, 48 bits
virtual. Operating System: Windows Server 2008. The instance was launched
and then an Apache Server 2.0 was setup to host our website. The website
has a public IP of 72.44.46.206. We install and launch WIRESHARK in the
same instance for capturing and storing the network traces. These traces
are then moved to another system for monitoring and intrusion detection.
The PlanetLab nodes used for the attack are shown in the Table 3 and for
generating normal traces are shown in Table 2.
Protocols Port
SSH 22
HTTP 80
RDP 3389
DNS 53
We use a popular tool available online ‘lbd.sh’ [28] to determine whether
the web server is load balanced or not. Lbd (load balancing detector) detects
if a given domain uses DNS and/or HTTP Load-Balancing (via Server: and
Date: headers and differences between server answers). After running the
script on EC2, it was shown that EC2 does load balancing. Also we have
Generation of Labelled Datasets to Quantify the Impact of Security ... 81
tested whether the EC2 uses the Round robin DNS scheme, wherein the
server has one domain name but multiple IP addresses. After testing it was
found that the EC2 has only one IP linked to one domain name.
server or a domain controller. In our case we host two machines in the same
virtual private cloud (VPC) in Amazon EC2, one machine acts as host and
the second machine will be the attacker. The attacker machine will capture
the traffic between the host and the gateway as shown in the Figure 6.
the victims. For our experiment we have visited few websites like Facebook,
Gmail etc. when the attacker is not present and again revisited the same
websites in the presence of attacker. After collecting the traffic in both the
attack and normal scenarios we convert it into user readable format (.arff)
using tshark and then select the feature which best differentiates the normal
and attack traffic. We have sorted the following feature from the list of
features available “tcp.analysis.ack_rtt”. This feature represents the round
trip time. Figure 7 shows the difference between attack & normal traces
using the above feature.
Figure 7. Difference between normal and ARP spoof traffic from same Planet-
Lab nodes.
ETHICAL CONSIDERATION
Our experiments to implement the framework for generation and collection of
network traces involve real world instances and systems. This usually raises
an ethical debate as scanning remote network devices can sometimes lead to
adverse attacks. At the same time, developing a robust framework for network
traces without collecting data from the real world is very difficult. Simulation
tools and performing experiments with a controlled lab environment cannot
replicate the randomness of the real world network traffic. A recent journal
article that discusses the ethics of security vulnerability research [31] , states
that this type of zealous vulnerability research serves important social functions.
Amazon EC2 provides students and researchers instances (Penetration Testing)
that can be used for performing the experiments which involve attacks. For this
86 Security of Cloud-based systems
the user has to get the permission from AWS before conducting any tests [32] .
This approach is neither illegal nor unethical under the US laws. While accessing
the instances to collect the vulnerability information we have taken utmost
care not to disturb the host functions. We used minimum external resources to
accurately collect the traces. The target networks in/24 blocks were scanned in
a non-sequential order so that no organization is overwhelmed with our attacks.
Also we did not scan any router or instance unnecessarily.
ACKNOWLEDGEMENTS
This work was partially supported by Department of Homeland Security
(DHS) SLA grant 2014-ST-062- 000059 and Office of the Assistant Secretary
of Defense for Research and Engineering (OASD(R&E)) under agreement
number FAB750-15-2-0120.
Generation of Labelled Datasets to Quantify the Impact of Security ... 87
REFERENCES
1. Shiravi, A., Shiravi, H., Tavallaee, M. and Ghorbani, A.A. (2012)
Toward Developing a Systematic Approach to Generate Benchmark
Datasets for Intrusion Detection. Computers & Security, 31.3, 357-
374. http://dx.doi.org/10.1016/j.cose.2011.12.012
2. Mukkavilli, S.K., Shetty, S. and Hong, L. (2012) Mining Concept
Drifting Network Traffic in Cloud Computing Environments. IEEE/
ACM CCGRID, Ottawa, 13-16 May 2012, 721-722.
3. Shetty, S., Mukkavilli, S.K. and Keel, L.H. (2011) An Integrated
Machine Learning and Control Theoretic Model for Mining Concept
Drifting Data Streams. IEEE HST, Waltham, 15-17 November 2011,
75-80. http://dx.doi.org/10.1109/ths.2011.6107850
4. University of California-KDD Cup 1999 Data. http://kdd.ics.uci.edu/
databases/kddcup99/kddcup99.html;2011
5. Tavallaee, M., Bagheri, E., Lu, W. and Ghorbani, A.A. (2009) A
Detailed Analysis of the KDD CUP 99 Data Set. IEEE CISDA, Ottawa,
8-10 July 2009, 1-6.
6. MIT Lincoln Lab DARPA Data. http://www.ll.mit.edu/mission/
communications/ist/corpora/ideval/index.html;2011
7. Sommer, R. and Paxson, V. (2010) Outside the Closed World: On Using
Machine Learning for Network Intrusion Detection. IEEE Symposium
on Security & Privacy, Oakland, 16-19 May 2010, 305-316.
8. McHugh, J. (2000) Testing Intrusion Detection Systems: A Critique of
the 1998 and 1999 DARPA Intrusion Detection System Evaluations as
Performed by Lincoln Laboratory. ACM Trans on Information System
Security, 3, 264-294. http://dx.doi.org/10.1145/382912.382923
9. Brown, C., Cowperthwaite, A., Hijazi, A. and Somayaji, A. (2009)
Analysis of the 1999 DARPA/Lincoln Laboratory IDS Evaluation
Data with Netadhict. IEEE International Conference on Computational
Intelligence for Security and Defense Applications, Ottawa, 8-10 July
2009, 1-7.
10. ISCX Datasets. http://www.unb.ca/research/iscx/dataset/iscx-IDS-
dataset.html
11. Cloud vs. Traditional Data Center. http://www.businessnewsdaily.
com/4982-cloud-vs-data-center.html
12. Classification of Data Center. http://www.datacenterknowledge.com/
archives/2013/11/01/a-public-private-or-hybrid-cloud-debate-not-
88 Security of Cloud-based systems
really/
13. Data Center Types. http://research.gigaom.com/2012/10/4-types-of-
data-centers/
14. CAIDA Data Centers. http://www.caida.org/
15. Cloud Platform. http://mindstormtools.com/2014/02/16/amazon-web-
services-aws-and-the-new-google-cloud-platform/
16. Cloud Intrusion. http://www.di.unipi.it/~hkholidy/projects/cidd/
17. AWS Data Centers. http://www.turnkeylinux.org/blog/aws-datacenters
18. Amazon AWS Instances. https://aws.amazon.com/ec2/instance-types/
19. Reddy, S., Shetty, S. and Xiong, K. (2013) Security Risk Assessment
of Cloud Carrier. 2013 13th IEEE/ACM International Symposium on
Cluster, Cloud and Grid Computing (CCGrid), Delft, 13-16 May 2013,
442-449.
20. PlanetLab Nodes. http://www.planet-lab.org/status
21. LBNL-The Internet Traffic Archive. http://www.icir.org/enterprise-
tracing/download.html
22. Specht, S.M. and Lee, R.B. (2004) Distributed Denial of Service:
Taxonomies of Attacks, Tools and Countermeasures. Proceedings of
17th International Conference on Parallel and Distributed Computing
Systems, San Francisco, 15-17 September 2004, 543-550.
23. Distributed Attack. http://searchsecurity.techtarget.com/definition/
distributed-denial-of-service-attack
24. DDOS Attack. http://www.crn.com/news/security/240158492/ddos-
attack-behind-latest-network-solutions-outage.htm
25. EC2 Instances. http://aws.amazon.com/ec2/
26. EC2 Security Groups. http://blog.learningtree.com/understanding-
amazon-ec2-security-groups-and-firewalls/
27. Load Balancing. http://www.webopedia.com/TERM/L/load_
balancing.html
28. Load Balancing Tool. https://packetstormsecurity.com/files/46871/
lbd-0.1.sh.txt.html
29. Slowloris Tool. https://github.com/gkbrk/slowloris
30. Wireshark Tool. https://www.wireshark.org/
31. Benson, T., Akella, A. and Maltz, D.A. (2010) Network Traffic
Characteristics of Data Centers in the Wild. Proceedings of the 10th ACM
Generation of Labelled Datasets to Quantify the Impact of Security ... 89
5
Towards a Comprehensive Security
Framework of Cloud Data Storage
Based on Multi Agent System
Architecture
ABSTRACT
The tremendous growth of the cloud computing environments requires
new architecture for security services. Cloud computing is the utilization
of many servers/data centers or Cloud Data Storages (CDSs) housed in
many different locations and interconnected by high speed networks. CDS,
Citation: A. Mohamed Talib, R. Atan, R. Abdullah and M. Azrifah Azmi Murad, “To-
wards a Comprehensive Security Framework of Cloud Data Storage Based on Multi
Agent System Architecture,” Journal of Information Security, Vol. 3 No. 4, 2012, pp.
295-306. doi: 10.4236/jis.2012.34036.
Copyright: © 2012 by authors and Scientific Research Publishing Inc. This work is li-
censed under the Creative Commons Attribution International License (CC BY). http://
creativecommons.org/licenses/by/4.0
94 Security of Cloud-based systems
INTRODUCTION
Computer in its evolution form has been changed multiple times, as learned
from its past events. However, the trend turned from bigger and more
expensive, to smaller and more affordable commodity PCs and servers
which are tired together to construct something called “cloud computing
system”. Moreover, cloud has advantages in offering more scalable, fault-
tolerant services with even higher performance [1]. Cloud computing can
provide infinite computing resources on demand due to its high scalability
in nature, which eliminates the needs for cloud service providers to plan far
ahead on hardware provisioning [2].
Cloud computing integrates and provides different types of services
such as Data-as-a-Service (DaaS), which allows cloud users to store their
data at remote disks and access them anytime from any place.
Towards a Comprehensive Security Framework of Cloud ... 95
Confidentiality
In cloud computing, confidentiality plays a major part especially in
maintaining control over organizations’ data situated across multiple
distributed cloud servers. Confidentiality must be well achieved when
employing a public cloud due to public clouds accessibility nature. Asserting
confidentiality of users’ profiles and protecting their data that is virtually
accessible, allows for cloud data security protocols to be enforced at various
different layers of cloud applications [10].
Data access control issue is mainly related to security policies provided
to the users while accessing the data. In a typical scenario, a small business
organization can use a cloud provided by some other provider for carrying
out its business processes. This organization will have its own security
policies based on which each user can have access to a particular set of
data. The security policies may entitle some considerations wherein some
of the employees are not given access to certain amount of data. These
security policies must be adhered by the cloud to avoid intrusion of data by
unauthorized users [11].
Correctness
Assurance Goal of correctness assurance in cloud computing is to ensure
cloud users that their cloud data are indeed stored appropriately and kept
intact all the time in the cloud to improve and maintain the same level of
storage correctness assurance even if cloud users modify, delete or append
their cloud data files in the cloud [4].
Availability
Availability is one of the most critical information security requirements in
cloud computing because it is a key decision factor when deciding among
private, public or hybrid cloud vendors as well as in the delivery models [10].
The SLA is the most important document which highlights the trepidation
of availability in cloud services and resources between the CSP and client.
98 Security of Cloud-based systems
Data Integrity
Integrity of the cloud data has to deal with how secure and reliable the cloud
computing data. This could mean that even if cloud providers have provided
secure backups, addressed security concerns, and increased the likelihood
that data will be there when you need it. In a cloud environment, a certification
authority is required to certify entities involved in interactions; these include
certifying physical infrastructure server, virtual server, environment, user
and the network devices [12].
LITERATURE REVIEW
Some argue that cloud user data is more secure when managed internally,
while others argue that cloud providers have a strong incentive to maintain
trust and as such employ a higher level of security. However, in the cloud,
your data will be distributed over these individual computers regardless of
where your base repository of data is ultimately stored. Industrious hackers
can invade virtually any server. There are the statistics that show that one-
third of breaches result from stolen or lost laptops and other devices. Besides,
there also some cases which from employees’ accidentally exposing data on
the Internet, with nearly 16 percent due to insider theft [13].
Wang et al. [4], stated that data security is a problem in cloud data
storage, which is essentially a distributed storage system. And explained
their proposed scheme to ensure the correctness of user’s data in cloud data
storage, an effective and flexible distributed scheme with explicit dynamic
data support, including block update, delete, and append relying on erasure
correcting code in the file distribution preparation to provide redundancy
parity vectors and guarantee the data dependability. Their scheme could
achieve the integration of storage correctness insurance and data error
localization, i.e., whenever data corruption has been detected during the
storage correctness verification across the distributed servers, Could almost
guaran tee the simultaneous identification of the misbehaving server(s)
through detailed security and performance analysis.
Takabi et al. [14], proposed a comprehensive security framework for
cloud computing environments. They presented the security framework and
discuss existing solutions, some approaches to deal with security challenges.
Towards a Comprehensive Security Framework of Cloud ... 99
METHODOLOGY
Currently, there is a lack of formal a security framework for collaborative
CDS environment [4,5], and there are no hard and fast rules on how to
formulate a security framework. The investigation of the problems and then
analyzed the formulation of the proposed framework is taking into account
the problems identified from the survey result. This is very important to
make sure the proposed framework is met the objective and the limitation.
So in which there three steps are taken in the methodology, first conducted
a survey and analyzed it, second analyzed the security framework and lastly
the process of the formulation of the security framework.
A survey was conducted in selected 15 respondents (2 respondents from
Information Security Department from MIMOS Berhad, 7 respondents
from Information Security Group (ISG) from Faculty of Computer Science
and Information Technology (FSKTM), UPM, 3 security experts and 3
programmers from different companies) participated in this research (pilot
study). Thirty three questionnaires were distributed to the respondents, and
fifteen questionnaires were returned. The questionnaire data were verified
and was analyzed using Rasch Model. The result of the survey contributed
to the formulation of the proposed security framework.
However, use of Rasch to analyze and validate questionnaires for
theoretical constructs in other technical fields is still lacking. Whilst
the usage of Rasch often deals with competency evaluation on people
or objects, the usage could also be extended to evaluate another critical
element of research—the research instrument construct validity [18]. The
pilot data were tabulated and analyzed using WinSteps, a Rasch tool. The
main components derived from the questionnaire are: information security
concept and understanding, cloud computing concept and understanding,
software agent concept and understanding, cloud computing security and
CDS based on MAS.
A new security framework shall be synthesized as follows:
• Structured cloud data, which includes in CDS. There are many
potential scenarios where data stored in the cloud is dynamic, like
electronic documents, photos, or log files etc.
Towards a Comprehensive Security Framework of Cloud ... 101
SECURITY FRAMEWORK
Figure 1 shows a schematic representation of security framework. The
framework has been built by using two layers.
The functionality of those layers can be summarized as follows [4, 19]:
• Agent layer: This layer has one agent: the User Interface Agent.
User Interface Agent acts as an effective bridge between the user
and the rest of the agents.
• Cloud data storage layer: Cloud data storage has two different
network entities can be identified as follows:
- Cloud user: Cloud users, who have data to be stored in the
cloud and rely on the cloud for data computation, consist of
both individual consumers and organizations.
- Cloud service provider (CSP): A CSP, who has significant
resources and expertise in building and managing
distributed cloud storage servers, owns and operates live
cloud computing systems.
MAS ARCHITECTURE
In MAS architecture, we proposed five types of agents: Cloud Service
Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA),
Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent
(CDAA) and Cloud Data Integrity Agent (CDIA) as illustrated in Figure 2.
The rest of agents are described as follows:
102 Security of Cloud-based systems
Cloud data availability is to ensure that the cloud data processing resources
are not made unavailable by malicious action. Our MAS architecture is
able to tolerate multiple failures in cloud distributed storage systems. To
ensure the availability, we explain the notions of global and local cloud
attack blueprints. To detect intrusions, the CDAA receives a set of goals
representing the global cloud attack blueprints. To recognize this global
cloud attack blueprint, it must be decomposed in local cloud sub-blueprints
used locally by the different agents distributed in the CDS. In general agents
can detect only local cloud attacks because they have a restricted view of the
CDS. So, we make a distinction between a global cloud attack blueprint and
local cloud sub-blueprints. A global cloud blueprint is an attack blueprint,
derived from the security policies specified at a high level by the CSPs, that
the MAS must detect and the detection of this blueprint will be notified only
to CDAA. A local cloud blueprint is a blueprint derived from the global
cloud blueprint but that must be detected by local agents. For a CDAA over-
viewing the global cloud attack blueprint the probability of an attack is equal
to 1, while for the local agent it is below 1.
The architecture of the CDAA consists of three modules, as shown in
Figure 5. Cloud Communication Module provides the agent with the capability
to exchange information with CDAA and CSPA. Cloud Servers Modules
provides the agent with the following mechanisms: 1) Disperse the data file
redundantly across a set of distributed servers; and 2) Enable the cloud user to
reconstruct the original data by downloading the data vectors from the servers.
Cloud Reasoning Module provides the CDAA with the specific misbehaving
server(s) and server colluding attacks by utilizing the information obtained
from the knowledge base and the availability policy rule.
“CloudZone” Requirements
• “CloudZone” only backs up the MS SQL databases. It does not
back up other MS SQL files such as program installation files,
etc.
• “CloudZone” does not support component-based backup.
• “CloudZone” does not use Visual SourceSafe (VSS) for backup
and restore.
• “CloudZone” supports backup and recovery of Windows Oracle
10 g.
With “CloudZone” Cloud Backup, you can select any of the following
as backup objects:
• Oracle Server 10 g running on Windows.
• Microsoft SQL Server 2000, 2005 and 2008.
• Microsoft Exchange Server 2003 and 2007.
IMPLEMENTATION GANAWA
Security as a Service (GSecaaS) has been implemented (~30.000 lines of
JAVA code) with Oracle 11 g. The implementation was based on structure-
in-5 MAS architectures described above. We briefly describe the GSecaaS
implementation to illustrate the role of the agents and their interaction. To
simulate the agents,
Oracle database packages and triggers are used to implement agent
functions and Oracle jobs are utilized to create agents. Each agent is
considered as an instance of the agent in the environment that can work
independently, and can communicate with other agents in order to fulfill
its needs or fulfill the others requests. To demonstrate the feasibility of the
proposed system, a prototype is implemented using Java and PHP.
At the interface layer, the interaction of the system with the cloud user
is based on a set of dialogues. These dialogues are implemented using Java
and PHP. An example of an interface is shown in Figure 7.
PILOT STUDY
Result
The pilot data were tabulated and analyzed using WinSteps, a Rasch tool.
The results of Person and Item summary statistics and measures are tabulated
in Tables 1 and 2.
The results of the survey are analyzed in three parts; data reliability,
fitness of respondent and items data and determination of component groups
cut-off points.
Towards a Comprehensive Security Framework of Cloud ... 109
Data Reliability
Summary statistics for respondents (persons) and items (questions) are
depicted in Tables 1 and 2, respectively. 15 respondents returned the survey
questionnaire. Out of which, Rasch identified an extreme score which will
later be excluded from further analysis.
Real RMSE 0.30 Adj. S.D. 0.62 Separation 2.10 Person reliability
0.82 Model RMSE 0.27 Adj. S.D. 0.64 Separation 2.35 Person reliability
0.85 S.E. of person mean = 0.11 Maximum extreme score: 1 Person valid
responses: 95.0%.
From the summary of measured persons (Table 1), the spread of
person responses is = 3.29 logit is fair. This is due to extreme responses
by a participant. However, Reliability = 0.82 and Cronbach Alpha = 0.94
indicates high reliable data and hence the data could be used for further
analyses
On the questionnaire items, the summary of 15 measured questionnaire
items (Table 2) reveals that the spread of data at 2.36 logit and reliability of
0.74 are good and fair, respectively.
110 Security of Cloud-based systems
Real RMSE 0.32 Adj. S.D. 0.54 Separation 1.69 Item reliability 0.74
Model RMSE 0.27 Adj. S.D. 0.64 reparation 2.35 Item reliability 0.75 S.E.
of item mean = 0.09.
Details on each measured items are listed in Table 3. The acceptable
limits are 0.4 < Acceptable Point Measure Correlation < 0.8 and 0.5 < Outfit
Mean Square < 1.5, and –2.0 < Outfit z-standardized value < 2.0). The
previous pilot study is therefore proven helpful in making the questionnaire
more reliable.
Discussion
Based on the overall experts’ judgments, the following components are
selected to be excluded from the model (Table 3):
• C2 Encourage/CSPs must encourage cloud users to use their
trusted CDS.
• D1 CSPA—Provide the security service task according to the
authorized service level agreements (SLAs)/ different area.
• E5 Data privacy/different area.
• E6 Multi-tenancy/different area.
• E7 Control/different area.
Based on the above reduced components, the revised framework is
depicted in Figure 1 and its MAS architecture in Figure 2. Based on the Pilot
study results, the revised security framework based on MAS architecture
is directly driven from the initial framework. This is because the most of
the components are common and used to identify the respondent in the
questionnaire.
The proposed security frameworks to facilitate security of CDS are
based on Wang et al. [4], Talib et al. [5], Takabi et al. [14], Yu et al. [15],
Du et al. [16] and Venkatesan and Vaish [17], they all runs in six main parts
layers, functions, security goals, infrastructures, approaches, technologies
and applications and overlaps on some specific components are architectures
and collaborations. The major comparison on the major components of all
above frameworks is depicted in Table 4.
Towards a Comprehensive Security Framework of Cloud ... 113
CONCLUSION
In this paper, we investigated the problem of data security in cloud computing
environment, to ensure the confidentiality, correctness assurance, availability
and integrity of users’ data in the cloud; we proposed a security framework
and MAS architecture to facilitate security of CDS. This security framework
consists of two main layers as agent layer and cloud data storage layer. The
propose MAS architecture includes five types of agents: CSPA, CDConA,
CDCorA, CDAA and CDIA. To formulate the security framework for
collaborative CDS security, the components on MAS, cloud user and CSP
are compiled from various literatures. An initial model of modified MAS
components for collaborative CDS security is proposed. The relationships
between these components are used to construct the questionnaire, which
were tested in a pilot study. Rasch model was used in analyzing pilot
questionnaire. Item reliability is found to be poor and a few respondents
and items were identified as misfits with distorted measurements. Some
problematic questions are revised and some predictably easy questions are
excluded from the questionnaire. A prototype of the system (GSecaaS) is
implemented using Java and PHP. The use of this system has shown how the
system could be used to facilitate the security of the CDS.
REFERENCES
1. M. Zhou, R. Zhang, W. Xie, W. Qian and A. Zhou, “Security and
Privacy in Cloud Computing: A Survey,” Proceedings of the Sixth
International Conference on Semantics Knowledge and Grid (SKG),
Beijing, 2010, pp. 105- 112.
2. C. S. Aishwarya, “Insight into Cloud Security Issues,” UACEE
International Journal of Computer Science and Its Applications, 2011,
pp. 30-33.
3. J. W. Rittinghouse and J. F. Ransome, “Cloud Computing:
Implementation, Management, and Security (Chapter 6),” 2009.
4. C. Wang, Q. Wang, K. Ren and W. Lou, “Ensuring Data Storage
Security in Cloud Computing,” IEEE, Vol. 186, No. 978, 2009, pp. 1-9.
5. A. M. Talib, R. Atan, R. Abdullah and M. A. A. Murad, “Formulating
a Security Layer of Cloud Data Storage Framework Based on Multi-
Agent System Architecture,” TGSTF International Journal on
Computing, Vol. 1, No. 1, 2010, pp. 120-124.
6. A. M. Talib, R. Atan, R. Abdullah and M. A. A. Murad, “Towards
New Access Data Control Technique Based on Multi Agent System
Architecture for Cloud Computing in Software Engineering and
Computer Systems Part II,” In: V. Snasel, J. Platos and E. El-Qawasmeh,
Eds., Springer Series: Communications in Computer and Information
Science 189, Springer-Verlag, pp. 268-279.
7. M. R. Genesereth and S. P. Ketchpel, “Software Agents,”
Communication of the ACM, Vol. 37, No. 7, 1994, pp. 48-53.
8. E. H. Durfee, V. R. Lesser and D. D. Corkill, “Trends in Cooperative
Distributed Problem Solving,” IEEE Transactions on Knowledge and
Data Engineering, 1989, pp. 63- 83.
9. H. Mouratidis, P. Giorgini and G. Manson, “Modelling Secure Multi-
Agent Systems,” ACM, 2003, pp. 859-866.
10. S. Ramgovind, M. M. Eloff and E. Smith, “The Management of
Security in Cloud Computing,” Information Security for South Africa
(ISSA), Sandton, Johannesburg, 2010, pp. 1-7.
11. K. D. Bowers, A. Juels and A. Oprea, “HAIL: A HighAvailability
and Integrity Layer for Cloud Storage,” 2009. http://eprint.iacr..
org/2008/489.pdf
12. D. Zissis and D. Lekkas, “Addressing Cloud Computing Security
Issues,” Future Generation Computer Systems, Vol. 28, No. 3, 2010,
Towards a Comprehensive Security Framework of Cloud ... 115
pp. 583-592.
13. J. Yang and Z. Chen, “Cloud Computing Research and Security Issues,”
International Conference on Computational Intelligence and Software
Engineering (CiSE), 2010, pp. 1-3.
14. H. Takabi, J. B. D. Joshi and G. J. Ahn, “SecureCloud: Towards
a Comprehensive Security Framework for Cloud Computing
Environments,” 34th Annual IEEE Computer Software and
Applications Conference Workshops, 2010, pp. 393-398.
15. H. Yu, N. Powell, D. Stembridge and X. Yuan. “Cloud Computing and
Security Challenges,” ACM, 2012, pp. 298-302.
16. J. Du, W. Wei, X. Gu and T. Yu, “RunTest: Assuring Integrity of Dataflow
Processing in Cloud Computing Infrastructures,” ASIACCS’10,
Beijing, 13-16 April 2010, pp. 293-304.
17. S. Venkatesan and A. Vaish, “Multi-Agent Based Dynamic Data
Integrity Protection in Cloud Computing,” 2011, pp. 76-82.
18. A. A. Aziz, A. Mohamed, A. Zaharim, S. Zakaria, H. A. Ghulman and
M. S. Masodi, “Evaluation of Information Professionals Competency
Face Validity Test Using Rasch,” Proceedings of the 4th Pacific Rim
Objective Measurement Symposiom (PROMS), 2008, pp. 396-403.
19. A. M. Talib, R. Atan, R. Abdullah and M. A. A. Murad, “Security
Framework of Cloud Data Storage Based on Multi Agent System
Architecture: Semantic Literature Review,” Computer and Information
Science, Vol. 3, No. 4, 2010, p. 175.
20. A. M. Talib, R. Atan, R. Abdullah and M. A. A. Murad, “CloudZone:
Towards an Integrity Layer of Cloud Data Storage Based on Multi-
Agent System Architecture,” ICOS, 2011, pp. 127-132.
CHAPTER
6
Control Framework for Secure
Cloud Computing
Delhi, India
Computer Science and Information Systems, Coastal Carolina University,
2
Conway, USA
ABSTRACT
Cloud computing is touted as the next big thing in the Information Technology
(IT) industry, which is going to impact the businesses of any size and yet the
security issue continues to pose a big threat on it. The security and privacy
issues persisting in cloud computing have proved to be an obstacle for its
widespread adoption. In this paper, we look at these issues from a business
Citation: Srivastava, H. and Kumar, S. (2015), “Control Framework for Secure Cloud
Computing”. Journal of Information Security, 6, 12-23. doi: 10.4236/jis.2015.61002..
Copyright: © 2015 by authors and Scientific Research Publishing Inc. This work is li-
censed under the Creative Commons Attribution International License (CC BY). http://
creativecommons.org/licenses/by/4.0
118 Security of Cloud-based systems
perspective and how they are damaging the reputation of big companies.
There is a literature review on the existing issues in cloud computing and
how they are being tackled by the Cloud Service Providers (CSP). We
propose a governing body framework which aims at solving these issues by
establishing relationship amongst the CSPs in which the data about possible
threats can be generated based on the previous attacks on other CSPs. The
Governing Body will be responsible for Data Center control, Policy control,
legal control, user awareness, performance evaluation, solution architecture
and providing motivation for the entities involved.
Keywords: Cloud computing, Security, Privacy, Organization, Control,
Governance, Framework, Cloud Provider
INTRODUCTION
National Institute of Standards and Technology (NIST) defines cloud
computing as a computing model for enabling ubiquitous, convenient, on-
demand network access to a shared pool of configurable computing resources
(e.g., networks, servers, storage, applications, and services) [1] . These
services can be rapidly provisioned and released with minimal management
effort or service provider interaction. NIST also defines that the cloud
computing can be achieved through three service models: Software as a
Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service
(IaaS). Cloud computing can be implemented by the four deployment
models: Private Cloud, Community Cloud, Public Cloud and Hybrid Cloud.
This emerging paradigm allows an organization to reduce costs and develops
highly scalable solutions [2] . Cloud promises customers with the benefits
of a more convenient way of provisioning IT resources at a faster speed and
with a lower cost, compared to traditional IT processes and systems.
Cloud computing has been regarded as the next big thing in the
Information Technology (IT) industry. It is predicted that it will have a
global impact on how people store and access their data. Apart from storage,
it also provides other services which can be utilized from anywhere and at
any time. The only concern, however, with cloud computing is the security
and privacy issues. As people put their valuable data on the cloud, they
are completely dependent on the Cloud Service Provider (CSP) to ensure
proper security for their data. Due to large amount of attacks on the data
on the cloud, many people have lost their important data and moreover,
the confidentiality of their data has been compromised. Therefore, security
Control Framework for Secure Cloud Computing 119
and privacy are big concern in cloud computing. These issues have been
impeding the growth of cloud computing and are proving to be a major
obstacle for its widespread adoption.
Cloud service providers try to provide cloud services with built-in
security features. They try to build a cloud infrastructure that can withstand
any sort of failure whether it is technical, logical or physical. However,
there are many factors that can harm the security and reliability of the Cloud
infrastructure despite of taking all the necessary steps.
They are generally categorized in the following three layers, in which an
organization takes control of the security. These are as follows:
• Physical Layer: The physical layer of security encompasses many
factors.
1) Data Center: This deals with the geographical location of the
data center. Locations are chosen in such a way that they are not
prone to natural or man-made disasters. No data center will be
successful in withstanding severe earthquakes, cyclones, volcanic
eruptions etc. and it is best to keep the data center in a place that
is less vulnerable to be affected by these factors. Also, location
of data centers is kept confidential so that it does not fall prey to
external attacks.
2) Biometric Scanning: There are methods such as finger-print scan
or retina-scan which allow only selected employees to enter the
data center. There are usually very few people that are allowed
physical entry inside the area where the data are actually stored.
3) Building: The buildings are generally designed to be a data
center from the start. They are built in such a way that they can
withstand fires. There are cameras all around the place and alarms
that go off in case of emergency. Employees and security guards
are present in the data center 24 × 7.
• Logical Layer: Logical Layer of security deals with the design of
the network that is used for providing cloud services. The network
is kept secured with the help of firewalls, anti-virus and intrusion
detection systems. Companies that provide cloud services do
not want to compromise with the quality of the software used,
since it would harm their reputation and affect their business. The
hypervisors are generally of high standards and these systems are
centrally managed and protected.
120 Security of Cloud-based systems
affected and all their messages were deleted in the wake of that software bug
[4] .To overcome such security threats, cloud providers try to minimize the
risk of attacks by various ways. The whole process of deployment of security
is also governed by how they deploy the technology of cloud computing in
the first place. The way each cloud service provider deploys the cloud is
different from one to another. Therefore, the techniques followed by them are
significantly different. For example, as per Cloud Security Alliance Guide
[5] , Amazon’s AWS EC2 infrastructure, as an example, includes vendor
responsibility with respect to security and privacy lies only at the physical
security, environmental security, and virtualization security level. The user
is responsible for security controls at the operating system, applications,
and data level. As an example of how the cloud service providers differ
from one another, Salesforce.com’s Customer Relationship management
(CRM) is a SaaS offering and provides entire service to the user. Hence the
provider is not only responsible for the physical and environmental security
controls, but it must also address the security controls on the infrastructure,
the applications, and the data.
According to a recent survey [6] , the total number of records containing
sensitive personal information involved in security breaches in the United
States is more than 600 million records in about 4000 data breaches since
January 2005. Recent surveys reveal that human errors and systems glitches
caused nearly two-thirds of data breaches globally in 2012, while malicious
or criminal attacks are the most costly everywhere at an average of $157 per
compromised record.
Some surveys show that malicious attacks (defined as a combination of
hacking and insider theft) accounted for nearly 47 percent of the recorded
breaches in 2012 in the United States. Hacking attacks were responsible for
more than one-third (33.8 percent) of the data breaches recorded [6] .
According to a survey by Open Security Foundation [7] , there were
more than 2000 cloud related data breach incidents globally since 2012.
Surveys done on some randomly selected companies show that 82% of
those companies saved money moving to cloud while only 14% downsized
their IT after cloud adoption.
LITERATURE REVIEW
As we discussed earlier, the main concern in cloud computing is of security
and the security issues in cloud computing remain the chief obstacle that may
prevent its widespread adoption. As more and more data is being migrated
122 Security of Cloud-based systems
to the cloud, there have been more attacks, such as Denial of Service and
Authentication attacks. For example, the increase of Internet-capable
devices creates opportunities for remote hacking and data leakage. More
cloud adopters have been at the receiving end of cloud infrastructure security
incidents as compared to traditional IT infrastructure security events. These
security incidents and data breaches can have financial consequences on a
corporate organization [8] . Despite the decrease in the cost of data breaches
in the last year, data breaches are still reported to have cost British and
German organizations on average between $2.7 million and $4.4 million [8]
. In addition to the economic and financial troubles, security breaches and
threats can lead to damaged reputations, loss of customers, delayed software
releases and a reduction in investor confidence [9] .
attacks that occur. These attacks weaken the trust of the users and
they feel that their data is insecure. Users also raise other issues
that might be possible with the type of data security provided
by cloud providers. These include the security of Application
Program Interfaces (API) provided by them. Users would want
to know whether the software used and the machines present
are reliable and the way in which they are used, such that it is
sufficient to ensure data security. Cloud Providers are reluctant
to provide this kind of information as giving all the details about
security they will make themselves vulnerable to more attacks.
This creates a lack of transparency between the users and the
Cloud Providers.
• Access: Jansen and Grance [16] stated that one of the biggest
concerns for an organization, considering the adoption of cloud
computing, is preventing unauthorized access to resources. It
has been demonstrated that the unauthorized access of data
compromises the confidentiality of the data stored access [16]
. Cloud computing promises availability i.e. users can access
the same data from any device. Question is if this would impact
security? If there would be any unauthorized access of someone’s
data, it will not be from the same device that the user uses to
access it but from a remote location and obviously from a
different device. In that case, it is essential to ensure that the user
is genuine. Therefore, a default device should be assigned to a
user by the cloud provider and if the user tries to access the data
from another device, one would need to give proper verification
and authentication in order to prove his identity. Google follows
the location based access technique but not all the cloud providers
follow this [15] . Hence an organization should ensure that all the
providers consistently follow these controls.
• Availability: To ensure availability to all the users, that try to
access their account or data, the cloud service must scale itself
according to the number of users. The number of servers increase
or decrease to keep up with the traffic. This scalability feature is
performed either automatically by the cloud providers’ servers
through knowledge learning or manually by prompting the
administrator to do this. This however, will not ensure that a cloud
can handle any amount of traffic that comes its way. SAP’s CEO,
Leo Apotheker stated: “There are certain things that you cannot
126 Security of Cloud-based systems
run in the cloud because the cloud would collapse. Don’t believe
that any utility company is going to run its billing for 50 million
consumers in the cloud.” This raises another issue that in case of
huge traffic caused by DoS attacks, the cloud might just collapse
and for that time the users will not be able to access their data.
• Compliance: Several organizations such as SAS 70 and ISO 27001
put forth regulations from the security audits, operation traceability
and data location perspective. Cloud providers are supposed to follow
these rules & regulations in order to ensure security of the cloud.
Users need to be completely aware of what all rules and regulations
are followed by their cloud provider. There have been many instances
such as the case of Google Docs in March 2009, where full security
and data safety audit reports were not made public and data integrity
was allegedly compromised by improper access [17] .
• Role of Users: The customers also play an important role in
determining the course of cloud computing. Cloud adopters
need to trust the cloud providers and understand that until the
technology is fully matured, that cloud computing customers will
need to make every effort to protect the information consciously.
Reed and Bennett [18] provide key guidelines on how to make
best use of secure cloud services and a concise guide to cloud
computing. The key points of their discussion are:
1) The biggest risk that the technology faces today is Users.
2) Shadow IT is an on-going risk and generally introduced by
such employees who have no concerns beyond their own role in
considering the risks involved in the solution provided.
3) Experienced teams often roll out new technologies, but there still
exists the risk when traditional security practices are ignored or
adapted to the new environment.
4) Attackers will always go after the valuable things and it may not
be money itself.
5) A single security standard is unlikely to save you.
Related Solutions Proposed in Literature: There are few organizational
control perspective solutions proposed in the literature to address the issues
discussed earlier. Organizational control will help to manage the overall
services of the cloud service provider and in return, reduce the security and
reliability issues of cloud computing. The cloud computing governance
model by Guo, Song and Song [19] addresses requirements and objectives
Control Framework for Secure Cloud Computing 127
GOVERNING BODY
There is a need for the cloud providers to hide some security related
information, as they need to keep all the information about the security
procedures confidential in order to minimize any security breaches. Do
we have any reference to substantiate this claim This lack of transparency
results in the cloud customers losing trust on the cloud providers. As a result,
customers are reluctant to store their valuable data on the cloud, which
undermines the potential of cloud computing. Our framework approach to
solve these issues is by the formation of a governing body which will act as
an interface between the cloud providers and cloud end users and provide
organizational control. The governing body in our framework is unique
compared to the existing infrastructure due to the following reasons: This
governing body will be an independent unit and will not be influenced by
any of the two entities involved. It will be responsible for any and every
actions that take place inside the cloud environment. Various cloud providers
will need to register themselves to the governing body and then that body
will assess all the procedures and methodologies involved in the technology.
Control Framework for Secure Cloud Computing 129
In general, this Governing Body will be responsible for risk assessment &
management, security performance evaluation, policy, audit and compliance
with respect to the deployment of cloud layer. The Governing Body is different
from the existing infrastructure as it will not be limited to just assessing the
conditions. In addition, it will also provide solutions and alternatives to the
customers in case of any issues that takes place in the cloud environment
whether it is due to technology failure or any external factors.
As shown in Figure 1, the governing body is an interface that provides
formal control and governance between cloud provider and customer, to
ensure that there is a smooth working and a well-coordinated system. The
governing body will be responsible for the following functionalities, which
the cloud provider cannot provide on their own.
example, the security policy shall specify the use of firewalls, anti-virus,
type of virtualization and the hyper-visor used to achieve the secure cloud
functionality.
User Awareness
The governing body will need to specify all the procedures and methods
that a cloud provider and user follow to ensure the security and privacy of
the cloud.
The governing body needs to filter and provide information to users
in such a way that the users are aware of the security features and at the
same time, no confidential information is leaked. Our automated control
framework described in next section, ensures that based on triggers, central
body convey right information at right time to right parties involved in the
environment in an automated fashion. This will ensure removal of the lack
of transparency in communicating security features, such that users are able
to trust the cloud providers.
Control Framework for Secure Cloud Computing 131
Legal Control
There are a number of jurisdictions and laws that apply to cloud computing. Laws
vary from place to place and generally the data centers of a cloud provider are
located in different countries or may be different continents. To gain knowledge
and abide by all the laws of different location can be very difficult to cope with.
For example US Patriot Act can be applied to foreign organizations that use U.S
based cloud provider. Per US Patriot Act the Governmental authorities only may
access cloud data pursuant to the Patriot Act to 1) “obtain foreign intelligence
information not concerning a United States person” or 2) “protect against
international terrorism or clandestine intelligence activities”. Even a single law
broken may affect the organization in many different ways. These laws and
jurisdiction vary from geographical locations to the methods involved in the
cloud computing and allowing the personnel to enter or work in the facility.
Complying with all the jurisdiction and laws is a very time consuming job and
may reflect in the efficiency of the cloud. Therefore, by outsourcing and letting
the governing body take care of all the legal matters, the cloud provider can
redirect the resources to ensure their cloud services are safe, secure and efficient
and at the same time ensure all the jurisdictions and laws are followed.
Performance Evaluation
One of the parameters to evaluate the performance of the cloud is the number
of security breaches and attacks to determine the performance of the cloud.
Governing body should assess the performance of the cloud environment
based on the security parameters and draft a report that will determine
the efficiency of the cloud. This will help users in determining what all
security features are being ignored by the cloud provider and help them
make decisions by providing the right choices. The performance evaluation
of the providers would motivate the good providers to increase their trust
score with the governing body, compared to those providers who can try
to negatively affect the organization. This will also help the governing
body to rank the providers based on the provider’s trust score. The cloud
providers will also benefit from this evaluation, as they will get to know
the limitations and the disadvantages in their implementation of security
controls in the cloud computing environment and redirect the resources
where the attention is needed. With the help of the performance evaluation
functionality, the factors that caused attacks and threats can be identified
and response strategies cab be applied to remove those threats and attacks,
to ensure the cloud is safe and reliable.
132 Security of Cloud-based systems
Solution Architecture
The governing body shall not only be responsible for the policy, monitoring,
evaluation and legal controls but also responsible for providing solutions to
the customers: providers and end users. For example, following are some
of the problem samples that the governing body shall be responsible for
providing solutions: 1) Customers lost their data or are unable to access their
data due to the occurrence of mishap in the cloud environment. 2) If a Cloud
Provider goes bankrupt or due to some other factors and decides to shut
down some of the data centers, many users’ data will be at risk. At that point
of time, the governing body will be responsible for providing alternative
solutions to the users. The solution might range from migration of data to
some other cloud provider or giving all the data back to the user so that
they can manage it themselves in their internal IT environment. This results
in tighter organizational control for the resources, which is the governing
body’s mandate.
In a large organization that caters to the needs of millions of customers,
there could be many unsatisfied customers, who often file legal complaints
or threaten to damage the reputation of the organization in some way or
the other. Disputes and conflicts may also arise between two or more cloud
providers, due to the disagreement over the issues. Disputes in IT industry
are very common and there have been a number of incidents where some
company adopted someone else’s ideas to develop their own product. For
instance, recently Microsoft sued Salesforce.com for the cloud computing
patent infringement. In this case, the governing body will make sure that
the conflicts and disputes are solved through our framework. This is done
with the help of threat index, which we introduced in our framework. The
threat index is computed by the security parameters, of which conflicts and
disputes are part of it.
the cloud are proving to be ineffective or even dangerous. In this case, the
cloud providers might be reluctant to support the Governing Body and might
even question its existence as it is harming them in one way. On the other
hand however, by complying with all the regulations set by the Governing
Body, they will ensure quality in their functioning and therefore will attract
a large number of customers. In this way, the Governing Body can prove to
be a negative factor to those who aren’t securing their technology properly
and can also prove to be massively beneficial for those who are abiding by
all the rules and regulations of the Governing Body.
As a result, the cloud providers who are detrimental to the needs of the
user are marginalized and the cloud providers who are sensitive to the secure
operations of the cloud become successful in their operations. This also
ensures that the provider works collaboratively with the governing body to
ensure its success in its existence.
Thus the governing body provides organizational control to the
cloud environment by keeping track of all the activities going on and
providing solutions as and when required. By establishing a central body,
cloud computing will become organized and managed by ensuring right
information is conveyed at right time to right parties. Thus, through this
governance control framework enabled governing body, which is trusted
by both the cloud provider and the end user, we can eliminate the lack of
transparency that exists between the user and the cloud provider. As the
end users perceive security and transparency in the communications, with
minimal conflicts and disputes, they would be motivated to participate in the
clouds computing activities (Table 1).
and without attacks, with and without legal control, with and without policy
control over a long period of time. The comparison of the index threshold
with the threat index helps the organization to gain knowledge of the current
security, policy and legal trends. This will help the organization and the
cloud provider to increase or decrease the controls from technical, legal and
policy perspective with the help of solution architecture framework. It will
also help them pointing out the methodologies that are flawed, if any, and
help them improve it in order to increase the reliability of the cloud.
REFERENCES
1. Mell, P. and Grance, T. (2011) The NIST Definition of Cloud
Computing. NIST Special Publication 800-145, National Institute of
Standards and Technology, Gaithersburg. [Citation Time(s):1]
2. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski,
A., Lee, G., Patterson, D., Rabkin, A., Stoica, I. and Zaharia, M.
(2009) Above the Clouds: A Berkeley View of Cloud Computing.
Technical Report No. UCB/ EECS-2009-28, University of California,
Berkeley. [Citation Time(s):1]
3. Morgan, T.P. (2014) Amazon Cloud Knocked out by Violent Storms
in Virginia. http://www.theregister.co.uk/2012/06/30/amazon_cloud_
storm_outage/ [Citation Time(s):1]
4. Mah, P. (2014) The Big Gmail Crash and the Lesson for Email
Administrators. http://www.theemailadmin.com/2011/03/the-big-gmail-
crash-and-the-lesson-for-email-administrators [Citation Time(s):1]
5. Cloud Security Alliance Guide (2013). https://www.
cloudsecurityalliance.org/csaguide.pdf [Citation Time(s):1]
6. Symantec (2014). http://www.symantec.com/connect/blogs/data-
breach-trends [Citation Time(s):2]
7. Open Security Foundation Dataloss DB [Data File] (2014). http://www.
symantec.com/connect/blogs/data-loss-db-breach-data-breaches-
classified-source [Citation Time(s):1]
8. Glisson, W.B., McDonald, A. and Welland, R. (2006) Web
Engineering Security: A Practitioner’s Perspective. Proceedings of
the 6th International Conference on Web Engineering, ACM, Palo
Alto. [Citation Time(s):2]
9. Ponemon Institute LLC (2011) The 2011 Cost of Data Breach Study:
Global. Symantec. [Citation Time(s):1]
10. Clemons, E.K. and Chen, Y.Y. (2011) Making the Decision to Contract
for Cloud Services: Managing the Risk of an Extreme Form of IT
Outsourcing. 44th Hawaii International Conference on System Sciences
(HICSS), Kauai, 4-7 January 2011, 1-10, http://dx.doi.org/10.1109/
HICSS.2011.292 [Citation Time(s):1]
11. Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka,
R. and Molina, J. (2009) Controlling Data in the Cloud: Outsourcing
Computation without Outsourcing Control. Proceedings of the 2009
ACM Workshop on Cloud Computing Security, Chicago, 13 November
Control Framework for Secure Cloud Computing 137
7
Security Model for Preserving
Privacy over Encrypted Cloud
Computing
ABSTRACT
In our today’s life, it is obvious that cloud computing is one of the new and
most important innovations in the field of information technology which
constitutes the ground for speeding up the development in great size storage
of data as well as the processing and distribution of data on the largest scale.
In other words, the most important interests of any data owner nowadays
are related to all of the security as well as the privacy of data, especially in
the case of outsourcing private data on a cloud server publicly which has not
Citation: Mlgheit, J. , Houssein, E. and Zayed, H. (2017), “Security Model for Preserv-
ing Privacy over Encrypted Cloud Computing”. Journal of Computer and Communica-
tions, 5, 149-165. doi: 10.4236/jcc.2017.56009.
Copyright: © 2017 by authors and Scientific Research Publishing Inc. This work is li-
censed under the Creative Commons Attribution International License (CC BY). http://
creativecommons.org/licenses/by/4.0
140 Security of Cloud-based systems
been one of the well-trusted and reliable domains. With the aim of avoiding
any leakage or disclosure of information, we will encrypt any information
important or confidential prior to being uploaded to the server and this may
lead to an obstacle which encounters any attempt to support any efficient
keyword query to be and ranked with matching results on such encrypted
data. Recent researches conducted in this area have focused on a single
keyword query with no proper ranking scheme in hand. In this paper, we
will propose a new model called Secure Model for Preserving Privacy Over
Encrypted Cloud Computing (SPEC) to improve the performance of cloud
computing and to safeguard privacy of data in comparison to the results of
previous researches in regard to accuracy, privacy, security, key generation,
storage capacity as well as trapdoor, index generation, index encryption,
index update, and finally files retrieval depending on access frequency.
Keywords: Cloud Computing, Multi-Keyword Query, Ranked Query,
Trapdoor, Privacy Preserving, Encrypted Cloud Data, Top-K Query, Cloud
Security
INTRODUCTION
We can refer to cloud computing as being a remarkable and outstanding IT
innovation in today’s life. It is mainly based on the fact that cloud can produce
resources and services of computing since it is a modern and distinguished
technique. The services provided by cloud computing are numerous and
can be classified into the following: Infrastructure-as-a-Service (IaaS),
Platform-as-a-Ser- vice (PaaS) as well as Software-as-a-Service (SaaS) [1]
. These services are also offered on the largest data canters scale such as
Amazon, Google, and even Microsoft which draws the attention of several
numbers of customers around the globe. As regards minor as well as medium
size businesses, cloud computing relocation develops noteworthy and big
savings from the economic perspective. As a matter of fact, cloud computing
relocation is mainly dependent on the model of “pay per use” in respect with
prices, as the payment by the user is based on his using or consuming the
available resources [2] . And in spite of all the advantages offered by the
cloud computing relocation, there are however some obstacles and problems
which may occur such as inter-provider data portability problem, energy
conservation problem, as well as security problem [3] .
Several methods are mainly proposing to provide a precise protection
of data privacy upon outsourcing storage on the Cloud Server Provider
(CSP) [4] - [9] [11] [12] [13] . These methods use certain cryptographic
Security Model for Preserving Privacy over Encrypted Cloud ... 141
RELATED WORK
This section will cover a detailed review of the related works which are
referred for to formulate our proposed model.
Kamara, S., & Lauter, K. [23] , have submitted their proposal of a
conceivable architecture design to be used in a cryptographic cloud storage.
As soon as the data are being prepared for storage onto the cloud, the owner
of data will create certain indexes as well as encrypt such data using a
specific scheme for symmetric encryption (e.g., AES) by means of a unique
key. Therefore, the indexes are being encrypted by means of a scheme of
searchable encryption to further encrypt such unique key by a scheme of
attribute-based encryption following the proper policy. Eventually, all of the
encrypted data as well as indexes are being encrypted in a manner which
can be verified afterward by the data verifier to check if they are integral
by means of a storage proof. As such, this identical strategy is also used
in several types of research. In their turn, all of Fu, Z., et al. [24] , have
also proposed the application of a deterministic algorithm for encryption
with the aim of keywords’ encryption, as well as using stream ciphers
so as to carry out security post-encrypt keywords. Furthermore, Han, F.,
et al. [25] , gave their proposal of a new technique for transforming the
Key-Policy Attribute-Based Encryption (KP-ABE) to be Attribute-Based
Encryption instead using the feature of Keyword Search (ABEKS). In order
to render transformation feasible, the researchers were keen on defining
the feature of weak anonymity, which is known as attribute privacy that is
also incurring slight computational transparency. The so-called cipher text-
policy Attribute-Based Encryption (CP-ABE) is be used for the first while
the aim of implementing a thorough control known as “priority access”.
In the next step, the fundamental or principal scheme “KP-ABE” applied
for supporting encrypted data search facility. Nevertheless, the ABEKS is
somewhat vulnerable to security violation as it is not providing the adequate
or satisfactory feature of Access Control Aware Search (ACAS); however,
it may leak such a volume of documents which includes the checked
words. As well, it may be of less efficiency compared to such methods
depending on the search based on the index. This would perform a complete
decryption of documents so as to recover the documents that are requested;
while the methods of search based on the index are only decrypting
documents’ identifiers which include but not limited to such the keywords
to be searched. As far as Chen, R., et al. [26] , are concerned, Asymmetric
Searchable Encryption is proposed in this respect in which they introduced
Public Key Encryption with keyword Search (PEKS), that is dependent
Security Model for Preserving Privacy over Encrypted Cloud ... 143
secure inner data computation feature. As well, the researchers could achieve
efficient ranking result by means of k-nearest neighbor method that is used
as well in order to help the server encrypt the document by RSA Algorithm
and also convert encrypted document to be a Zip file having an activation
code, then this activation code shall send to user a request for download.
Finally, Barde, C. R., et al. [31] , firstly executed a plain idea of Single
Keyword Search over Encrypted Data as well as Multi-key- word Ranked
Search over Encrypted cloud data (MRSE) which is mainly dependent on
protected inner product computation in addition to the effective similarity
of coordinate matching. In other words, several matches are being used
with the aim of capturing the data documents relevance of in relation to
the search query. Then, there are two meaningfully significant improved
schemes of MRSE so as to attain numerous stringent privacy preconditions
using two different threat models. Also, the assignment of anonymous ID is
to be used by the user in order to maintain and secure the utmost security of
the data onto the cloud server. So as to improve the experience of data search
and the search service, there should be more advanced extension using both
schemes in order to support as much more as possible search semantics.
PROBLEM FORMULATION
In this research paper, we will propose a new (SPEC) model with the aim
of improving the previously used models as well as results of the previous
researches in this field, mainly document keyword collection which
represents as index, encrypted index as well as secure index, multi-keyword
query, trapdoor which is an encrypted version of a query. We will describe
hereinafter the threat model, abbreviations as well as the proposed model
architecture, and eventually the proposed model construction.
Threat Model
In our proposed model architecture, we consider that the cloud server is
“honest-but-curious” which is typically adopted by most previous searchable
encryption schemes. In other words, the cloud server is implementing
honestly the protocol and then returns back the search results in a correct
manner, however, it is curious as well to deduce some important information
while performing the execution of the protocol. In the well-established
cipher text, the encrypted dataset, encrypted search query and the searchable
index are made are available to the cloud server [16] . We have two main
parts, first model ‘‘Ciphertext Model’’ which supposes that the CSP can see
Security Model for Preserving Privacy over Encrypted Cloud ... 145
Key Generation
Our proposal is based mainly upon the following: a key generator which is
able to generate new keys depending on three part (M1, M2, and S) and a
set of operations. Results are merged to check the size of output equal the
size of the plain text. In case the size of the output is equal to the size of
plain text, therefore, merged key can be entered as a secret key. Algorithm
1. Illustrates the steps of the key generation proposal.
Algorithm 1. Secret Key generation
1. Procedure: Secret Key generation
2. The secret key consists of three parts.
3. Converting first part to square matrix A.
4. Making transpose to matrix A and stored in a
Matrix B.
5. Multiplying the A to B.
6. Storing result in M1
7. Converting second part to square matrix C.
8. Making transpose to matrix C and store in
Matrix D.
9. Multiplying the C to D.
10. Storing result in M2
11. Making reverse to the third part and store in E.
12. Making Xor operation between the third part
Security Model for Preserving Privacy over Encrypted Cloud ... 147
And E.
13. Storing result in S.
14. Merging the three-part to present the new key in
The following form:
15. S connect M1 connect M2
16. The new key possible to enter the master key.
17. End
Build Index
Having generated the key pairs, then the owner will build a file collection
index. In general, we will utilize Kuzu, M., et al. [18] scheme to be the basis
on which our index is built. Then, building the index will be shown in detail
hereinafter in Algorithm 2.
Algorithm 2. Build Index
1. Procedure: Build Index
2. Kid = Keygen(ψ)
3. For all Di ∈∈ D do
4. Fi = extract features of Di
5. for all fij ∈∈ Fi and gk ∈∈ g do
6. If gk (fij) ∉ bucket identifier list then
7. Add gk (fij) to the bucket identifier list
8. end if
9. end for
10. end for
11. for all Bk ∈∈ bucket identifier list do
12. YBk = EncKid (Bk)
13. add YBk to I
14. end for
15. return I
where D is data document collection; g is composite hash functions; ψψ is
security parameter.
148 Security of Cloud-based systems
Encryption Index
Having built the index, the owner will encrypt index so as to ensure the
privacy of index. So far as there is limited computing power on data owner’s
part, we will have encrypts index [19] . Our process of encryption process
will be detailed hereinafter in Algorithm 3.
Algorithm 3. Encryption index
1. Procedure: encryption index
2. Split the index I into two vectors {I’, I”}
3. for each element ij ∈∈ I
4. set I’j = I”j = Ij if sj ∈∈ S is 1
5. Otherwise I’j = 1/2 Ij + r, I”j = 1/2 Ij - r
6. Encrypt {I’, I”} with (M1, M2) into {M1 t・ I’, M2t ・ I”}
7. Output Enc SK (I) = {M1t ・ I’, M2t ・ I”} as the secure index.
Where r is a random number
4. MixColumns:
MixColumns is transformed process of all the columns that containing
four bytes by means of certain mathematical function. that Such a function
takes for each column four bytes as input and the result is four totally novel
bytes, and novel bytes is replace with original bytes ,The result is a novel
matrix containing 16 new bytes. This step is not executed in the final round.
5. Add round key:
In this Add Round Key operation which executed (XOR) operation to
the 128 bits of the round key. If this is the final round then the result is
encrypted documents or files. Executed XOR operations on results from mix
column and round keys. For AES 128,128 bit XOR operations are executed.
Otherwise, the resulting 128 bits are interpreted as 16 bytes and then we
begin another similar round.
Trapdoor Generation
Having sorted the data in the cloud, if authorized user is looking forward to
retrieving any file containing some keywords, he will compute the trapdoor
(Twi) for keywords wi ∈∈ w and then resend it to the cloud server provider
(CSP) in the form of search request [19] . The process of computing trapdoor
will be detailed hereinafter in Algorithm 5.
Algorithm 5. Trapdoor generation
1. Procedure: Trapdoor
2. Compute Trapdoor
3. Send trapdoor to the (CSP)
4. The user gets the trapdoor information from the data Owner
5. For inserted keywords, the user computes the trapdoor
6. Then, the user sends trapdoor (Twi, k) to the CSP
Where k is an optional value, Twi is a compute trapdoor.
Ranked Search
Data user will send the trapdoor to the CSP. Having the information, first of
all, the CSP will determine the files that may be accessed by data consumer
(DC), and he will compute afterward matching score of each authorized
file in the encrypted index set. Then the CSP will sort results depending on
scores and will return back the top k files in the resulting set to the DC. In
our trapdoor algorithm, whenever keyword access frequency is regarded,
Security Model for Preserving Privacy over Encrypted Cloud ... 151
PERFORMANCE ANALYSIS
We have executed our own schemes using a laptop or a PC provided with
Intel Core i5 processor of 3.3 GHz capacity as well as 4 GB RAM memory.
The total number of simulation code is 5637 lines written in java (JDK)
language with Sql yog, NetBeans IDE 7.1.2, Mozilla Firefox, using simple
152 Security of Cloud-based systems
Figure 2. (a) Secret key generation overhead (s), starting from 1000 keywords;
(b) the storage comparison under the same dictionary size.
Security Model for Preserving Privacy over Encrypted Cloud ... 153
MKQE as well as SPEC will use the same algorithm in order to generate
secret keys, thus their performances are the same. The overhead for secret
key generations in MRSE is gradually increasing compared to MKQE
and SPEC. SPEC is better than MKQE and MRSE and the difference is
minimal. Thus, the time consumption in MRSE is higher than MKQE and
SPEC. Furthermore, the performance gap becomes even wider as more and
more keywords are added. Apparently, SPEC has a better performance than
MRSE and MKQE since it reuses an original set of indexes during keyword
expansion. A number of elements required to be produced in matrices is too
much smaller than MKQE as well as MRSE respectively.
Also, we compare storage consumption to update keyword dictionary as
well as other data structures in our scheme with MKQE and MRSE. Result
in Figure 2(b) indicates that SPEC consumes less space. As the size of the
dictionary increases, SPEC saves, even more, storage spaces than MKQE
and MRSE. The reason is that in SPEC, we use partitioned matrices and a
great quantity of unused elements which are not stored. Due to the help of
linked matrix list, SPEC can make sure that the space consumption grows
linearly according to the expansion of dictionary.
Figure 3. (a) The generation time of index for single file v.s. # of the keywords;
(b) Time consumption comparison on trapdoor generation (ms).
Figure 4. (a) update index time starting with 1000 with update index; (b) Index
encryp- tion time comparison with 1000 file indexes encrypted.
Security Model for Preserving Privacy over Encrypted Cloud ... 155
CONCLUSION
In the present paper, our main objective is to find an effective solution to the
problems of multi-keyword ranked query over encrypted cloud computing.
First of all, we gave a definition or a formulation of the problem, to analyse the
solutions in hand and then we will use a new scheme called (SPEC) in order to
solve this problem and therefore improve the performance of cloud computing and
to safeguard privacy of data in comparison to the results of previous researches
in regard to accuracy, privacy, security, key generation, storage capacity as well
as trapdoor, index generation, index encryption, index update, and finally files
retrieval depending on access frequency. Then, we have designed a new trapdoor
generation algorithm, which may be able to solve finally out-of-order problem in
the returned result set without affecting the accuracy and privacy of data.
REFERENCES
1. Wang, C., Ren, K., Yu, S. and Urs, K.M.R. (2012) Achieving Usable
and Privacy-Assured Similarity Search over Outsourced Cloud
Data. INFOCOM, Orlando, 25-30 March 2012, 451-459. https://doi.
org/10.1109/infcom.2012.6195784
2. Buyya, R. and Dastjerdi, A.V. (2016) Internet of Things: Principles and
Paradigms. Elsevier, New York.
3. Rong, C., Nguyen, S.T. and Jaatun, M.G. (2013) Beyond Lightning:
A Survey on Security Challenges in Cloud Computing. Computers &
Electrical Engineering, 39, 47-54.
4. Zhang, R., Liu, J., Han, Z. and Liu, L. (2011) RBTBAC: Secure
Access and Management of EHR Data. International Conference on
Information Society, London, 27- 29 June 2011, 494-499.
5. Zhang, R., Liu, L. and Xue, R. (2014) Role-Based and Time-Bound
Access and Management of EHR Data. Security and Communication
Networks, 7, 994-1015. https://doi.org/10.1002/sec.817
6. Nabeel, M., Bertino, E., Kantarcioglu, M. and Thuraisingham, B.
(2011) Towards Privacy Preserving Access Control in the Cloud. 7th
International Conference on Collaborative Computing: Networking,
Applications and Work Sharing, Orlando, 15-18 October 2011, 172-
180. https://doi.org/10.4108/icst.collaboratecom.2011.247061
7. Nabeel, M. and Bertino, E. (2012) Privacy Preserving Delegated
Access Control in the Storage as a Service Model. 13th International
Conference on Information Reuse and Integration, Las Vegas, 8-10
August 2012, 645-652.
8. Nabeel, M. and Bertino, E. (2014) Privacy Preserving Delegated Access
Control in Public Clouds. IEEE Transactions on Knowledge and Data
Engineering, 26, 2268- 2280. https://doi.org/10.1109/TKDE.2013.68
9. Nabeel, M., Shang, N. and Bertino, E. (2013) Privacy Preserving
Policy-Based Content Sharing in Public Clouds. IEEE Transactions
on Knowledge and Data Engineering, 25, 2602-2614. https://doi.
org/10.1109/TKDE.2012.180
10. Raykova, M., Zhao, H. and Bellovin, S.M. (2012) Privacy Enhanced
Access Control for Outsourced Data Sharing. International Conference
on Financial Cryptography and Data Security, Kralendijk, 27 Februray-2
March 2012, 223-238. https://doi.org/10.1007/978-3-642-32946-3_17
158 Security of Cloud-based systems
11. Kaur, G. and Mahajan, M. (2013) Analyzing Data Security for Cloud
Computing Using Cryptographic Algorithms. International Journal of
Engineering Research and Applications, 3, 782-786.
12. Zissis, D. and Lekkas, D. (2012) Addressing Cloud Computing Security
Issues. Future Generation Computer Systems, 28, 583-592.
13. Han, J., Susilo, W. and Mu, Y. (2013) Identity-Based Data Storage in
Cloud Computing. Future Generation Computer Systems, 29, 673-681.
14. Boutet, A., Frey, D., Guerraoui, R., Jégou, A. and Kermarrec, A.M.
(2016) Privacy-Preserving Distributed Collaborative Filtering.
Computing, 98, 827-846. https://doi.org/10.1007/s00607-015-0451-z
15. Fu, Z., Wu, X., Guan, C., Sun, X. and Ren, K. (2016) Toward Efficient
Multi-Keyword Fuzzy Search over Encrypted Outsourced Data with
Accuracy Improvement. IEEE Transactions on Information Forensics and
Security, 11, 2706- 2716. https://doi.org/10.1109/TIFS.2016.2596138
16. Fahl, S., Harbach, M., Muders, T. and Smith, M. (2012) Confidentiality
as a Service—Usable Security for the Cloud. 11th International
Conference on Trust, Security and Privacy in Computing and
Communications, Liverpool, 25-27 June 2012, 153-162.
17. Harbach, M., Fahl, S., Brenner, M., Muders, T. and Smith, M. (2012)
Towards Privacy-Preserving Access Control with Hidden Policies,
Hidden Credentials, and Hidden Decisions. 10th Annual International
Conference on Privacy, Security and Trust, Paris, 16-18 July 2012, 17-
24. https://doi.org/10.1109/pst.2012.6297915
18. Kuzu, M., Kantarcioglu, M., Thuraisingham, B., Khan, L. and
Schweitzer, H. (2013) Practical Privacy Preserving Record Integration
and Search. The University of Texas, Austin.
19. Wang, C., Cao, N., Ren, K. and Lou, W. (2012) Enabling Secure and
Efficient Ranked Keyword Search over Outsourced Cloud Data. IEEE
Transactions on Parallel and Distributed Systems, 23, 1467-1479.
https://doi.org/10.1109/TPDS.2011.282
20. Singh, M. and Singh, N.S. (2014) Implementation of Triple Data
Encryption Standard Using Verilog. International Journal of Advanced
Research in Computer Science and Software Engineering, 2277, 667-670.
21. Kakkar, A., Singh, M.L. and Bansal, P.K. (2012) Comparison of
Various Encryption Algorithms and Techniques for Secured Data
Communication. International Journal of Engineering and Technology,
2, 87-92.
Security Model for Preserving Privacy over Encrypted Cloud ... 159
22. Cao, N., Wang, C., Li, M., Ren, K. and Lou, W. (2014) Privacy-
Preserving Multi-Keyword Ranked Search over Encrypted Cloud
Data. IEEE Transactions on Parallel and Distributed Systems, 25, 222-
233. https://doi.org/10.1109/TPDS.2013.45
23. Kamara, S. and Lauter, K. (2010) Cryptographic Cloud Storage.
International Conference on Financial Cryptography and Data Security,
Tenerife, 25-28 January 2010, 136-149. https://doi.org/10.1007/978-3-
642-14992-4_13
24. Fu, Z., Ren, K., Shu, J., Sun, X. and Huang, F. (2016) Enabling
Personalized Search over Encrypted Outsourced Data with Efficiency
Improvement. IEEE Transactions on Parallel and Distributed Systems,
27, 2546-2559. https://doi.org/10.1109/TPDS.2015.2506573
25. Han, F., Qin, J., Zhao, H. and Hu, J. (2014) A General Transformation
from KP-ABE to Searchable Encryption. Future Generation Computer
Systems, 30, 107- 115.
26. Chen, R., Mu, Y., Yang, G., Guo, F., Huang, X., Wang, X. and Wang,
Y. (2016) Server-Aided Public Key Encryption with Keyword Search.
IEEE Transactions on Information Forensics and Security, 11, 2833-
2842. https://doi.org/10.1109/TIFS.2016.2599293
27. Liu, Q., Wang, G. and Wu, J. (2012) Secure and Privacy Preserving
Keyword Searching for Cloud Storage Services. Journal of Network
and Computer Applications, 35, 927-933.
28. Shiba Sampat Kale, P. and Lahane, S.R. (2014) Privacy Preserving
Multi-Keyword Ranked Search with Anonymous ID Assignment over
Encrypted Cloud Data. International Journal of Computer Science and
Information Technologies, 5, 7093- 7096.
29. Xia, Z., Chen, L., Sun, X. and Wang, J. (2013) An Efficient and Privacy-
Preserving Semantic Multi-Keyword Ranked Search over Encrypted
Cloud Data. Advanced Science and Technology Letters, 31, 284.
30. Madane, S.A. and Patil, B.M. (2015) Comparison of Privacy
Preserving SingleKeyword Search and Multi-Keyword Ranked Search
Techniques over Encrypted Cloud Data. International Journal of
Computer Applications, 126, 34-38.
31. Barde, C.R., Katkade, P., Shewale, D. and Khatale, R. (2014) Secured
MultipleKeyword Search over Encrypted Cloud Data. International
Journal of Emerging Technology and Advanced Engineering, 4, 528-
532.
CHAPTER
8
Trusted Heartbeat Framework for
Cloud Computing
INTRODUCTION
Outsourcing computation to cloud can reduce IT expenditure spent by
companies. Still, most of them are not willing to do so, due to security
concerns with cloud computing environment and services. As per survey
[1] , it is found that despite of huge benefits, fear is still there about security
threats like loss of control of data and integrity of systems. Computing nodes
(virtual machines) can be tampered with or ill configured to produce wrong
results. E.g. Assigned Hadoop task (related to financial data consolidations)
may generate incorrect result due to few malfunctioning nodes [2] . Due
the large size of data and its processing, the error is very hard to identify in
collective results, and it may result in huge loss.
Hadoop
Apache Hadoop [8] is framework that facilitates the data intensive distributed
processing of massive data sets across clusters machines. It supports
extension of processes from a single to thousands of machines. Designed
with a fundamental assumption that hardware failure is common, making it
the software’s responsibility to identify and handle failures at the application
layer. It replicates data across multiple nodes with rapid data transfer facility.
Hadoop implementation essentially consists of two major components: (i)
Hadoop Distributed File System (HDFS) [9] : A file system that manages all the
nodes in a cluster for data storage, and (ii) Map- Reduce [10] : The framework
that allocate work to nodes in a cluster. Hadoop Cluster can be designed in
various ways. One of which includes a single master and multiple worker
nodes. The master node consists of a Job- Tracker, TaskTracker, NameNode
and DataNode. A worker node acts as both a DataNode and TaskTracker, it
depends on avalability of physical or virtual resources (Figure 2).
Related Work
There have been many attempts to enhance the fault tolerance and trust
based mechanisms to preserve integrity of cloud system in open distributed
environment [14] . For sensitive data in open distributed systems, Airavat
[15] is developed. It incorporates mandatory access control to detect privacy
violation. Verification-based Integrity Assurance Framework [16] is based
on the idea of replication and quiz related methods. It can detect malicious
and normal task trackers in Hadoop system with the help of predefined
set of questionnaires. Authors in article [17] , proposed algorithm named
Longest Approximate Time to End (LATE). LATE finds the slow tasks in a
homogeneous environment. LATE first estimates the remaining time for each
tasks, then assigns the speculative tasks for those with the longest remaining
time to end and maintains integrity of the system. Terra [18] provides an
attestation ability that allows a remote party to reliably detect whether the
host is running a platform that the remote party trusts. As elaborated by
Bercher et al. [19] , for encrypted communication between all the nodes in
the HDFS system, a key must be securely exchanged in advance. However,
there are issues with how the key is shared. As seen in [20] ; key exchange is
done frequently by heartbeat messages and attacker can pretend to be a data
node and can many chunks of data.
CONCLUSION
In this paper, we propose Trusted Heartbeat framework; that creates a
collaborative network among virtual machines. With remote attestations
and heartbeat messages, a Master node can define the exact status (working
or malfunctioning) of its nodes. This proposed framework identifies the
genuine worker node using trusted computing facilities. Heartbeat interval
time is very important parameter in our system. Trust and reputation based
detector improve Hadoop like distributed systems in detecting malicious
nodes quickly. This framework shows utilization of common messages to
establish trust among all the corresponding nodes in distributed environment.
172 Security of Cloud-based systems
REFERENCES
1. (2012) What’s Holding Back the Cloud. http://www.intel.in/content/
dam/www/public/us/en/documents/reports/whats-holding-back-the-
cloud-peer-research-rep ort2.pdf
2. Khan, S.M. and Hamlen, K.W. (2012) Hatman: Intra-Cloud Trust
Management for Hadoop. CLOUD’12: Proceedings of 5th International
Conference on Cloud Computing, Honolulu, 24-29 June 2012, 494-
501. http://dx.doi.org/10.1109/cloud.2012.64
3. Feng, J., Chen, Y., Ku, W. and Liu, P. (2010) Analysis of Integrity
Vulnerabilities and a Non-Repudiation Protocol for Cloud Data Storage
Platforms. ICPPW’10: Proceedings of 39th International Conference
on Parallel Processing Workshops, San Diego, 13-16 September 2010,
1-8. http://dx.doi.org/10.1109/icppw.2010.42
4. Sujitha, G., Varadharajan, M., Rao, Y.V., Sridev, R., Gauthaum,
M.K.S., Narayanan, S., Raja, R.S. and Shalinie, S.M. (2013) Improving
Security of Parallel Algorithm Using Key Encryption Technique.
Information Technology Journal, 12, 2398. http://dx.doi.org/10.3923/
itj.2013.2398.2404
5. Contractor, D. and Patel, D. (2012) Trust Management Framework for
Attenuation of Application Layer DDoS Attack in Cloud Computing.
IFIPTM 2012: 6th IFIP WG 11.11 International Conference on Trust
Management, 374, 201- 208. http://dx.doi.org/10.1007/978-3-642-
29852-3_14
6. Futral, W. and Greene, J. (2013) Introduction to Trust and Intel Trusted
Execution Technology. Intel Trusted Execution Technology for Server
Platforms, 1-14.
7. TPM Software Stack (TSS) Specification, Version 1.2. http://
www.trustedcomputinggroup.org/resources/tcg_software_stack_
specification_tss_12_faq
8. White, T. (2012) Hadoop: The Definitive Guide. O’Reilly.
9. Dean, J. and Ghemawat, S. (2008) MapReduce: Simplified Data
Processing on Large Clusters. Communications of the ACM, 51, 107-
113. http://dx.doi.org/10.1145/1327452.1327492
10. Borthakur, D. (2007) The Hadoop Distributed File System: Architecture
and Design. In hadoop.apache.org, 2007. http://hadoop.apache.org/
docs/r0.18.0/hdfs_design.pdf
11. Hoffmann, H., Eastep, J., Santambrogio, M.D., Miller, J.E. and
Trusted Heartbeat Framework for Cloud Computing 173
9
Education Technology Cloud Platform
Framework Establishment and
Security
ABSTRACT
With more educational business absorbed into information management
system at universities, traditional information management platform seems
unable to provide efficient service for tea- ching and research. Some
universities then resort to cloud computing platform. In view of the pro-
blems existing in the traditional information platform, this study presented
an information management framework designed with cloud technology,
and introduced the security techniques for its protection.
Citation: Hu, G. , Yang, Y. and Li, L. (2016), “Education Technology Cloud Platform
Framework Establishment and Security”. Journal of Computer and Communications,
4, 7-14. doi: 10.4236/jcc.2016.47002.
Copyright: © 2016 by authors and Scientific Research Publishing Inc. This work is li-
censed under the Creative Commons Attribution International License (CC BY). http://
creativecommons.org/licenses/by/4.0
176 Security of Cloud-based systems
INTRODUCTION
As the digital campus construction of Northwest Agriculture & Forestry
University keeps advancing, great achievements have been made in network
construction, information services and educational technology. Through
years of relentless exploration, the university’s digital campus has built
up a traditional information platform integrating the network construction,
information services and educational technology. However, a number of
problems have been discovered during the actual application of the traditional
information platform in recent years, so how to solve these problems has
become a top priority for the construction of the digital campus.
Customizable Self-Services
Cloud computing provides users with self-help resource services so that
users are able to obtain self-help computing resources without needing to
be face-to-face with the providers. Meanwhile, the cloud system provides
certain application server directories for the users to choose service items
and content to meet their needs on their own.
Quantifiable Services
When providing cloud services for users inside and outside campus, the
resources are monitored and controlled in real-time to automatically control
and optimize their allocation for different types of services provided for
users, and thus to ensure that every user’s requirements are met timely.
Education Technology Cloud Platform Framework Establishment ... 179
Layer of Infrastructure
This layer is corresponded to the IaaS in the cloud computing service
model, which mainly integrates and uniformly allocates hardware resources
through virtualization technology with infrastructure resources of digital
campus as its core. With a series of unified management services such as
optimal management, storage management and security management, all
heterogeneous and loose nodes are integrated into a tight “virtual super
computers” with a single image [3] .
Users can deploy and operate the operating systems and software
applications on the cloud platform composed of all the hardware resources.
When doing this, rather than being concerned about the deployment and
management of the infrastructure layer, users only need to obtain their
service resources through the service interface provided for them. In this
paper, the infrastructure layer is sorted into four layers, i.e., layer of resource
pools, layer of virtualization, layer of management support and layer of
service. The detailed design is as shown in Figure 1.
for teachers and students who can also customize different applications to
meet their demands in their work and scientific researches.
1) Resource isolation
Isolation of hardware resources can be divided into CPU isolation, network
isolation and disk I/O isolation. The strategy for CPU isolation: To bind all
the virtual CPUs and the Domain-0 to physical CPUs.
The strategy for network isolation: iptables+tc is used for network
isolation, with strategy limits on the incoming traffic implemented and HTB
traffic control for bridge devices conducted. Network isolation providing
security for data transfer has become a mechanism applied extensively in
financial areas such as e-banking and e-payment. The other ways to ensure
network security and isolation includes VLAN technology, VPN technology
and HTTP/SSL technology [5] .
Disk I/O isolation: dm-ioband is used with a principle of setting only the
proportion yet no absolute cap.
184 Security of Cloud-based systems
2) Security reinforcement
The reinforcement of operating systems and software: the configuration of
the operating systems and the server software is consolidated to prevent
security holes at the operating system level, and the developers will be
informed in time to deal with them accordingly. All the servers attached
to the platform should receive timely software upgrades so as to patch the
software that has vulnerabilities and to even change the secondary websites
or the software that has powerful vulnerabilities.
Database reinforcement: to install operating systems and data files in
the database programs onto different NTFS partitions; to install database
programs and files onto non-system volumes; to install the components
necessary for the businesses instead of those unnecessary ones such as
upgrade tools, development tools, code samples and online books; to restrict
the client computers to link to the scope of the protocols that can be used by
the database servers and ensure the safety of these protocols, like limiting
using TCP/IP only; to restrict the client computers to link to the specific
ports that are used by the data servers without using default ports.
3) Network security
The powerful defense system of the Network Education Center is made full
use of to help the applications resist network attacks and intrusions. The
Center will clear abnormal traffic and monitor botnets at a regular interval,
will hide the surveillance and financial intranets and isolate the security
domains, and will set up firewalls respectively at the exits of each intranet.
An IPS is deployed on the cloud platform, which can interrupt, adjust and
isolate some abnormal internet transfer immediately. The anti-virus server
is deployed on the cloud computing system to manage anti-virus software;
the safety patch server is deployed on the management node on the cloud
computing platform to automatically install patches, test and roll back,
which helps the teachers and students to install patches with automatic tools.
4) Data security
The most advanced technology of virtualized mass storage has been
adopted to store and manage data resources so as to back up timely and
Education Technology Cloud Platform Framework Establishment ... 185
extensively and store various kinds of core data resources reliably for a
long time. Corresponding safety mechanism includes data encryption, data
isolation, data verification, data backup and disaster recovery. The data
between different applications are isolated because teachers and students
with development demands are only able to access the data under their
corresponding accounts after they apply for the virtual machines. Through
the end-to-end VLAN isolation, the data isolation in terms of management
level, business level and storage level is realized, and thus to avoid the
impact that the mutual effects between each aspect have on the data security.
In addition, with regard to the data upload and download between the
Internet and the intranet, the campus cloud computing platform should
provide special passage for the upload and download on FTP and run a
security scan for the applications so as to prevent the test code or code that
has safety holes from being published to the Internet.
5) Password safety
The unified identity authentication platform based on LDAP can manage
the campus users and permissions in a unified and centralized way, so the
users only need to log onto the campus information portal to visit all the
systems inside the campus. When campus users log onto the servers directly,
multifactor authentication is used to guarantee the safety of passwords
effectively and carry out multi-level fine authorization.
Business Safety
The cloud platform should provide a one-stop security platform to check,
manage and operate the security information. The business security platform
includes two modules:
1) Open API audit information check module
The security server daemon will automatically analyze the data that the
186 Security of Cloud-based systems
Information Security
The cloud platform should introduce information filtering and detecting
mechanism. The technology of Internet spam detection and filtration can
identify and filter malicious information on the dimensions of character
recognition, user behavior analysis and credit system, ensuring the coverage
while effectively reducing misjudge rate. The information security can be
divided into three parts:
1) To improve information classification and management and
strictly control users’ access rights to information.
Combining the setting of permission, universities can strictly control
user’s access rights by classifying the information and users according to
a certain sequence and based on information security level and category
of the information needed by users. Besides, the identity authentication
system should be linked so that only the users who are permitted by the
authentication system can visit the educational resources on the cloud. For
the cloud computing is environmentally dynamic, cross-organizational, and
diverse in services, the technologies of the unified identity authentication
platform and access control are used to strictly control the teachers and
students or visitors’ access to the information, and thus the information
security is effectively ensured.
2) To protect the integrity of information during transmission by
using encryption technologies
In order to make sure that the information on the “educational
Education Technology Cloud Platform Framework Establishment ... 187
CONCLUSION
This paper has designed the framework of for the cloud platform of
educational technology, which mainly includes layer of infrastructure,
layer of basic services and layer of application services. The cloud platform
designed based on the framework has completely solved the problems in
the traditional information platforms. Besides, prevention strategies are
proposed to address the security issues in the using of new platform, thus
making sure that users can use the cloud platform of educational technology
safely.
ACKNOWLEDGEMENTS
The authors wish to thank the helpful comments and suggestions from
my leaders in Network and Education Technology center. This work is
supported by Research project of teaching reform of higher education in
Shaanxi (No.13BY13).
188 Security of Cloud-based systems
REFERENCES
1. Miller, T.D. and Crawford, I.L. (2010) System and Method for
Allocating Computing Resources for a Grid Virtual System. US,
US7765552.
2. Celesti, A., Tusa, F., Villari, M. and Puliafito, A. (2011) An Approach to
Enable Cloud Service Providers to Arrange IaaS, PaaS, and Saas Using
External Virtualization Infrastructures. 2011 IEEE World Congress on
Services (SERVI- CES), Washington DC, 4-9 July 2011, 607-611.
http://dx.doi.org/10.1109/SERVICES.2011.92
3. T.A. (2011) DNA Sequence Patterns—A Successful Example of
Grid Computing in Genome Research and Building Virtual Super-
Computers for the Research Commons of e-Societies. 8th International
Desktop Grid Foundation (IDGF) Workshop, Max Planck Institute for
Gravitational Physics, Hannover, 17 August 2011.
4. Godhankar, P.B. and Gupta, D. (2014) Review of Cloud Storage
Security and Cloud Computing Challenges. International Journal of
Computer Science & Information Technology, 5, 528-533.
5. Jiang, Y. (2014) To Explore the Application of Vlan Technology in
Network Security and Access Control and Practice. Network Security
Technology & Application, 7, 18-19.
6. Van Melderen, L. and De Bast, M.S. (2009) Bacterial Toxin-Antitoxin
Systems: More than Selfish Entities? PLoS Genet, 5, Article ID:
e1000437.
SECTION 3
ENHANCING SECURITY
IN THE CLOUD
CHAPTER
10
Design and Development of a Novel
Symmetric Algorithm for Enhancing
Data Security in Cloud Computing
ABSTRACT
Cloud computing is a kind of computing that depends on shared figuring
assets instead of having nearby servers or individual gadgets to deal with
applications. Technology is moving to the cloud more and more. It’s not just
a trend, the shift away from ancient package models to package as service
has steadily gained momentum over the last ten years. Looking forward,
the following decade of cloud computing guarantees significantly more
Citation: Hossain, M. , Ullah, A. , Khan, N. and Alam, M. (2019), “Design and Devel-
opment of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Com-
puting”. Journal of Information Security, 10, 199-236. doi: 10.4236/jis.2019.104012.
Copyright: © 2019 by authors and Scientific Research Publishing Inc. This work is li-
censed under the Creative Commons Attribution International License (CC BY). http://
creativecommons.org/licenses/by/4.0
192 Security of Cloud-based systems
INTRODUCTION
Research Background
Cloud computing is a general term for anything that involves delivering
hosted services over the Internet [1] . These services are broadly divided into
three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service
(PaaS) and Software-as-a-Service (SaaS). There are total three principles of
cloud computing and they are, on demand computing resources, founding
a pay-as-you-go business model for computing and information technology
services that can be used for elastic scaling, and elimination of up-front
capital and operational expenses [2] .
As the rate of cybercrimes increasing rapidly throughout the internet,
and cloud computing is an enchanting target for many reasons that’s why
data security plays the most key role in the cloud and the major concern over
the internet in order to serve all the services and benefits of it. Data secrecy
over the network could be achieved by using cryptographic technique that is
the process of encryption and decryption.
Encryption is the method by which plaintext is converted from a
readable form to an encoded version (cipher text) that can only be decoded
by another entity if they have access to a decryption key. Decryption is the
reverse process encryption to convert the encrypted text into plain text.
There are three most common types of encryption and decryption methods
and they are Symmetric, asymmetric, and hybrid algorithms that can be used
to encrypt and decrypt data in cloud computing storage [3] .
Symmetric encryption is an encryption system in which the sender and
receiver of a message share a single common key that is used to encrypt and
decrypt the message. Symmetric algorithm that is used in cloud computing
are Data Encryption Standard (DES), Advanced Encryption Standard
Design and Development of a Novel Symmetric Algorithm ... 193
(AES). Asymmetric Encryption uses two distinct yet related keys, one key
is a Public key which is used for encryption and the other key is the Private
key used for decryption.
The private key is intended to be private so that only the authenticated
recipient can decrypt the message. An example of asymmetric algorithm
used in cloud computing is RSA algorithm. Hybrid encryption is a method
of encryption that combines two or more encryption schemes and includes a
combination of symmetric and asymmetric encryption to take advantage of
the strengths of each type of encryption [4] .
It’s a research where authors are developing novel a symmetric algorithm
which will be used for the encryption and decryption of data stored in the
cloud thus enhancing the data security of the cloud. In this paper, authors
used several permutation to increase the complexity and security.
The reason behind choosing symmetric encryption is that symmetric
key encryption doesn’t require as many CPU cycle as asymmetric key
encryption, so it can be said that it’s generally faster. Thus, when it comes to
speed, symmetric is much faster than asymmetric.
For encrypting private and sensitive data or information symmetric
encryption trumps the asymmetric encryption, as symmetric encryption
uses the same key for both encryption and decryption. So unless the sender
himself tells the secret key to the receiver, the receiver will never be able to
decrypt the message.
Objective
To design and develop a symmetric algorithm for enhancing data security
in cloud.
Justification of Study
Cloud computing is perhaps the most flamboyant technological innovation of the
21st Century. Because Cloud computing facilitates the access of applications and
data from any location worldwide and from any device with an internet connection.
But the security of client’s data is a major responsibility of a cloud
provider. To be secured information needs to hidden from unauthorized
access (Confidentiality), protected from unauthorized change (integrity),
and available to the authorized entity when it is needed (availability). And it
not uncommon that many cloud servers have been under attack by hackers
and lost valuable data for the lack of security.
194 Security of Cloud-based systems
As the world progresses people are becoming more and more dependent on
these sort of services to store their data and information and it has become
utmost important to protect the data that are stored in the cloud. Our algorithm
mainly works to improve the security and overcome these problems.
The most important services that our algorithm will provide are:
*Confidentiality: The algorithm aims to unauthorized disclosure of the
protected data.
*Integrity: Protect against illegal modification and deletion.
*Authorization: Algorithm will prevent the access of unauthorized users.
By providing these services, algorithm ensures more security in cloud
computing.
Scope of Study
Data security is one of the biggest challenges at the current time. The security
of client’s data is major responsibility of cloud provider. Cloud computing
is likely to suffer from a number of known and unknown vulnerabilities,
enabling attackers to either obtain computing services for free or steal
information from cloud. To solve this problem, we have proposed a
symmetric algorithm that will provide safest data security and will prevent
the unauthorized access of dada. It will provide data to the authorized user
without any loss of data or theft of data.
LITERATURE REVIEW
Cloud Computing is transforming information technology. As information
and processes are migrating to the cloud, it is transforming not only where
computing is done, but also fundamentally, how it is done. As increasingly
more corporate and academic worlds invest in this technology, it will also
drastically change IT professionals’ working environment. Cloud Computing
solves many problems of conventional computing, including handling peak
loads, installing software updates, and, using excess computing cycles.
Cloud computing has significantly impacted every section of our lives
and business structure. Securing the cloud data is the major concern in the
cloud computing environment. Many research works are being proposed to
secure cloud data.
In [5] , the author proposed a hybrid cryptography model for cloud data
security which combines the symmetric key (AES) and asymmetric key
(Hyper Elliptic Curve Cryptography (HECC)) techniques. The AES and
HECC algorithms are used for the key generation, encryption and decryption
processes. To enhance the level of data security in cloud she used Hyper
Elliptic Curve Cryptography (HECC). The HECC in cloud environment
typically have encrypted with the public key and decrypted with a private
key. The reviewed paper works with block size of 128 bit whereas the
proposed work provides the facility to take 192 bits as block size.
In [6] , the authors have developed a hybrid hashing security algorithm
for data storage on cloud computing which makes the data more secure
from theft. In this work, they used hybrid algorithm (RSA and AES) and
196 Security of Cloud-based systems
hash functions for securing cloud data storage. In this work, they proposed
a new Hybrid-SHA256 algorithm. They used different data input sizes (34,
67, and 93) kb, for both the Hybrid and Hybrid-SHA256 algorithms. Their
model provides more secure encryption than Hybrid model because the
model used hashing and digital signature concept. The reviewed work used
hybrid algorithm (RSA and AES) whereas our algorithm is totally new. The
reviewed work used SHA-256 and digital signature concept, on the other
hand, the proposed algorithm used SHA-512 for message authentication.
In [7] , the authors proposed a model to secure user data in cloud computing
using encryption algorithms in which they used different algorithms. They
proposed several different algorithms to eliminate the concerns regarding
data loss, segregation and privacy. They used RSA, DES, AES and Blowfish
algorithm to encrypt and decrypt data in cloud and compare the accuracy
of each algorithm. They use different key size for each algorithm. The key
length of DES algorithm is 56 bits. The key size of AES algorithm is 128, 192
and 256 bits. The key size of Blow-fish algorithm is 128 - 448 bits. The key
size of RSA algorithm is 1024 bits. They found that AES algorithm takes the
least time to execute cloud data. Blowfish algorithm has the least memory
requirement. DES algorithm takes least encryption time. RSA takes longest
memory size and encryption time. The reviewed work did a survey on four
different algorithms by comparing them considering their advantages and
disadvantages, on the other hand, the proposed algorithm specifically works
for encrypting data in cloud in a secure way.
In [8] , the authors developed an encryption algorithm to enhance data
security in cloud storage. Their algorithms suggest the encryption of the files
to be uploaded on the cloud. The security of the data uploaded by the user is
ensured by doubly. The algorithm encrypts the data as well provides access
to the data only on successful authentication. In this algorithm, the uploaded
file will be encrypted by using AES algorithm. The AES key is encrypted by
RSA Algorithm. The reviewed algorithm works for encrypting file and store
it in cloud but the proposed work encrypt text and store it in cloud.
In [9] , the authors have developed an algorithm to enhance data security
in cloud computing. They developed a Lightweight cryptographic algorithm.
The algorithm mainly works in three steps. Firstly, key exchange. This step
has two parts: key generation and key exchange. Secondly, Data storage in
which the encrypted data is stored in cloud. Thirdly, data access by which
the user requests the data from the cloud storage. To do this the authors used
asymmetric and symmetric cryptographic algorithm. The data is encrypted
Design and Development of a Novel Symmetric Algorithm ... 197
In [20] , the authors proposed a model to protect the data from attackers by
using two essential processes. These processes are listed as Encryption and
Decryption. Encryption is the process of converting the data to stop it from
attackers to read the original data clearly. Encryption involves conversion of
plain text to unreadable format.
It is known as cipher text. The user cannot read the above format. Hence,
the next process that is carried out by the user is Decryption. In the world of
computing, there exist security issues for storing the data in cloud.
In order to secure data in cloud AES encryption technique is used in this
project. Advanced Encryption Standard is a block cipher with a block length
of 128 bits. It permits three different key lengths: 256, 192,128 or bits. The
reviewed work uses AES algorithm for encrypting and decrypting data. The
proposed algorithm uses a new symmetric algorithm that is more secure and
less time consuming than AES.
The main difference between the proposed work and the existing related
works that have been reviewed this section are that most of these papers
work with block size of maximum 128 bits. Whereas, the proposed algorithm
works with 192 bits. The key size of the proposed algorithm is also 192 bits
where the maximum reviewed papers work with key size of 128 bits.
METHODOLOGY
In this research paper, authors used 5 phases to describe the procedure.
These phases are planning, requirement analysis, proposed algorithm,
implementation, testing and result. Figure 1 shows the method of the
proposed work.
Planning
A successful research begins with a proper planning. So the authors started
this process of research with a proper plan. The plan includes the topic of
the research and the working process. First of all, the authors went through
many research works of similar topic.
Then the authors selected the title based on the knowledge gained from
those papers. While going through those papers the authors found out that
there were few limitations in every work. So the authors planned the research
to overcome those limitations, also keeping a uniqueness to the work.
Design and Development of a Novel Symmetric Algorithm ... 201
Requirement Analysis
Every work has some requirements according to needs. The proposed work
does require some specific resources.
1) System Requirements: system requirement can be isolated into
two types:
a) Software requirement.
b) Hardware requirement.
• • Software Requirements
i) Language—Java.
ii) Environment—JDK and JRE.
iii) Operating System—Windows, Linux, MAC.
iv) Cloud Server.
v) External Algorithm—AES, DES, SHA.
• Hardware Requirements
i) Laptop or Desktop with processor.
ii) USB cable.
2) User Requirements: user requirement includes what the user
expects from the system. For this, the user wants the security of
data including integrity, confidentiality and authentication.
202 Security of Cloud-based systems
Proposed Algorithm
The proposed algorithm works in Block wise. The proposed algorithm takes
a plain text of up to 192 bits block of data and converts it into a cipher text.
This algorithm includes many specific methods for encryption and
decryption. For both the encryption and decryption, the key size is same
which is 192 bits.
The algorithm encrypts and decrypts the data in 12 rounds. Each round
uses the same key to encrypt and decrypt the data. A hash value is also
generated for authentication. The goal of the proposed algorithm is to secure
and enhance the protection of data stored in cloud.
Implementation
The programming language used to design the proposed algorithm is java.
In java, for encrypting data, the algorithm works in two steps.
At first, it takes input, secondly it requires a 192-bit secret key to encrypt,
after providing key, the algorithm encrypts the data and gives a cipher text as
output and a hash code is also generated.
For decrypting data, the algorithm works in three steps, at first, it
receives the cipher text, secondly it requires the same secret key and thirdly
it receives the hash code and then it decrypts the data and provides the
original text. After implementing the algorithm in java, the authors propose
to use the algorithm in cloud.
Hashing
Encryption Process
C1 C2 C3 C4 C5 C6
M= R1 Ai, j Ai, j+1 Ai, j+2 Ai, j+3 Ai, j+4 Ai, j+5
R2 Ai+1, j Ai+1, j+1 Ai+1, j+2 Ai+1, j+3 Ai+1, j+4 Ai+1, j+5
R3 Ai+2, j Ai+2, j+1 Ai+2, j+2 Ai+2, j+3 Ai+2, j+4 Ai+2, j+5
R4 Ai+3, j Ai+3, j+1 Ai+3, j+2 Ai+3, j+3 Ai+3, j+4 Ai+3, j+5
Constant 2 3 1 1 2 3
Matrix= 1 2 3 1 1 2
1 1 2 3 1 1
3 1 1 2 3 1
0 63 7C 77 7B F2 6B 6F C5 30 01 67 2B FE D7 AB 76
1 CA 82 C9 7D FA 59 47 F0 AD D4 A2 AF 9C A4 72 C0
2 B7 FD 93 26 36 3F F7 CC 34 A5 E5 F1 71 D8 31 15
3 04 C7 23 C3 18 96 05 9A 07 12 80 E2 EB 27 B2 75
4 09 83 2C 1A 1B 6E 5A A0 52 3B D6 B3 29 E3 2F 84
5 53 D1 00 ED 20 FC B1 5B 6A CB BE 39 4A 4C 58 CF
6 D0 EF AA FB 43 4D 33 85 45 F9 02 7F 50 3C 9F A8
7 51 A3 40 8F 92 9D 38 F5 BC B6 DA 21 10 FF F3 D2
8 CD 0C 13 EC 5F 97 44 17 C4 A7 7E 3D 64 5D 19 73
9 60 81 4F DC 22 2A 90 88 46 EE B8 14 DE 5E 0B DB
A E0 32 3A 0A 49 06 24 5C C2 D3 AC 62 91 95 E4 79
B E7 C8 37 6D 8D D5 4E A9 6C 56 F4 EA 65 7A AE 08
C BA 78 25 2E 1C A6 B4 C6 E8 DD 74 1F 4B BD 8B 8A
D 70 3E B5 66 48 03 F6 0E 61 35 57 B9 86 C1 1D 9E
E E1 F8 98 11 69 D9 8E 94 9B 1E 87 E9 CE 55 28 DF
F 8C A1 89 0D BF E6 42 68 41 99 2D 0F B0 54 BB 16
Insert a plaintext.
→ Anwar Newaz Feroz from 34c.
Arrange the plain text in 4 * 6 matrix (see Table 4).
Convert into equivalent ASCII value (see Table 5).
Perform Shift Rows (see Table 6).
Enact Permutation 1:
Interchange column-C1 by C2 and C2 by C1 (see Table 7).
Interchange column-C3 by C4 and C4 by C3 (see Table 8).
Interchange column-C5 by C6 and C6 by C5 (see Table 9).
Interchange Row-R1 by R3 and R3 by R1 (see Table 10).
Interchange Row-R2 by R4 and R4 by R2 (see Table 11).
After Permutation 1 the result is (see Table 12).
Reverse the whole block of matrix (see Table 13).
A n w a r N
e w a z F e
r o z _ f r
0 m 3 4 c .
C1 C2 C3 C4 C5 C6
97 114 78 65 110 119
97 122 70 101 101 119
111 122 32 102 114 114
210 Security of Cloud-based systems
111 109 51 52 99 46
C1 C2 C3 C4 C5 C6
114 97 65 78 110 119
122 97 101 70 101 119
122 111 102 32 114 114
109 111 52 51 99 46
109 111 52 51 46 99
C1 C2 C3 C4 C5 C6
99 46 51 52 111 109
Enact Permutation-2:
Interchange column-C5 by C6 and C6 by C5 (see Table 14).
Interchange Row-R1 by R4 and R4 by R1 (see Table 15).
Perform C1 ♁ C3 = X (see Table 16).
Perform C2 ♁ C4 = Y (see Table 17).
Replace C1 by X and C2 by Y (see Table 18).
After Permutation-2 the result is (see Table 19).
Convert into equivalent Hexadecimal Value (see Table 20).
Replace the value using S-Box (see Table 21).
Convert into equivalent Decimal Value (see Table 22).
Mix column operation (see Table 23).
Tables 24-29 show the XOR operation between each column of Mix
column operation.
Resultant mix column (see Table 30).
212 Security of Cloud-based systems
Key Generation
Key text: → This key is symmetric.
C1 C2 C3 C4 C5 C6
114 114 32 102 122 111
110 119 78 65 114 97
99 46 51 52 109 111
101 119 70 101 122 97
114 ♁ 32 = 82
110 78 32
99 51 80
101 70 35
114 ♁ 102 = 20
119 65 54
46 52 26
119 101 18
80 26 51 52 109 111
35 18 70 101 122 97
52 14 20 66 7A 6F
20 36 4E 41 72 61
50 1A 33 34 6D 6F
23 12 46 65 7A 61
00 FA B7 33 DA A8
B7 05 2F 83 40 EF
53 A2 C3 18 3C A8
26 C9 5A 4D DA EF
0 ♁ 2 = 2
183 1 182
83 1 82
38 3 37
250 ♁ 3 = 249
5 2 7
162 1 163
201 1 200
183 ♁ 1 = 182
47 3 44
195 2 193
90 1 91
51 ♁ 1 = 50
131 1 130
24 3 27
77 2 79
Design and Development of a Novel Symmetric Algorithm ... 215
218 ♁ 2 = 216
64 1 65
60 1 61
218 3 217
168 ♁ 3 = 171
239 2 237
168 1 169
239 1 238
IDU2IDk3IDIz MyAyMjI=.
T h i s _ k
e y _ i s _
s y m m e t
r i c . 0 0
Table 33. XOR between resultant mix column and key text table.
2 ♁ 84 = 86
182 101 211
82 115 33
37 114 87
Design and Development of a Novel Symmetric Algorithm ... 217
50 ♁ 115 = 65
130 105 235
27 109 118
79 46 97
216 ♁ 32 = 248
65 115 50
61 101 88
217 48 233
Decryption Process
C1 C2 C3 C4 C5 C6
Md= R1 Ai, j Ai, j+1 Ai, j+2 Ai, j+3 Ai, j+4 Ai, j+5
R2 Ai+1, j Ai+1, j+1 Ai+1, j+2 Ai+1, j+3 Ai+1, j+4 Ai+1, j+5
R3 Ai+2, j Ai+2, j+1 Ai+2, j+2 Ai+2, j+3 Ai+2, j+4 Ai+2, j+5
R4 Ai+3, j Ai+3, j+1 Ai+3, j+2 Ai+3, j+3 Ai+3, j+4 Ai+3, j+5
Constant 2 3 1 1 2 3
Matrix= 1 2 3 1 1 2
1 1 2 3 1 1
3 1 1 2 3 1
220 Security of Cloud-based systems
Table 43. AES Inverse SubBytes transformation (“Rijndeal S-box”, 2019) [25].
0 1 2 3 4 5 6 7 8 9 A B C D E F
0 52 09 6A D5 30 36 A5 38 BF 40 A3 9E 81 F3 D7 FB
1 7C E3 39 82 9B 2F FF 87 34 8E 43 44 C4 DE E9 CB
2 54 7B 94 32 A6 C2 23 3D EE 4C 95 0B 42 FA C3 4E
3 08 2E A1 66 28 D9 24 B2 76 5B A2 49 6D 8B D1 25
4 72 F8 F6 64 86 68 98 16 D4 A4 5C CC 5D 65 B6 92
5 6C 70 48 50 FD ED B9 DA 5E 15 46 57 A7 8D 9D 84
6 90 D8 AB 00 8C BC D3 0A F7 E4 58 05 B8 B3 45 06
7 D0 2C 1E 8F CA 3F 0F 02 C1 AF BD 03 01 13 8A 6B
8 3A 91 11 41 4F 67 DC EA 97 F2 CF CE F0 B4 E6 73
9 96 AC 74 22 E7 AD 35 85 E2 F9 37 E8 1C 75 DF 6E
A 47 F1 1A 71 1D 29 C5 89 6F B7 62 0E AA 18 BE 1B
B FC 56 3E 4B C6 D2 79 20 9A DB C0 FE 78 CD 5A F4
C 1F DD A8 33 88 07 C7 31 B1 12 10 59 27 80 EC 5F
D 60 51 7F A9 19 B5 4A 0D 2D E5 7A 9F 93 C9 9C EF
E A0 E0 3B 4D AE 2A F5 B0 C8 EB BB 3C 83 53 99 61
F 17 2B 04 7E BA 77 D6 26 E1 69 14 63 55 21 0C 7D
T h i s _ k
e y _ i s _
s y m m e t
r i c . 0 0
Table 47. XOR between arranged cipher text and key text table.
33 218 172 118 88 221 115 121 109 109 101 116
86 ♁ 84 = 2
33 115 82
87 114 37
12 32 44
172 109 193
56 99 91
224 Security of Cloud-based systems
65 ♁ 115 = 50
235 105 130
118 109 27
97 46 79
248 ♁ 32 = 216
50 115 65
88 101 61
233 48 217
2 ♁ 2 = 0
182 1 183
82 1 83
37 3 38
249 ♁ 3 = 250
7 2 5
163 1 162
200 1 201
226 Security of Cloud-based systems
182 ♁ 1 = 183
44 3 47
193 2 195
91 1 90
50 ♁ 1 = 51
130 1 131
27 3 24
79 2 77
216 ♁ 2 = 218
65 1 64
61 1 60
217 3 218
171 ♁ 3 = 168
237 2 239
169 1 168
238 1 239
00 FA B7 33 DA A8
Design and Development of a Novel Symmetric Algorithm ... 227
B7 05 2F 83 40 EF
53 A2 C3 18 3C A8
26 C9 5A 4D DA EF
52 14 20 66 7A 6F
20 36 4E 41 72 61
50 1A 33 34 6D 6F
23 12 46 65 7A 61
C1 C2 C3 C4 C5 C6
82 20 32 102 122 111
32 54 78 65 114 97
80 26 51 52 109 111
35 18 70 101 122 97
82 ♁ 32 = 114
32 78 110
80 51 99
35 70 101
20 ♁ 102 = 114
54 65 119
26 52 46
18 101 119
C1 C2 C3 C4 C5 C6
101 119 70 101 122 97
110 119 78 65 114 97
99 46 51 52 109 111
114 114 32 102 122 111
99 46 51 52 111 109
114 114 32 102 111 122
C1 C2 C3 C4 C5 C6
109 111 52 51 46 99
C1 C2 C3 C4 C5 C6
114 97 65 78 110 119
122 97 101 70 101 119
122 111 102 32 114 114
109 111 52 51 99 46
230 Security of Cloud-based systems
C1 C2 C3 C4 C5 C6
114 97 78 65 110 119
122 97 70 101 101 119
122 111 32 102 114 114
109 111 51 52 99 46
A n w a r N
e w a z F e
r o z _ f r
o m 3 4 c .
Design and Development of a Novel Symmetric Algorithm ... 231
Security Analysis
Cloud is being used for storing sensitive and important data so it is very
important to use a strong key that will provide security to the data stored
in cloud. If we used a key of 10 characters using alphanumeric character.
There are total 26 alphabets in English and if we count the upper and lower
cases the total numbers are 26 + 26 = 52 and if we count the numeric digits
the total number is 62. For a 10 character key, it will be 6210 or 8.39 *
1017 or 8.4 quintillion combination almost. A computer would take almost
257,201,646.091 years to crack a 10 digits key. A super computer will take
800,000,000 seconds or 133,333,333.333 minutes or 2,222,222.22222 hours
or simply we can say it will take almost 257 years to crack the key. This
calculation is for 10 digits key and if we take 48 digits key also count the
special characters then it will take a numerous amount of time to crack the
key which sounds almost impossible.
Figure 14. Proposed model of data storage in cloud using the proposed algo-
rithm.
234 Security of Cloud-based systems
When a receiver request the data, he gets the cipher text from cloud, then
he request for key and hash code from data base, after getting the hash code
and key, the receiver decrypts the data using the proposed algorithm and
gets the original plain text.
RESULT DISCUSSION
The result has tested by:
Windows 10Pro64-bit.
Intel®Core™[email protected] GHz 2.71 GHz.
8 GB RAM.
In Table 81, the authors analyze the algorithm with the same key and
same message size for different types of data.
In Table 82, the authors compare the algorithm with AES, DES.
Graphical Representation of Encryption and Decryption time for 192-bit
data among the proposed algorithm, AES and DES (see Figure 15).
Graphical Representation of Encryption and Decryption time for 384-bit
data among the proposed algorithm, AES and DES (see Figure 16).
Graphical Representation of Encryption and Decryption time for 576-bit
data among the proposed algorithm, AES and DES (see Figure 17).
Table 81. Algorithm analysis with the same key and same message size.
CONCLUSIONS
Conclusion
The main purpose of the algorithm is to provide security to data stored in
cloud. For this purpose, the authors used a symmetric algorithm. They used
various methods to further enhance the algorithm which can easily be used
for encrypting data stored in cloud. The algorithm works on block wise. The
algorithm takes up to 192 bits block of data at a time and encrypts them into
cipher text. The algorithm encrypts and decrypts the data in 12 rounds. The
algorithm used 192-bit key that’s why it provides better security. Symmetric
algorithms are used widely around the world to store private data and since
this algorithm will also be used to encrypt private data, that’s why authors
thought of using a symmetric algorithm. The algorithm developed by the
authors ensures data confidentiality, integrity and authenticity for data
stored in cloud.
Limitations
1) It works on text format data only.
2) Key and Hash code exchange is not much secure.
Design and Development of a Novel Symmetric Algorithm ... 237
Future Works
1) Audio, video, image and file encryption.
2) Providing better security on Key and Hash code exchange.
238 Security of Cloud-based systems
REFERENCES
1. Definition of Cloud Computing. https://searchcloudcomputing.
techtarget.com/definition/cloud-computing
2. What Is Cloud Computing. https://searchcloudcomputing.techtarget.
com/definition/cloud-computing
3. What Is Encryption and Decryption. https://www.tutorialspoint.com/
internet_technologies/data_encryption
4. What Is the Types of Encryption Technique. https://www.zettaset.com/
blog/types-of-encryption-underlying-algorithms
5. Selvi, S. (2017) An Efficient Hybrid Cryptography Model for Cloud
Data Security. International Journal of Computer Science and
Information Security, 15, 307-313.
6. AbdElnapi, N.M.M., Omara, F.A. and Omran, N.F. (2016) A Hybrid
Hashing Security Algorithm for Data Storage on Cloud Computing.
International Journal of Computer Science and Information Security,
14, 175-181.
7. Arora, R. and Parashar, A. (2013) Secure User Data in Cloud Computing
Using Encryption Algorithms. International Journal of Engineering
Research and Applications, 3, 1922-1926.
8. Kartit, Z. and El Marraki, M. (2015) Applying Encryption Algorithm
to Enhance Data Security in Cloud Storage. Engineering Letters, 23,
277-282.
9. Belguith, S., Abderrazak, J. and Attia, R. (2015) Enhancing Data
Security in Cloud Computing Using a Lightweight Cryptographic
Algorithm. The 11th International Conference on Autonomic and
Autonomous Systems, Rome, 24-29 May, 98-103.
10. Singh, N. and Singh, N.K. (2014) Information Security in Cloud
Computing Using Encryption Techniques. International Journal of
Scientific & Engineering Research, 5, 1111-1113.
11. Agarwal, A. and Agarwal, A. (2011) The Security Risks Associated
with Cloud Computing. International Journal of Computer Applications
in Engineering Sciences, 1, 257-259.
12. Pancholi, V.R. and Patel, B.P. (2016) Enhancement of Cloud Computing
Security with Secure Data Storage Using AES. International Journal
for Innovative Research in Science & Technology, 2, 18-21.
13. Sachdev, A. and Bhansali, M. (2013) Enhancing Cloud Computing
Design and Development of a Novel Symmetric Algorithm ... 239
isch&sa=X&ved =0ahUKEwidv6a-v9_jAhVp8XMBHfUQAToQ_
AUIEigC&biw=1536&bih=750#im grc=SUvuOD_TXhzHvM
24. Base64 Encoder and Decoder. https://www.base64encode.org
25. Rijndeal S-Box, 2019. Wikipedia.
CHAPTER
11
Enhancing Mobile Cloud Computing
Security Using Steganography
ABSTRACT
Cloud computing is an emerging and popular method of accessing shared
and dynamically configurable resources via the computer network on
demand. Cloud computing is excessively used by mobile applications to
offload data over the network to the cloud. There are some security and
privacy concerns using both mobile devices to offload data to the facilities
provided by the cloud providers. One of the critical threats facing cloud
users is the unauthorized access by the insiders (cloud administrators) or
INTRODUCTION
Cloud computing refers to popular method of accessing services and resources
via network connections on demand [1] . The popularity of cloud computing,
for most part, can be attributed to fee for service and flexibility of providing
services and resources to the customer whenever they these services are
needed. The cloud paradigm has significantly eased up front infrastructural
and operating cost. However, there are many issues and concerns remained to
be addressed when migrating to cloud computing. Examples of these issues
include security, scalability, privacy, portability, etc.
The growth of the number of the mobile devices in the past few years
has shown that there is a high demand for mobile applications [1] . Mobile
devices are considered to be low-end computing. As such, they have limited
storage and computing capability compared to the traditional computing
platforms such as desktops. Cloud computing has been used as a durable
alternative to compensate the inherent limitations of mobile devices by
mobile industry [2] . The current approach to increase security and privacy
of data work encryption algorithms, negatively affects the performance [3] .
Mobile cloud computing (MCC) acting as clients, is benefitting from the
cloud computing platform acting as server [4] [5] . Mobile devices and apps
became very popular over the past two decades [6] . This is very evident by
the exponential growth in the development of mobile devices and systems
such as, android, smart phones, PDA’s with a variety of mobile computing,
networking and security technologies. Mobile computing has three major
components [3] : hardware, software and communication.
Enhancing Mobile Cloud Computing Security Using ... 243
In mobile cloud computing, the user data are stored on device or cloud.
As the internet enabled mobile usage to continue growing, web-based
malicious security threat is a serious issue. In this paper, we discuss the
working concepts of mobile cloud computing and its various security issues.
In this work, we attempt to address security of mobile cloud computing
using mobile devices, because it is very important for customers and
providers to retrieve, transmit and retain the data on cloud without breaking
any type of secrecy [7] . As discussed in [5] [7] , existing security standards
and policies [4] are meant to assure the data and access security, but no
standards/requirements currently exit to prevent unauthorized access of
customer data by the cloud providers. Toward this goal, we have applied
techniques from steganography to secure data maintained by the cloud
provide. Steganography has been used to hide messages [8] inside some
kinds of contents like image, audio or video in such a way that it does not
allow anyone to detect that there is a secret message present. Due to today’s
advanced modern technology, stenography is used on image, text, audio and
video [9] . Efficiency of the application is based on the medium used and the
maximum data capacity to hide information inside medium.
RELATED WORK
There are many different approached of storing data securely over the cloud,
using mobile computing such as end-to-end encrypted data transmission,
dynamic credential generation, steganography etc.
The stored application or information on cloud raises security issues
which are discussed in Bilogrevic [21] . To increase the storage capacity of
mobile device, mobile users use cloud storage services. The mobile users
do not have any control on the information store on the cloud which causes
security and privacy issues [22] - [24] .
C. Saravankumar and C. Arun [5] explain cloud computing issues and
proposed new cloud computing security model. An important issue of the
mobile cloud computing is to secure the user data is addressed in this paper.
There are many security standards and policies are available to secure the
data such as data privacy, authenticated access to data, third party data
protection, but these standards are exist only at the cloud end. It is a critical
for the customer as well as provider to store, retrieve and transmit the data
over the cloud network in a secure manner. To provide secure system, the
authors have proposed the algorithm [5] to develop a customer owned
security model. This algorithm is able to send the encrypted data to the
provider. The provider can also apply the security by encryption over the
customer’s data by using the algorithm. The customer’s data is secure at
both the end. The proposed algorithm uses ASCII and BCD security with
steganography that stores the encrypted data in an image file which will be
send to the provider end. The security algorithm is using CDM (Common
Deployment Model) which also provides an interoperable security services
over the cloud. The main objective of the proposed algorithm is to control
and send the data in an encrypted manner by the customer to the provider.
The provider also maintains the data with a security algorithm to protect the
data from unauthorized access.
Z. Al-Khanjari and A. Alani proposed a steganography scheme
architectural model to protect data in cloud. Cloud computing systems
needs to satisfy interoperability, security, safety, dependability, performance
and many other parameters [25] . Security is one of the important issues,
discussed and resolved in this paper using protected access control technique
which can prevent security problems. Authors are proposing steganography
to secure the data in cloud computing. The paper explains that how to hide
the data through security pipeline channel. This provides protected access
to the data. Steganography will provide safety, dependability, performance,
248 Security of Cloud-based systems
integrity and confidentiality to the data for exchanging data over the
network. It is hiding the data when data is requested and displayed. This
steganography scheme uses text properties to hide the data, text properties
includes font, font metrics, font styles, color and their RGB values, and the
x, y location to display data. This steganography architecture supports cloud
computing to provide security from unauthorized access. The architecture
contains 3 layers physical Layer, data Layer, security Layer [25] . Security
layer hides the data through security pipeline channel.
S. Brohi, M. Bamiah, S. Chuprat and J. Manan provide a solution
for data privacy issue [26] . In some organization such as healthcare and
payment card industry, have a user’s personal data which is very important
factor, these organizations can store data on cloud but malicious attackers
may steal, view or manipulate client’s data. To provide privacy to cloud
data storage, authors propose an improved technique which consists of five
contributions [26] : resilient role-based access control mechanism; partial
homomorphic cryptography; efficient third- party auditing service; data
backup and recovery process.
This technique maintains client’s data intact and protects them from
malicious attackers.
Resilient Role-based Access Control Mechanism - The process starts
from this phase and it is responsible for generation of private and public keys
by requesting the cloud server for data communication over the internet.
Using Partial Homomorphic Cryptography, data inside the file will be
homomorphic-ally encrypted during the uploading process and stored on the
cloud in the encrypted format [26] . Whenever this file is required, server
needs client’s private key to decrypt the selected file. This technique not
allows the client to process the data on cloud while it is in the encrypted
format [26] . To change the encrypted data, client needs to decrypt the data
prior to processing. Here author has used the security features of asymmetric
algorithms, he has implemented the homomorphic version of RSA algorithm
to encrypt, decrypt and process the encrypted data on cloud.
STEGANOGRAPHY: BACKGROUND
Now a day’s sender can send the secret data openly using encrypted mail
or files to receiver with no fear of reprisals. However there are often cases
when this is not allowed when sender or receiver is working for a company
that does not allow encrypted email or the local government does not allow
Enhancing Mobile Cloud Computing Security Using ... 249
retrieves the key from the stego-image and compares it with the user entered
image; if both keys are matched then the application displays the embedded
data to the user.
Steganography can be classified as: 1) pure steganography, 2) symmetric
steganography and 3) asymmetric steganography [30] . Pure steganography
does not require any exchange of information. Symmetric steganography
does not require exchange of keys prior to sending the messages. Asymmetric
steganography does not require to exchange keys prior to sending the
messages.
Steganography, for the most part, is dependent on the type of medium being
used to hide the information. Medium being commonly used include text,
images, audio or video used in network transmissions. Image steganography
is generally more preferred media because of its easiness, harmlessness and
attraction. Technology advancement in cameras and digital images being
saved in cameras and then transfer to PCs [15] has also enhanced many
folds. Another thing is the text message hidden in the images does not distort
the image. There are some techniques available which change only one bit
of an image whose effects is almost negligible on its quality and image looks
like unchanged. There are some methods are used to hide information in the
media/medium selected for steganography. Some methods are as follows
[28] : 1) embedding secret message in text/documents, 2) embedding secret
message in audio/video, 3) embedding secret message in images.
To farther enhance secure communication, it is common practice to
encrypt the hidden message before placing it in the cover message. However,
the hidden message does not need to be encrypted to qualify as steganography.
The hidden message can be in plain English. If steganographer decides to
have the extra layer of protection then the encryption should provide that
extra level of protection. In case, the hidden message is found by unauthorized
person (thief), then encryption provides additional level of data protection.
In what follows, we explain the method of embedding secret message in
images using pure Steganography approach.
are more integrated into the image; they may be applied without fear of
image destruction. The human visual system cannot detect changes in JPEG
images.
The algorithms and transformations technique, on the other hand, use
mathematical functions to hide the least bit coefficients in the compression
algorithms which reduce the size of images.
In what follows, we show how the data embedding process of using LSB is
performed. Assuming that the user wants to embed letter “A” into a 24-bit
image and the binary value of “A” is 10000011. In 24-bit image each pixel
has eight bits for each color in RGB model that is red, green and blue. The
user needs to change the least significant bits that require only 3 pixels for
hiding 8 bits letter “A”. The original three pixels are represented in Table
1. Each row of the table represents each pixel and each column represents
RGB value of each pixel.
CASE STUDY
In recent year’s mobile with digitalized applications are widely used and
popular due to flexibility and feasibility of the wireless internet. Most of the
daily work can be performed easily with the help of mobile internet such as
modern ways of communication like Messenger, Whats App, Facebook and
Email, handling banking accounts using mobile e-banking.
Now a day’s who owns a mobile, text or call more often than directly
going to someone’s house to convey the message even if house is really
close. Email’s has replaced for mails. Paper signed up or registration has
replaced by online forms etc.
For any kind of online work, we mostly have to sign up and open new
account with personal detail so that you can access your account later with
username and password. Due to the popularity and comfort of mobile
wireless internet access, user prefers opening and accessing new accounts
using mobile phones. In this case it is highly possible that user have many
accounts and there is high chance of forgetting credentials of those accounts.
Hence to be on the safe side, users write down some important information
or pass phrase somewhere. This written information may be read or access
by another user or it is also possible that user kept this information at house
and wanted to access that from remote location which is not possible. To
handle this issue, we have proposed solution in which user can store limited
amount of information on cloud, by mobile using steganography, which will
protect user data from cloud administrator. If user is storing their information
on cloud then they can access data from any location without any strain of
losing important data on mobile device or any unauthenticated data access.
This application works for small amounts of data per image with
low processing power and less battery usage, which eventually increases
the performance of the overall application and the mobile device. This
approach combines and enhances the trust in mobile computing as well as
the efficiency of cloud computing.
Figure 4 shows the Mobile Cloud Computing Application’s main page,
where a user can select an input and output image path, and enter data
and a key to embed into an image. Figure 5 explains how a user can enter
information and an encryption key to embed in the selected image.
Figure 6 shows that using mobile cloud computing application; a user is
able to browse for the file location of the original image as well as the file
location of the stego-image (message embedded image) using the provided
“Browse” button. Figure 7 and Figure 8 display a message shown by the
Enhancing Mobile Cloud Computing Security Using ... 257
application after pressing the “Embed” button. This message box represents
that the process of message encoding and key into the specified image is
completed successfully.”Browse” button to select the stego-image and enter
the key. After pressing the “Retrieve” button, information is retrieved if the
entered encryption key matches with the retrieve key from the stego-image.
REFERENCES
1. Gupta, P. and Gupta, S. (2012) Mobile Cloud Computing: The Future
of Cloud. International Journal of Advanced Research in Electrical
Electronics and Instrumentation Engineering, 1, 134-145.
2. Bheda, H. and Lakhani, J. (2013) Application Processing Approach
for Smart Mobile Devices in Mobile Cloud Computing. International
Journal of Software Engineering and Knowledge Engineering, 3,
1046-1055.
3. Buyya, R., Yeo, C. and Venugopal, S. (2008) Market-Oriented
Cloud Computing: Vision, Hype, and Reality for Delivering it
Services as Computing Utilities in High Performance Computing and
Communications. The10th IEEE International Conference on IEEE,
5-13.
4. Donald, C. and Arockiam, O.L. (2013) Mobile Cloud Security Issues
and Challenges: A Perspective. St. Joseph’s College Tiruchirappalli,
Department of Computer Science, Tamil Nadu.
5. Saravankumar, C. and Arun, C. (2014) An Efficient ASCII-BCD Based
Steganography for Cloud Security Using Common Development
Model. Journal of Theoretical and Applied Information Technology,
65, 1992-8645.
6. Prasad, R., Gyani, J. and Murti, P. (2012) Mobile Cloud Computing:
Implications and Challenge. Journal of Information Engineering and
Applications, 2, 7-15.
7. Juneja, M. and Singh, P. (2014) Improved LSB Based Steganography
Techniques for Color Images in Spatial Domain. International Journal
of Network Security, 16, 366-376.
8. Kumar, A. and Pooja, K. (2010) Steganography: A Data Hiding
Technique. International Journal of Computer Applications, 9, 975-
8887. http://dx.doi.org/10.5120/1398-1887
9. Ross, A. and Fabien, P. (1998) On the Limits of Steganography. IEEE
Journal of Selected Areas in Communications, 16, 474-481.
10. Foster, I., Zhao, Y., Raicu, I. and Lu, S. (2008) Cloud Computing and
Grid Computing 360-Degree Compared. Grid Computing Environments
Workshop, 2008, 1-10. http://dx.doi.org/10.1109/gce.2008.4738445
11. Buyya, R., Yeo, C., Venugopal, S., Broberg, J. and Brandic, I. (2009)
Cloud Computing and Emerging IT Platforms: Vision, Hype, and
Reality for Delivering Computing. The 5th Utility Future Generation
Enhancing Mobile Cloud Computing Security Using ... 263
1910-1927. http://dx.doi.org/10.1016/j.jss.2011.04.027
22. Ren, W., Yu, L., Gao, R. and Xiong, F. (2011) Lightweight and
Compromise Resilient Storage Outsourcing with Distributed Secure
Accessibility in Mobile Cloud Computing. Tsinghua Science
and Technology, 16, 520-528. http://dx.doi.org/10.1016/S1007-
0214(11)70070-0
23. Yang, J., Wang, H., Wang, J., Tan, C. and Yu, D. (2011) Provable
Data Possession of Resource Constrained Mobile Devices in Cloud
Computing. Journal of Networks, 6, 1033-1040. http://dx.doi.
org/10.4304/jnw.6.7.1033-1040
24. Tysowski, P. and Hasan, M. (2011) Re-Encryption-Based Key
Management towards Secure and Scalable Mobile Applications in
Clouds. IACR Cryptology Eprint Archival, 668-678.
25. Al-Khanjari, Z. and Alani, A. (2014) Developing Secured Interoperable
Cloud Computing Services. The European Interdisciplinary Forum
2014 (EIF 2014), Vilnius, 18-19 June 2014, 341-350.
26. Brohi, S., Bamiah, M., Chuprat, S. and Manan, J. (2014) Design and
Implementation of a Privacy Preserved Off-Premises Cloud Storage.
Journal of Computer Science, 10, 210-223. http://dx.doi.org/10.3844/
jcssp.2014.210.223
27. Bassil, Y. (2012) A Text Steganography Method Using Pangram and
Image Mediums. International Journal of Scientific & Engineering
Research, 3, 2229-5518.
28. Bender, W., Gruhl, D., Morimoto, N. and Lu, A. (1996) Techniques
for Data Hiding. IBM Systems Journal, 35, 313- 336. http://dx.doi.
org/10.1147/sj.353.0313
29. Wang, H. and Wang, S. (2004) Cyber Warfare: Steganography vs.
Steganalysis. Communications of the ACM, 47, 76- 82. http://dx.doi.
org/10.1145/1022594.1022597
30. Mahajan, S. and Singh, A. (2012) A Review of Methods and Approach
for Secure Steganography. International Journal of Advanced Research
in Computer Science and Software Engineering, 2, 484-488.
31. Johnson, N. and Jajodia, S. (1998) Exploring Steganography:
Seeing the Unseen. Computer, 31, 26-34. http://dx.doi.org/10.1109/
MC.1998.4655281
32. Shaw, M. and Garlan, D. (1996) Software Architecture: Perspective on
an Emerging Discipline. Prentice Hall, Upper Saddle River.
CHAPTER
12
Data Security of Mobile Cloud
Computing on Cloud Server
ABSTRACT
Mobile Cloud computing is a technology of delivering services, such as
software, hardware (virtual as well) and bandwidth over the Internet. Mobile
devices are enabled in order to explore, especially Smart phones. The mobile
cloud computing technology is growing rapidly among the customers and
many companies such as Apple, Google, Facebook and Amazon with rich
users. Users can access their data at any time, at any place, even with any
device including mobile devices by using the cloud storage services, although
INTRODUCTION
To have an in-depth understanding of Mobile Cloud Computing (MCC), it is
necessary to get a complete grasp on cloud computing [1] . Cloud computing
is a new market-oriented business model which offers high quality and low
cost information services [2] . Generally, cloud computing resources are
provided in the form of services such as Infrastructure as a Service (IaaS),
Data storage as a Service (DaaS), Communication as a Service (CaaS),
Security as a Service (SecaaS), Hardware as a Service (HaaS), Software as
a Service (SaaS), Business as a Service (BaaS), and Platform as a Service
(PaaS). There are various layered architectures available for cloud computing
to provide the aforementioned services as a utility [3] . User can consume
these services based on SLA (Service Level Agreement) which define their
QoS (Quality of Service) parameters on a pay-per-use basis as well as users
can access their data any time, at any place, even with any computing device
including mobile devices.
Cloud computing with resource constraint mobile devices, ubiquitous
wireless infrastructure, mobile web, and location-based services provides
a ground for a new computing paradigm called Mobile Cloud Computing
(MCC) [4] . The ultimate goal of the MCC is to enable execution of rich
mobile applications on a plethora of mobile devices, with a rich user
experience [5] . According to the consumer and enterprise market, cloud-
based mobile applications are expected to rise to $9.5 billion by 2014. Due
to increase in the number of users, there are numerous challenges existing in
the field of MCC, including data replication, consistency, limited scalability,
unreliability, unreliable availability of cloud resources, portability (due to
Data Security of Mobile Cloud Computing on Cloud Server 267
the lack in cloud provider standard), trust, security and privacy. To attract
more potential consumers, the cloud service provider has to target all the
security issues to provide a completely secure environment [6]. Many
commercial cloud storage services protect user’s data stored in server
storages by introducing client-based or server-based data encryption.
The objective of this paper is to draw attention to many important issues
and challenges concerning with security as well as privacy in mobile cloud
application development. This paper also proposes some data encryption
and decryption solutions for MCC. The rest of the paper is organized as
follows. Section 2 presents the research background and overview. Section
3 researches methodology. Section 4 presents the software and tools and
Section 5 concludes the paper with a summary of our contributions.
Infrastructure as a Service
IaaS mostly offers Utility computing, which allows users to get infrastructure
from cloud service providers as virtual resources as need basis. Virtual
hardware, raw processors, storage software platforms include computers.
In spite of having physical hardware in their offices placed in the ‘cloud’
and information is accessed through the internet. The basic idea behind
IaaS is not new, but this type of cloud computing is getting new life from
big providers like Sun, Amazon, Rackspace, according to architecture
showing in Figure 1, IBM and Google. The main benefit is that there is
no need to procure a server or execute physical data center equipment like
storage, networking, etc. [7] . They have organized over the applications and
Operating Systems they install on top of the rented computing resources [8]
. The user can’t handle or control the underlying cloud infrastructure but it
has had power over operating systems, deployed applications, storage, and
maybe limited [9].
Software as a Service
SaaS mostly offers executed applications on demand for users. Software
executes over the cloud and serve to many end-users or client organizations.
This is the model of software deployment where an application is hosted
over the Internet and serves to the tenants. This way eliminates the need to
Data Security of Mobile Cloud Computing on Cloud Server 269
install and execute the application on the customer own computer, These
applications are accessible from various customer devices because of
a thin client interface such as a web browser (e.g., web enabled e-mail).
This type of service provides complete applications to the clients which is
customizable within the confines [12] . SaaS model service delivery, clients
procures cloud-based applications from service providers. A SaaS provider
cannot store the unencrypted client data [13]. Network-based access and
management of commercially offered software that are handled from
centralized locations and enabling clients to access these applications which
is remotely over the Internet.
RESEARCH METHODOLOGY
The paper involves different research approaches; first a literature study
is conducted to gain a fundamental understanding of cloud computing and
usage of its services in the architectural development of software. It also
includes research articles of different researchers who have covered data
storage techniques and have applied in different areas. Secure data storage
by different researchers is also included in this literature study.
Next, few case studies are also referred in this context in which we
will try to find the pros and cons of different variations conducted and
implemented at various organizations, such as: encryption algorithms like―
AES, DES, RSA and blowfish to ensure the security of data in cloud. The
research will be conducted using Java runtime of Google App Engine, i.e.
JDK 1.6 Eclipse IDE, Google App Engine SDK 1.6.0 or higher. Following
are the steps for proposed work plan.
There are many advantages in mobile cloud ecosystem. However, there
are some issues and challenges in mobile cloud computing such as data
ownership, privacy and Data Security and other Security Issues. There are
some possible solutions are presented for Cloud-access protection strong
authentication method ensures that only legitimate user with authorization
can access cloud-based services embedded device identity protection. It is
possible to embed a personalized configuration profile on each employee’s
mobile device, thereby implementing a credential or personal security token
on their mobile device. There are some other security features and policies
that can be enforced to maximize the security on mobile devices, especially
in a corporate context.
Security is an important factor in cloud deployment and by building in
the capabilities described in these six steps, organizations can better manage
270 Security of Cloud-based systems
and protect their customer data over the cloud.The team will also refer to the
reports published by IEEE, SEI, ACM and other renowned research forums.
This method will give us the understanding for implementation of mobile
cloud computing as point of security view.
PREVIOUS WORK
According to paper [14] , there are many issues in mobile cloud computing
due to limitations of mobile devices. Security is the main concern in mobile
cloud computing. In Mobile Cloud Computing data of owner is stored on the
cloud, which is not secured.
According to paper [15] , due to the feature of resource-constrains,
security in mobile devices have potential challenges in cloud accessing,
consistent accessing, data transmission, and so on. Such challenges can
be solved using: special application (service) and middle-ware (provide a
platform for all mobile cloud computing systems).
According to paper [15] , the security applying on client side of mobile cloud
computing are also inherited in mobile cloud computing with the additional
limitations of resource constrained mobile devices such as time consuming.
According to paper [16] , mobile cloud computing architecture for code
offloading in MCC applications, addressing both energy and performance
issues due to time constraint.
Data Security of Mobile Cloud Computing on Cloud Server 271
KEY COMPONENTS
DDOS Attack
Denial of Service is such type attacks over the cloud that prevents the clients
from receiving the service from the cloud. The attacker is continuously
attack to the target server to get the server busy make a machine or network
resource unavailable to its intended users, so that clients might not be able
to receive the service from the server, because server will busy servicing the
attack. There are many techniques to perform DOS attack. Like SYN flood.
The SYN flood exploits the TCP 3-way handshake with the help of requesting
connections to the target server and ignoring the acknowledgement (ACK)
from the server. Attacker applies attack to the server. This makes the server
to wait for the ACK, wasting time and resources. Eventually, the servers do
not have any resources to provide services to the clients. This type of attack
can be prevented by authorizing strict access to the cloud and may using
cryptographic protocols to make sure that the right personnel are accessing
the cloud [17] .
There are different technology products have been released to prevent
and detect DDOS attacks, the security breach had been growing at a shocking
rate both in the cloud computing environments and enterprise.
Malware Attack
Malware attack executes this attack, an intruder is necessary to produce his
own malicious application, service or virtual machine instance and then the
intruder has to attach it to the cloud system. When malicious software will
be added to the cloud system, the attacker has to trick the cloud system to
treat with malicious software as a valid instance. Another scenario is this that
may be attacker try to upload a virus or Trojan program to the cloud. Once
the cloud system treats it as a valid service, if the virus program execute
automatically over the cloud infects the virus which can damage to the
cloud. Due to this attack virus damages the hardware of the cloud system,
other cloud instances running on the same hardware may affect the virus
Data Security of Mobile Cloud Computing on Cloud Server 273
program because they share the same hardware. Attacker may plan to use
a virus program to attack other users on the cloud system. When customer
requests the malicious program case, the cloud system sends the virus over
cloud to the customer and then run on the customer’s machine. Client’s
computer will be impure via virus. The type of attack could be possible,
performing a service instance integrity verifying for incoming requests. The
hash value may be used to store over the original service instance’s image
file and compare this value with the hash values of all new service instance
images. The result of using the hash values, an attacker needs to create a
valid hash value comparison in order to trick the cloud system and inject a
malicious instance over the cloud system.
The term malware refers to any malicious software that could intentionally
perform malicious tasks on a computer system or on networked systems.
The following covers some basic definitions of the malware problem.
Virus is a program that is designed to replicate itself and to spread from
one machine to another using an infected carrier host program. That is a
malicious program copy itself into a program. Once an infected program is
executed, the virus starts its functionality, infects and damages the machine.
Thus, viruses attempt to spread and infect within the infected machine.
Trojan Horse
Trojan horse is a program that is believed to be useful but which has a
harmful intention towards the host machine. Some hidden parts of this type
of malware contain a malicious payload that may exploit or damage the
host system. Trojan horses can also be spyware because of their malicious
actions such as the unauthorized collection of a user’s data.
RELATED WORK
Issues Reason
Encryption/Decryption Time Consuming
Brute Force Attack Because of open body
Resolve the external entity Because XML 1.0/1.1 Stand
Data Security of Mobile Cloud Computing on Cloud Server 275
UTF-8/UTF-16 Malformed
PROPOSED WORK
According to Figure 4, the data of mobile computing travel to cloud
computing through JSON object, that is trusted because it has serialize
format of data into JSON object, then cloud server will encrypted all data
into cryptography, finally it will store in cloud data storage.
According to Figure 5, replace the xml web services REST API, and
solve the above all problems of “XML”, and according to Figure 5 now data
security will be manipulated at cloud server and proposed work for secure
data storage in Mobile cloud computing, wrote AES (Advanced Encryption
Standards)
Encryption and Decryption algorithm in Java (JDK and JRE). Now
deploy encryption into Amazon Elastic Compute Cloud (EC2). There are
three block ciphers consisted on AES, AES-128, AES-192 and AES-256.
Every cryptographic key using 128-, 192- and 256-bits, listed automatically
to encrypt and decrypt data in the blocks. Secrete key or symmetric is using for
encryption and decryption. Both sender and receiver must know while using
same secret key. Consider, all key lengths are enough to protect classified
information up to the “Secret” Level with “Top Secret” information, and
must require 192- or 256-bit key lengths. There are bits listed below for
every round:
1. 10 rounds for 128-bit keys
2. 12 rounds for 192-bits keys
3. 14 rounds for 256-bits keys
276 Security of Cloud-based systems
N= pq (1)
for p and q primes. Also define a private key d and a public key e such
that
(2)
(3)
where is the quotient function; (a, b) denotes the greatest common
divisor (so (a, b) =1 means that a and b are relatively prime), and a = b
mod(a) is a congruence. Let the message be converted to a number M. The
sender then makes n and e public and sends
(4)
To decode, the receiver (who knows d) computes
(5)
since N is an integer. In order to crack the code, d must be found. But this
requires factorization of n since
(6)
Both p and q should be picked so that are divisible
by large primes, since otherwise the Pollard p − 1 factorization method or
Williams p + 1 factorization method potentially factor n easily. It is also
desirable to have large and divisible by large primes.
It is possible to break the cryptosystem by repeated encryption if a unit
of has small field order (Simmons and Norris 1977, Meijer 1996),
where Z/Z is the ring of integers between 0 and s−1 under addition and
s
and p, p1, p2, q, q1, and q2 are all primes. In this case,
(11)
(12)
Meijer (1996) also suggests that p2 and q2 should be of order 1075.
Using the RSA system, the identity of the sender can be identified as
genuine without revealing his private code.
The Model provides full security using JSON - REST API and performing
GET, PUT, POST and DELETE (CRUD) operation by JAVA. Java provides
the strong encryption method. We applied encryption in JAVA code to plain
text and converted it into cipher text. The cipher text is the encrypted file.
It’s purely secure. And that file sent to cloud server.
IMPLEMENTATION
According to Figure 5, the application of cloud is possible in many domains.
One of the domains of our current interest is that of mobiles. Hence, we will
be focusing on utility of cloud computing environment for mobile usage and
how can a cloud add value to the overall functionality and performance of
mobile devices?
According to [9] as depicted in Figure 2, MCC is a service that allows
resource constrained mobile users to adaptively adjust processing and storage
capabilities by transparently partitioning and offloading the computationally
intensive and storage demanding jobs on traditional cloud resources by
providing ubiquitous wireless access.
According to Figure 5, this architecture is showing the mobile data first
step go to private cloud server, which is responsible for data encryption and
cryptography. Then encrypted data will go to cloud server that is public and
responsible for data storage on cloud database that is EC2 database storage.
The relationship between mobile cloud computing is now secure, the
security exist on cloud server that is located privately and safely and public
cloud only responsible for storage the encrypted data into data storage. This
way user can safely share their important data on cloud server without any
hindrance. This concept may be some time taking but very secure for mobile
cloud computing.
Authentication and authorization are useful for this architecture, now
security flows can occur throw this architecture.
Data Security of Mobile Cloud Computing on Cloud Server 279
DEPLOYED APPLICATION
Build an Android app using the IBM Mobile Data for Blue mix cloud service
Store, delete, update, and query objects stored in the cloud
Step-1 Add some grocery list items
Step-2 Restart the application
Notice that your data items have persisted. You now have data on the
cloud!
Step-3 See your data on the cloud
Log in to Blue mix.
Click your application in the Dashboard view.
Step-4 On the Manage Data tab, you can see encrypted Data Classes
being stored in the cloud, as well as the instances of each Data Class being
persisted
Step-5 You can reverse decrypted your data when you again access the
data into mobile
Click the Mobile Data Service. Interface for application.
Dashboard
280 Security of Cloud-based systems
CONCLUSIONS
The concept of cloud computing provides a great opportunity to users to
utilize their services by on-demand basis. The requirement of mobility in
cloud computing gave birth to Mobile cloud computing. MCC provides more
possibilities for access services in convenient manner. It is expected that
after some years a number of mobile users will go to use cloud computing
on their mobile devices.
There are many issues in mobile cloud computing due to limitations of
mobile devices. Security is the main concern in mobile cloud computing. In
Mobile Cloud Computing, data of owner is stored on the cloud, which is not
secured.
This paper has provided the description about the basics of Mobile
Cloud Computing and issues associated with it. Mainly it discussed about
security of data stored in cloud and importance of data security. This paper
has explored a number of mechanisms for providing data security so that
Mobile Cloud Computing can be widely accepted by a number of users
in future. It also proposed a mechanism to provide confidentiality, access
control as well as integrity to mobile users.
ACKNOWLEDGEMENTS
This is the team work, whose help, suggestions, knowledge, experience and
encouragement helped to reached research on final results. Team members
work hard to try to reduce the problems of client and server side security.
FUTURE WORK
In this paper, we present a prototype of the secure data processing model for
mobile cloud computing. In the future, we will focus on the follow research:
1) investigate more application scenarios that require data sharing between
cloud private domain and public domain; 2) investigate the robustness of
the Tri-rooted ESSI solution; and 3) investigate the security monitoring,
auditing, and misuse detection in the mobile cloud system.
Data Security of Mobile Cloud Computing on Cloud Server 281
REFERENCES
1. Abrishami, S. and Naghibzadeha, M. (2012) Deadline-Constrained
Workflow Scheduling Algorithms for Infrastructure as a Service
Clouds.
2. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H.,
Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I. and
Zaharia, M. (2013) Above the Clouds: A Berkeley View of Mobile
Cloud Computing. Technical Report, EECS Department University
of California, Berkeley. http://www.eecs.berkeley.edu/Pubs/
TechRpts/2009/EECS-2009-28.html
3. h t t p : / / n v l p u b s . n i s t . g o v / n i s t p u b s / L e g a c y / S P /
nistspecialpublication800-145.pdf
4. John, R. (2005) DoD Directive 3020.40, Mobile Cloud Computing
Defense Critical Infrastructure Program. 19 Aug, p. 13. http://www.
dtic.mil/whs/directives/corres/pdf/302040p.pdf
5. Ouyang, X.Z. (2011) Cloud Computing in Mobile Communication
Networks. Emerging Technologies of Future Multimedia Coding,
Analysis and Transmission, No.1. http://wwwen.zte.com.cn/endata/
magazine/ztecommunications/2011Year/no3/articles/201110/
t20111029_260205.html
6. Li, X.P., Qian, L.H. and Yang, J. (2015) Workflow Scheduling with
Deadline and Time Slots Constraints in Mobile Cloud Computing. IEEE
19th International Conference on Computer Supported Cooperative
Work in Design (CSCWD), Calabria, 6-8 May 2015, 606-613. http://
ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7231027
7. (2011) Adrian Otto’s Blog. What Is a Cloud Platform? http://adrianotto.
com/2011/02/cloud-platform/
8. Pooja, N.D. and Ramteke, P.L. (2013) Mobile Cloud Computing.
International Journal of Science and Research.
9. Hampton, T.J. (2011) A Quick Guide to Cloud Terminology. 11 August.
http://www.thehostingnews.com/a-quick-guide-to-cloud-terminology.
html
10. Lakhan, A. (2015) Security and Data Privacy Using Mobile Cloud
Computing.
11. Rahman, M. and Hassan, R. (2015) Adaptive Workflow Scheduling for
Dynamic Grid and Cloud Computing Environment.
12. Singh, R. (2015) Workflow Scheduling in Cloud Computing Using
282 Security of Cloud-based systems
Spot Instance.
13. Kaur, N. (2015) Comparison of Workflow Scheduling Algorithms in
Cloud Computing.
14. Kaur, A. (2015) A Review of Workflow Scheduling in Cloud Computing
Environment.
15. Singh, L. and Singh, S. (2015) A Survey of Workflow Scheduling
Algorithms and Research Issues.
16. Lakhan, A. and Hussain, F. (2015) Data Security and Privacy for Cross
Platform Using Mobile Cloud Computing.
17. Lakhan, A.A. (2015) Integration of Dual Data Security Algorithm for
Mobile Private Cloud Computing.
CHAPTER
13
New Proposed Robust, Scalable and
Secure Network Cloud Computing
Storage Architecture
ABSTRACT
Cloud computing describes highly scalable computing resources provided
as an external service via the internet. Economically, the main feature of
cloud computing is that customers only use what they need, and only pay
for what they actually use. Resources are available to be accessed from the
cloud at any time, and from any location via the internet. There’s no need
to worry about how things are being maintained behind the scenes―you
simply purchase the IT service you require. This new, web-based generation
Citation: Al-Anzi, F. , Salman, A. and Jacob, N. (2014), “New Proposed Robust, Scal-
able and Secure Network Cloud Computing Storage Architecture”. Journal of Software
Engineering and Applications, 7, 347-353. doi: 10.4236/jsea.2014.75031.
Copyright: © 2016 by authors and Scientific Research Publishing Inc. This work is li-
censed under the Creative Commons Attribution International License (CC BY). http://
creativecommons.org/licenses/by/4.0
284 Security of Cloud-based systems
INTRODUCTION
The paradigm shift from traditional software models to the Internet has
progressively gained momentum over the last 10 years. Traditional business
applications have always been very complex and costly. The amount and
type of hardware and software required to run them are scary. With the
arrival of cloud computing, those headaches are eliminated because we are
not handling hardware and software. It is the responsibility of a proficient
Service Provider. The shared infrastructure means that it works like a utility.
We only pay for what we need, upgrades are automatic, and scaling up or
down is easy. Businesses are running all kinds of applications in the cloud,
like customer relationship management, human resources management,
finance, and much more. Some of the world’s largest companies moved their
applications to the cloud after rigorously testing the security and reliability
of the infrastructure. Most IT departments are forced to spend a significant
portion of their time on frustrating implementation, maintenance, and upgrade
projects that too often don’t add significant value to the company’s bottom
line. Increasingly, IT teams are turning to cloud computing technology to
minimize the time spent on lower-value activities and allow IT to focus
on strategic activities with greater impact on the business. To find enough
storage space to hold all the user data they have acquired is a real challenge.
Some people store data in larger hard drives. Others prefer external storage
devices like USB drives or external hard drives. But some are choosing to
rely on a growing trend: cloud storage.
Cloud storage really refers to saving data to an off-site storage
system maintained by a third party. Instead of storing information to your
computer’s hard drive or other local storage device, you save it to a remote
database. The Internet provides the connection between your computer
New Proposed Robust, Scalable and Secure Network Cloud ... 285
and the database. Cloud storage providers operate large data centers, and
people who require their data to be hosted buy or lease storage capacity
from them. They virtualize the resources according to the requirements of
the customer and expose them as storage pools, which the customers can
themselves use to store files or data objects. Physically, the resource may
span across multiple servers and multiple locations. The safety of the files
depends upon the hosting companies, and on the applications that leverage
the cloud storage.
Cloud storage services may be accessed through a web service
application programming interface (API) or by applications that utilize the
API, such as cloud desktop storage, a cloud storage gateway or Web-based
content management systems.
Cloud storage has the same characteristics as cloud computing in terms
of agility, scalability, elasticity and multi-tenancy, and is available both off-
premises and on-premises. The cloud storage makes data safety by divided
data to small pieces and save them to different places. If data pieces in one
data center or a disk crashed, the data can be resumed by left pieces. It is an
important method to promote access performance and system availability.
In cloud computing environment, data are stored as public in service
providers site, so data are highly insecure. Depending on a single service
provider for data storage in cloud environment is not trustworthy. Cloud
data storage is growing in popularity due to the benefits it provides, such
as simple, anywhere access with independent geographical locations,
avoidance of capital expenditure on hardware and software, the removal of
the burden of in-house maintenance and management. The pioneer of Cloud
Computing vendors, Amazon Simple Storage Service (S3) and Amazon
Elastic Compute Cloud (EC2) are both well-known examples. It is basically
the delivery of data storage as a service, from a third party provider, with
access via the internet and billing calculated on capacity used in a certain
period (e.g. per month). While Cloud Computing makes these advantages
more appealing than ever, it also brings new and challenging security threats
towards users’ outsourced data. The major security challenge with clouds is
that the owner of the data may not have control of where the data is placed.
Depending on a single service provider for data storage in cloud
computing is insecure. In this paper, we propose a Robust, Scalable and
Secure Network Storage (RSSNS) architecture which depends on multiple
service providers for the secure storage of outsourced data. In order to
provide better availability, reliability and security, user data are encrypted
286 Security of Cloud-based systems
and split into various cipher blocks and distributed among available service
providers. Data loss will happen due to hardware or network problem in the
service provider’s site. In order to recover data from any data loss due to
hardware or network issues in service provider’s site, we adopt a distributed
parity scheme in this architecture. The second important aspect used in
this architecture is that service provider site adopts Redundant Array of
Inexpensive Disks (RAID) storage scheme for the better availability and
reliability of data in data storage servers.
In [1] , the authors discussed distributing data over multiple clouds in
such a way that if an adversary is able to intrude in one network, he cannot
retrieve any meaningful data; because it’s complementary pieces which are
stored in other network. In [2] and [3] , the authors discussed the idea of
RAID technology for storage in cloud computing. Cryptographic measures
[4] alone cannot meet the privacy demanded by cloud computing services.
It is insufficient for ensuring data privacy in cloud computing. In [5] , the
authors put the idea of distributing the data over multiple cloud service
providers site rather than centralized distribution of data. Our approach is
also similar to this approach with a change in the distribution scheme.
In [6] - [8] , the authors discussed the cloud storage system structure
which consists of access layer, application interface layer, basic management
and physical storage layer. In [9] , the authors focused on the research by
the combination of private cloud and cloud storage. Wu et al. [10] proposed
the infrastructure of cloud storage and to hide complexity of hardware
and software from its users. Zhang et al. [11] analyses the advantage and
feasibility of private cloud storage technology based on Hadoop. Zhang
et al. [12] used Service Level Agreement (SLA) as the common standard
between user and service provider to ensure data security in cloud storage
system. Koletka et al. [13] [14] proposed architecture to securely store user
data in public cloud and private cloud using encryption. Various researches
of cloud storage applications are described and implemented in [15] - [17]
. Liu et al. [18] analyse security issue in cloud storage according to cloud
computing concepts and features.
In the proposed system, user data are encrypted and split into cipher
blocks. The cipher blocks are distributed among available service providers
site. Figure 1 shows the proposed data storage architecture with the host
machine represented as client and Service providers marked as SP1 to SPn.
Not only encrypted blocks of data, but also the parity information associated
with the distributed data are also stored in the service provider’s data server.
New Proposed Robust, Scalable and Secure Network Cloud ... 287
SECURITY ISSUES
Data security is one of the most critical issues related to any storage
architectures. Even though cloud service providers have dominant
infrastructure and security mechanisms to ensure customer’s data safety and
288 Security of Cloud-based systems
blocks A and B are again striped and mirrored (A: A1, A2 and B: B1, B2).
The splitting of data blocks is done in such a way that, a single service
provider cannot able to retrieve any information from the data stored in his
network. The other security threat encountered is the cloud service provider
might collude together to reconstruct and access the customer’s stored data.
Here in this approach, the encryption and distribution is carried out in such a
way that, data reconstruction is not possible, even though couple of service provider
will collude each other. It guarantees the security of the proposed architecture.
REFERENCES
1. Singh, Y., Kandah, F. and Zhang, W. (2011) A Secured Cost-Effective
Multi-Cloud Storage in Cloud Computing. IEEE INFOCOM Workshop
on Cloud Computing, Tainan, 16-18 December 2010, 619-624.
2. Chen, P.C., Freg, C.P., Hou, T.W. and Teng, W.G. (2010) Implementing
RAID-3 on Cloud Storage for EMR System. IEEE International
Computer Symposium, Tainan, 16-18 December 2010, 850-853.
3. Joshi, S., Patwardhan, U. and Deshpande, P. (2010) RAID 5 for Secured
Storage Virtualization. IEEE International Conference on Data Storage
and Data Engineering, Bangalore, 9-10 February 2010, 278-282.
4. Dijk, M. and Juels, A. (2010) On the Impossibility of Cryptography
Alone for Privacy-Preserving Cloud Computing. HotSec’10
Proceedings of the 5th USENIX Conference on Hot Topics in Security,
Article No. 1-8.
5. Olivera, P.F., Lima, L., Barros, J. and Medard, M. (2010) Trusted
Storage over Untrusted Networks. IEEE Global Telecommunication
Conference, Miami, 6-10 Decemebr 2010, 1-5.
6. Amazon.com (2008) Amazon Web Services (AWS). http://aws.
amazon.com
7. http://en.wikipedia.org/wiki/Cloud_computing
8. Sun, J. and Yue, S.-S. (2011) The Application of Cloud Storage
Technology in SMEs. International Conference on E- Business and
E-Government (ICEE 11), Shanghai, 6-8 May 2011, 1-5.
9. Deng, J., Hu, J., Liu, A.C.M. and Wu, J. (2010) Research and Application
of Cloud Storage. 2nd International Workshop on Intelligent Systems
and Applications (ISA 10), Wuhan, 22-23 May 2010, 1-5.
10. Wu, J., Ping, L., Ge, X., Wang, Y. and Fu, J. (2012) Cloud Storage as
the Infrastructure of Cloud Computing. International Conference on
Intelligent Computing and Cognitive Informatics (ICICCI 10), Kuala
Lumpur, 22-23 June 2010, 380-383.
11. Zhang, D., Sun, F., Cheng, X. and Liu, C. (2011) Research on Hadoop-
Based Enterprise File Cloud Storage System. 3rd International
Conference on Awareness Science and Technology (iCAST 11),
Dalian, 27-30 September 2011, 434- 437.
12. Zhang, X., Du, H., Chen, J., Lin, Y. and Zeng, L. (2011) Ensure Data
New Proposed Robust, Scalable and Secure Network Cloud ... 293
14
Survey on Public Key Cryptography
Scheme for Securing Data in Cloud
Computing
J. Athena, V. Sumathy
Department of ECE, Government College of Technology, Coimbatore, India
ABSTRACT
Numerous advancements in the Information Technology (IT) require the
proper security policy for the data storage and transfer among the cloud. With
the increase in size of the data, the time required to handle the huge-size data
is more. An assurance of security in cloud computing suffers various issues.
The evolution of cryptographic approaches addresses these limitations
and provides the solution to the data preserving. There are two issues in
security assurance such as geographical distribution and the multi-tenancy
of the cloud server. This paper surveys about the various cryptographic
techniques with their key sizes, time required for key/signature generation
and verification constraints. The survey discusses the architecture for
secure data transmissions among the devices, challenges raised during the
transmission and attacks. This paper presents the brief review of major
cryptographic techniques such as Rivest, Shamir Adleman (RSA), Dffie
Hellman and the Elliptic Curve Cryptography (ECC) associated key sizes.
This paper investigates the general impact of digital signature generation
techniques on cloud security with the advantages and disadvantages. The
results and discussion section existing in this paper investigate the time
consumption for key/signature generation and verification with the key
size variations effectively. The initialization of random prime numbers and
the key computation based on the points on the elliptic curve assures the
high-security compared to the existing schemes with the minimum time
consumption and sizes in cloud-based applications.
Keywords: Cloud Computing, Cryptography, RSA, Diffie Hellman,
Elliptic Curve Cryptography, Digital Signature
INTRODUCTION
Cloud computing enables on-demand services to the users in the pay-as-use
basis with the highest level of scalability and flexibility. The cloud services
include Software as a Service (SaaS), Platform as a Service (PaaS), and
Infrastructure as a Service (IaaS). The cloud usage eliminates the burden of
system maintenance, software license purchase, and the cost of hardware
components. The benefits of cloud computing improve accessibility,
automatic software integration, quick deployment, high scalability, low
investment cost and flexibility [1] . On the basis of the services offering
by the cloud computing, the clouds are categorized into four types such as
private, public, hybrid and community clouds.
• ・ Public clouds: The provisions of the services through the off-
premise third party to the general public and computing resources
fall into this category.
• ・ Private clouds: They enable the large size organizations to
achieve the efficiencies with the responsibility constraint of data.
• ・ Hybrid clouds: Some enterprises utilize the public clouds for
general computing and private clouds for customer data protection
to assure the security.
Survey on Public Key Cryptography Scheme for Securing Data ... 297
only the specific user, who possess the keys to access the data. Hence, the
cryptography schemes are the best way to provide data security, in which the
user cannot access the data without the knowledge of key. Generally, most
of the cryptography techniques include three major steps as follows:
• ・ Key generation;
• ・ Encryption;
• ・ Decryption.
Figure 1 shows the data flow and message flow in cloud storage server
for secure data transmission. Key generation is the process of producing
the keys that are used for encryption and decryption. The encryption is the
process of converting the original data into an unreadable form known as
cipher text by the keys. The decryption is the process of retrieving back
the original message from the cipher text using the appropriate keys. The
cryptography schemes are classified into two types such as symmetric or
conventional cryptography and asymmetric or public key cryptography. The
symmetric cryptography uses same key for both encryption and decryption,
whereas the public key cryptography uses different keys. The symmetric
cryptography schemes are fast but there is no guarantee for secure key
distribution. As they use the same key for encryption and decryption, the
third party, who is snooping while key transmission may decrypt the data.
In order to overcome this issue, public key cryptography is introduced
with a pair of keys, namely, public key and private key. The key advantage
of public key cryptography is that the private keys used for decryption is
never shared or transmitted [3] .
The public key will be broadcasted, using which the data can be encrypted.
The authorized user who possess the private key can only have the right to
decrypt the data.
The remaining sections of this paper are organized as follows: Section
II presents the security challenges in cloud computing. Section III provides
the list of cloud security attacks. Section IV describes various public key
cryptography techniques to overcome the security issues. Section V shows
the results and discussion of the cryptography schemes. The survey is
concluded in Section VI.
Regulatory Compliance
The distributed cloud infrastructure stores data in multiple remote servers
that are located in different geographical locations. The legal constraints
vary from place to place and hence, it is difficult to assign a particular server
to be used for data transmission at the borders of a region.
Survey on Public Key Cryptography Scheme for Securing Data ... 301
Unencrypted Data
The unencrypted data leads to data confidentiality, data breaches and data
loss by exposing the original data. The cloud users depend on the service
provider for encryption and the keys can be either managed by the user or
the provider. Key management and distribution is a sensitive process, as the
message can be read by any one, who gets the key. In order to improve the
security, the keys are split into several units and distributed among the users,
provider and the third party service that is responsible for encryption [8] .
Unprivileged Access
The access control mechanisms must be incorporated to prevent the
unauthorized users from accessing the data. The sensitive data must be
secured by providing access only to a very few important persons of an
organization. The data are classified based on its sensitivity and need. The
users are mapped only to the required data and they are prohibited to access
or view the other unnecessary data [9] . Data abstraction and transparency is
implemented for privileged access.
Service Hijacking
Service hijacking is the illegal access by unauthorized users to certain
services. It leads to software exploitation, fraud, criminal activities and
phishing through e- mail. The services must be registered in the service
providers to avoid hijacking.
Authentication Attack
Authentication is a weak point in hosted and virtual services and is frequently
targeted.
There are many different ways to authenticate users. The mechanisms
used to secure the authentication process and the methods used are a frequent
target of attackers. Currently, regarding the architecture of SaaS, IaaS, and
PaaS, there is only IaaS offering this kind of information protection and data
encryption.
Man-In-The-Middle Attack
This attack is carried out when an attacker places himself between two users.
Anytime attackers can place themselves in the communication’s path, there
is the possibility that they can interfere and modify communications.
In the encryption step, the sender publishes the public key (m, encr) and
keeps the private key. The padding scheme is used to convert the original
data D to cipher text
Cipher=Dmodm.Cipher=Dmodm.
In the decryption step, the original data D is obtained as follows:
D=Ciphermodm.D=Ciphermodm.
Attacks in RSA
304 Security of Cloud-based systems
Advantages
1. Integrity, authentication, non-repudiation, and secrecy and
privacy are the features of RSA algorithm.
2. Private keys are never exposed.
Survey on Public Key Cryptography Scheme for Securing Data ... 305
Disadvantages
1. RSA requires exponential amount of time because of large key
sizes.
2. Key generation is complex.
3. No tradeoff between time and security.
Applications
1. Secure Socket Layer (SSL) protocol.
2. Secure Shell (SSH) remote connection.
3. Pretty Good Privacy (PGP) to guarantee security and privacy.
Advantages
1. Improves security for the shared secret key.
2. As the key size is small, the computation is fast.
Disadvantages
1. Messages cannot be encrypted using Diffie Hellman algorithm.
Applications
1. Secure Socket Layer (SSL) protocol [16] .
2. Internet Protocol Security (IPSec).
3. Public Key Infrastructure (PKI).
4. Secure Shell (SSH) remote connection [16] .
Advantages
1. Strong security with small keys.
2. Faster performance.
3. Low computational complexity.
4. Increased level of authentication and confidentiality.
Survey on Public Key Cryptography Scheme for Securing Data ... 309
Disadvantages
1. Size of the encrypted message is increased.
2. Implementation is difficult.
Applications
1. Secure Socket Layer.
2. Debit/Credit cards.
3. E-mails.
DIGITAL SIGNATURE
The digital signature standard is used to detect unauthorized modifications
and to verify the document’s identity. The digital signature is represented
as binary digits and computed using a set of rules and parameters. The
signature is generated by the use of a private key, which is known only to the
user [18] . The signature is verified using a public key that is corresponding
to the private key. The signature is generated by the user with the help of
the private key, which is never shared. A Secure Hash (SSH) function is
used in the signature generation process to obtain a condensed version of
the data called a message digest. A digital certificate contains the digital
signature of the certificate issuing authority so that anyone can verify the
originality of the certificate [19] . The digital certificates will expire after
specific duration, which results in insecurity.
Advantages
1. Legal compliance.
2. Less processing time.
3. Reduced overhead.
4. Improved security.
Disadvantages
1. Short life span.
2. Complicates sharing in case of incompatibility.
Applications
1. E-mails.
310 Security of Cloud-based systems
2. Fund transfers.
3. Data interchange.
4. Software distribution.
Diffie Hellman and ECC also increases. The size of ECC is twice that of
symmetric key and the key size of RSA and Diffie Hellman increases in
terms of exponents. Table 2 Comparison of key generation time and Table
3 Comparison of signature generation time
Table 2 depicts the comparison of key generation time of RSA and ECC
schemes [20] . By varying the key length from 1024 to 15,360 bits, the time
required for key generation increases linearly. In RSA, the minimum time
required for key generation is 0.16 secs for 1024 bits and the maximum
time is 679.06 secs for 15,360 bits. Similarly, the time required for key
generation in ECC is 0.08 and 1.4 secs for the key size of 163 and 571 bits
respectively. The comparative analysis between the RSA and ECC states
that the proposed EC offers significant performance improvement. The key
lengths are measured in bits and the key generation time is computed in
seconds. The key generation time varies based on the key length. As the key
length increases, the key generation time also increases. Table 3 shows the
time requires to generate the signature in RSA and ECC techniques [20] .
The signature is generated for user authentication and it is measured in terms
of seconds. The time required for signature generation depends on the key
size.
By varying the key length from 1024 to 15,360 bits, the time required for
signature generation increases linearly. In RSA, the minimum time required
for signature generation is 0.01 secs for 1024 bits and the maximum time is
9.2 secs for 15,360 bits. Similarly, the time required for signature generation
in ECC is 0.15 and 3.07 secs with respect to key length variations. The
comparative analysis between the RSA and ECC states that the proposed EC
offers significant performance improvement.
Table 4 presents the comparison of signature verification time of RSA
and ECC schemes [20] . By varying the key length from 1024 to 15,360
bits, the time required for signature verification increases linearly. In RSA,
the minimum time required for signature verification is 0.01 secs for 1024
bits and the maximum time is 0.01 secs for 15360 bits. Similarly, the time
required for signature generation in ECC is 0.23 and 4.53 secs with respect
to the key length variations. The signature is verified at the decryption stage
and it also depends on the key length. As the number of bits in the key size
increases, the time required for signature verification also increases.
CONCLUSION
This paper addressed the limitations in the security assurance and the data
privacy limitations with increase in size of the data on cloud. The evolution
of cryptographic approaches addressed these limitations and provided the
solution to the preserving process. Due to the multi-tenancy property of the
cloud, server and the geographical factors limited the security of the cloud
data access and storage. This paper surveyed about the various cryptographic
techniques with their key sizes, time required for key/signature generation and
verification constraints. The survey discussed the architecture for secure data
transmissions among the devices, challenges raised during the transmission
and attacks. This paper presents the brief review of major cryptographic
techniques such as RSA, Dffie Hellman and the ECC associated key sizes.
This paper investigated the general impact of digital signature generation
techniques on cloud security with the advantages and disadvantages. The
results and discussion section existing in this paper investigated the time
consumption for key/signature generation and verification with the key size
variations effectively. Finally, the results of these approaches were compared
in terms of key size, key generation time, signature generation time and
signature verification time. The initialization of random prime numbers and
the key computation based on the points on the elliptic curve assured the
high-security compared to the existing schemes with the minimum time
consumption and sizes in cloud-based applications.
314 Security of Cloud-based systems
REFERENCES
1. Vuyyuru, M., Annapurna, P., Babu, K.G. and Ratnam, A. (2012) An
Overview of Cloud Computing Technology. International Journal of
Soft Computing and Engineering, 5, 2231-2307.
2. Asma, A., Chaurasia, M.A. and Mokhtar, H. (2012) Cloud Computing
Security Issues. International Journal of Application or Innovation in
Engineering & Management, 1, 141-147.
3. Agrawal, M. and Mishra, P. (2012) A Comparative Survey on
Symmetric Key Encryption Techniques. International Journal on
Computer Science and Engineering, 4, 877.
4. Kaur, M. and Kaur, K. (2016) A Comparative Review on Data Security
Challenges in Cloud Computing. International Research Journal of
Engineering and Technology, 3, 334-339.
5. Chen, D. and Zhao, H. (2012) Data Security and Privacy Protection
Issues in Cloud Computing. 2012 International Conference on
Computer Science and Electronics Engineering, Hangzhou, 23-25
March 2012, 647-651. https://doi.org/10.1109/ICCSEE.2012.193
6. Rao, R.V. and Selvamani, K. (2015) Data Security Challenges and Its
Solutions in Cloud Computing. Procedia Computer Science, 48, 204-
209. https://doi.org/10.1016/j.procs.2015.04.171
7. Sookhak, M., Gani, A., Talebian, H., Akhunzada, A., Khan, S.U.,
Buyya, R., et al. (2015) Remote Data Auditing in Cloud Computing
Environments: A Survey, Taxonomy, and Open Issues. ACM Computing
Surveys, 47, 65. https://doi.org/10.1145/2764465
8. Bhore, R.S. and Sheikh, R. (2015) Technical Review on Security Issues
& Cryptographic Algorithm in Cloud Computing.
9. Ren, K., Wang, C. and Wang, Q. (2012) Security Challenges for
the Public Cloud. IEEE Internet Computing, 16, 69-73. https://doi.
org/10.1109/MIC.2012.14
10. Wu, L., Zhou, S., Zhou, Z., Hong, Z. and Huang, K. (2015) A
Reputation-Based Identity Management Model for Cloud Computing.
Mathematical Problems in Engineering, 2, 1-15. https://doi.
org/10.1155/2015/238245
11. Mahajan, S. and Singh, M. (2014) Analysis of RSA Algorithm Using
GPU Programming. arXiv:1407.1465
12. cs.CR.
Survey on Public Key Cryptography Scheme for Securing Data ... 315
13. Gola, K.K., Rathore, R., Sharma, V. and Kandpal, M. (2015) Secure
Key Exchange in Diffie-Hellman Key Exchange Algorithm.
14. Chaturvedi, A., Srivastava, N. and Shukla, V. (2015) A Secure Wireless
Communication Protocol Using Diffie-Hellman Key Exchange.
International Journal of Computer Applications, 126, 126-132.
15. Boni, S., Bhatt, J. and Bhat, S. (2015) Improving the Diffie-Hellman
Key Exchange Algorithm by Proposing the Multiplicative Key
Exchange Algorithm. International Journal of Computer Applications,
130, 7-10.
16. Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M.,
Halderman, J.A., et al. (2015) Imperfect Forward Secrecy: How Diffie-
Hellman Fails in Practice. Proceedings of the 22nd ACM SIGSAC
Conference on Computer and Communications Security, Denver, 12-
16 October 2015, 5-17. https://doi.org/10.1145/2810103.2813707
17. Garg, V. and Ri, S.R. (2012) Improved Diffie-Hellman Algorithm for
Network Security Enhancement. International Journal of Computer
Technology and Applications, 3, 1327-1331.
18. Setiadi, I., Kistijantoro, A.I. and Miyaji, A. (2015) Elliptic Curve
Cryptography: Algorithms and Implementation Analysis over
Coordinate Systems. 2015 2nd International Conference on Advanced
Informatics: Concepts, Theory and Applications, Chonburi, 19-22
August 2015, 1-6. https://doi.org/10.1109/icaicta.2015.7335349
19. Pornin, T. (2013) Deterministic Usage of the Digital Signature
Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm
(ECDSA).
20. Poulakis, D. and Rolland, R. (2015) A Digital Signature Scheme Based
on Two Hard Problems. Springer International Publishing, New York,
441-450. https://doi.org/10.1007/978-3-319-18275-9_19
21. Sinha, R., Srivastava, H.K. and Gupta, S. (2013) Performance
Based Comparison Study of RSA and Elliptic Curve Cryptography.
International Journal of Scientific & Engineering Research, 4, 720-725.
SECTION 4
CASE STUDIES
CHAPTER
15
Cloud Security: Services, Risks, and
a Case Study on Amazon Cloud
Services
ABSTRACT
Recent advances have witnessed the success and popularity of cloud
computing, which represents a new business model and computing
paradigm. The feature of on-demand provisioning of computational, storage,
and bandwidth resources has driven modern businesses into cloud services.
The cloud is considered cutting edge technology and it is solely relied on
by many large technology, business, and media companies such as Netflix
or Salesforce.com. However, in addition to the benefit at hand, security
issues have been a long-term concern for cloud computing and are the main
barriers of the widespread use of cloud computing. In this paper, we briefly
describe some basic security concerns that are of particular interest to cloud
technology. We investigate some of the basic cloud concepts and discuss
cloud security issues. Amazon Web Services is used as a case study for
discussing common cloud terminology. Data security, as well as some cloud
specific attacks is introduced. The current state and the future progression of
cloud computing is discussed.
Keywords: Could computing, security, Amazon, cloud storage
INTRODUCTION
Recent advances have witnessed the success and popularity of cloud computing,
which represents a new business model and computing paradigm [1] . The feature
of on-demand provisioning of computational, storage, and bandwidth resources
has driven modern businesses into cloud services [2] . The cloud is considered
cutting edge technology and it is solely relied on by many large technology,
business, and media companies such as Netflix or Salesforce.com. However, in
addition to the benefit at hand, security issues have been a long-term concern
and are the main barriers of the widespread use of cloud computing [1] . There
are three main challenges [1] for building a secure and trustworthy cloud:
• Outsourcing reduces both capital expenditure and operational
expenditure for cloud customers [1] . However, outsourcing
also indicates that cloud customers no longer retain the physical
control on hardware, software, and data. To address this
challenge, a trustworthy cloud is expected, meaning that cloud
customers are enabled to verify the data and computation in terms
of confidentiality, integrity, and other security services [1] .
• Multi-tenancy means that a cloud is shared by multiple customers
[1] . Virtualization is heavily used by cloud vendors to optimize
resource allocation and management [1] . A common but risky
situation is that data belonging to different customers may be
stored in the same physical machine. Adversaries can exploit this
vulnerability to launch various attacks such as data/computation
breach, flooding attack, etc. [1] .
Cloud Security: Services, Risks, and a Case Study on Amazon ... 321
DATA SECURITY
Cloud customers may store sensitive information in cloud instances. From a
security perspective, cloud companies need to ensure the confidentiality of
the service [2]. For example, this data could be the backend database for a
financial service. A client of any cloud service is supposed to know the risks
associated with data security, e.g., data loss and data theft [8]. When storing
sensitive information, encryption is always a powerful scheme. Naturally,
it would make sense to encrypt sensitive information such as credit card
numbers that are stored in the cloud. A potential weakness to encryption in
the cloud is the security of the keys. In the hacker world, it is commonly
known that physical access to a machine always results in game over.
This is because an attacker has control over the machine [2] [5] . Simple
passwords on the operating system will not prevent an attacker from stealing
data. A break-in is unavoidable unless the full disk is encrypted [8] . Full
disk encryption means that the entire volume is encrypted, including the
operating system [20] . While full disk encryption is possible in the cloud-
Cloud Security: Services, Risks, and a Case Study on Amazon ... 323
computing world, many clients do not encrypt their data for performance and
financial reasons. Disk encryption adds additional overhead to the total data
stored. Even though data rates vary from region to region, when clients pay
by the terabyte, less data is best (see Table 1) [3] . Additionally, many large
data stores require quick access. For example, a video streaming service
needs to read data quickly [3] . Disk encryption will slow this process down
significantly and increase business costs. To this end, many cloud customers
do not encrypt their volumes.
When cloud customers do not encrypt their volumes, a security risk is
presented. A rogue employee of the provider has the power to snoop around
without the customer’s knowledge. Since the employee has physical access
to the costumer’s cloud instance, there is nothing to stop the employee from
grabbing vital information and any other private keys [2] [8] . This employee
can do this simply by cloning the victim’s virtual machine, and then running
the clone on a second offline hypervisor [5] . The employee can monitor
the behavior of the virtual machine and take their time looking for valuable
data. The rogue employee can then proceed to steal the data or use the keys
to break into more cloud instances. When storing data in the cloud, trust is
a very important part of data privacy. “The threat of a malicious insider is
well-known to most organizations. This threat is amplified for consumers
of cloud services by the convergence of IT services and customers under a
single management domain, combined with a general lack of transparency
into provider process and procedure” [2] . Therefore, a trustworthy cloud is
an essential step toward the success of cloud computing.
A key concern when encrypting data is determining whether or not the
encryption software is open source.
text messaging, videoconferencing, and email. For example, Apple has a service
called, “iMessage” that handles text messages in the cloud. All messages are
encrypted end-to-end, ensuring that no middleman can read your conversations
[4] . What Apple does not tell you is that they are legally required to keep a copy
of the key. Again customers are putting trust in the provider, Apple.
and implement your own server in your home you will probably have
to trust someone else to help you, thereby risking the data’s integrity. It
would be unwise to attempt to secure grand amounts of money on the
cloud for this reason; even on your own server the temptation would
exist for the valuables to be stolen [2] . Perhaps an employee would
risk their job and reputation for a chance at this money or perhaps
the cloud service has taken precautions against employees gaining
too much valuable information. This much is unclear and unreported
by cloud service businesses. Nonetheless if looking toward using a
cloud one should remember that risks surround every server and the
most important question is: would you do the extra work for the extra
security?
API Keys
Application Programming Interface (API) Keys [19] on the cloud were first
used solely as the identifier for client programs running on a cloud. This
allowed for the management of client programs and users to be monitored
so as to backtrack events and log usage. While initially this had no security
issues involved, later progress on cloud infrastructure has expanded the use
of these keys [2] . In some cases it has been reported that these keys are used
for authorization. Thus having this key gives one the power to alter delete or
transfer an account’s data or to use the servers for any other purpose, which
would then be traced back and billed to the account holder [2] . After these
keys became security risks the major problem was that they were not treated
326 Security of Cloud-based systems
like them. Developers would email them around and store them in their hard
drives, where snooping and sniffing could find them.
Years ago Google and Yahoo were making this mistake, but it was not
long until the risks were found. They have since bulked their authorization
security using Security Assertion Markup Language [21] , and hashed- based
authentication codes [22] . Yet the issue remains a threat as developers fail to
follow best practices and continue to use API Keys for security purposes [2]
. The older, more experienced businesses like Yahoo, Google, and Amazon
have all either fallen into this trap before or are aware of the faults present.
These companies can be trusted to build better software and control data
flow than startups. If API Keys are going to secure information, they need to
be handled with greater care.
APIs
Application Programming Interfaces or APIs, give what is almost a roadmap
into how an application works [9] [10] . They are usually treated securely but
not often enough. The University of Texas at Austin and Stanford University
examined several commonly used web services [10] . Payment services at
several of them were found to have vulnerabilities in the Secure Sockets
Layer (SSL) protocol when accessed through APIs not meant for a browser
[3] . Taking advantage of this flaw led to getting access to a user’s files.
Applications like Chase Mobile Banking and Instagram failed to implement
SSL with complete security [10] .
Recent Examples
In recent years, one of the companies on the vanguard of cloud technology―
Amazon.com, Inc.―fell prey to such an attack. In 2010 hijackers performed
a cross-site scripting (XSS) attack on some site to gain its credentials, and
were successful [23] . The attackers then infiltrated the Amazon Relational
Database Service (RDS) [7] such that, even if they lost their original access,
they would still have a backend into the Amazon system. From that point
on, they could capture the login information of anyone who clicked the login
button on the Amazon homepage.
The attackers used their servers to infect new machines with the Zeus
Trojan horse [23] and control machines already infected with it (Zeus is a
piece of malware designed for Windows most often used for stealing bank
information through form-grabbing and password-logging via a man-in-the-
browser attack [24] [25] ). Computers infected with the malware began to
report to Amazon’s EC2 for updates and instructions [23] .
One of the most interesting facts about this case was that it was not, strictly
speaking, Amazon’s fault. The attackers gained access through some other,
more vulnerable domain [23] . This reveals one truth about the cloud: on it,
even one vulnerable system may lead to the compromising of the whole net-
work. Furthermore, Amazon was only one of several sites to suffer this type
of attack in the period of just a few months, and it was not in bad company:
Twitter, Google’s app engine, and Facebook all experienced similar threats
[23] .
Possible Defenses
To prevent this type of breach, the Cloud Security Alliance (CSA)
admonishes organizations to disallow users and services from sharing
account credentials between themselves, and in addition to employ multi-
factor authentication requirements when feasible [2] . However, both these
changes may make systems more difficult to use, more expensive, and
slower. Multi-factor authentication [26] is authentication demanding at least
two of the following: knowledge, or something one knows; possession, or
something one has; and inference, or something one is. Thus, multi-factor
authentication places much more of a burden on users and services than
single-factor authentication. And if users and services are disallowed from
directly sharing credentials, cloud service providers may have to construct
secure channels (an expensive undertaking) or hire a third party for
communication between users and services (likewise expensive) [26] .
328 Security of Cloud-based systems
PRISM Scandal
In June 2013 Edward Snowden revealed that the National Security Agency
(NSA) has been collecting enormous amounts of communication and search
data from internet companies such as Microsoft, Yahoo, Google, and many
more, including data about the activities of American citizens [27] . Snowden
also explained that even low-level NSA employees have the ability to access
this data without warrants. Such surveillance has taken place since January
2007. It may not be immediately clear why this information is particularly
relevant to the cloud. The government can force cloud service providers to
install backdoors in their hypervisors, but it can do the same for operating
systems and even individual machines [11] . However, targeting the machine
of one individual is much less likely, since at that point the government
has singled out that user specifically. Instead, the cloud provides the NSA
with a brimming ocean of network activity, in which it can cast its net
and hope to catch something of use―much more efficient than targeting
individual machines. As one writer for Porticor said: “Scanning all the
data from a cloud provider is relatively easy, because massive amounts of
data from multiple owners is all available” [11] . Porticor recommends that
users encrypt their own data to combat such invasions of privacy, but it is
doubtful that such a solution will ever prove widely acceptable, seeing as
it places undue responsibility on users and requires a degree of expertise.
The example of PRISM [27] touches on many issues within the future of
cloud security: maintenance of privacy, government policy, and data theft
(since attackers may capture user data using NSA techniques, or even the
NSA channels themselves). These issues are not often considered by users
of cloud services, and are not being discussed on a large scale.
A Better Cloud
There are organizations working towards a more secure cloud, such as the
CSA [2] . Another is Silver Sky, an expert provider of cloud security and
provider of “the industry’s only advanced Security-as-a-Service platform
from the cloud” [13] [28] . The CTO of Silver Sky, Andrew Jaquith, explains
that many CIOs are moving their services to the cloud in order to save
money, but that security remains a key concern and these moves may be
Cloud Security: Services, Risks, and a Case Study on Amazon ... 329
insecure or at least hasty. But on the other hand, he also explains that many
cloud service providers are becoming clearer, more transparent, and more
assured than ever before that they could protect customer data [13] .
Thus, the move to the cloud, while it may in some ways be insecure,
does not herald anyone’s doom. And, with its ever-increasing popularity,
even hesitant companies may not soon have a choice.
CONCLUSION
Patrick Mosca, Yanping Zhang, Zhifeng Xiao, Yun Wang (12,92)”>12] as a
case study, we are able to implore some of the basic terms and concepts of
cloud computing. We then proceed to discuss data security, API concerns,
account hijacking, and other security concerns. These general concerns are
shown to be of particular interest to cloud security. The main differences
between traditional services and cloud services are compared from a security
perspective. Service and account hijacking is covered, as well as possible
defenses. We investigate differences between security issues in cloud
services and in traditional services. From the practitioners’ view, we briefly
overview the security in cloud. The study in this paper provides a guideline
of research on cloud services and security issues. Finally, we give some
ideas on how to build a more secure cloud. Our future work will focus on
the security concerns in cloud services. It will include the privacy protection
of data information stored in cloud, data integrity with multiple backups for
services purpose, etc.
330 Security of Cloud-based systems
REFERENCES
1. Xiao, Z. and Xiao, Y. (2013) Security and Privacy in Cloud Computing.
IEEE Communications Surveys & Tutorials, 15, 843-859.
2. Cloud Security Alliance (2010) Top Threat to Cloud Computing.
https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
3. Amazon: Amazon Glacier. http://aws.amazon.com/glacier/
4. Quarks Lab (2013) iMessage Privacy. http://blog.quarkslab.com/
imessage-privacy.html
5. Mutch, J. (2010) How to Steal Data from the Cloud. http://www.
cloudbook.net/resources/stories/how-to-steal-data-from-the-cloud
6. Yorozu, Y., Hirano, M., Oka, K. and Tagawa, Y. (1982) Electron
Spectroscopy Studies on Magneto-Optical Media and Plastic Substrate
Interface. IEEE Translation Journal on Magnetics in Japan, 2, 740-741.
7. Amazon: Service Level Agreement. http://aws.amazon.com/ec2-sla/
8. Kirchgaessner, S. (2013) Cloud Storage Carries Potent Security Risk.
http://www.ft.com/cms/s/0/4729ed7c-3722-11e3-9603-00144feab7de.
html
9. Lemos, R. (2012) Insecure API Implementations Threaten Cloud.
http://www.darkreading.com/cloud/insecure-api-implementations-
threaten-cl/232900809
10. Lemos, R. (2013) Vulnerable APIs Continue to Pose Threat to Cloud.
http://www.darkreading.com/services/vulnerable-apis-continue-to-
pose-threat/240146453
11. Porticor Cloud Security (2013) Did Snowden Compromise the Future
of Cloud Security? http://www.porticor.com/2013/07/cloud-security-
snowden/
12. Amazon: Amazon Web Services. http://aws.amazon.com
13. SilverSky (2013) The Future of Cloud Computing and the Latest
Security Threats. https://www.silversky.com/blog/the-future-of-cloud-
computing-and-the-latest-security-threats
14. Columbia University (2012) Fog Computing: Mitigating Insider Data
Theft Attacks in the Cloud. http://www.cs.columbia.edu/~angelos/
Papers/2012/Fog_Computing_Position_Paper_WRIT_2012.pdf
15. Amazon: Amazon Machine Image (AMI). http://docs.aws.amazon.
com/AWSEC2/latest/UserGuide/AMIs.html
16. Amazon: Amazon EBS. http://aws.amazon.com/ebs/
Cloud Security: Services, Risks, and a Case Study on Amazon ... 331
16
A Quick Survey on Cloud Computing
and Associated Security, Mobility and
IoT Issues
ABSTRACT
This survey paper provides a general overview on Cloud Computing.
The topics that are discussed include characteristics, deployment and
service models as well drawbacks. Major aspects of Cloud Computing are
explained to give the reader a clearer understanding on the complexity of the
platform. Following this, several security issues and countermeasures are
also discussed to show the major issues and obstacles that Cloud Computing
Citation: Perez, M. and Kumar, S. (2017), “A Quick Survey on Cloud Computing and
Associated Security, Mobility and IoT Issues”. Journal of Computer and Communica-
tions, 5, 80-95. doi: 10.4236/jcc.2017.512009.
Copyright: © 2017 by authors and Scientific Research Publishing Inc. This work is li-
censed under the Creative Commons Attribution International License (CC BY). http://
creativecommons.org/licenses/by/4.0
334 Security of Cloud-based systems
INTRODUCTION
Cloud computing is a model that is completely based on the Internet and
remote servers to utilize large amounts of data, software, and applications.
It is a promising new platform for services to be provided on the Internet.
These include storage, applications, and hardware services that clients can
utilize as an on-de- mand basis. The listed services are provided without the
clients having to own the particular service or application. As for hardware
services, clients do not have to have them installed locally. They are usually
paid for by clients “per use” basis, which results in overall cost reductions.
Along with reduced costs, major companies such as Google and Amazon
utilize the features and benefits of cloud computing such as low investment
cost, easy to manage, and flexibility to provide their services [1] . The purpose
of this survey paper is to give the reader a much clearer understanding of
the fundamentals of cloud computing ranging from a general overview of
cloud computing to the security issues and vulnerabilities that are involved
with the platform.
The topics presented in this paper can be divided into four major
categories. This includes a general Cloud Computing overview, Cloud
Computing security, Mobile Cloud Computing, and Internet of Things. For
the cloud computing overview, the reader will find detailed explanations for
each individual aspect of cloud computing to get a clearer understanding
on the platform ranging from its architecture to each service model. The
cloud computing security section will provide an overview of a variety of
different security threats and vulnerabilities that cloud computing faces.
Mobile Cloud Computing and Internet of Things both act as extensions to
the general overview of Cloud Computing with subtopics including Cloud
Computing limitations, new applications, and the future outlook, as Cloud
Computing is further integrated with mobile devices.
A Quick Survey on Cloud Computing and Associated Security, ... 335
The physical layer is the hardware and resources that the two layers above
utilize to perform their required tasks. Hardware includes individual servers,
switchers, and routers. The facilities that house the hardware is also a part
of this layer along with the power systems related to maintaining proper
operation of the physical components in house. This includes heating,
ventilation, air conditioning, and emergency power [2] .
privacy. In most cases users and clients do not know this information, as this
aspect of Cloud Computing is essential but out of their hands. This concern
of Cloud Computing will be discussed in further detail. Looking at various
security threat examples and countermeasures pertaining to topic discussed
previously such as Cloud Computing service models and characteristics can
give a good overview on the obstacles that Cloud Computing faces as it is
further implemented and more widely used.
Related to the data breach risks stated previously, since data in cloud
computing can be stored anywhere in the world this can lead to access
problems for clients. This makes any type of localized attacks at the storage
areas completely out of the customer’s control. For a customer and provider,
knowing who is managing their data and what are their privileges is part of the
preventative maintenance process for making sure their data is secure. With
storage locations being unknown, identity management and authentication
is key. Brute force attacks can decrypt passwords and lead to unauthorized
access. On a related note, with storage facilities being all over the world
there are privacy concerns that are associated in the cloud-computing
environment. Different countries may have different privacy regulations
with their own restrictions and guidelines on data security. This can lead
to data being prone to man-in-the-middle attacks and other eavesdropping
techniques. The countermeasures to protect data because of data location
and the privacy issues include high-level password authentications and data
access policies, sniffing detection platforms, and separating endpoint and
server security processes [10] .
DDoS related attacks. Overall, for the three service models they each share
vulnerabilities that relate to the CIA triad such as each one can be susceptible
to DDoS attacks, which affect availability, or the assurance of information,
which affects confidentiality, and maintaining data integrity in general [11] .
Figure 2. Mobile cloud computing service models: (a) Mobile as a service con-
sumer model; (b) Mobile as a service provider; (c) Mobile as a service broker.
CONCLUSION
In summary, this survey paper provides a general overview of Cloud
Computing and various subtopics related to the technology behind it including
mobile, security and IoT. The scope and potential for Cloud Computing can
be endless but it has several drawbacks and security risks that need to be
addressed in order for it to become more reliable and more accepted. As
a new Information Technology model and platform for the consumptions
and delivery of services on the Internet, there are many benefits from both
a business and personal standpoint. These applications can utilize Cloud
Computing to provide better and more efficient services as discussed in the
previous sections. Full utilization of Cloud Computing has yet to be realized
but as the technology and architecture become more adopted along with
possible standardizations that are needed, many devices and applications
can have a much larger scope and greater performance potential from Cloud
Computing.
ACKNOWLEDGEMENTS
This work was supported in part by the US National Science Foundation,
under Grant# 0421585 and Houston Endowment Chair in Science, Math and
Technology Fellowship
350 Security of Cloud-based systems
REFERENCES
1. Kamboj, S. and Ghumman, N.S. (2016) A Survey on Cloud Computing
and Its Types. 2016 3rd International Conference on Computing for
Sustainable Global Development (INDIACom), New Delhi, 2971-
2974.
2. Colman-Meixner, C., Develder, C., Tornatore, M. and Mukherjee,
B. (2016) A Survey on Resiliency Techniques in Cloud Computing
Infrastructures and Applications. IEEE Communications
Surveys & Tutorials, 18, 2244-2281. https://doi.org/10.1109/
COMST.2016.2531104
3. Arinze, B. and Anandarajan, M. (2013) Adapting Cloud Computing
Service Models to Subscriber Requirements. 2013 16th International
Symposium on Wireless Personal Multimedia Communications
(WPMC), Atlantic City, 1-5.
4. Savu, L. (2011) Cloud Computing: Deployment Models, Delivery
Models, Risks and Research Challenges. 2011 International Conference
on Computer and Management (CAMAN), Wuhan, 1-4. https://doi.
org/10.1109/CAMAN.2011.5778816
5. Mirobi, G.J. and Arockiam, L. (2015) Service Level Agreement in
Cloud Computing: An Overview. 2015 International Conference
on Control, Instrumentation, Communication and Computational
Technologies (ICCICCT), Kumaracoil, 753-758. https://doi.
org/10.1109/ICCICCT.2015.7475380
6. Polash, F., Abuhussein, A. and Shiva, S. (2014) A Survey of Cloud
Computing Taxonomies: Rationale and Overview. The 9th International
Conference for Internet Technology and Secured Transactions
(ICITST-2014), London, 459-465. https://doi.org/10.1109/
ICITST.2014.7038856
7. Bokhari, M.U., Shallal, Q.M. and Tamandani, Y.K. (2016) Cloud
Computing Service Models: A Comparative Study. 2016 3rd
International Conference on Computing for Sustainable Global
Development (INDIACom), New Delhi, 890-895.
8. Kanday, R. (2012) A Survey on Cloud Computing Security. 2012
International Conference on Computing Sciences, Phagwara, 302-311.
https://doi.org/10.1109/ICCS.2012.6
9. Patil Madhubala, R. (2015) Survey on Security Concerns in Cloud
Computing. 2015 International Conference on Green Computing
A Quick Survey on Cloud Computing and Associated Security, ... 351
17
Block Level Data Integrity Assurance
Using Matrix Dialing Method towards
High Performance Data Security on
Cloud Storage
P. Premkumar1, D. Shanthi2
Department of Computer Science and Engineering, K.L.N. College of
1
ABSTRACT
Data outsourcing through cloud storage enables the users to share on-
demand resources with cost effective IT services but several security issues
arise like confidentiality, integrity and authentication. Each of them plays
an important role in the successful achievement of the other. In cloud
Citation: Premkumar, P. and Shanthi, D. (2016), “Block Level Data Integrity Assur-
ance Using Matrix Dialing Method towards High Performance Data Security on Cloud
Storage”. Circuits and Systems, 7, 3626-3644. doi: 10.4236/cs.2016.711307.
Copyright: © 2016 by authors and Scientific Research Publishing Inc. This work is li-
censed under the Creative Commons Attribution International License (CC BY). http://
creativecommons.org/licenses/by/4.0
354 Security of Cloud-based systems
INTRODUCTION
Cloud computing is a modern computing paradigm in which scalable
resources are shared dynamically as various services over the internet [1]
. Cloud storage services enable the user to enjoy with high capacity and
quality storage with less overhead but it has many potential threats like data
integrity, data availability, data privacy and so on. The two issues mainly
occur while outsourcing the data using cloud storage is data integrity and
data security due to unfaithful cloud service provider [2] . Data integrity is
the form of protection of data against loss and damage caused by hardware,
software and network failure [3] [4] . Normally data inaccuracy can occur
either accidently through programming errors or maliciously through
breaches or hacks. It is one of the important aspects among the other
cloud storage issues because data integrity ensured that data are of quality,
correctness, consistency, accuracy, security, confidentiality, reliability, and
accessibility but assurance of data integrity in the cloud is a major challenge
that is faced by today’s cloud users [5] . It refers to assurance by the user that
Block Level Data Integrity Assurance Using Matrix Dialing ... 355
the data are not modified or corrupted by the service provider or other users.
The performance of data integrity is measured by using the parameters like
computation time, encryption time and decryption time, memory utilization
and output size. While outsourcing their data using cloud storage does
not maintain a local copy. Hence, cryptographic measures cannot be used
directly to monitor the integrity of data and also downloading the data for
monitoring integrity is not a viable solution. Therefore, an external Third
Party Auditor (TPA) is required [6] . The TPA is an independent authority
that has capabilities to monitor the integrity of outsourced data by the client
and also inform on data corruption or loss, if any. But it requires separate
memory and also takes more time for verification of data to ensure integrity
of data; hence the overall performance is degraded. Nowadays, software
professionals employ number of practices to ensure data integrity which
includes data encryption, data backup, access controls, input validation,
data checking, error detection and correction while transmitting and storing
the data. The performance of data violation checking methods is affected
due to communication overhead, memory overhead, key size, encryption
time, decryption time, and computation time. The scope of the data integrity
assurance mechanism can be classified into two levels: first is to prevent
data corruption and second is to detect and correct data violation. This paper
only focuses on detection of data violation. The algorithms and methods to
ensure data integrity are discussed in [7] . In paper [8] , certain degree of
integrity assurance is provided by RAID technique but it operates only on
binary data, takes more computation time and also the value of determinant
factor is three bits long and hence needs large memory for storage. In paper
[9] , to evaluate the performance of the encryption algorithm for text files,
it uses AES, DES [10] [11] and RSA algorithm and the parameters such
as computation time, memory usage, and output bytes are considered. The
time taken to convert the plain text into cipher text is known as encryption
time. The decryption time is the time that a decryption algorithm takes to
reproduce a plaintext from a cipher text. Comparing these three algorithms,
RSA takes more time for computation [12] . The memory usage of each
algorithm is byte level. RSA requires more memory than AES and DES.
In paper [13] , various algorithms such as AES, 3DES, Blowfish and DES
are discussed. Throughput is equal to total encrypted plaintext in bytes
divided by the encryption time. Higher the throughput, higher will be the
performance [14] . Asymmetric encryption techniques are slower than
symmetric techniques, because they require more computational processing
power. Also, Blowfish algorithm gives better performance than all other
356 Security of Cloud-based systems
algorithms in terms of throughput [15] [16] . In paper [17] and paper [18]
, the performance evaluation of AES and Blowfish algorithms is discussed
[19] . The parameters such as time consumption of packet size for 64 bit
encodings and hexadecimal encodings, performance for encryption of text
files and the throughput are considered. The result shows that Blowfish
has better performance than AES in almost all the test cases. The paper is
organized as follows: Section 1 describes introduction and related work.
The proposed methodology is discussed in Section 2. Section 3 describes
comparison of results and analysis. Section 4 concludes the paper.
PROPOSED METHODOLOGY
The proposed technique is based on the Determinant Factor (DF) approach
to enhance both data integrity and security which involves the following
steps:
Before transmitting the series of data, it is divided into N-matrices,
where N is given by:
Step 3. At Receiver side decrypt the message using their own private key.
Step 4. Regenerate the Message Digest.
Step 5. Finally the Signature is verified using Sender’s public key.
Message digest function also called as hash function used to generate
digital signature of the data which is known as message digest. SHA-1
algorithm is used to implement integrity of the message which produce
message digest of size 128 bits. These are mathematical functions that
process information to produce different message digest for each unique
message. It processes the message and generates 128 bits message digest.
The AES algorithm consists of the following steps and also it described
by Figure 3.
Step 1: Add Padding to the end of the genuine message length is 64 bits and
multiple of 512.
Step 2: Appending length. In this step the excluding length is calculated.
Step 3: Divide the input into 512-bit blocks. In this step the input is divided
into 512 bit blocks.
Step 4: Initialize chaining variables. In this step chaining variables are
initialized. In the proposed method 5 chaining variables are initialized each
of size 32 bits giving a total of 160 bits.
Step 5: Process Blocksie., Copy the chaining variables, Divide the 512 into
16 sub blocks, Process 4 rounds of 20 steps each.
Step 6: Output Generation.
Further this algorithm is divided into 5 steps: Key Generation, Digital
Signing, Encryption, Decryption and Signature Verification are discussed as
below:
Different combinations of key size such as 128, 192 or 256 bits are used.
To perform the AES algorithm, round keys must be generated from the user
provided key. The Key Schedule of this algorithm provides 33 128-bit keys
to be mixed with the text blocks during the Round function of the algorithm.
First create 8 32-bit pre keys using the key provided by the user. The user’s
key is split every 32 bits to do this and then generate 132 intermediate keys
using the following reoccurrence: for i from 0 to 131. The 33 round keys are
generated from these intermediate keys by running through the S-Boxes and
combining them into 128-bit blocks.
Step 2: Digital Signing
Generate message digest of the document to be send by using SHA-1
algorithm.
The digest is represented as an integer m.
Digital signature S is generated using the private key (n, d).
S = md mod n.
Sender sends this signature S to the recipient.
Step 3: Encryption
Sender represents the plain text message as a positive integer m.
It converts the message into encrypted form using the receiver’s public
key (e, n).
C = me mod n
Sender sends this encrypted message to the recipient. Here, n is the
modulus and e is the encryption exponent.
Step 4: Decryption
Recipient does the following operation:
Using his private key (n, d), it converts the cipher text to plain text “m”.
M = Cd mod n
where d is the secret exponent or decryption exponent.
Step 5: Signature Verification
Receiver does the followings to verify the signature:
An integer V is generated using the sender’s public key (n, e) and
signature S.
V = Se mod n
It extracts the message digest M1, from the integer V using the same SHA-1
362 Security of Cloud-based systems
.
Step 2: Generate a normally distributed random number
.
Step 3: .
Step 4: xi with certainty degree of µi is a cloud drop in the domain.
Step 5: Repeat Steps 1 to 4, and generate drops.
Algorithm 2: Reverse cloud generator
.
Step 2: .
Step 3: .
Step 4: .
Ex is provided by data owner; En and He are produced by negotiation of
data owner and service provider. Each cloud user is provided with a value
called expected value which is known only to the user. The negotiated values
with the CSPs are Entropy which is unique for all users in the particular
group sharing the data in the cloud. Hyperentropy is the value which is
common to all the group users of the data. Then, a lot of cloud drops will be
formed by forward cloud generator (see Algorithm 1) and are used to color
the user data. When the data are used, the cloud drops are extracted from
colored data Ex0, En0, and He0 will be produced by reverse cloud generator
(see Algorithm 2). Final color matching which indicates data is not modified
by others. Data owner and storage service provider negotiate together to
select En and He, just like the key. Ex, En, and He are three mathematical
characters. En and He can be used to transform a certain print to uncertain
print drops. Figure 4 shows different paint drops according to different
En. Also compute the entropy of each cloud drop (En0) and compare the
difference between En and En0. To provide the continuous authentication
within the group, an automated validation of data can be made at regular
intervals of time. The experiment result is illustrated in the concerned tables,
and the curve of case is shown in concerned Figures. The performance of
364 Security of Cloud-based systems
50 6
60 7
70 8
80 9
Figure 6 describes Decryption time for various block size of data given
in the Table 2. It can be seen from the figure that decryption time is linearly
proportional to the block size. Figure 7 describes time taken for digital
signature generation regards with various block size of data given in Table
3. It can be seen from the figure that the digital signature generation time
is linearly proportional to the block size. Figure 8 describes time taken for
executing various block size of data given in Table 4. It can be seen from
the figure that the Average Finishing time is constant proportional to the
block size. Figure 9 describes Resource Utilization in terms of CPU and
Memory for various Data Sizes as mentioned in Table 5. Figure 10 describes
Accuracy checking in terms of number of defects detected for various Data
Sizes as mentioned in Table 6. Figure 11 describes Throughput in terms of
Encrypted data and Time as mentioned in Table 7. Figures 12-15 gives the
comparison between Two fish, Serpent algorithm with AES algorithm in
terms of Encryption time and Decryption time and Execution Time, output
size for each block of data given in Tables 8-11 respectively. Based on the
results AES algorithm provides better performance in terms of encryption
time and decryption time and execution time.
Data size (KB) Start time (Sec) Finish time Execution time (Sec) =
(Sec)
(finish time − start time)
5 5 7 2
10 5 7 2
15 10 13 3
20 15 18 3
25 20 23 3
30 20 23 3
35 24 27 3
40 25 28 3
45 30 33 3
50 30 34 4
Block Level Data Integrity Assurance Using Matrix Dialing ... 367
80 40 75 8
90 45 77 7
100 50 79 8
Table 7. Throughput.
30 4 22.5 5.62
40 5 30 6
50 6 37.5 6.25
60 7 45 6.42
70 8 52.5 6.56
80 9 60 6.66
Block Level Data Integrity Assurance Using Matrix Dialing ... 369
Data size (KB) AES (Sec) Two Fish (Sec) Serpent (Sec)
50 5.5 5 5.9
100 9.5 10 10.5
500 15 15.4 16
1024 21.5 22.3 23
5120 27 26.5 28
Data size (KB) AES (Sec) Two Fish (Sec) Serpent (Sec)
50 6 7 6.2
100 8 9 8.5
Block Level Data Integrity Assurance Using Matrix Dialing ... 371
Data size (KB) AES (Sec) Two Fish (Sec) Serpent (Sec)
50 4 6 7
100 4.5 7 7.2
500 6.5 8 8.3
1024 10 11.5 11.9
5120 13 14.3 15
Data size AES (output Two Fish (output Serpent (output bytes)
(KB) bytes) bytes)
70 132,082 146,022 160,030
80 132,082 146,022 160,030
95 132,082 146,022 160,030
105 132,082 146,022 160,030
115 132,082 146,022 160,030
120 132,082 146,022 160,030
130 132,082 146,022 160,030
CONCLUSION
This paper presents a new technique for enhancing data security through
improving data integrity violation checking over the cloud storage without
using TPA. In the proposed technique, the data are divided into blocks,
where each block is arranged into square matrix. An element in this matrix
is arranged into a new form using Matrix Dialing method which leads to
memory saving through bits reduction and also to enhance accuracy of data.
Also digital signature is applied on each determinant factor to enhance data
integrity assurance. This model also uses data coloring on encrypted digital
signature to enhance the data security which helps the user to verify and
examine the data from unauthorized people who manipulate the data in the
cloud storage. In this method accuracy is maintained at satisfied level by
rearranging the data two times via original matrix and its corresponding
Dialing method Rotational matrix. Though it requires more computation
time it provides good level of accuracy and security of data. Thus, here
it tries to provide a new insight to improve the cloud storage security
through detection of data integrity violations in block level during storing or
transmission. Encryption algorithm plays an important role in data security
where encryption time, memory usages and output byte are the major issue
Block Level Data Integrity Assurance Using Matrix Dialing ... 373
of concern. The selected encryption AES, Two Fish and Serpent algorithms
are used for performance evaluation. Based on the text files used and the
experimental result it was concluded that AES algorithm consumes least
encryption time and least memory usage. Serpent algorithm consumes
longest encryption time and memory usage is also very high but output
byte is least. The simulation results show that the new method gives better
results compared to the Two Fish and Serpent algorithms and has resolved
all of their deficiencies that go along with data integrity assurance methods
towards data security. The performance measures viz., better encryption/
decryption time and also computation time, memory utilization, and quicker
detection of violation are considered. In future work this proposed model can
be implemented for conducting more experiments using various algorithms
and methods in cloud computing on other types of data like image, sound
and multimedia data and test the performance of the proposed approach. The
focus will improve encryption time and less memory usage.
374 Security of Cloud-based systems
REFERENCES
1. Chavan, A. (2014) Cloud Computing. Asian Journal of Management
Sciences, 2, 1-6.
2. Diffie, W. and Hellman, M.E. (1976) New Directions in Cryptography.
IEEE Transactions on Information Theory, 22, 644-654. http://dx.doi.
org/10.1109/TIT.1976.1055638
3. Kahate, A. (2008) Cryptography and Network Security. Tata McGraw-
Hill Publishing Company, New Delhi.
4. Shantala, C.P. and Kumar, A. (2014) Integrity Check Mechanism in
Cloud Using SHA-512 Algorithm. International Journal of Engineering
and Computer Science, 3, 6033-6037.
5. Wang, C., Wang, Q. and Ren, K. (2009) Ensuring Data Storage
Security in Cloud Computing. 17th International Workshop on Quality
of Service (IWQoS), IEEE Conference Publication.
6. Govinda, K., Gurunathprasad, V. and Sathishkumar, H. (2012) Third
Party Auditing for Secure Data Storage in Cloud through Digital
Signature Using RSA. International Journal of Advanced Scientific
and Technical Research, 4.
7. Bhagat, A. and Sahu, R.K. (2013) Cloud Data Security While Using
Third Party Auditor. International Journal of Computer Applications,
70.
8. Ghaeb, J.A., Smadi, M.A. and Chebil, J. (2010) A High Performance
Data Integrity Assurance Based on the Determinant Technique.
Elsevier, April.
9. Zhang, T.N.T. (2009) A Study of DES and Blowfish Encryption
Algorithm. Tencon IEEE Conference.
10. (2015) DES Algorithm. http://orlingrabbe.com/des.htm
11. Coppersmith, D. (1994) The Data Encryption Standard (DES) and Its
Strength against Attacks. IBM Journal of Research and Development,
38, 243-250. http://dx.doi.org/10.1147/rd.383.0243
12. Seth, S.M. and Mishra, R. (2011) Comparitive Analysis of Encryption
Algorithms for Data Communication. IJCST, 2, 292-294.
13. Stallings, W. (2006) Cryptography and Network Security. 4th Edition,
Pearson Prentice Hall.
14. Singh, G., Singla, A.K. and Sandha, K.S. (2011) Throughput Analysis
of Various Encryption Algorithms. IJCST, 2, 527-529.
Block Level Data Integrity Assurance Using Matrix Dialing ... 375
18
Current Status of the Use of Cloud
Computing in SMEs in the City of
Latacunga, Ecuador
Ambato, Ecuador.
2
Facultad de Ciencias Administrativas, Universidad Técnica de Ambato,
Pontificia Universidad Católica del Ecuador, Ambato, Ecuador.
ABSTRACT
This document is the result of a descriptive research on and analysis of
hierarchical conglomerates. Its purpose is to investigate the current state of
Cloud Computing (CC) use in small and medium enterprises (SMEs) in the
INTRODUCTION
Small and medium enterprises (SMEs) have an important economic
role in different countries. Some authors [1] [2] [3] mention that SMEs
represent 79% of businesses worldwide, 95% in Latin America, and 99%
in Ecuador. SMEs in Ecuador are established as the main source of direct
and indirect work, and their participation in the development of the country
is transcendental. According to data from the National Institute of Statistics
and Census1 (INEC), 8447 companies were registered in Ecuador, divided
into 19 productive activities, of which 90.5% are SMEs. This information is
compiled by the Board of Directors of Companies from records generated by
the Internal Revenue Service2 (SRI) and the Social Security Institute3 (IEES)
from a sectoral and territorial perspective. According to [4] , SMEs are
defined by sales volume, social capital, number of employees, and their
level of production; which are received in Ecuador and are regulated by the
law of company and tax regime.
SMEs play an important role in the country’s economy, because apart
from contributing to the creation of jobs, they also promote the economic
recovery of certain regions and foster technological progress. Their capacity
depends fundamentally on the ability of the manager/owner to invest in
intangible products, technological products and their capacity for flexible
innovation.
Authors [5] [6] [7] agree that one of the most important technological
developments of recent years is Cloud Computing. The potential benefits of
these technologies include the benefits of an operational nature to implement
Current Status of the Use of Cloud Computing in SMEs in the ... 379
and needs of the companies; they also involve economic aspects, because
they allow a reduction in their costs, when using this service. Therefore,
managers or owners of companies have access to personalized information
for each one, which can share it internally and access it from any connection
point.
The article is organized as follows, as the first point is the definition of
SMEs with an international context, showing their classification and their
sectors in Ecuador, as well as the use of ICT and the current state of CC in
the country. As a second point, the methodology applied for this research
is detailed, as well as the instruments for data collection and validation.
From this, the results are manifested and finally, the conclusions of the
investigation.
THEORETICAL FRAMEWORK
Regarding the use of provincial ICT according to INEC data, the provinces
that are most linked to the use of technology are Galapagos with 68.4%
and the province under study, Cotopaxi, where its use reaches 50.4%, thus
showing that growth and adaptation to this resource is rapid, with a slight
difference of 18%.
Cloud Computing
Some authors [31] [32] [33] indicate that Cloud Computing has been
contextualized in different ways. They also establish that the most common
definition is adopted by the National Institute of Standards and Technology
(NIST11), which refers to Cloud Computing as computer groups, features and
models. References [34] [35] [36] state that Cloud Computing integrates the
stability, scalability and delivery of a service. In addition, [37] [38] point out
that it is a business application on a website, through which organizations
384 Security of Cloud-based systems
METHODOLOGY
In this study, regulatory sites of the Ecuadorian business regulations and
documents in Spanish and English were reviewed from online journals of
Scopus, Science Direct, Web of Science and ProQuest published in the last
10 years, the studies were identified with key words, among which stand out:
IT in the company, cloud computing, cloud computing services and Cloud
Computing in SMEs, where 498 results were found in relation to the subject.
The criteria of selectivity was based on: advantages and disadvantages of
Cloud Computing, ICT applications in Ecuador and Cloud Computing use
survey models, which contributed to the study topic.
Similarly, the recommendations for the construction of the theoretical,
statistical and explanatory framework of the object of study were accepted
[53] [54] . The investigation started from the analysis of empirical studies in
a systematic way of the selected sources [6] [55] [56] .
For the qualitative study, an exploratory analysis was carried out using
hierarchical conglomerates, which according to [57] [58] [59] consists
of determining the dimensions established in groups, which allowed to
identify how these variables influence the use of Cloud Computing of SMEs
in the city of Latacunga-Ecuador, through intergroup links and chi-square
measurement counts. In addition to better understanding, a dendrogram
is established that clearly reflects the groups conformed by the nominal
variables established in the questionnaire questions.
On the other hand, the exploration was carried out through a
questionnaire, divided into two parts. The participation profiles to answer the
items in the first part were addressed to staff with administrative positions
and access to a computer, without requirement of deep knowledge of Cloud
Computing. In the second instance, the survey was explicitly directed to
386 Security of Cloud-based systems
where:
KR20 = Reliability Coefficient (Kuder Richarson)
n = number of items that the instrument contains
Vt = Total variance of the test
p = positive probability
q = Negative probability (1 − p)
After applying the formula a level of reliability according to data was
obtained:
KR20 = 0.81
The population under study of this research are the SMEs of the
agricultural (A), manufacturing (C), commerce (G) and services (N) sectors
of the city of Latacunga, since they are companies of greater number within
the province, that use or are benefited by the Cloud Computing technology
service in its different strategies.
The report was initially developed with a population of 76 SMEs,
however, only 43 SMEs from the city under study were involved, due to the
fact that not all SMEs were still active, some maintain certain data disclosure
restriction policies, among other reasons. These SMEs contained a range of
existence in the market, going from 5 years to 21 years.
Current Status of the Use of Cloud Computing in SMEs in the ... 387
RESULTS
The NVivo software was applied for the findings, which allowed analyzing
qualitative data in relation to most used clouds in SMEs. As for the
qualitative analysis, data was processed in the SPSS software (Statistical
Package for the Social Sciences), for the obtaining of descriptive results and
the realization of hierarchical conglomerates.
Main results
Table 3 shows the sectors of the SMEs under study versus the range of
years to which they belong expressed in percentages.
As shown in the table above, most of the companies corresponding to
32.6% are in a range of between 6 and 10 years in the market, most of them
dedicated to commercial activities. It is also observed that 27.9% are have 5
years and that most of them carry out agricultural activities.
The main Internet uses of the 43 companies surveyed show that: a)
81.4% use the Internet for activities such as social networks; while b) 65.1%
use it for communication through e-mail, since the respondents stated that it
is an effective means of communication inside and outside the company, in
addition to being an economic and ecological mean, which saves resources;
and c) 44% respond to the payment of basic services.
In addition, in terms of the departments that make the most use of
computer programs for the execution of their tasks there are management,
accounting, information technologies and human talent, which have more
access to the tool for the execution of their tasks with 97.7%, 81.4%, 65.1%
and 53.5% respectively. Departments such as purchasing, marketing,
finance, risk management and others, do not operate through this resource.
In relation to security, the results show that 69.8% claim to use user ID and
password to access their computer; 65.1% say they make backup copies of
their digital documents in flash memory and compact discs; and 51.2% of
SMEs maintain security policies; while an average of 38.1% affirm that they
do not use any of these three means of security. These results reflect the use
of ICT within SMEs; but not the benefits of including Cloud Computing.
With respect to ICT staff training, 23.3% state that they receive training
at least twice a year, however, a high percentage, 76.7%, indicate that they
have no training in this regard, which is obvious lack of foray into specific
issues such as services and use of Cloud Computing. On the other hand,
388 Security of Cloud-based systems
Hierarchical clusters
The results of the exploratory analysis by classification of hierarchical
clusters are shown in the following table of clusters of belonging:
CONCLUSIONS
Once the main results have been presented relative to the analysis variables
that define the usability of Cloud Computing in SMEs of the city of
Latacunga, and by way of conclusion, it is determined that:According to the
bibliography found, SMEs play an important social role, both as a generator
of employment and as a significant sector in national and international
economies. In this context, the development of emerging technologies
means that companies choose to acquire new technological services as
a competitive advantage over their peers, which allows SMEs to reach a
market segment in digital environments.
In this framework, the investigation of the current state of use of Cloud
Computing in the SMEs of the city under study allowed to identify the factors
that would promote or affect the hiring of this type of service. Among the
disadvantages that stand out is security of the information. On the other hand,
its main advantages are: cost savings in servers and permanent advice. The
result of the diagnosis made is that young companies in the market choose this
resource being the PaaS model the most used because they develop their own
computerized systems, 65.1% admit having heard about the subject, 28.5%
adopt this service in office automation applications, document repositories and
in minimum amount contract SaaS, especially in the billing area. Companies
that exceed 10 years remain indifferent to adopting this service.
NOTES
1
Nacional de Estadísticas y Censos.
2
Servicio de Rentas Internas.
3
Seguridad Social.
4
Incipiente adopción de Cloud.
5
Comunidad Andina de las Naciones Unidas.
6
Clasificación Industrial Internacional Uniforme.
7
Ministerio de Telecomunicaciones y de la Sociedad de Información.
8
Red Nacional de Infocentros.
9
Plan Nacional del Buen Vivir.
10
Consejo Nacional de Planificación.
11
Nacional de Estándares y Tecnología.
12
Libro Blanco de Territorios Digitales en Ecuador.
Current Status of the Use of Cloud Computing in SMEs in the ... 393
REFERENCES
1. Solano-Gallegos, S. (2018) The Importance of Small and Medium
Enterprises in the City of Cuenca-Ecuador and Their Contribution to
the Creation of Employment. Academy of Accounting and Financial
Studies Journal, 22, 1-17.
2. Coutinho, M.C. (2009) Ethics and Corporate Social Responsibility in
Latin American Small and Medium Sized Enterprises: Challenging
Development. African Journal of Business Ethics, 4, 37-47.
3. Wisuttisak, P. (2017) Law for SMEs Promotion and Protection in
Vietnam and Thailand. Review of Integrative Business and Economics
Research, 6, 60-67.
4. Odlin, D. (2019) Domestic Competitor Influence on Internationalizing
SMEs as an Industry Evolves. Journal of World Business, 54, 119-136.
5. Assis, M.R.M. and Bittencourt, L.F. (2016) A Survey on Cloud
Federation Architectures: Identifying Functional and Non-Functional
Properties. Journal of Network and Computer Applications, 72, 51-71.
https://doi.org/10.1016/j.jnca.2016.06.014
6. Ramachandra, G., Iftikhar, M. and Khan, F.A. (2017) A Comprehensive
Survey on Security in Cloud Computing. Procedia Computer Science,
110, 465-472. https://doi.org/10.1016/j.procs.2017.06.124
7. Ravi, K., Khandelwal, Y., Krishna, B.S. and Ravi, V. (2018) Analytics
in/for Cloud—An Interdependence: A Review. Journal of Network
and Computer Applications, 102, 17-37. https://doi.org/10.1016/j.
jnca.2017.11.006
8. Vafamehr, A. and Khodayar, M.E. (2018) Energy-Aware Cloud
Computing. Electricity Journal, 31, 40-49. https://doi.org/10.1016/j.
tej.2018.01.009
9. Ratten, V. (2015) Continuance Use Intention of Cloud Computing
: Innovativeness and Creativity Perspectives. Journal of Business
Research, 69, 1737-1740.
10. Bernal-Barcia, E.C. (2017) An Approach of the New Technology in the
Different Sectors of Society. 3, 3-12.
11. Trun, P. (2019) Infrastructures for High-Performance Computing:
Cloud Computing. Encyclopedia of Bioinformatics and Computational
Biology, 1, 236-239.
12. Suárez, D. (2017) Flexibilidad Escalabilidad Almacenamiento. 26-43.
394 Security of Cloud-based systems
2017-0013
44. Noor, T.H., Zeadally, S., Alfazi, A. and Sheng, Q.Z. (2018) Mobile
Cloud Computing: Challenges and Future Research Directions.
Journal of Network and Computer Applications, 115, 70-85. https://
doi.org/10.1016/j.jnca.2018.04.018
45. Tan, C.B., Hijazi, M.H.A., Lim, Y. and Gani, A. (2018) A Survey on
Proof of Retrievability for Cloud Data Integrity and Availability: Cloud
Storage State-of-the-Art, Issues, Solutions and Future Trends. Journal
of Network and Computer Applications, 110, 75-86.
46. Jafarnejad Ghomi, E., Masoud Rahmani, A. and Nasih Qader, N.
(2017) Load-Balancing Algorithms in Cloud Computing: A Survey.
Journal of Network and Computer Applications, 88, 50-71. https://doi.
org/10.1016/j.jnca.2017.04.007
47. Vasiljeva, T., Shaikhulina, S. and Kreslins, K. (2017) Cloud Computing:
Business Perspectives, Benefits and Challenges for Small and Medium
Enterprises (Case of Latvia). Procedia Engineering, 178, 443-451.
https://doi.org/10.1016/j.proeng.2017.01.087
48. Galdino-Evangelista, W. and Souza-Neto, J. (2016) Modelo de
avaliação da capacidade das organizações da administração pública
federal para a adoção de software as a service (SaaS) público. Revista
Do Serviço Público, 67, 173-202.
49. Iglesias, A. (2017) El “cloud” en españa se hace mayor de edad.
50. Lazo Villela, S. (2012) Factores relevantes que inciden en la adopción
de la Computación en Nube en las Universidades de Puerto Rico, 129.
51. Henao-Diaz, L.F., Pacheco-Fernández, N.M., Argüello-Bernal, S.,
Moreno-Arocha, M.M. and Stevenson, P.R. (2012) Patrones De
Diversidad De Epífitas En Bosques De Tierras Bajas Y Subandinos.
Colombia Forestal, 15, 161-172. http://revistas.udistrital.edu.co/ojs/
index.php/colfor/article/view/3758/5617 https://doi.org/10.14483/
udistrital.jour.colomb.for.2012.2.a02
52. MINTEL (2018) Libro blanco de la Sociedad de la Información y del
Conocimiento. Telecomunicaciones. Gob. Ec, 1, 1-155.
53. Kestin, I. (2018) Statistics in Clinical Trials and Audit. Anaesthesia
and Intensive Care Medicine, 19, 144-148. https://doi.org/10.1016/j.
mpaic.2017.12.004
54. Leppink, J. (2017) Helping Medical Students in their Study of Statistics:
A Flexible Approach. Journal of Taibah University Medical Sciences,
398 Security of Cloud-based systems
W
Web Application 245
Web-based content management
285
Web response time (WRT) 76