13.07.2015 Views

Survey on Privacy and Data Security Issues in Cloud Computing

Survey on Privacy and Data Security Issues in Cloud Computing

Survey on Privacy and Data Security Issues in Cloud Computing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Internati<strong>on</strong>al Journal of Eng<strong>in</strong>eer<strong>in</strong>g <strong>and</strong> Advanced Technology (IJEAT)ISSN: 2249 – 8958, Volume-2, Issue-5, June 2013trusted user. It’s quite possible to imitate a trusted user <strong>and</strong>corrupt entire data without even be<strong>in</strong>g noticed. Thus, it isnecessary to <strong>in</strong>stall higher level of security checks tom<strong>in</strong>imize these risks.Denial of Service Attacks: DoS attempts to make theservices assigned to the authorized users not able to be usedby them. In such an attack, the service becomes unavailableto the authorized user because the server provid<strong>in</strong>g theservice is flooded by a large number of requests lead<strong>in</strong>g tothe denial of service. Sometimes, we are unable to accessthe site <strong>and</strong> observe an error due to overload<strong>in</strong>g of theserver with the requests to access the site. This happenswhen the server exceeds its capacity to h<strong>and</strong>le the numberof requests[11]. The occurrence of a DoS attack <strong>in</strong>creasesb<strong>and</strong>width c<strong>on</strong>sumpti<strong>on</strong> <strong>in</strong> additi<strong>on</strong> caus<strong>in</strong>g c<strong>on</strong>gesti<strong>on</strong> <strong>and</strong>mak<strong>in</strong>g certa<strong>in</strong> parts of the clouds <strong>in</strong>accessible to the users.Us<strong>in</strong>g an Intrusi<strong>on</strong> Detecti<strong>on</strong> System (IDS) is the mostpopular method of defense aga<strong>in</strong>st this type of attacks.Cookie Positi<strong>on</strong><strong>in</strong>g: It <strong>in</strong>volves modify<strong>in</strong>g or chang<strong>in</strong>g thec<strong>on</strong>tents of cookie to make unauthorized access to awebpage or to an applicati<strong>on</strong>. Cookies mostly c<strong>on</strong>ta<strong>in</strong> theuser’s identity related credentials. Once these cookies areavailable, the c<strong>on</strong>tent of these cookies can be forged toimitate an authorized user. This can be avoided either byimplement<strong>in</strong>g an encrypti<strong>on</strong> scheme for the cookie data orby perform<strong>in</strong>g regular cookie cleanup.Hidden field manipulati<strong>on</strong>: While access<strong>in</strong>g a web-page,there are some fields that are hidden <strong>and</strong> c<strong>on</strong>ta<strong>in</strong> the pagerelated <strong>in</strong>formati<strong>on</strong> which are basically used by developers.These fields are highly pr<strong>on</strong>e to a hacker attack as they canbe changed easily <strong>and</strong> posted <strong>on</strong> the web-page. This results<strong>in</strong> severe security violati<strong>on</strong>s.Google Hack<strong>in</strong>g: Google is the best opti<strong>on</strong> for f<strong>in</strong>d<strong>in</strong>gdetails regard<strong>in</strong>g anyth<strong>in</strong>g <strong>on</strong> the net. Google hack<strong>in</strong>gmeans us<strong>in</strong>g Google search eng<strong>in</strong>e to trace sensitive<strong>in</strong>formati<strong>on</strong> that a hacker can use to his benefit whilehack<strong>in</strong>g a user’s account. Usually, hackers try to hit up<strong>on</strong>the security loopholes by prob<strong>in</strong>g out <strong>on</strong> Google about thesystem they wish to hack <strong>and</strong> then after hav<strong>in</strong>g collected theessential <strong>in</strong>formati<strong>on</strong>, the hacker carry out the hack<strong>in</strong>g ofthe c<strong>on</strong>cerned system. Sometimes, a hacker is not sure ofthe target. As an alternative, he tries to Google out thetarget based <strong>on</strong> the loophole he wishes to hack a systemup<strong>on</strong>. The hacker then searches for all the possible systemswith such a loophole <strong>and</strong> f<strong>in</strong>ds out those hav<strong>in</strong>g theloopholes he wishes to hack up<strong>on</strong>. These had been some ofthe security threats that can be launched at the applicati<strong>on</strong>level <strong>and</strong> cause a system downtime disabl<strong>in</strong>g the applicati<strong>on</strong>access even to the authorized users.[7]V. ENSURING SECURE CLOUD STORAGEIn order to secure the cloud aga<strong>in</strong>st the various securitythreats <strong>and</strong> attacks like: SQL <strong>in</strong>jecti<strong>on</strong>, Cross Site Script<strong>in</strong>g(XSS) attacks, DoS attacks, Google Hack<strong>in</strong>g <strong>and</strong> ForcedHack<strong>in</strong>g, the cloud service providers take up differenttechniques. Some st<strong>and</strong>ard techniques so as to detect theabove menti<strong>on</strong>ed attacks are as: avoid the usage ofdynamically generated SQL <strong>in</strong> the code, validat<strong>in</strong>g all userentered parameters, f<strong>in</strong>d<strong>in</strong>g the meta-structures used <strong>in</strong> thecode, removal <strong>and</strong> disallow<strong>in</strong>g unwanted data <strong>and</strong>characters, etc. For an optimized cost performance ratio, ageneral security framework needs to be worked out. Thema<strong>in</strong> criteri<strong>on</strong> to be fulfilled by the generic securityframework is to <strong>in</strong>terface with any type of cloudenvir<strong>on</strong>ment, <strong>and</strong> to be able to detect <strong>and</strong> h<strong>and</strong>lecustomized as well as predef<strong>in</strong>ed security policies.[3]<strong>Security</strong> Scheme<strong>Data</strong> Storagesecurity[12]User identitysafety <strong>in</strong> cloudcomput<strong>in</strong>gTrust model for<strong>in</strong>teroperability<strong>and</strong> security <strong>in</strong>cross cloud [2]Virtualizeddefence <strong>and</strong>reputati<strong>on</strong> basedtrustmanagementSuggestedApproachUseshomomorphictoken withdistributedverificati<strong>on</strong> oferasure-codeddata towardsensur<strong>in</strong>g datastoragesecurity <strong>and</strong>locat<strong>in</strong>g theserver be<strong>in</strong>gattacked.Uses activebundlesscheme,wherebypredicates arecompared overencrypted data<strong>and</strong> multipartycomput<strong>in</strong>g.1. Separatedoma<strong>in</strong>s forproviders <strong>and</strong>users, eachwith a specialtrust agent.2. Differenttrust strategiesfor serviceproviders <strong>and</strong>customers.3. Time <strong>and</strong>transacti<strong>on</strong>factors aretaken <strong>in</strong>toaccount fortrustassignment.1. Uses ahierarchy ofDHT-basedoverlaynetworks, withspecific tasksto beperformed byeach layer.2. Lowestlayer dealswith reputati<strong>on</strong>aggregati<strong>on</strong><strong>and</strong> prob<strong>in</strong>gcolluders. Thehighest layerdeals withvariousattacks.Strengths1. Supportsdynamicoperati<strong>on</strong>s <strong>on</strong>data blockssuch as:update, delete<strong>and</strong> appendwithout datacorrupti<strong>on</strong> <strong>and</strong>loss.2. Efficientaga<strong>in</strong>st datamodificati<strong>on</strong><strong>and</strong> servercollud<strong>in</strong>gattacks as wellas aga<strong>in</strong>stbyzant<strong>in</strong>efailures.Does not needtrusted thirdparty (TTP)for theverificati<strong>on</strong> orapproval ofuser identity.Thus theuser’s identityis notdisclosed. TheTTP rema<strong>in</strong>sfree <strong>and</strong> couldbe used forother purposessuch asdecrypti<strong>on</strong>.1. Helps thecustomers toavoidmalicioussuppliers.2. Helps theproviders toavoidcooperat<strong>in</strong>g/serv<strong>in</strong>gmalicioususers.Extensive useofvirtualizati<strong>on</strong>for secur<strong>in</strong>gcloudsLimitati<strong>on</strong>sThe security <strong>in</strong>case ofdynamic datastorage hasbeenc<strong>on</strong>sidered.However, theissues with f<strong>in</strong>egra<strong>in</strong>ed dataerror locati<strong>on</strong>rema<strong>in</strong> to beaddressed.Active bundlemay not beexecuted at allat the host ofthe requestedservice. Itwould leavethe systemvulnerable. Theidentityrema<strong>in</strong>s asecret <strong>and</strong> theuser is notgrantedpermissi<strong>on</strong> tohis requests.<strong>Security</strong> <strong>in</strong> avery large scalecross cloudenvir<strong>on</strong>ment.This scheme isable to h<strong>and</strong>le<strong>on</strong>ly a limitednumber ofsecurity threats<strong>in</strong> a fairly smallenvir<strong>on</strong>ment.The proposedmodel is <strong>in</strong> itsearlydevelopmentalstage <strong>and</strong> needsfurthersimulati<strong>on</strong>s toverify theperformance.133

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!