1. Data Security in Cloud Environment
Shivam Singh
Department of Computer Science and Engineering
Sardar Patel University of Police, Security and Criminal Justice, Jodhpur
Dissertation Presentation I
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 1 / 15
2. Table of Contents
1 What is Cloud?
2 Cloud Computing Models
Service Models
Development Models
3 Attacks on Cloud
4 Cloud Security Controls
5 Security Models in Cloud
Data Integrity
Data Privacy
Data Confidentiality
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 2 / 15
3. What is Cloud?
A cloud refers to a distinct IT environment that is designed for the
purpose of remotely provisioning scalable and measured IT resources
(servers, services, storage devices, network devices, software, etc.).
The cloud computing is a big deal for below reasons:
It does not need any effort on users part to maintain or manage it.
It is effectively infinite in storage size, so user do not need to worry
about it running out of capacity.
User can access cloud-based applications and services from anywhere,
only need is a device with an internet connection.
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 3 / 15
4. Cloud Computing Models
Service Models
Infrastructure as a Service (IaaS)
IaaS are self-service models for accessing, monitoring, and managing
remote datacenter infrastructures. It provides access to computing
resource in a virtual environment.
Platform as a Service (PaaS)
PaaS provides a platform and environment to allow developers to
build applications and services over the internet.
Software as a Service (SaaS)
SaaS describes any cloud service where consumers are able to access
software applications over the internet. The applications are hosted in
cloud and can be used for a wide range of tasks for both individuals
and organisations.
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 4 / 15
5. Cloud Computing Models
Development Models
Public Cloud
It allows systems and services to be easily accessible to the general
public.
Private Cloud
It allows systems and services to be easily accessible within an
organization.
Community Cloud
It allows systems and services to be easily accessible by the group of
organization.
Hybrid Cloud
It is a mixture of Public and Private Cloud.
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 5 / 15
6. Attacks on Cloud
Cloud services pose an attractive target to cyber attacks and criminal
activities as these services have information from many organizations and
individuals stored in their repositories.
Most common attacks on cloud are:
Denial of service
Malicious insider attacks
Cross virtual machine side channel attacks
Corrective controls
Phishing attacks
Attacks targeting shared memory
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 6 / 15
7. Cloud Security Controls
Cloud security control is a set of controls that enables cloud architecture
to provide protection against any vulnerability and mitigate or reduce the
effect of a malicious attack.
The different types of cloud security controls will fall under any one of the
following category:
Deterrent controls
Preventive controls
Detective controls
Corrective controls
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 7 / 15
8. Cloud Security Controls Conti..
Deterrent controls
A deterrent control is anything intended to warn a would-be attacker
that they should not attack.
Preventive controls
The system strength can be given by the preventive controls to
eliminating the vulnerabilities.
Detective controls
The detective controls are to detect and react on the incidents in
order to solve the issue.
Corrective controls
By limiting the damage this Corrective controls reduce the
consequences of any incident.
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 8 / 15
9. Security Models in Cloud
Data Integrity
Data integrity protects the data from modification, fabrication or from
deletion. Through database constraints and transactions, data integrity is
done by the database management system which is maintained in the
standalone systems.
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 9 / 15
10. Security Models in Cloud
Data Privacy
The ability of an individual or a group of persons to seclude the
information about themselves and reveal them in a selectively.
Service Abuse
Averting Attack
Identity Management
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 10 / 15
11. Security Models in Cloud
Data Privacy Conti..
Service Abuse
It means that attacker may abuse cloud service and aquire the extra
data available or destroy the interest of other users.
Averting Attack
Cloud system should be efficient of avoiding attacks like Denial of
Service (DoS) attacks.
Identity Management
It is to prevent data leakage and privacy loss in the cloud.
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 11 / 15
12. Security Models in Cloud
Data Confidentiality
In cloud, for the users to store the confidential data, data confidentiality is
very essential. It can be ensured that data confidentiality and data
authentication strategies are used as following:
Homomorphic Encryption
Encrypted Search and Database
Distributive Storage
Data Concealment
Deletion Confirmation
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 12 / 15
13. Security Models in Cloud
Data Confidentiality Conti..
Homomorphic Encryption
It is the conversion of ciphertext which can be analyzed and worked
with that which are in original form.
Encrypted Search and Database
In this the number of keys as well as the computation techniques are
increased.
Distributive Storage
It is the model which shares the components of the software to
improve the efficiency.
Data Concealment
It is used to keep the data confidentiality in the cloud.
Deletion Confirmation
It means that the data can not be recovered after the deletion
confirmation by the user.
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 13 / 15
14. Direction of Work
Study the current algorithms on data security and implement them.
Analysis to improve the existing algorithms.
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 14 / 15
15. Reference
Dr. K.B.Priya Iyer, Manisha R, Subhashree R,Vedhavalli K
ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING.
International Conference on Advances in Electrical, Electronics,
Information, Communication and Bio-Informatics (AEEICB16),2016
Yunchuan Sun, Junsheng Zhang, Yongping Xiong and Guangyu Zhu
Data Security and Privacy in Cloud Computing
International Journal of Distributed Sensor Networks Volume,2014
Md Tanzim Khorshed, A. B. M. Ali, and Saleh A. Wasimi
A survey on gaps, threat remediation challenges and some thoughts
for proactive attack detection in cloud computing.
Future Generation Computer Systems,2012
Shivam Singh (SPUP, Jodhpur) Data Security in Cloud Environment 28 Sept. 2016 15 / 15