SlideShare a Scribd company logo
SECURITY THREATS
ON CLOUD
COMPUTING
VULNERABILITIES
REZA PAHLAVA
STMIK RAHARJA
What is Cloud Computing?
 Cloud computing involves delivering computing resources
(hardware and software) as a service over a network (typically the
Internet) by cloud computing service providers.
• A good understanding of cloud security threats is necessary in
order to provide more secure services to cloud users.
CLOUD SERVICE MODELS
Cloud computing includes three layers:
• System layer: known as Infrastructure-as-a-Service (IaaS)
• Platform layer: known as Platform-as-a-Service (PaaS)
• Application layer: known as Software-as-a-Service (SaaS)
Layers of Cloud Computing
SalesForce CRM
LotusLive
TAXONOMY OF CLOUD SECURITY THREATS
• SaaS, PaaS, and IaaS also disclose information security issues and
risks of cloud computing systems.
• Hackers might abuse the forceful computing capability provided
by clouds.
• Data loss is an important security risk of cloud models.
• Traditional network attack strategies can be applied to harass
three layers of cloud systems.
Abuse Use of Cloud Computational
Resources
• Previously, hackers used multiple computers or a botnet to produce
a great amount of computing power in order to conduct cyber-
attacks.
• Now, powerful computing infrastructure could be easily created
using a simple registration process in a cloud computing service
provider.
• Brute force attack
• Denial of Service attack
BRUTE FORCE ATTACK: THOMAS
ROTH, A GERMAN RESEARCHER,
MANAGED TO CRACK A WPA-PSK
PROTECTED NETWORK BY RENTING A
SERVER FROM AMAZON’S EC2. IN
APPROXIMATELY 20 MINUTES, FIRED
400,000 PASSWORDS/SEC INTO THE
SYSTEM AND THE COST WAS ONLY 28
CENTS/MINUTE.
DOS: BRYAN AND ANDERSON,
LAUNCHED CLOUD-BASED DOS
ATTACKS TO ONE OF THEIR CLIENTS
IN ORDER TO TEST ITS
CONNECTIVITY WITH THE HELP OF
AMAZON’S EC2; SPENT $6 TO RENT
VIRTUAL SERVERS, USED A
HOMEMADE PROGRAM TO
SUCCESSFULLY FLOOD THEIR
CLIENT'S SERVER AND MADE IT
UNAVAILABLE.
Data Breaches
Malicious Insider:
• insiders who exploit cloud vulnerabilities gaining unauthorized
access to confidential data or carry out attacks against its own
employer’s IT infrastructure
Online Cyber Theft:
• sensitive data stored on clouds have become an attractive target to
online cyber theft.
• Incidents such as Zappos, LinkedIn, Sony Playstation
Cloud Security Attacks
• Malware Injection Attacks:
• hackers exploit vulnerabilities of a web application and embed
malicious codes into it changing the course of its normal
execution. The two common forms are SQL injection attack
and cross-site scripting attack.
• Wrapping Attack:
• use XML signature wrapping (or XML rewriting) to exploit a
weakness when web servers validate signed requests. An
attacker is able to change the content of the signed part
without invalidating the signature.
MALWARE INJECTION ATTACKS: HACKERS EXPLOIT VULNERABILITIES
OF A WEB APPLICATION AND EMBED MALICIOUS CODES INTO IT
CHANGING THE COURSE OF ITS NORMAL EXECUTION. THE TWO
COMMON FORMS ARE SQL INJECTION ATTACK AND CROSS-SITE
SCRIPTING ATTACK.
COUNTERMEASURES
• Security Policy Enhancement: avoid weak registration systems,
credit card fraud monitoring, and block of public black lists could
be applied.
• Access Management: continuous monitoring of physical
computing systems, restricting traffic access to the data using
firewalls and intrusion detection systems, and controlling access to
cloud applications and data using SAML and XACML.
• Data Protection: data loss prevention systems, anomalous
behavior pattern detection tools, format preserving and encryption
tools, user behavior profiling, decoy technology, and authentication
and authorization.
• Security Techniques Implementation: for malware injection
use FAT system; also store a hash value on the original service
instance’s image file and perform integrity check. For XML signature
wrapping attacks, use XML Schema Hardening techniques i.e. a
subset of XPath, called FastXPath.
CONCLUSIONS AND FUTURE WORK
• Cloud Computing is in continual development, while people enjoy
the benefits cloud computing brings, security in clouds is a key
challenge.
• Much vulnerability in clouds still exists and hackers continue to
exploit these security holes.
• this paper has examined the security vulnerabilities in clouds from
three perspectives), included related real world exploits, and
introduced countermeasures to those security breaches.
• In the future, further efforts in studying cloud security risks and the
countermeasures to cloud security breaches must continue.

More Related Content

What's hot (20)

PPTX
Cloud security
Niharika Varshney
 
PPT
Cloud computing security
Akhila Param
 
PPTX
Network security
Nandini Raj
 
PPTX
Firewall and Types of firewall
Coder Tech
 
PPTX
Cloud computing and Cloud security fundamentals
Viresh Suri
 
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
PPTX
Cloud Computing PPT.pptx
HetKhandol
 
PPTX
Fog computing
Pachipulusu Giridhar
 
PPTX
IoT Security
Peter Waher
 
PPTX
Data security in cloud computing
Prince Chandu
 
PPT
Issues in cloud computing
ronak patel
 
PPTX
An introduction to Cyber Essentials
Jisc
 
PPTX
Network security
Simranpreet Singh
 
PPTX
Cybersecurity
A. Shamel
 
DOC
Cloud security
Mohamed Shalash
 
PPTX
Introduction to Network Security
John Ely Masculino
 
PPTX
Balbix-New-CISO-Board-Deck.pptx
jjvdneut
 
PPT
Cloud Security
Rashmi Agale
 
PDF
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
PDF
Network Security Presentation
Allan Pratt MBA
 
Cloud security
Niharika Varshney
 
Cloud computing security
Akhila Param
 
Network security
Nandini Raj
 
Firewall and Types of firewall
Coder Tech
 
Cloud computing and Cloud security fundamentals
Viresh Suri
 
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cloud Computing PPT.pptx
HetKhandol
 
Fog computing
Pachipulusu Giridhar
 
IoT Security
Peter Waher
 
Data security in cloud computing
Prince Chandu
 
Issues in cloud computing
ronak patel
 
An introduction to Cyber Essentials
Jisc
 
Network security
Simranpreet Singh
 
Cybersecurity
A. Shamel
 
Cloud security
Mohamed Shalash
 
Introduction to Network Security
John Ely Masculino
 
Balbix-New-CISO-Board-Deck.pptx
jjvdneut
 
Cloud Security
Rashmi Agale
 
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
Network Security Presentation
Allan Pratt MBA
 

Viewers also liked (12)

PDF
Malware detection in cloud computing infrastructures
ieeepondy
 
PPTX
Seban ppt
Kevin ITian
 
PPT
Cloud Computing using virtulization
AJIT NEGI
 
PPTX
Web Browsers
Adolfo Vasconez
 
PPTX
Seminar
Kevin ITian
 
PPT
Ethical hacking
Manas Das
 
PPTX
Cloud computing in medical field
Barani Tharan
 
PPTX
What is VoIP and How it works?
broadconnect
 
PPTX
Voice over internet protocol (VoIP)
Namra Afzal
 
PPTX
Voip powerpoint
GW1992
 
PPT
VOICE OVER INTERNET PROTOCOL
Rajan Kumar
 
PPT
Voice Over IP (VoIP)
habib_786
 
Malware detection in cloud computing infrastructures
ieeepondy
 
Seban ppt
Kevin ITian
 
Cloud Computing using virtulization
AJIT NEGI
 
Web Browsers
Adolfo Vasconez
 
Seminar
Kevin ITian
 
Ethical hacking
Manas Das
 
Cloud computing in medical field
Barani Tharan
 
What is VoIP and How it works?
broadconnect
 
Voice over internet protocol (VoIP)
Namra Afzal
 
Voip powerpoint
GW1992
 
VOICE OVER INTERNET PROTOCOL
Rajan Kumar
 
Voice Over IP (VoIP)
habib_786
 
Ad

Similar to Security on Cloud Computing (20)

PPT
Cloud Security and their classifications
KENNEDYDONATO1
 
PPT
Unit 4 -Cloud Computing and security
MonishaNehkal
 
PPTX
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Shivananda Rai
 
PDF
Cloud Security - Emerging Facets and Frontiers
Gokul Alex
 
PPTX
UIT1701-U04S01-CloudSecurityMechanisms.pptx
Manonmani40
 
PDF
Abuse_in_the_Cloud_Palani_Ashwin
Ashwin Palani
 
PPT
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
PDF
Cloud Computing Security
Arunvignesh Venkatesh
 
PDF
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
PPTX
A general security rule is that if an individual can physically touch a devic...
Chandravathi Dittakavi
 
PPTX
cloud computing security in intenet.pptx
moromoro8
 
PPTX
INFORMATION SECURITY PPT.pptx ON CYBER SECURITY
mee23nu
 
PPT
Cloud Security_Module2.ppt
ArunKumbi1
 
PPTX
The Top Cloud Security Issues
HTS Hosting
 
PPT
Cloud Computing Security Challenges
Yateesh Yadav
 
PPTX
Cloud Security in cloud computing 1.pptx
RahulBhole12
 
PDF
CLOUD & ETHICAL HACKING INTRODUCTION PDF
ArunIsaac5
 
PPTX
Introduction to Cloud Security.pptx
ssuser0fc2211
 
PPTX
Lecture Cloud Security.pptx
ShimoFcis
 
PPT
12-cloud-security.ppt
chelsi33
 
Cloud Security and their classifications
KENNEDYDONATO1
 
Unit 4 -Cloud Computing and security
MonishaNehkal
 
Cloud computing-security-from-single-to-multiple-140211071429-phpapp01
Shivananda Rai
 
Cloud Security - Emerging Facets and Frontiers
Gokul Alex
 
UIT1701-U04S01-CloudSecurityMechanisms.pptx
Manonmani40
 
Abuse_in_the_Cloud_Palani_Ashwin
Ashwin Palani
 
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
Cloud Computing Security
Arunvignesh Venkatesh
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
A general security rule is that if an individual can physically touch a devic...
Chandravathi Dittakavi
 
cloud computing security in intenet.pptx
moromoro8
 
INFORMATION SECURITY PPT.pptx ON CYBER SECURITY
mee23nu
 
Cloud Security_Module2.ppt
ArunKumbi1
 
The Top Cloud Security Issues
HTS Hosting
 
Cloud Computing Security Challenges
Yateesh Yadav
 
Cloud Security in cloud computing 1.pptx
RahulBhole12
 
CLOUD & ETHICAL HACKING INTRODUCTION PDF
ArunIsaac5
 
Introduction to Cloud Security.pptx
ssuser0fc2211
 
Lecture Cloud Security.pptx
ShimoFcis
 
12-cloud-security.ppt
chelsi33
 
Ad

Recently uploaded (20)

PDF
How to Fix Error Code 16 in Adobe Photoshop A Step-by-Step Guide.pdf
Becky Lean
 
PPTX
02 IoT Industry Applications and Solutions (1).pptx
abuizzaam
 
PPTX
本科硕士学历佛罗里达大学毕业证(UF毕业证书)24小时在线办理
Taqyea
 
PDF
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
APNIC
 
PDF
DORA - MobileOps & MORA - DORA for Mobile Applications
Willy ROUVRE
 
PDF
Slides PDF: ZPE - QFS Eco Economic Epochs pdf
Steven McGee
 
PPTX
ipv6 very very very very vvoverview.pptx
eyala75
 
PPTX
Internet_of_Things_Presentation_KaifRahaman.pptx
kaifrahaman27593
 
PDF
Web Hosting for Shopify WooCommerce etc.
Harry_Phoneix Harry_Phoneix
 
PDF
Pas45789-Energs-Efficient-Craigg1ing.pdf
lafinedelcinghiale
 
PPTX
1.10-Ruta=1st Term------------------------------1st.pptx
zk7304860098
 
PPTX
ZARA-Case.pptx djdkkdjnddkdoodkdxjidjdnhdjjdjx
RonnelPineda2
 
PPTX
西班牙武康大学毕业证书{UCAMOfferUCAM成绩单水印}原版制作
Taqyea
 
PDF
123546568reb2024-Linux-remote-logging.pdf
lafinedelcinghiale
 
PDF
Digital Security in 2025 with Adut Angelina
The ClarityDesk
 
PDF
Internet Governance and its role in Global economy presentation By Shreedeep ...
Shreedeep Rayamajhi
 
PDF
The Power and Impact of Promotion most useful
RajaBilal42
 
PPTX
Simplifying and CounFounding in egime.pptx
Ryanto10
 
PDF
Technical Guide to Build a Successful Shopify Marketplace from Scratch.pdf
CartCoders
 
PPTX
Random Presentation By Fuhran Khalil uio
maniieiish
 
How to Fix Error Code 16 in Adobe Photoshop A Step-by-Step Guide.pdf
Becky Lean
 
02 IoT Industry Applications and Solutions (1).pptx
abuizzaam
 
本科硕士学历佛罗里达大学毕业证(UF毕业证书)24小时在线办理
Taqyea
 
APNIC's Role in the Pacific Islands, presented at Pacific IGF 2205
APNIC
 
DORA - MobileOps & MORA - DORA for Mobile Applications
Willy ROUVRE
 
Slides PDF: ZPE - QFS Eco Economic Epochs pdf
Steven McGee
 
ipv6 very very very very vvoverview.pptx
eyala75
 
Internet_of_Things_Presentation_KaifRahaman.pptx
kaifrahaman27593
 
Web Hosting for Shopify WooCommerce etc.
Harry_Phoneix Harry_Phoneix
 
Pas45789-Energs-Efficient-Craigg1ing.pdf
lafinedelcinghiale
 
1.10-Ruta=1st Term------------------------------1st.pptx
zk7304860098
 
ZARA-Case.pptx djdkkdjnddkdoodkdxjidjdnhdjjdjx
RonnelPineda2
 
西班牙武康大学毕业证书{UCAMOfferUCAM成绩单水印}原版制作
Taqyea
 
123546568reb2024-Linux-remote-logging.pdf
lafinedelcinghiale
 
Digital Security in 2025 with Adut Angelina
The ClarityDesk
 
Internet Governance and its role in Global economy presentation By Shreedeep ...
Shreedeep Rayamajhi
 
The Power and Impact of Promotion most useful
RajaBilal42
 
Simplifying and CounFounding in egime.pptx
Ryanto10
 
Technical Guide to Build a Successful Shopify Marketplace from Scratch.pdf
CartCoders
 
Random Presentation By Fuhran Khalil uio
maniieiish
 

Security on Cloud Computing

  • 2. What is Cloud Computing?  Cloud computing involves delivering computing resources (hardware and software) as a service over a network (typically the Internet) by cloud computing service providers. • A good understanding of cloud security threats is necessary in order to provide more secure services to cloud users.
  • 3. CLOUD SERVICE MODELS Cloud computing includes three layers: • System layer: known as Infrastructure-as-a-Service (IaaS) • Platform layer: known as Platform-as-a-Service (PaaS) • Application layer: known as Software-as-a-Service (SaaS)
  • 4. Layers of Cloud Computing SalesForce CRM LotusLive
  • 5. TAXONOMY OF CLOUD SECURITY THREATS • SaaS, PaaS, and IaaS also disclose information security issues and risks of cloud computing systems. • Hackers might abuse the forceful computing capability provided by clouds. • Data loss is an important security risk of cloud models. • Traditional network attack strategies can be applied to harass three layers of cloud systems.
  • 6. Abuse Use of Cloud Computational Resources • Previously, hackers used multiple computers or a botnet to produce a great amount of computing power in order to conduct cyber- attacks. • Now, powerful computing infrastructure could be easily created using a simple registration process in a cloud computing service provider. • Brute force attack • Denial of Service attack
  • 7. BRUTE FORCE ATTACK: THOMAS ROTH, A GERMAN RESEARCHER, MANAGED TO CRACK A WPA-PSK PROTECTED NETWORK BY RENTING A SERVER FROM AMAZON’S EC2. IN APPROXIMATELY 20 MINUTES, FIRED 400,000 PASSWORDS/SEC INTO THE SYSTEM AND THE COST WAS ONLY 28 CENTS/MINUTE. DOS: BRYAN AND ANDERSON, LAUNCHED CLOUD-BASED DOS ATTACKS TO ONE OF THEIR CLIENTS IN ORDER TO TEST ITS CONNECTIVITY WITH THE HELP OF AMAZON’S EC2; SPENT $6 TO RENT VIRTUAL SERVERS, USED A HOMEMADE PROGRAM TO SUCCESSFULLY FLOOD THEIR CLIENT'S SERVER AND MADE IT UNAVAILABLE.
  • 8. Data Breaches Malicious Insider: • insiders who exploit cloud vulnerabilities gaining unauthorized access to confidential data or carry out attacks against its own employer’s IT infrastructure Online Cyber Theft: • sensitive data stored on clouds have become an attractive target to online cyber theft. • Incidents such as Zappos, LinkedIn, Sony Playstation
  • 9. Cloud Security Attacks • Malware Injection Attacks: • hackers exploit vulnerabilities of a web application and embed malicious codes into it changing the course of its normal execution. The two common forms are SQL injection attack and cross-site scripting attack. • Wrapping Attack: • use XML signature wrapping (or XML rewriting) to exploit a weakness when web servers validate signed requests. An attacker is able to change the content of the signed part without invalidating the signature.
  • 10. MALWARE INJECTION ATTACKS: HACKERS EXPLOIT VULNERABILITIES OF A WEB APPLICATION AND EMBED MALICIOUS CODES INTO IT CHANGING THE COURSE OF ITS NORMAL EXECUTION. THE TWO COMMON FORMS ARE SQL INJECTION ATTACK AND CROSS-SITE SCRIPTING ATTACK.
  • 11. COUNTERMEASURES • Security Policy Enhancement: avoid weak registration systems, credit card fraud monitoring, and block of public black lists could be applied. • Access Management: continuous monitoring of physical computing systems, restricting traffic access to the data using firewalls and intrusion detection systems, and controlling access to cloud applications and data using SAML and XACML. • Data Protection: data loss prevention systems, anomalous behavior pattern detection tools, format preserving and encryption tools, user behavior profiling, decoy technology, and authentication and authorization. • Security Techniques Implementation: for malware injection use FAT system; also store a hash value on the original service instance’s image file and perform integrity check. For XML signature wrapping attacks, use XML Schema Hardening techniques i.e. a subset of XPath, called FastXPath.
  • 12. CONCLUSIONS AND FUTURE WORK • Cloud Computing is in continual development, while people enjoy the benefits cloud computing brings, security in clouds is a key challenge. • Much vulnerability in clouds still exists and hackers continue to exploit these security holes. • this paper has examined the security vulnerabilities in clouds from three perspectives), included related real world exploits, and introduced countermeasures to those security breaches. • In the future, further efforts in studying cloud security risks and the countermeasures to cloud security breaches must continue.