These problems related to Privacy and Trust in Cloud Computing Environments. I w
ID: 3855125 • Letter: T
Question
These problems related to Privacy and Trust in Cloud Computing Environments.
I want you to write a good paragraph for each problem explain how this problem might happen. I list under each problem some issues that would happen.
The first problem:
- Loss of Control
Data Loss and Data Breach
Data Storage and Transmission under Multiple Regional Regulations
Cheap Data and Data Analysis
The second:
- Lack of Transparency
Willingness to disclose and share various security details (trade secrets)
Accessibility of data
Presentation and organization of data
Types of security controls
Negotiation is needed between the service providers and users
The 3rd:
- Virtualization
New Access Context
Attacks against Hypervisor
VM Hijacking
VM Hopping
VM Escape
VM Mobility
Dormant VMs.
Explanation / Answer
Loss of control
Loss of control in cloud computing occurs when the data is moved from the own local servers to the remote cloud servers which fades of the users control over the data.To overcome this loss,several data protection have been raised.
a)Data loss and data breach
The main problems in cloud are data loss and data breaches, To help customers recover in case of service failures, the cloud arranged the customers to get their data recreated in multiple data centers as backups.And also this may inturn raise the issue of data breaches.Firstly the attackers can get the data if any one of the storage devices is compromised. Secondly the failures of data synchronization will lead to data inconsistency.
b) Data Storage and Transmission under Multiple Regional Regulations
Due to the distributed infrastructure of the cloud,the users data may be stored on data centers geographically located in multiple legal jurisdictions,which leads to cloud users involve about the legal reach of local regulations on data stored out of region.And tthen, the local laws may be violated since the dynamic nature of the cloud makes it most difficult to designate a specific server or device to be used for transborder data transmission.
c) Cheap Data and Data Analysis
The rapid development of cloud computing has easily made the generation of big data leading to cheap data collections and analysis. Cloud users that store the data are getting better business revenue by retrieving user information through data mining and analysis or selling the data to other businesses for secondary usage. Such data usage has raised extensive privacy concerns since the sensitive information of cloud users may be easily accessed and analyzed by unauthorized parties.
Lack of Transparency
a)Willingness to disclose and share various security details
The wiilingness that is transparency of a cloud provider to reveal various details which include policies on security, privacy, service level.
b)Accessibility of data
when measuring transparency, it is important to note the accessiblility of the data and information security.
c)Presentation and organization of data
Even if the security facts of an organization are available and not presented in an organized and easily understandable manner for cloud users and auditors, the transparency of the organization will relatively low.
d)Types of security controls
The cloud service providers are always not ready to share this information,but cloud users and auditors need to know the types of security controls of cloud providers for their cloud infrastructure.
e)Negotiation is needed between the service providers and users
The service providers and users should negotiate on the information to be shared. Depending on the negotiation results,the users may decide not to use the services provided by the providers.Actually, many users choose not to use service providers because of the frustration associated with this negotiation process and the resulting lack of transparency. For cloud computing to be more widely used, this challenge of transparency is one of the biggest problem to be removed.
Virtualization
Virtualization is the logical abstraction of computing resources from physical constraints.This technology also introduces security and privacy risks in the cloud computing environment.
New Access Context
Virtualization technology enables users to access their data and applications running on a single logical location which usually the integration of multiple physical devices. The lack of security border and isolation introduces the possibility of information leakage.Such access can be done through a single user account logged on from various devices located anywhere in the world.This new access context raises many challenges, such as whether a user has the same advantage to access different physical or virtual devices; whether the accounts logged on from multiple distant geographic locations belong to the same user.
Attacks against Hypervisor
The hypervisor which maintains multiple virtual machines becomes the target of attacks. Different from physical devices which are independent from one another,virtual machines in the cloud are usually residing in one physical device managed by the same hypervisor. The compromise of the hypervisor therefore will put multiple V machines at risk.And also,the undeveloped hypervisor technology,such as isolation, access control, security hardening, etc., provides attackers with new ways to utilize the system.
Various attacks against virtual machines are as follows:
VM Hijacking
When a virtual machine is launched, the information required is created and saved on the host.This information for all the machines located in the same server will be stored on a common storage system.The attackers gaining access to this storage space will be able to break into the virtual machines,which is the VM Hijacking
VM Hopping
If an attacker gains access over the hypervisor,they are able to manipulate the network traffic, configuration files, and even the connection status of the VMs located on top of the hypervisor.
VM Escape
Attackers gaining access to the host running multiple VMs are able to access the resources shared by the VMs, and even bring down these resources and turn off the hypervisor.
VM Mobility
A VM can be copied over the network or through a USB, and the source configuration files are recreated when the VM is moved to a new location. This way, the attackers are able to modify the configuration file as well as the VM’s activities.
Dormant VMs.
VMs can exist in either active or inactive states. Although the inactive VMs may still hold sensitive user data, they can easily be overlooked and not updated with latest security settings,which leads information leakage.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.