Securing Cloud Computing Thesis
Securing Cloud Computing Thesis
net/publication/228319527
CITATIONS READS
0 957
1 author:
Aiman Athambawa
Sri Lanka Institute of Advanced Technological Education
9 PUBLICATIONS 15 CITATIONS
SEE PROFILE
All content following this page was uploaded by Aiman Athambawa on 27 November 2018.
1
Abstract
Cloud computing is the latest buzz words in computing. There is significant excitement about
Cloud computing and this has been building up over the past few years. Cloud computing
offers several great benefits which include cost savings and easy access to state of the art
resources, however when considering deploying critical applications and sensitive
information to a public cloud environment, security concerns are a big challenge. Recent
study has shown that security, privacy and legal issues are the main obstacles to the adoption
of cloud services. This thesis looks at how a cloud service user can constantly place a check
on the cloud service provider with respect to data security and in cases where there has been a
breach of security agreement, how these breach can be traced using forensic tools by the
provider. We implement a virtual environment to showcase our proposed solution and
configure security and test out deployment using a forensic tool (Forensic Tool Kit)
2
Acknowledgement
Dr. Xiangdong Xue, who has been my supervisor for this project. He was guiding me
to complete it in a correct way. He was always there to help me out from the
beginning to end.
Dr. Mona Ghassimian, the senior lecturer, who involve more on cloud based system
when i was reading second semester and encourage me to focus on different
virtualization techniques. She was arranged guest lecturers who work in cloud based
companies.
Dr. Dimitrios Frangiskatos, the senior lecturer, who taught me many aspects of
System security and computer forensic techniques. He serves me as the programme
leader of my course.
My father, Mr. Shahul Hameed Athambawa, Encourage me to study further from my
Bachelor’s degree to Master’s Degree. He makes me up with wishes when i succeed
and giving hope when i fail on something.
My mother, Mrs. Ummul Varitha, She is like my father. She always makes me a star.
My Friend, Mr. Ummar Sheriff, He is helping and supporting me a lot on my studies
like a mentor.
My Brothers and sisters, they always keeping me busy with my studies and helping
out my personnel day to day stuff.
My other friends, who have encouraged me when I lacked confidence.
Above all to GOD, who works through me as he does through all of us!
3
Table of Contents
1 Introduction ........................................................................................................................ 7
2 Background ....................................................................................................................... 11
2.7 Benefits...................................................................................................................... 21
4
4 Design Analysis ................................................................................................................ 28
5 Implementation ............................................................................................. 34
5.1 Introduction ............................................................................................................... 34
6 Conclusion .................................................................................................... 43
6.1 Future Work .............................................................................................................. 44
5
Table of Figures
Figure 2.1: Cloud Computing Market Landscape.................................................................... 17
Figure 5.9: FTK running forensic analysis on the server logs ................................................. 42
6
CHAPTER 1
1 Introduction
1.1 Introduction
As we blaze on in this jet age where speed and time are key concern to everyone especially in
the IT industry, technological advancement has come to help us make work and living easy
by affording tangible products and also services that helps us undertake various task in more
organised and easy way. These products and services help us keep pace with major logical
and technical challenges we face daily; and as a result makes work easier, faster, cheaper, and
better. Amongst these services is cloud computing.
The idea of cloud computing is more of a combination of many technologies rather than a
single technology. Its element mirrors the earlier computing eras, but differs in that it
incorporates advances in virtualization, storage, connectivity, and processing power to
synthesize modern technical ecosystem for cloud computing. Many organizations including
private sector, public sector, and the governmental organization are moving their data to the
cloud via cloud service providers amongst which are: Microsoft, VMware, Google, Amazon
etc due to the huge benefits it offers ranging from flexibility, scalability, centralized data
management, cheap in terms of cost, no down time or infinitesimal down time, and most
importantly the architecture stresses on the benefits of shared services over isolated products;
thus increasing the adoption of cloud computing services. This project focuses on the private
cloud infrastructure deployment, and how the service renders security of data because
moving data to the cloud, to a large extent exposes users of this cloud service to privacy
attack by hackers. However, one of the branches of this project focuses on ways in which
these data stored in the cloud is kept secured. Cloud computing as a matter of fact has come
to make productivity quite easier by offering users of these services the ability to stay
connected and at the same time maintain essential security and control required. This gives
everyone a better platform and endless ways to work and collaborate from anywhere,
anytime, and on variety of devices.
7
1.2 Motivation
Owing to the fact that cloud services could either be a public cloud service or a private cloud
service; whichever the case maybe, we adopt this service base on the many benefits it
promises but not really putting into consideration the fact that as we adopt cloud services,
confidential data is outsourced in a sense, this therefore raises the question of data protection,
as data protection policies varies in different countries. Many cloud service providing
organisations may not even have proper controls in place in terms of security, hence we only
hope that our data is kept secured based on trust and also when in transit as we call for them.
This piece of work looks at how a cloud service user can constantly place a check on the
cloud service provider with respect to data security through auditing, and in cases where there
has been a breach of security agreement, how these breach can be traced using forensic tools
by the provider.
Similarly, there has been a slow adoption of cloud service as a result of issues arising base on
security of data in the cloud; hence this piece of work in a sense has come to present the
concept of cloud computing not just as migration, but as transformation. It’s just like saying
the aim of marriage is not just to change your surname but more so for companionship.
It is important to draw to mind the fact that we are still in the early stage of cloud adoption
owing to the fact that transferring one’s organisation’s sensitive data to a third-party cloud-
based vendor raises serious security concerns we can’t really overlook; amongst which is
untraceable data breaches. Unto this end, we shall deploy the cloud infrastructure in a
virtualized environment for the sake of this project.
Due to the fact that Cloud computing is a service, the infrastructure upon which this piece of
work shall be demonstrated will be a virtual environment for the sake of cost and also saves
space. The project went through the following stages:
8
Create cloud environment and providing security on it. The platform for the scenario
will be virtual PCs for creating small server- client architecture or alternatively, cloud
server and use the web browser as the client.
Monitoring security threats channelled to the cloud architecture
Performing audit on cloud environment from client site.
Using forensic tool(s) to perform forensics on cloud environment from client site.
This project is concerned on how to provide a secure cloud service by unveiling some
technical ways to keep the cloud service and architecture safe from being compromised and
the data that resides in the cloud service providers domain safe as well from hackers. In
addition, to be able to trace breaches with forensic tool in cases where data is being
compromised.
Chapter 1 – The general introduction to Cloud and the overview of the project work.
Chapter 2 – This chapter presented a general overview of the concept of cloud computing,
providing insight into the emergence of cloud computing, the basic characteristics that are
required for cloud services, the different deployment models and service models of cloud
computing and then concludes with the benefits of adopting cloud services.
Chapter 3 – Literature review of the existing services and technology, background study of
the subject matter and the functionality of Cloud Computing. The literature review affords
insight into what the project entails and its relevance with respect to previous works on the
project. A review of previous literatures on the topic is treated here with emphasis on the
problems encountered, how to solve them and the best option among alternatives. This
chapter also covers the cloud computing marketplace, presenting the early developers of
cloud services such as Amazon, Google etc.
Chapter 4 –This chapter first looks at the security challenges in adopting cloud services and
proceeds to present the proposed architecture that provides for securing cloud services and
carry out forensic analysis on the cloud. In simple term(s), a design overview is afforded
here, detailing the initial design of the system
9
Chapter 5 – Implementation and testing of design, functionality and interoperability of
functional parts. This chapter affords details regarding the implementation of the system. The
final architecture design is unveiled in detail, with justification for certain decisions. The
details of system testing are found here, including the methodology that was used in the
testing. The results obtained from the above testing will also be discussed and finally
Chapter 6 – Conclusion, recommendation and limitations of the project. This chapter sums up
all aims set out in the introduction, it indicates if the overall aims of the project have been
met, and if the system was as it was expected. Considerations for future research are also
included in this chapter.
10
CHAPTER 2
2 Background
2.1 Introduction
With the excitement about Cloud computing that has been building up over the past few years
and the general hype surrounding the idea. One cannot help but be curious about what this is.
However, to any curious persons understanding, there is a general consensus to agree to
disagree on what cloud computing is. If one goes on to ask ten different professionals, you
tend to end up with ten different answers. You are left wondering what all the hype is about
this new fad.
In 2008, Oracle CEO Larry Ellison had to comment on this hype but indicating that the term
was overused and poorly applied. He said to a group of Oracle analysts that “The computer
industry is the only industry that is more fashion-driven than women’s fashion,” [1]
I believe that this general excitement around cloud computing is due to the obvious
emergence of a new model of computing in the IT world which is a very big deal.
In 1961, a professor at MIT called John McCarthy presented the concept of computing as a
utility which is similar to that of electricity. Then in 1969, J. C. R Licklider who later went
ahead to develop the basis for the ARPANET, presented the idea of an “Intergalactic
computer network” at ARPA and Bolt, Beranek and Newman (BBN). He stated that, “If such
a network as I envisage nebulously could be brought into operation, we could have at least
four large computers, perhaps six or eight small computers, and a great assortment of disc
files and magnetic tape units—not to mention remote consoles and teletype stations—all
churning away.” The combination of the utility computing concept by McCarthy and a large
scale network by Licklider provided the foundation for the future development of cloud
computing. [3]
11
The arrival of [Link] in 1999, heralded one of the first milestones for cloud
computing. [Link] brought to reality the concept of enterprise applications being
delivered via a simple website. This then led software firms to deliver applications over the
internet. Then in 2002, Amazon web services was developed and provided a suite of a variety
of cloud-based service which ranged from computation to storage. In 2006, they then
launched the Elastic compute cloud (EC2) which was a commercial web service that allows
for renting of computers on a pay by the hour basis. According to Jeremy Allaire, CEO
of Brightcove, "Amazon EC2/S3 was the first widely accessible cloud computing
infrastructure service".
In 2009, a major mile stone in cloud computing was reached when Google and other began to
offer browser-based enterprise application, for example Google Apps. One key contributor to
the evolution of cloud computing has been the maturing of virtualization technology. Another
being high speed bandwidth. [2]
According to Irving Wladawsky-Berger of IBM over the hype around cloud computing in his
blog titled Cloud- the Emergence of a New Model of Computing, he said “In my opinion, the
key piece of the puzzle that has brought it all together and is giving us unmistakable signals
that a new computing model is indeed emerging, is the explosive rise of intelligent mobile
devices, such as BlackBerrys, iPhones, Web-capable cell phones of all kinds, e-book
devices and netbooks. Beyond them, is the even larger number of sensors and other digital
technologies that are being embedded into myriads of things in the physical world, like cars,
appliances, medical equipment, cameras, roadways, pipelines, pharmaceuticals or livestock.
These are bringing together the world’s digital and physical infrastructures and giving rise
to all kinds of new, smart applications.” [4]
12
2.3 What is a Cloud?
With all the hype around cloud computing and the general consensus on the lack of unifying
definition of a cloud, I will attempt to draw from the knowledge of several experts in this
field in order to provide a general overview of what a cloud is.
Peter Mell and Tim Grance of the National Institute of Standards and Technology (NIST)
Information Technology Laboratory, presented a paper titled “Effectively and Securely Using
the Cloud Computing Paradigm,”[3] In an October, 2009 . They defined cloud computing as:
“…a model for enabling convenient, on-demand network access to a shared pool of
configurable and reliable computing resources (e.g., networks, servers, storage, applications,
services) that can be rapidly provisioned and released with minimal consumer management
effort or service provider interaction.” [3]
13
Elasticity: This refers to the capability of cloud services to expand and reduce in order to
handle fluctuations in demand for resources. This is an essential feature required in IT
systems as the traditional infrastructure are setup to scale up or down in order to deal with
changes in demand. Hence the typical solution is to over-allocate resources leading
underutilization of the total resources. Therefore elasticity is vital capability required in
cloud services in order to allow for scaling up or down automatically without extra effort. [5]
Complete Virtualization:
The lack of mature tools and skilled personnel saw the early era of widespread adoption of IT
resource virtualization end up complicating IT operations which lead to the ‘VM sprawl’ [5].
The missing component in this era was the lack of a seeming transparency of the
infrastructure components – to act as one from the view of software developers and
operational groups. That is to say, irrespective of the degree of scaling of a particular cloud,
the simplicity of working with it does not change i.e. it stays easy to operate and easy to
develop applications for as if it was a single server. This is what complete virtualization is.
[24]
14
Other Common (though Nonessential) Characteristics
The previous characteristics are essential to any cloud deployment project; however the
following characteristics are optional though quite important.
15
2.5.3 Public Cloud
A public cloud is a cloud computing deployment scheme that is hosted, operated and
managed by a third party cloud services vendor and is open for use by the general public. The
general public refers to either individual users or corporations. [3] With public clouds, day to
day operations and management is handled by the third party cloud services vendor, which
leaves the customer with little to no control over the physical and logical security of the
cloud. [6] Public clouds are an economically viable option for organisations as it provides
immediate cost savings. This is due to the fact that cloud implementations remove the burden
of maintaining IT infrastructure from the organisation and provides access to state of art
resources without the crippling capital investment cost. [3] The type of clouds available were
mostly public clouds such as Amazon, Google and Salesforce and they tend to focus on
providing services on particular layers. For example, Amazon focuses on providing
Infrastructure based services, while Google and Salesforce focus on application based
services. [5]
This deployment approach provides an organization with the flexibility to utilize the best
tools when required, while adapting to deal with the increasing complexity. [5], [3]
16
Figure 2.1: Cloud Computing Market Landscape
17
2.6 Cloud Services Delivery Model
The cloud services delivery model commonly referred to as SPI is made up of three major
layers–the cloud infrastructure (commonly known as Infrastructure as a Service, or IaaS),
cloud application platform (commonly known as Platform as a Service, or PaaS), and cloud
application (commonly known as Software as a Service, or SaaS) layers. The following
section presents an overview of the different layers. [6]
The adoption of the IaaS model is mostly done in conjunction with both the PaaS and SaaS
models and together, they offer a very good level of scalability that can swiftly respond to
change in any dimension of a business practice in a way that conventional IT infrastructure
cannot.
There exist a broad variety of IaaS service providers ranging from data centre centric cloud
infrastructure service providers (such as Sun, Oracle, IBM etc), data storage centric service
providers (such as Dropbox and Amazon Simple Storage Service) and full-fledged IaaS
service provicedrs such as Amazon Web Services and Rackspace. [5], [3]
18
In other words, the PaaS model can be said to be a kind of SaaS model but where the service
provided is a software development and deployment environment. In most cases, this
provided service includes a software development kit which interfaces with the service
provider’s deployment environment, pre-configured domain names, dynamic and scalable
application hosting environment, etc. Hence, the PaaS proposition offers software application
developers a more reliable and scalable service with a lower total cost of ownership (TCO)
with attendant lower cost of entry. Examples of PaaS service providers include the Google
App Engine and Windows Azure. [30]
There are a variety of PaaS service offerings ranging from a full suite consisting of
application development tools with provision for testing and deployment. However, the
service can also be smaller and more targeted to a specific area for instance – content
management. Moreover, the key element that qualifies a platform to be a PaaS includes the
presence of:
1. A Monitoring system for applications resource management.
2. An integration mechanism for the customer’s application software with other cloud-
based services e.g. databases, firewalls, etc.
3. A multi-tenancy system which can accommodate a good number of customers
(software developers) simultaneously.
4. A scheme to allow for collaboration between the stakeholders (service providers,
developers, and users) via the cloud.
5. A basic provision of security, reliability and privacy for all applications
6. A browser based interface for developers to access their accounts and software
deployments. [5] [3]
19
delivery model as “well-defined applications offering users online resources and storage. This
differentiates SaaS from traditional websites or web applications which do not interface with
user information (e.g., documents) or do so in a limited manner.”[9]
From these definitions, the SaaS cloud delivery model can simply be said to be a solution
whereby a service provider delivers software services to consumers on demand via a
licensing model. Usually, the service provider caters for the hosting of the service while the
consumer accesses the service using an authorized predefined interface – usually a web
browser. The SaaS model is a big departure from conventional methods of acquiring software
which often involved purchasing, shipping and then installation when the product arrives at
the customer’s destination. In the SaaS model, the customer is billed for access to the service
in a ‘pay-as-you-go’ model or through a subscription model unlike the inflexible payment
model for conventional delivery. [28]
Furthermore, with the SaaS model the consumer no longer has to deal with compatibility
issues with hardware, software or operating systems. Also, getting updates is now
instantaneous with little or no need for client premise support or maintenance. Other benefits
of the SaaS model include minimal installation requirements and software rollout
simplification. To the service provider, the SaaS model provides increased control of the use
of its products (in terms of licensing) and also patch and upgrade management control. A
good example of SaaS is the Google App suite which provides customers with word
processing and email services. [5], [3]
20
2.7 Benefits
The rapid adoption of cloud computing is as a result of the benefits it offers. Some of these
benefits include:
The adoption of cloud computing can provide an organization with means for reducing IT
infrastructure costs and offering ways to maximize the available IT capacity through a variety
of schemes. For instance, cloud computing can avail an organisation with ‘pay-as-you-go’
capacity such that they only pay for what they need and when they need it. This also
eliminates unnecessary capital expenditure with the associated cost of maintaining an
extensive IT infrastructure. Cloud computing affords organisation a reduced cost of operation
since operations can easily be centralized when virtualized thereby requiring less IT resources
in terms of software, hardware and peopleware. [29]
Cloud computing provides leverage for storage and infrastructure virtualization which can
significantly improve server and storage utilization to the tune of 50-65% [5]. Such asset
utilization reduces the associated fixed overhead cost, maintenance cost and the total number
of staff required to manage the assets. Furthermore, cloud computing can allow an
organization easily decouple its IT infrastructure and assets in such a way that makes
outsourcing seamless so that IT staff can focus on more strategic aspects of the organization
which leads to a better return on people assets.
Business Agility
To a large extent, the adoption of cloud computing in a business can shed some weight of the
business to leave room for flexibility in the business model. When cloud models such as
infrastructure as a service (IaaS), platforms as a service (PaaS) or software as a service (SaaS)
are adopted by a business, the business is given the freedom to easily react to market changes
without its infrastructure holding it back. In addition, the business can easily experiment with
infrastructure or service architectures without costing it so much money or time. [5]
21
Figure 2.2: Architecture for relevant technologies
22
CHAPTER 3
3 Literature Review
The focus of this chapter is to explore existing literature of previous works on the subject
matter with regards to this thesis. It examines previously related technology schemes and
methods involved in keeping data secured, thereby stating areas of variation as opposed to
that of the project.
In a world where loss of confidential or sensitive data could expose one to the risk of fraud or
copyright breaches and also the reputation of an organisation could be directly affected.
Judith Hurwitz et al[13], presents a better storage in terms of capacity and security to an
extent, compare to the old scheme of storing data using magnetic tapes (e.g. as in floppy
drives), Hard disk, and mainframe. The piece of material gives an in depth knowledge of the
concept of cloud computing, and also explores the benefits of cloud services such as
scalability via dynamic i.e. "on-demand" purveying of resources on a fine-grained,
establishment where customers serve themselves near real-time, without the users having to
mastermind for peak loads; Performance, maintenance, scalability amongst others. It looks at
cloud computing beyond just being a service sitting in some remote data centre; but as a set
of approaches that can help organisations quickly do some mathematically additions and
subtractions of resources in almost real time. It also channelled it’s write-up on the business
impact, the economics of the cloud, and how to develop cloud services strategy.
Zaharia et al. [10] presented LATE, a kind of scheduling algorithm which is used to handle
heterogeneity in a data center environment. This algorithm LATE attempt to schedule tasks
according to the longest approximate time to completion. The approximation relies on the
heterogeneity of the nodes and the gradual improvement of the task. The work presented in
[10] could potentially be extended to schedule tasks in an edge based cloud where it involves
latency and node bandwidth in the required approximate time for completing calculations. In
a nutshell, projects demanding cloud computing concepts, such as the ones that drive the
MapReduce programming model, directly to edge networks is sparse and this sphere of
research is still modern and so in a stage of early development.
23
Eric A. Marks et al, looks at the best place to begin with cloud computing by considering
some of the developments that are not only enabling the practical adoption of cloud
computing, but in turn will be themselves driven by that same adoption. The author(s) admit
to the fact that over the next 5 to 10 to 15 years, some changes are more or less inevitable
such as: ‘The decline and fall of the near-monopoly of the relational database—it will no
longer dominate and simply be assumed; rather it will be relegated to relatively modest to
mid-sized and legacy use cases’[12];’The nature of archiving, disaster recovery, and
geographic distribution will fundamentally change—archiving and disaster recovery will be
accomplished by multiple, optionally live, geographically dispersed copies of the same data;
this will be true for the most crucial, mission- critical, high-volume data’[12]; and thirdly,
‘Computing and storage infrastructures will merge—first for the highest volume applications,
then eventually for most applications’[12]. An explanation for the cause of this phenomenon
according to the write up lies in the fact that the developments are epidemic to cloud
computing.
Daniel [14] critically looked at securing cloud service in terms of e-mail and the growing
opportunities cloud services provides. Though he considered security but was just considered
only in the light of e-mail services by looking at the fact that about 80 to 95% of the mails
sent within a day are spam, not just that they are spam but also that they can carry security
threat to business and so has suggested that internal anti-spam and firewall solutions on
laptops, PCs and also mail servers are good approach to combating this threat, but can be
even better by constantly managing and upgrading internal defenses or alternatively is to
adopt a cloud-based email security application, because of its ability to filter and blocks
unwanted content in the cloud to prevent it from getting to its destination.
Owing to the above facts, other project work(s) as regards cloud computing looks at how to
secure cloud services, and from the user’s side we adopt this service base on trust; but this
project takes it a step further by looking at how to ensure that from the user’s side we don’t
just adopt this services base on just trust hoping that our data is kept secured in the cloud and
that this data is not being compromised in terms of security, but also ensuring that we can
audit, and also carry out forensic investigations in places that matter and when it is required
especially in cases where there is a breach of security measure(s) in the cloud. [28]
24
3.1 Cloud Computing Marketplace
Having discussed what Cloud Computing is, we are now going to look at the different
vendors who offer cloud computing services and what they have to offer.
Elastic Compute Cloud (EC2): A web service that offers scalable deployment of
applications by providing an interface through which a user can create virtual
machines and extra CPU cycles to load any software required an in turn the customer
pays by the hour for active servers. [27]
Simple Storage Service (S3): This a web services interface that allows you to store
and retrieve items up to 5GB in size in Amazon’s virtual storage service.
Simple Queue Service (SQS): This is a distributed queue messaging service which
allows different machines to communicate over the internet using this message-
passing API. [1]
SimpleDB: This is a web service for indexing and running queries on structured data
in real time. This service works in close conjunction with Amazon Simple Storage
Service (Amazon S3) and Amazon Elastic Compute Cloud (Amazon EC2),
collectively providing the ability to store, process, and query data sets in the cloud
making web-scale computing easier and more cost effective.
Cloud Front: This is a content delivery network that delivers content using a global
network of edge locations. [6]
25
3.1.2 Microsoft Azure Services Platform
The Windows Azure Platform is Microsoft’s Cloud offering, this is a public cloud
implementation managed on Microsoft’s data centres around the world. Windows Azure is an
operating system that provides an overlay for IT infrastructure and runs the applications and
services which are used by end users for development, management and hosting purposes.
The end user makes use of the provided libraries to develop the desired Azure based
applications while making use of tools such as Visual studio. [15]
3.1.3 Google
Google App Engine is Google’s cloud services offering that enables developers to build their
web apps on Google’s infrastructure. The currently supported programming languages are
Python and Java. Google App Engine allows for easy deploying of web applications by
providing computing resources dynamically when required. Google App Engine allows one
to take advantage of Bigtable and other components of Google’s scalable infrastructure
thereby making it easier to adapt to changes. Google’s Services allow for several uses cases,
such as:
Messaging: Google’s Apps can be leveraged by organisations for internal emails and
calendar services.
Securing Existing Email Systems: Google Apps can be used by organisations for
securing their existing mal systems in filtering out spam and viruses.
Collaboration: Google Apps can be used for office productivity and collaboration
etc. [6]
26
3.1.4 [Link]/ [Link]
[Link] is a cloud service provider offering CRM products or hosted sales force
automation applications for a number of years. Pricing is done on a per user / per month
basis, depending on the different [Link] modules needed. [Link] is a SaaS
model deployed in a public cloud also providing a PaaS offering with the [Link] platform.
[15]
27
CHAPTER 4
4 Design Analysis
4.1 Introduction
As we have seen from the previous chapter, Cloud computing offers several great benefits
which include cost savings and easy access to state of the art resources, however when
considering deploying critical applications and sensitive information to a public cloud
environment, security concerns are a big challenge. As a result, the cloud service provider
now has to address this security concerns by developing security controls that are of the same
level or greater than what the organization would have in their own private establishment. In
this chapter we discuss these security concerns and propose a solution that enables the cloud
service user to ensure that this service level is adhered to by the service provider.
User access: Access control is a big concern when referring to cloud computing services due
to insider attacks. The user of the cloud service has no control over the physical and logical
access controls at the end of the service provider as well as the hiring policies. Hence the user
is at risk of compromise from the same individuals who provide the service [26]
Regulatory compliance: The responsibility of ensuring security and integrity of their data is
still placed on the cloud user even though it is held by the service provider. Hence customers
have to ensure these providers are able to meet the regulatory requirements or run the risk of
being prosecuted.
Data location: When using cloud services, a customer is at risk of their data being stored in a
different country. And different countries have different requirements and controls which are
to be placed on data access. For instance the EEA has the Data protection act while other
countries may not even have any controls. The cloud user is then at risk of not having the
same compliance level needed by law. [25]
28
Data segregation: When using a cloud service, the user runs the risk of having their data
stored in a shared environment along with data from other customers. Encryption may or may
not be provided and during transit and at rest is data encrypted. Although encryption is
effective, availability is compromised. [30]
Recovery: Disaster recovery is a key factor when using cloud services. Users may not know
where their data is located, but where ever that is, it is physically located somewhere which is
subject to threats such as fire, floods, natural disasters etc. Hence not knowing what could
happen to your data is a big concern for customers.
Investigative support: In event of a security breach, accessing logs and data is usually
difficult as multiple customers are usually co-located and the customer’s information may be
spread across different servers and data centres, thus, making it difficult to carry out an
investigation.
Long-term viability: The viability of a cloud service provider is a risk a customer has to face
as they could go out of business and the customer would be left stranded. [16], [17]
29
Threat 4: Shared Technology Issues
Cloud providers make use of virtualization technology to make their services scalable,
therefore exposing the customer to flaws from the hypervisor and insufficient isolation.
Computer forensics has to be carried out in a manner that ensures that it maintains the
standards of evidence which can be admissible in a court of law. [19]
30
4.5 Digital Forensic Challenges within the Cloud Ecosystem
Although advocates for cloud computing tout its scalability and cost effectiveness as the
advantages for which to adopt cloud services, however, due to the scope and diversity,
forensic scientists view this as a forensic challenge. The challenges to carrying out forensic
analysis within the cloud environment are as follows:
1. Establishing the computational and storage resources that fall within the scope of the
investigation
2. Separation of customer's data sources during evidence collection
3. Adapting forensic analysis methods to the cloud
4. Improving live analysis techniques
5. Improving log generation & analysis techniques
6. Establishing a complete understanding of processes, their dependencies and
distribution across different systems within the cloud ecosystem. [20]
31
4.6 Proposed Solution/ Design
In order to achieve the aims of this project, we propose a solution provides for security of the
cloud service user’s data by implementing Intrusion prevention and detection using Astaro
Security gateway virtual and also using Forensic tool kit to trace data security breach at the
cloud service provider’s end when such incident(s) present themselves.
This solution is to be implemented on VMware server 2.0 running three (3) virtual machines.
Two of the virtual machines are running Windows XP operating systems and have been set
up to run in a Client-Server manner. The third virtual machine is the Astaro security gateway
virtual appliance which is set up to ensure security of the cloud deployment. The forensic tool
kit was installed on the client –side to analyse digital evidence from the server.
32
4.7 Software Components
Forensic Toolkit (FTK) is a computer forensics software that delivers excellent computer
forensic analysis, decryption and password cracking. It is a court-validated digital
investigations platform built for speed, analytics and enterprise-class scalability. [23]
33
CHAPTER 5
5 Implementation
5.1 Introduction
In this chapter we present the steps used in achieving the aims of this project. This includes
setting up the virtual environment, configuring the security components and deploying
Forensics Tool Kit to enable Forensic analysis of the Cloud deployment.
VM VM VM
FTK Applications Applications Applications Applications Applications
Windows XP Windows XP
(Client) Astaro
(Server)
VMware Server
Windows 7
Hardware
34
5.3 Setup & Configuration
1. The first step taken was to log in to the Microsoft Windows 7 host as the
Administrator. Then from the Start menu, the directory containing the downloaded
installer file was selected. Then permission to run the installer was granted through
the User Account Control dialog box.
2. When the installation wizard opens and finished computing space requirements, the
license agreement was accepted and destination folder specified.
3. On the Server configuration page, the FQDN, Server HTTP Port, and Server HTTPS
Port were specified and on that same page “Allow virtual machines to start and stop
automatically with the system” was selected.
4. On the Configure shortcuts page, the shortcuts we wanted were specified and on the
ready to install page, install was clicked to begin installation.
5. The final wizard prompts were followed to complete the installation and the computer
rebooted.
In order to manage our deployment, we setup the VMware server to allow access via the VI
Web Access management interface. To do this we did the following:
1. Launched the Web browser and entered the URL of the VMware Server installation in
the format of [Link] or [Link]
2. The VI Web Access login page appears and then the user name and password used to
log in to the host was entered to Log In.
3. After the user name and password are authorized, the main application page appears.
35
Figure 5.2: VMware server configuration overview
To deploy the virtual machines on VMware Server, the virtual machine had to be first created
using the virtual machine wizard and the operating system was then installed.
36
7. On the Network Adapter page a network adapter was added. „
8. On the Ready to complete page, finish was clicked to create the virtual machine.
37
Network configuration information
WinXP-VM1 - [Link]
WinXP-VM2 - [Link]
Astaro - [Link]:4444
38
CONFIGURING ASTARO FOR SECURITY
WEB SECURITY
HTTP/S
The tab of the HTTP/S was used to configure Astaro Security Gateway Software as an
HTTP/S caching proxy. The HTTP/S of Astaro Security Gateway provides simple caching
services, web filtering etc. It also prevents viruses and spyware infections using its virus
scanning engines.
FIREWALL
The Packet Filter was used to define and manage packet filter rules of the firewall.
39
Figure 5.6:Astaro Network Security Statistics
INTRUSION PREVENTION
On the Intrusion Prevention tab, the IPS rules of the firewall were defined. The Intrusion
Prevention system (IPS) is a signature-based IPS that analyses the complete traffic and then
automatically blocks attacks before they can reach the network to compromise it.
Logging was enabled in Astaro through the logging tab. The machine was enabled to log all
interactions on the system including FTP Data connections, Admin notifications, Intrusion
prevention system alerts etc.
To allow for forensic analysis local auditing/logging has to be enabled in windows XP and
was done as follows:
1. After Logging on as administrator and opening the control panel, the local security
policy was expanded to display the individual policy settings.
2. The type of auditing required was then enabled
41
DEPLOYING FTK
In order to install and run FTK, the following steps were taken:
INSTALL CODEMETER
The installation wizard was launched to Install CodeMeter Software and the directions were
followed and all defaults were accepted to complete the installation
INSTALL FTK
Following the installation of CodeMeter Software, FTK was then installed by clicking on
Autorun. 1.
The Access Data License Agreement was read and accepted before selecting the location for
the FTK components.
RUN FTK: FTK was run next, to add the schema to the database.
42
CHAPTER 6
6 Conclusion
In this thesis, we were able to conduct an in-depth research into cloud computing and this
report presents the results of this research. We found out that cloud computing is a rapidly
developing area in the IT services industry. Despite the excitement around cloud computing,
most specialists have a different definition of the term. We were also able to present a report
on the emergence of cloud computing by looking into the history and stages of development
of cloud computing. This report also presents the different cloud deployment models and
service models.
The challenges of ensuring security by cloud adopters is the main focus of this thesis and we
presented a prototype solution which attempts to solve this issue for cloud adopters. This
thesis was concerned with how to provide a secure cloud service by presenting a client-
server virtual deployment which is representative of the cloud infrastructure and the cloud
adopters. We then went on to deploy a virtual security gateway which provides intrusion
detection and prevention, firewall and web security. In addition, to be able to trace breaches
we adapted the Forensic tool kit to carry out forensic analysis on the cloud.
In the process of carrying out this project, we faced a lot of challenges, ranging from the
software to be used to achieve the aims of the project to acquiring the technical know-how in
order to successfully carry it out.
43
6.1 Future Work
This project is not without its limitations due to the available resources. However, this project
is step towards solving the challenges cloud adopters have in ensuring compliance with the
security policies they require in their computing services.
This project can be further extended by deploying this proposed solution on a public cloud
such as Amazon EC2. This would allow for real world testing and evaluation based on real
data.
Further work can be done on auditing the cloud computing infrastructure. This would require
developing a means of auditing the cloud infrastructure without intervention from the cloud
provider. Thus by-passing the providers and still being able to ensure compliance with
required standards.
44
References
[1] Velte, A. T., Velte, T. J., & Elsen Peter, R. C. (2010). Cloud computing a practical approach.
New York, McGraw-Hill. [Link]
[2] Arif Mohamed; A History of Cloud Computing Available at:
[Link]
[Link] [Accessed 30 April 2011]
[3] Krutz, R. L., & Vines, R. D. (2010). Cloud security: a comprehensive guide to secure cloud
computing. Indianapolis, IN, Wiley
[4] Cloud the emergence of a new model of computing; Available at:
[Link]
[Link] [Accessed 30 April 2011]
[5] Marks, E. A., & Lozano, B. (2010). Executive's guide to cloud computing. Hoboken, N.J.,
Wiley
[6] Mather, T., Kumaraswamy, S., & Latif, S. (2009).Cloud security and privacy. Beijing,
O'Reilly.
[7] Cloud Computing; Available at: [Link] [Accessed
30 April 2011]
[8] Open Cloud Manifesto; Available at:
[Link] [Accessed 30 April 2011]
[9] Cloud computing use cases white paper; Available at:
[Link] [Accessed
30 April 2011]
[10] M. Zaharia, A. Konwinski, A. J. R. K.,and Stoica, I. Improving mapreduce
performance in heterogeneous environments. In 8th USENIX Symposium on Operating
Systems Design and Implementation (Dec 2008).
[11] Rajkumar Buyya, R. R., and Calheiros, R. N. Modeling and simulation of scalable
cloud computing environments and the cloudsim toolkit: Challenges and opportunities. In
Proceedings of the 7th High Performance Computing and Simulation Conference (Jun 2009).
Ropella GEP, Hunt CA. Cloud computing and validation of expandable in silico livers. BMC
systems biology. 2010;4:168.
[12] What's the Forecast for Cloud Computing in Healthcare; Available at:
[Link] [Accessed 30 April 2011]
[13] Judith Hurwitz, Robin Bloor,Marcia Kaufman, and Dr. Fern Halper. Cloud
Computing for Dummies. (2010).
[14] Daniel Power. Enemy at the gates: Email security and the growing opportunity from
the cloud. Available at:
[Link]
[Accessed 30 April 2011]
[15] Cloud Computing without the hype; an executive guide; Available at:
[Link]
DetectCookieSupport=1 [Accessed 30 April 2011]
[16] 10 Security Concerns Cloud Computing
Gartner: Seven cloud-computing security risks Available at:
[Link]
853?page=0,1 [Accessed 30 April 2011]
45
[17] CSA: Cloud Security Alliance; Top threats to cloud computing V1.0; Available at:
[Link] [Accessed 30 April 2011]
[18] Incidence Response; Available at:
[Link]
[Accessed 30 April 2011]
[19] Digital Forensic Challenges within Cloud Computing; Available at:
[Link] [Accessed 30 April 2011]
[20] VMware Servers Users Guide; Available at:
[Link] [Accessed 30 April
2011]
[21] Astaro home page; Available at: [Link] [Accessed 30 April 2011]
[22] Douglas Schweitzer; Incident Response; Available at:
[Link]
[Link] [Accessed 30 April 2011]
[23] CSA: Cloud Security Alliance; Security Guidance for Critical Areas of Focus in
Cloud Computing V2.1; Available at: [Link]
[Accessed 30 April 2011]
[24] Rittinghouse, J. W., & Ransome, J. F. (2010). Cloud computing: implementation,
management, and security. Boca Raton, CRC Press. Data protection and data sec issues on
cloud computing
[25] Rangan, (2008). K. The Cloud Wars: $100+ billion at stake. Tech. rep., Merrill
Lynch,
[26] May [Link], R. F. (2011). Evaluating & deploying cloud computing for
electronic records management: technology, security & implementation issues : a
management primer. [New Orleans, La.], E-Records Institute at IMERGE Consulting
[27] Qamar, S., Lal, N., Singh, M., (2010). Internet Ware Cloud Computing: Challenges.
(IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 3,
March 2010.
[28] Rosenthal, A., Mork, P., Li, M., Stanford, J., Koester, D., Reynolds, P., (2009). Cloud
computing: A new business paradigm for biomedical information sharing. Journal of
Biomedical Informatics. Journal homepage: [Link]/locate/yjbin.
[29] Kourpas E (2006) Grid Computing: Past, Present and Future – An Innovation
Perspective. IBM white paper.
[30] Youseff, L., Butrico, M. and Da Silva, D. (2008). Toward a Unified Ontology of
Cloud Computing. In Grid Computing Environments Workshop (GCE '08), Austin, Texas,
USA, November 2008, 1-10.
46