Cloud Computing
Cloud Computing
Cloud Security
Cloud Security :
Risks,
Security,
privacy,
Trust.
Security of OS,
VM,
VMM,
shared image,
management OS.
EC2 Instances,
connecting clouds,
Security rules,
Linux instances.
Cloud Security
Cloud Security is the set of policies, technologies, controls, and procedures used to protect data,
applications, and infrastructure in cloud computing environments from cyber threats, data breaches,
and unauthorized access.It ensures confidentiality, integrity, and availability (CIA) of data and
services hosted in the cloud.
Cloud Security refers to the combination of practices and technologies designed to safeguard cloud-
based systems, data, and infrastructure. It involves protecting cloud environments against data theft,
malware attacks, insider threats, and service disruptions.
Cloud Security is essential to maintain trust, protect sensitive data, and ensure business continuity
in cloud environments. As cloud usage grows, robust cloud security strategies become vital to
counter evolving cyber threats.
1
2
Objectives of Cloud Security
1. Data Protection
3. Network Security
4. Application Security
o Vulnerability scanning
o Log analysis
1. Public Cloud Security – Managed by the cloud provider (e.g., AWS, Azure, GCP).
3
Shared Responsibility Model
• Cloud Provider is responsible for security of the cloud (hardware, network, infrastructure).
• Insecure APIs
• Account hijacking
• Insider threats
Cloud computing offers flexible and scalable computing resources via the internet. However, moving
data and applications to the cloud introduces security risks that differ from traditional systems.
These risks arise due to shared environments, third-party control, and complex architectures.
Cloud computing provides powerful resources but introduces complex security challenges.
The main threats arise from:
4
• And potential abuse of scalable infrastructure.
Therefore, security, availability, and trust must be top priorities for both cloud providers and users.
Many organizations start using cloud services without fully understanding the security implications
or implementing ethical and secure practices.
There are two key questions we must ask:
5
(a) Traditional Security Threats
These are old, well-known threats that existed before cloud computing — but now they have a
greater impact because of:
Examples:
• DDoS attacks (Distributed Denial-of-Service) – Overload the server to make cloud services
unavailable.
• Phishing attacks – Tricking users to reveal sensitive info like passwords or credit card
numbers.
• SQL Injection – Malicious SQL code inserted into input fields to steal or modify data.
• Cross-site scripting (XSS) – Injecting harmful scripts into websites to steal session data or
impersonate users.
Special Concerns:
• Authentication & Authorization: Enterprises must assign proper user privileges; mismatched
policies can cause security holes.
• User-side security: Devices connecting to the cloud are often outside the corporate firewall,
increasing vulnerability.
Cloud service availability means that systems and data should always be accessible.
Threats include:
• Network interruptions
If downtime occurs:
• Users may face data lock-in (unable to access their own data).
Since cloud providers often outsource infrastructure or storage to third parties, users lose direct
control over their data.
6
Concerns include:
• Lack of transparency: Users don’t know where data is stored or who manages it.
Example:
Amazon Web Services (AWS) explicitly states in its agreement that it is not responsible for data loss,
damage, or unauthorized access, placing the burden entirely on the user.
Auditing difficulty:
Because of limited transparency, it’s hard to perform proper security audits or prove data deletion.
Affected Models:
• User
• Service
• Cloud Infrastructure
2. Service → User – Example: Phishing, fake SSL certificates, browser cache attacks.
These interactions create multiple points of vulnerability, making it crucial to secure every layer.
To reduce risks:
7
• Encrypt data in transit and at rest.
Privacy in cloud security refers to protecting users’ personal and sensitive data stored, processed, or
transmitted through cloud services. It ensures that data is accessed and used only by authorized
entities and according to user consent.
1. Data Confidentiality: Ensuring that only authorized users can access the data.
2. Data Ownership: Clarifying who owns the data stored in the cloud—the user or the provider.
3. Data Location: Knowing where the data is physically stored (different countries have
different privacy laws).
4. Data Retention: Understanding how long data is stored and when it is deleted.
• Data Minimization: Collecting only the data necessary for specific operations.
Trust in cloud computing means the confidence that cloud providers will protect data, ensure
service availability, and act ethically according to agreed terms and policies.
1. Transparency: The provider should clearly communicate how data is managed and
protected.
3. Security Assurance: Providers must follow strong security standards and certifications.
4. Compliance and Legal Trust: Providers must comply with laws and allow audits.
8
6. Reputation: Providers with a strong track record (like AWS, Azure, Google Cloud) gain user
trust.
• Service-Level Agreements (SLAs): Define reliability, performance, and data protection terms.
• User Control: Allow customers to manage their own security settings and keys.
Example
A company trusting Amazon Web Services (AWS) does so because AWS provides encryption,
compliance certifications, and strong SLAs ensuring 99.9% uptime and data protection.
• Trust ensures users believe the cloud provider will maintain privacy and security.
Operating System Security in the context of cloud computing refers to the implementation of
mechanisms, policies, and controls that protect the OS and its resources (processes, memory, files,
network connections) from unauthorized access, attacks, and vulnerabilities.
• Cloud servers often run multi-tenant environments (many users sharing the same physical
server).
o Privilege escalation
o Data breaches
o Service downtime
9
• Hence, maintaining OS integrity, availability, and confidentiality is essential for overall cloud
security.
• Protects hypervisor and guest OSs from cross-VM attacks (like side-channel or VM escape).
• Detects and removes viruses or malicious code that could compromise the OS.
10
5. Implement least privilege principle for all users.
7. Use cloud provider security tools (e.g., AWS Inspector, Azure Security Center).
9. Example
• In AWS EC2, the base OS (e.g., Ubuntu, Windows Server) must be hardened by:
Features of VM:
• Isolation: Each VM is separated from others, improving security by preventing one VM’s
compromise from affecting others.
• Resource Sharing: VMs share CPU, memory, and storage resources of a physical host
efficiently.
• Portability: VMs can be easily moved, backed up, or cloned across servers.
• Multi-tenancy: Enables multiple users (tenants) to securely share the same hardware
resources in the cloud.
11
Role of VM in Cloud Security:
4. Access Control:
VMs enforce user-level and process-level access permissions.
5. Intrusion Detection:
Security tools can run inside VMs to detect abnormal activities or malware.
• VM Escape: When malware breaks out from a VM to access the host system.
• Data Leakage: Improper isolation may lead to sensitive data exposure between VMs.
A Virtual Machine Monitor (VMM), also known as a Hypervisor, is a software layer that creates,
manages, and monitors multiple VMs on a single physical machine.
It acts as a bridge between hardware and virtual machines.
12
Types of Hypervisors:
Type 1 (Bare-metal) Runs directly on physical hardware VMware ESXi, Microsoft Hyper-V, Xen
Type 2 (Hosted) Runs on top of a host operating system VirtualBox, VMware Workstation
1. Resource Management:
Allocates CPU, memory, and I/O to VMs securely.
2. Isolation:
Ensures each VM runs independently without data leakage.
3. Monitoring:
Tracks VM activities and prevents unauthorized access.
4. Security Enforcement:
Implements access controls, firewall rules, and virtual network segmentation.
5. Fault Tolerance:
Detects VM failures and restarts them automatically.
• Hypervisor Attacks:
If the VMM is compromised, all hosted VMs are at risk.
• Malicious VM Creation:
Attackers may deploy rogue VMs to perform unauthorized actions.
• Side-channel Attacks:
Exploiting shared CPU caches or memory to steal data between VMs.
13
Component Function Security Role
In cloud computing, a shared image refers to a virtual machine (VM) image or system image that is
made available for use by multiple users, projects, or organizations within a cloud environment. It
contains the operating system, configurations, applications, and data required to deploy virtual
machines quickly and consistently.
In cloud security, shared images are powerful tools for efficient resource deployment but must be
handled with strict security controls. Ensuring sanitization, access restriction, encryption, and
regular auditing prevents image-based threats and protects the cloud ecosystem.
A shared image is a pre-configured virtual machine template that can be reused to create multiple
instances of identical systems in the cloud.
In cloud security, the management and sharing of such images must be handled carefully to prevent
data leaks, unauthorized access, or malware distribution.
Shared images are essential for efficient, scalable, and standardized deployments in cloud
computing.
However, without proper security controls, sanitization, and monitoring, they can become a vector
for attacks or data leaks.
Implementing access control, encryption, digital signatures, and regular audits ensures that shared
images remain trustworthy and secure across cloud environments.
14
Purpose of Shared Images
Threat/Issue Description
Sensitive information (like credentials, API keys) may be left inside the image
Data Leakage
before sharing.
Malicious Code
Attackers may insert malware or backdoors into shared images.
Injection
Version Control Issues Outdated or unpatched shared images can have vulnerabilities.
15
5. Examples in Cloud Platforms
• Microsoft Azure:
→ Uses Shared Image Gallery for managing and distributing VM images.
→ Provides versioning and replication across regions.
Management OS.
In cloud computing, the Operating System (OS) is a critical layer that manages hardware resources
and provides services for applications. In cloud environments, OS security is vital because multiple
tenants may share physical resources (multi-tenancy), increasing the attack surface.
Cloud OS management ensures the confidentiality, integrity, and availability (CIA) of the OS and all
hosted workloads.
OS management in cloud security is about proactively securing the operating system to prevent
attacks that exploit vulnerabilities, misconfigurations, or weak access controls. It’s the foundation of
secure cloud operations.
Responsibilities of OS in Cloud
1. Resource Management:
2. Process Management:
3. Security Enforcement:
4. Virtualization Support:
16
3. Security Challenges for Cloud OS
1. Multi-Tenancy Risks:
2. VM Escape:
o Malicious software in a VM could break isolation and affect the host OS or other
VMs.
3. Patch Management:
4. Unauthorized Access:
5. Resource Exploitation:
o DOS (Denial of Service) attacks can consume excessive CPU, memory, or I/O
resources.
17
5. OS Security Tools in Cloud
6. Summary Table
Backup & recovery Secure, versioned backups and disaster recovery plans
Amazon Web Services (AWS) is a comprehensive and widely adopted cloud computing platform
offered by Amazon. It provides a combination of Infrastructure as a Service (IaaS), Platform as a
Service (PaaS), and Software as a Service (SaaS) offerings to individuals, companies, and
governments, allowing them to store data, host applications, deploy virtual servers, manage
18
databases, perform analytics, and leverage artificial intelligence capabilities without owning
physical hardware. AWS eliminates the need for organizations to invest heavily in on-premises
infrastructure, offering scalable, flexible, and pay-as-you-go services.
AWS launched in 2006, and it has grown into one of the largest cloud platforms in the world, with
services spanning compute, storage, networking, databases, analytics, security, IoT, machine
learning, and application development.
1. Compute Services:
2. Storage Services:
o EBS (Elastic Block Store): Persistent block storage for EC2 instances.
3. Database Services:
19
7. Management & Monitoring:
Advantages of AWS:
3. Global Reach: Data centers across the world ensure low latency and high availability.
Real-Time Examples:
• Netflix uses AWS for video streaming and scalability during high demand periods.
• Airbnb leverages AWS for its cloud storage, database, and analytics services.
• NASA’s Jet Propulsion Laboratory uses AWS for big data storage and processing.
Amazon EC2 (Elastic Compute Cloud) is a web service that provides resizable virtual servers in the
cloud, allowing users to run applications on virtual machines (VMs) called instances. EC2 is a core
compute service in AWS that enables developers and organizations to deploy applications without
investing in physical hardware.
EC2 provides complete control over instances, including operating system choice, storage,
networking, and security. Users can scale compute capacity up or down automatically based on
requirements.
20
• Integrate with AWS services like RDS, S3, CloudWatch.
1. General Purpose: Balanced CPU, memory, and networking. Example: t3, t4g.
2. Compute Optimized: High CPU for compute-intensive tasks. Example: c6g, c7g.
3. Memory Optimized: High memory for large-scale databases. Example: r6g, x2gd.
5. Accelerated Computing: GPU instances for AI, ML, and graphics. Example: p3, g4.
Advantages of EC2:
Real-Time Examples:
• Spotify uses EC2 instances for backend services that process millions of music requests.
• NASA deploys EC2 for high-performance computing tasks like satellite data processing.
3. Connecting Clouds
1. Hybrid Cloud: Combines private and public clouds using secure connectivity.
2. Multi-Cloud: Uses services from multiple cloud providers to avoid vendor lock-in.
3. VPN (Virtual Private Network): Secure connection between on-premises and cloud.
4. Direct Connect (AWS): Dedicated network connection to AWS for high-speed access.
5. Cloud Interconnect Services: Tools like Google Cloud Interconnect or Azure ExpressRoute.
21
Advantages:
Real-Time Examples:
• Adobe uses hybrid cloud to run SaaS services for different geographies.
Definition:
AWS security rules are policies and configurations that control access to cloud resources. Security is
crucial because cloud resources are accessible over the internet. AWS provides multi-layered
security, combining network-level, user-level, and application-level protections. Security rules are
primarily managed through IAM policies, security groups, and network ACLs (Access Control Lists).
2. Security Groups:
3. Network ACLs:
4. Encryption:
22
Advantages of AWS Security Rules:
Real-Time Examples:
• Capital One uses AWS security services to manage access and encrypt customer data.
• Netflix applies strict IAM roles and security groups for EC2 instances.
Definition:
Launching an EC2 Linux instance means creating a virtual machine running Linux OS on AWS. Linux
is preferred due to its stability, cost-efficiency, and open-source ecosystem. Users can launch EC2
Linux instances for web servers, databases, application servers, and batch processing tasks.
3. Choose “Launch Instance” and select a Linux AMI (Amazon Machine Image).
23
Real-Time Examples:
Cloud Application Development using AWS is a powerful and flexible approach to building scalable,
reliable, and secure applications. AWS provides a wide range of services including EC2 instances,
storage, networking, and analytics tools. EC2 allows developers to deploy customizable virtual
machines, and connecting clouds ensures multi-cloud and hybrid strategies. AWS security rules
safeguard sensitive data while launching Linux EC2 instances is a practical choice for stable, cost-
effective applications. Real-world implementations by companies like Netflix, Spotify, NASA, Airbnb,
and Reddit demonstrate the effectiveness and global adoption of AWS cloud solutions.
24