• Tidak ada hasil yang ditemukan

Data and infrastructure security auditing in cloud computingenvironments International Journal of Information Management

N/A
N/A
Protected

Academic year: 2024

Membagikan "Data and infrastructure security auditing in cloud computingenvironments International Journal of Information Management"

Copied!
5
0
0

Teks penuh

(1)

ContentslistsavailableatScienceDirect

International Journal of Information Management

j o u r n a l ho me p ag e:w w w . e l s e v i e r . c o m / lo c a t e / i j i n f o m g t

Data and infrastructure security auditing in cloud computing environments

Hassan Rasheed

TaifUniversityDeanshipofInformationTechnology,SaudiArabia

a r t i c l e i n f o

Articlehistory:

Availableonline3December2013

Keywords:

Cloudcomputing Securityaudit Dataintegrity Standardscompliance

a b s t r a c t

Formanycompaniestheremainingbarrierstoadoptingcloudcomputingservicesarerelatedtosecurity.

Oneofthesesignificantsecurityissuesisthelackofauditabilityforvariousaspectsofsecurityinthe cloudcomputingenvironment.Inthispaperwelookattheissueofcloudcomputingsecurityauditing fromthreeperspectives:userauditingrequirements,technicalapproachesfor(data)securityauditing andcurrentcloudserviceprovidercapabilitiesformeetingauditrequirements.Wealsodividespecific auditingissuesintotwocategories:infrastructuresecurityauditinganddatasecurityauditing.Wefind ultimatelythatdespiteanumberoftechniquesavailabletoaddressuserauditingconcernsinthedata auditingarea,cloudprovidershavethusfaronlyfocusedoninfrastructuresecurityauditingconcerns.

©2013ElsevierLtd.Allrightsreserved.

1. Introductionandmotivation

CloudcomputinghasbecomeoneofthedominantITparadigms ofthecurrentage:fulfillingtheneedofusersfordynamic,high- capacity computing capabilities in diverse applicationssuch as businessintelligenceanddataarchivingwhileessentiallycreat- ingbusinessvalueforcloudprovidersoutof(whatwasatleast initially)surpluscomputingresources.Withallemergingtechnolo- gies,however,thelongevityoftheparadigmwillbedeterminedby thewayinwhichcertainchallengesaremet.

Oneof those chiefchallenges for cloudcomputing, and one whichhasmademanyorganizationshesitanttoadoptcloudsolu- tionsissecurity.TheEuropeanNetworkandInformationSecurity Agency(ENISA,2009)surveyedconcernsregardingcloudcomput- ingsecurityand among thetopten risks,two ofthem (loss of governanceandcompliancerisks)weretracedtothesamevul- nerability:namely,thatauditisnotavailabletocustomers.Within thecontextofcloudcomputing,therefore,thetermsecurityaudit- ingactuallyentailstwoseparateissues:thefirstishavingthecloud providertakeappropriatemeanstoensurethatdataorinfrastruc- tureissecure(the‘security’);thesecondismakingitpossiblefor thecustomertoverifythatthosesecuritycontrolsareindeedin placeandworkingaspromised(the‘auditing’).Itispossiblethata CloudServiceProvider(CSP)couldhavethefirstwithoutthesec- ond(securitywithnoauditing).Forexample:acloudproviderthat attemptstoensuredataintegritythroughtheuseofbackups.The

Tel.:+966536895637.

E-mailaddress:[email protected]

controlisinplacebuttheusermayhavenowaytoeasilyverify orauditthebackupsthatthecloudproviderismaking.Auditisan importantconcernbecauseitisameansthroughwhichthecus- tomercanattesttothewayinwhichtheirtechnologyresources arebeinghandled.Ourdiscussionofsecurityauditingwillfocuson customerandthird-partyauditingofcloudprovidersecuritycon- trolsandmethods–notonthemoregeneralissuesofcloudsecurity ortechnologyauditing.

Inthis paper,wewillattempttolookat thegeneralsubject ofcloudsecurityauditingwiththeaimofprovidinganswersto thefollowingcriticalquestions:(1)whatarethespecificauditing concernswhichmustbeaddressedtoensurebroaderadoptionof cloudcomputingtechnologies,(2)whatisthecurrentstateofcloud auditincurrentofferingsand(3)howmanyofthelingeringaudit issuescouldberesolvedusingexistingresearchapproachesand howmanydemandstillfurtherwork.Inordertodothat,wewill examineuserrequirementsforcloudauditingsecurityalongwith someoftheexistingresearchsolutionstogetanideaofwhatcould realisticallybeintegratedin cloudauditingsecurityin thenear future(asopposedtomoreunresolvedissuesthatwillrequiremore long-termsolutions).Thesetwowillbecontrastedagainstwhat cloudserviceprovidersarecurrentlyoffering(i.e.vendorsolutions forcloudsecurityauditing).

Inouranalysis,wewilllookatauditissueswhichcouldpoten- tially arise in all of the various cloudofferings: Software as a Service,PlatformasaService,StorageasaServiceandInfrastruc- tureasaService.Wewillsubdividetheseconcerns,however,into infrastructuresecurityauditinganddatasecurityauditing.Infra- structuresecurityisimportanttoallofthedifferentcloudservice layers:a customerdevelopinganapplicationonaCSPprovided 0268-4012/$seefrontmatter©2013ElsevierLtd.Allrightsreserved.

http://dx.doi.org/10.1016/j.ijinfomgt.2013.11.002

(2)

developmentstack,forinstance,mayhavethesameconcernsabout howvirtualmachineimagesandsnapshotsarestoredasacustomer whoisusingcompletevirtualservers.

Datasecurityissues,however, willbemostcritical forthose users above the infrastructure level: users relying on cloud databases,softwaredevelopmentplatforms,orcompleteapplica- tions.Ifacloudcustomerhastheirownvirtualcloudinfrastructure theninmostcasestheywillhavetheabilitytoimplementtheirown systemstoensuredataauditabilitybecausetheyhavecomplete virtualizedserversanddirectaccesstoinstallorsetupwhatever applicationstheydesire.Itiswhentheuserdoesnothavethatlevel ofaccess–andconsequentlymuchofwhathappenstotheirdata istransparent–thattheirismoreplanningnecessarytomaintain auditability.

2. Userrequirementsforcloudsecurityauditing

Wedividethebroadscopeofusersecurityneedswithrespectto cloudcomputingauditingintotwosub-areas:infrastructuresecu- rityanddataauditing.Theinfrastructureauditingconcernsdeal withthesystemsthatareusedtoprocessdataandthesecurity controlsthatareinplacetoprotectthosesystems.Theseconcerns aredistinguishedbybeingagnostictotheactualnatureofthebusi- nessorworkbeingperformedandmerelyensuringthatasecure environmentisavailableforbusinesstobeconducted.Dataaudit- ingconcernshavetodowiththepreservationofthedataitself:its confidentiality,integrityandavailability.Thedataisdistinguished bybeingtheinformationthatisstoredandprocessedontheinfra- structuresystemsmentionedpreviouslyandisinherentlytiedto thenatureofthebusinessitself.

2.1. Infrastructureauditingneeds

BecauseoverallsecurityintheITindustryisfrequentlydriven bybestpracticestandards,userconcernsforcloudinfrastructure securityalsoseemtobedrivenbythosestandards.Twoofthemost widelyusedandimportantstandardsforenterpriseinfrastructure securityareInternationalStandardsOrganizationsecuritystandard (ISO27001)InternationalOrganizationforStandardization(ISO) (n.d.)andPaymentCardIndustryDataSecurityStandard(PCIDSS) PCIStandardsSecurityCouncil(2010).

2.1.1. Paymentcardindustrydatasecuritystandard

PCIDSS(PCIStandardsSecurityCouncil,2010)isafrequently usedsecuritystandardinITbecauseachievingcertificationisapre- requisitetobeingabletohandlecustomercreditcardinformation.

Thestandardconsistsof11corerequirementsinsixmainareas:

buildingandmaintainingasecurenetwork,protectingcardholder data,maintaining a vulnerability management program, imple- mentingstrongaccesscontrolmeasures,regularlymonitoringand testingnetworksandmaintaininganinformationsecuritypolicy.

Organizationswishing to gain certification against therequire- mentsofthis standard mustgetanassessment fromasecurity specialistapprovedbyPCIDSS.

Because of the ambiguity of previous versions of PCI DSS regarding virtualization and multi-tenancy, version 2.0 (PCI StandardsSecurityCouncil,2010), waschangedtoclarifythese issues.Inparticular,the2.0standardestablishesthatvirtualcom- ponentsarealsoincludedundertheheadingofsystemcomponents towhichthestandardapplies.Italsochangedthepreviousrequire- mentthateachserverimplementonlyoneprimaryfunction,sothat itnowallowsforasinglehardwareservertohostmultiplevirtual machineswithdifferentfunctionsaslongaseach ofthevirtual machineshasonlyoneprimaryfunction.Thisisacriticalchangeto allowmerchantstobecomePCIcertifiedusingmulti-tenantcloud offerings.

Despitethesechanges,however,there remainaspects ofthe standardwhichmaybedifficultforcloudcustomerstomeet.In discussinganarchitectureforsecurityin publiccloudofferings, the authors in Prafullchandra et al. (2011) outline risk factors for eachof thecorePCI DSSprovisions.These riskfactorshave beendiscussedindetailinRasheed(2011),butwewillsumma- rizethemostsignificantofthemintosevencategories:virtualized networkdevicesrequiringgreaterdocumentationtodemonstrate effectivenetworkseparation,automaticallyprovisionedsystems usingdefaultsettings(risksfromtwocoreareasfallintothiscat- egory),exposureofvolatilememorywhenit iswrittentodisk, disclosureofprivatedataonpublicnetworks,managingvulner- abilitypatchingondynamicvirtualsystems,hypervisor-resident accesscontrolmethods(risksfromthreedifferentcoreareasfall intothiscategory)and maintainingaudittracesforallmachine activity.

Oftheseconcernssomeareeasiertoresolvethanothers.We willdividetheseconcernsintothreetypesbasedonthedifficultyof resolution:easy,moderateanddifficult.Thefirstone,forinstance, requiringgreaterdocumentationforeffectivenetworkseparation wouldmerelyrequirethecooperationofthecloudserviceprovider (CSP) in allowingaccess tosome oftheir network architecture diagrams.Andbecausethere areCSPsbeginningtothissuchas Amazon(aswillbediscussedin detailinanupcomingsection), thereisarelativelysimpleresolutiontothisrisk.Thesecondrisk regardingautomaticsystemprovisioningisalsoeasytoresolve:

thecloudcustomermerelyneedstousetheservicesofaprovider whichallowscustomerstoimporttheirowncustomizedimages tocreatevirtualmachines,ratherthanusingbaseimagesprovided bytheCSP.Theriskofvolatilememorybeingwrittentothediskis actuallynotspecifictovirtualmachines(althoughitismorepreva- lent):manymodernoperatingsystemshavethecapabilityfora usertosuspendthesession,writingvolatilememorytodiskand poweringoffthemachine.Theriskishigherwithvirtualization, however,becauseasingleservermayberesponsibleformanag- ingsnapshotsofmanyvirtualmachines.Theresolutiondifficulty forthisriskisthereforemoderatebecausethemanaginghyper- visor willneedtobeone that supportsgranularaccesscontrol forvirtualmachinesandencryptsbackups.Theriskofdisclosing privatedatais alsoeasy toresolve, becausethecardprocessor cansimplyensurethatalldatatransmittedoverthenetworkis encrypted.Theremaybesomeneedtodeterminewhatconstitutes a‘publicnetwork’iftherearemultiplevirtualmachinesrunning onapubliccloudhost,but intheworstcasetheprocessorcan satisfytherequirementbyencryptingtrafficevenbetweenpeer servers.

Managingvulnerabilitypatchingcouldbehandledeasilyifthe individualmachinesareresponsibleforpullingtheirownupdates using the service provided by a specific operating system (e.g.

WindowsUpdate,RedHatNetwork,etc.).If,however,thecloud customer will need to update multiple software packages and thuswantstopushupdatesandpatchestotheirvirtualmachines thiswilldependupontheconfigurationoptionstheyhavewith theirserviceprovider.DependingontheCSPthiscouldbeadif- ficult risk to resolve optimally. There are, however, CSPs such as IBM(IBM, n.d.)that do offer privatepatch servers.The risk regardinghypervisor-residentaccesscontrolisofmoderatediffi- cultytoresolve:thecustomerwillneedtoensurethattheCSPthey areusinghasanaccesscontrolsysteminplacewherebyaccesspriv- ilegesarelimitedbyjobfunctionandthataccesstothehypervisor andvirtualmachinesaregovernedbythataccesscontrolsystem.

Lastly,thesecurityriskfordataloggingisalsoofmoderatedifficulty toresolve:thecloudcustomermustensurethatthehypervisorrun- ningtheirvirtualmachineshasloggingcapability,thatitisenabled andthatthoselogscouldbeobtainedifneededforcertification purposes.

(3)

2.2. Dataauditingneeds

Wewillfocusonfouressentialdatachallengesthatfallunderthe topicofdatasecurityauditing:dataintegrity,dataconfidentiality, datalineage,dataprovenanceanddataremnance.Dataintegrity meansthe“thepreservationofdatafromunauthorizedchanges”

(Mather,Kumaraswamy&Latif,2009)andthismustbeensuredfor bothdataresidinginastoragemediumorbeingtransferredover thenetwork.Dataconfidentialityistheneedforusersto“preserve datafromunauthorizeddisclosure”(Matheretal.,2009):thisprop- ertymustalsobeachievedfordataresidentinastoragemedium andbeingtransferredoveranetwork.

Traditionally,in much of thedata processing literaturedata lineage has been used interchangeably with provenance. Bose andFrew(2005),forexampledefineslineageas“theoriginsand processinghistory,”ofobjectsandprocesses.Withinthespecific areaofcloudcomputing,however,lineagehasalsotakenonthe additionalmeaningofreferringtotheabilitytotrackexactlywhere thedatawaslocatedatanygiventimeandbeingabletofollowthe pathofdata(Matheretal.,2009).Thisisofspecialconcernincloud computingarchitecturesbecausesuchsystemsmaydynamically movevirtualizedsystemsanddataforperformanceandscalabil- ityreasonsandsomeofthedatamayhavecomplianceregulations statinginwhichgeographicareasthedatacanbestored.

DataprovenanceisdefinedinMatheretal.(2009)astheabil- itytodemonstratethatthedataiscomputationallyaccurateand wascorrectlycalculatedbasedonacertaindelineatedmethod.In Simmhan,PlaleandGannon(2005)itisdefinedas“...information thathelpsdeterminethederivationhistoryofadataproduct,start- ingfromitsoriginalsources,”whichincludesbothprecedingdata elementsusedinthederivationaswellasthederivationprocess.

Thisissueismorecomplexthanintegritybecauseitalsoencom- passesensuringandverifyingthatchangesmadeinanauthorized mannerarefundamentallycorrect.

Dataremnanceisthepossibilitythatsomeresidualportionsof datamayremainafteritwaserasedor removed(Matheretal., 2009). The risk is that such remnants could be inadvertently exposedtoaunauthorizedthirdparty.Itisthereforeaconfiden- tialityissue,butfocusedonretainingtheconfidentialityofdata whichwasintendedtoberemoved.

3. Techniquesfordatasecurity

Intheprevioussection,weprovidedanoverviewoftheimpor- tantissues indataauditingwhich maybeofconcernforcloud serviceusers.Inthissectionweprovideabriefoverviewofsome ofthe recent techniquesproposedin those same areasof data auditing.Specialattentionwillbegiventoapproachesspecifically proposedforuseincloudenvironmentsorwhichcouldbeeasily adaptedtocloudenvironments.

3.1. Dataconfidentialityandintegrity

Cryptographyis a toolfrequentlyusedtoensuredata confi- dentiality,privacyandintegrity.IndiVimercati,Foresti,Jajodia, ParaboschiandSamarati(2007)theauthorsdesignanaccesscon- trolsystemforuseinoutsourceddatastorage(suchasstorageas aserviceofferings)thatreliesonissuingcryptographicallyderived accesstokenstousers.Anumberofapproachesalsoproposetech- niquesforqueryingandsearchingdatathatresidesencryptedon thecloudserver(Cao,Wang,Li,Ren&Lou,2011;Lietal.,2010;

Wang,Cao,Li,Ren&Lou,2010).

Therehasalsobeensomerecentworkonapplyingtheconcepts ofremotedataintegritycheckingtoenableastoragecustomerto verifytheintegrityoftheirdatastoredinapubliccloud.InWang

etal.(2010),Wang,Chow,Wang,RenandLou(2011)andWang, Wang,Ren,LouandLi(2011),theauthorsdevelopanapproachfor privacy-preservingthirdpartydataintegritycheckingthatrelieson achallengeprotocoltoverifypre-calculatedcryptographichashes offilesegments;theproposedschemealsosupportsbatchdata auditing.Zhuetal.(2011)proposesasimilarintegritychecking mechanismbutassumestheThirdPartyAuditor(TPA)asatrustable delegateoftheoriginaldataownerandthusdoesnotprovidecon- trolsforpreventingtheoriginaldatacontentsfrombeingdisclosed totheTPA.

3.2. Dataremnance

Dataremnanceinthecloudhasreceivedverylittleattention comparedtotheotherusersecurityconcerns.Therehasbeensome workonproofsofsecureerasurewithmobileembeddeddevices (Karvelas,2013;Perito&Tsudik,2010).Manyofassumptionsused bysuchproofs,however–suchasassumingthatthestoragedevice hasfixedmemoryofknownsize–donotholdforthecloudscenario andthusthereisstillmuchworkrequiredondataremnance.Inlieu ofsuchapproaches,therefore,theassumptionofthecloudprovider asanuntrustedagentisevenmoresignificant:iferasurecannotbe provenandtheclienthasnoaccesstothestoragemediumthenit becomesevenmoreimportantthatthedatawhichisgiventothe CSPisinencryptedformtobeginwith.

3.3. Datalineageandprovenance

InSimmhanetal.(2005)theauthorspresentasurveyofdata provenance techniquesand systems along witha taxonomy of provenanceapproaches basedonfourmainaspects: thesubject oftheprovenancedata(i.e.dataorprocess),therepresentation ofthedata,itsstorageanddissemination.Themajorityofthesys- temssurveyedweresystemsfordistributedprocessingofscientific data.Onlyone–ProvenanceAwareService-orientedArchitecture (PASOA)(Groth,Luck&Moreau,2005)–proposesanopenpro- tocolfordataprovenancethatcouldpotentiallybeleveragedfor provenanceinfrastructuresinthecloudcomputingdomain.Among othercapabilities,thesystemsupportscollectingdataontheinputs andoutputsofserviceinvocationwhichmustbeagreeduponby boththeclientandtheserviceprovider.Allprovenancemessages areassignedauniqueIDwhichcanbeusedtoconstructaprocess orientedprovenancetraceoftheoriginalworkflow.

InBoseandFrew(2005)asurveyofdatalineage/provenance approachesispresented,inwhichtechniquesareclassifiedbased onhowchangesareintroducedintothedata:commandlinebase dataprocessing,scriptandprogram-baseddataprocessing,work- flowsystembaseddataprocessing,query-baseddataprocessing andservice-baseddataprocessing.However,theissueoftracking thephysicallocationwheredatawasprocessedwasnotdiscussed inthesurveyedapproachesandthusthisaspectofdatalineagehas yettobeaddressedwithapproachescompatiblewiththecloud computingenvironment.However,judgingbythebreadthofthe availableapproachesforgeneraldataprovenance,extensiontoalso collectdataaboutthephysicallocationoftheprocessingserver shouldbeastraight-forwardmodification.

4. Providersecuritycapabilities

4.1. Securityandcomplianceatleadingcloudproviders

IndeterminingthespectrumofCSPsecurityofferings,welooked atthetoptenpubliccloudstorageprovidersbasedona recent surveybyGartner(Ruth&Chandrasekaran,2012):AmazonWeb Services, AT&T, Google, HP, IBM, Internap, Microsoft, Nirvanix, RackspaceandSoftlayer.Ofthese,allalsohadInfrastructureasa

(4)

ServiceofferingsexceptforMicrosoft(whoonlysupportsIaaSser- vicesbyprovidingsoftwaretoitsresellers)andGooglewhoseIaaS isstillinbetatestingatthetimeofwriting.

4.1.1. Infrastructuresecurity

Allofthecompanieswesurveyedprovideddetailedinforma- tion abouttheirsecurity controlsand processes aswell asthe compliancecertificationstheyhavereceivedsuchasPCIDSS,ISO 27001andSafeHarbor.Allofthecompaniesalsoprovideadditional securityservicesfortheirclientsasadd-onstothebasicservice.

Forafewofthelargertechcompaniesinthelist(HP,IBM)this includescustom-developedsecurityplatformsthataremadeavail- abletocustomers.Forexample,HPprovidesatechnicalwhitepaper (HP,n.d.)whichgivesanoverviewofitsTippingPointIPStechnol- ogywhichisprimarilyresponsibleforthesecurityofitsservers, networkhardwareand datacenters.In thepapertheyalsodis- cussaCloudArmoursolutionwhichisauser-configurableIPSand firewallforVMsrunningintheirenterpriselevelcloudoffering.

OtherproviderssuchasAmazon,AT&T,RackspaceandInternap justprovideadd-onservicessuchasmanagedfirewalls,intrusion detection/preventionoridentityandaccessmanagementasmodu- lar,independentsecurityservices.Yetanothermodelforproviding additionalsecurity serviceswastheuseof specialized partners toprovidethird-partysecurityasaservice.Softlayer,forexam- pleofferscustomersafree“PCICompliance”accountwithMcAfee Secure(aservicethatprovideswebsitemonitoringandsecurity certification).

Onlyonecompany(Amazon)supplementedthediscussionof theirownsecuritycertificationswithdetailedinformationabout howtheircustomers couldachieve standardscomplianceusing theirpubliccloudoffering.LikemostotherCSPs,theyofferapage describingtheirsecuritycontrolsandcertification;buttheygofur- therin detailingfrequently askedquestions bytheircustomers regardingPCIDSSandISO27001(AmazonWebServices,n.d.-a, n.d.-b).Theyalsooffertoprovidecustomerswithasetofdocu- mentstoassist theminobtainingtheirown certificationwhich includes: theattestationof PCI compliancefor AWS,high-level documentationsuchasthedescriptionofthein-scopeenviron- mentandmoredetaileddocumentationsuchasadetailedmatrix ofPCIDSScontrolsdescribingwhoisresponsibleforeach indi- vidualcontrol.Theyprovideageneralruleregardingthebalance betweenthesecurityresponsibilitiesofCSPandcustomerssay- ing,“fortheportionofthePCIcardholderenvironmentdeployed inAWS,your QSA(QualifiedSecurityAssessor)canrely onour validatedserviceproviderstatus,butyouwillstillberequiredto satisfyallotherPCIcomplianceandtestingrequirements,includ- inghowyoumanagethecardholderenvironmentthatyouhost withAWS”AmazonWebServices(b).AWSalsoassertsthatsev- eralcustomers have achievedPCI DSS certification, although it is not clearwhich parts of theirinfrastructure werehosted on AWS.

Also AWS offers some guidance regarding the ISO 27001 standard. However, perhaps because therequirements for that standard are more high-level, no compliance pack is made availablewhichdetailswheretheresponsibilityforcertaincon- trols lie.To illustrate this point, for example, PCI DSS requires thingssuchasthefollowing:buildingandmaintainingasecure network, protecting cardholder data, implement strong secu- rity measures and regular testing and monitoring of networks (PCI StandardsSecurityCouncil,2010).ISO 27001,ontheother hand,requiressystematicallyevaluatinginformationsecurityrisks, implementing information security controls and risk manage- ment and adopting an overarching management process for securitycontrols(InternationalOrganizationforStandardization (ISO)).

4.1.2. Datasecurity

CSPsupportforauditingdatasecurityiscurrentlyverylimited.

In fact, the only CSP supportingreal-time auditingof any sort appears tobe Amazonwith itsCloudWatch API(Amazon Web Services,n.d.)and,asdiscussedpreviouslyindetail(Park,Spetka, Rasheed,Ratazzi&Han,2012;Rasheed,2011),thisAPIonlyreally supportsauditingperformancestatisticsforvariousAWSofferings.

CloudAudit(Hoff,Johnston,Reese&Sapiro,2010),anindustry-wide efforttostandardizeonawaytopresentsecuritycompliancedoc- umentationseemstohavemadenofurtherprogressafteranRFC (requestforcomments)submittedtotheIETFin2010.Furthermore, evenbasicsupportfordatasecurityinsoftware,platformandstor- agelevelcloudofferingsisalsoverylimited.Theloneexception appearstobeAmazon’ssupportfor encryptionofdatathrough a JavaAPIfor itsS3 storage-as-a-serviceoffering.Thispartially resolvessomeconfidentiality issues,butonlyinthecasewhere thedataisnotregularlyupdated.

5. Relatedwork

In Zhou,Zhang, Xie, Qianand Zhou(2010),theauthors dis- cussthecloudsecurityissuesofavailability,confidentiality,data integrity,controlandauditinadditiontoprivacyissues.Thereisa significantdiscussionofhowvariousCSPsaremeetingthesecurity challengesofthevariousareas,especiallyfortheareasofavail- ability,confidentiality,dataintegrityandcontrol.Thediscussionof auditingchallengesismoregeneral.Theauthorsadvocateforaudit- ingtotakeplaceinasoftwarelayerwithinthevirtualoperating systemandthatsuchasystemshouldprovideminimal-overhead monitoringofeventsandlogs.

InSubashiniandKavitha(2011),asurveyispresentedofsecurity issuesarisinginserviceorientedarchitectures(andconsequently cloudcomputingplatformsbecauseoftheirrelianceonserviceori- entation).Theauthorsdividesecurityissuesbasedonthecloud servicelevelatwhichtheyoccur:SoftwareasaService,Platform asaServiceandInfrastructureasaService.Intotalfourteenbroad securityissuesareoutlinedforSoftwareasaServicecloudofferings including:datasecurity,networksecurity,dataintegrityanddata segregation.TheconcernslistedforPlatformasaServiceandInfra- structureasaServicearemoregeneral,however,andnospecific issuesaredetailed.Dataauditingisnotlistedasoneofthesecu- rityconcernsatanyservicelevelandthereisonlyabriefmention howcurrentcloudofferingsaddressthesecurityissueswhichare raised.

InChowetal.(2009)theauthorsprovideanoverviewofthe securityissuesintheareaofcloudcomputingbydividingthem intothreecategories:traditionalsecurityissuesthatarealsoprob- lematicincloudcomputing,availabilityissuesandissuesarising fromthirdpartydatacontrol.Amongthesixdatacontrolissues listedisthedifficultyofperformingaudits.Theyalsooutlinetwo researchdirectionswhichcouldbeusedtoalleviatesomeofthe datacontrolissuesandprovidevarioustypesofauditability.The firstisthenotionofatrustedmonitorresidingonthecloudserver whichcanaudittheserversactionsandprovideverifiableproofs ofcompliancetothedataowner.Thesecondisfordatatobeself- describing,self-protectingandcapableofcreatingasecurevirtual environmentfordataaccessconsistentwithanembeddedusage policy.

TheauthorsinChen,PaxsonandKatz(2010)performagen- eralanalysisofcloudcomputingsecurityissues,arguingthatmost ofthesecurityissuesrelatedtocloudcomputingwerefirstcon- frontedin themain-frame time-sharingcomputingerabutthat multi-partytrust andtheneedformutualauditabilityaresecu- rityissuesuniquetothecurrentformulationofcloudcomputing.

TheresearchpresentedbyKaufman(2009)examinessomeofthe

(5)

legalandregulatoryissuesoverwhetherthecustomerorthecloud serviceproviderisresponsibleformaintainingdatasecurityfor informationstoredinthecloud.InJansenandGrance(2011)the authorssurveythesecurityandprivacyissuesrelatedtocloudcom- putingandprovidessomeguidelinesfororganizationsconsidering utilizingcloudserviceofferings.

6. Conclusion

Despite itssignificantgrowth,there are still someobstacles tothemore widespread adoption ofcloud computingservices.

For many companies the most significant concern is security andspecificallythelackofauditability.Wehaveexaminedcloud computingauditingfromthreeperspectives:userauditingrequire- ments,technicalapproachesforsecurityauditingandcurrentcloud serviceprovidercapabilitiesformeetingauditrequirements.User auditing requirementswere further divided into infrastructure securityauditinganddatasecurityauditing.Many oftheinfra- structureauditingrequirementsaredrivenbytheneedtoachieve compliancewithanITsecuritystandard.Forthatreasonweprofiled theinfrastructureauditingrequirementsofthePCIDSSstandard version2.0(PCIStandardsSecurityCouncil,2010).Whilemostof therisksareeasytoovercomewiththeco-operationoftheCSPa fewsuchaspatchmanagementmaypresentchallengesdepending onuserrequirementsandproviderinfrastructureandconfigura- tion.Dataauditingissuesincludedconfidentiality,integrity,data remnance,dataprovenanceanddatalineage. Thereareanum- berofapplicableapproachesineachoftheseareaswhichcould serve the data auditing needs of cloud service users with the exceptionofdataremnancewhich appearstobeanopenissue withinpublic cloudofferings. While most of theleading cloud providershavebeguntoprovidesignificantdetailabouttheirown internalinfrastructuresecurityandcompliance,onlyonecarefully addressedquestionsregardinghowusersofpubliccloudofferings couldalsoachievestandards compliance.Unfortunately, among thecloudproviderssurveyedwedidnotfindanywithsolutions foruserdatasecurityauditing.However,becausethecloudser- vicesmarketisdrivenandshapedbycustomerdemands,ifsuch auditingfeaturesbecomeacriticalservicedifferentiatorforasuf- ficientnumberofcustomersthenCSPswilllikelybegintooffer them.

References

AmazonWebServices.(n.d.-a).AmazonCloudWatch.RetrievedFebruary2013, from:http://aws.amazon.com/cloudwatch/

AmazonWebServices.(n.d.-b).ISO27001Certification.RetrievedFebruary2013, from:https://aws.amazon.com/security/iso-27001-certification-faqs/

Amazon Web Services. (n.d.-c). PCI DSS Level 1 Compliance. Retrieved February 2013, from: https://aws.amazon.com/security/pci-dss-level-1- compliance-faqs/

Bose,R.,&Frew,J.(2005).Lineageretrievalforscientificdataprocessing:Asurvey.

ACMComputingSurveys,37(1),1–28.

Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2011). Privacy-preserving multi-keyword ranked search over encrypted cloud data. In Proceedings IEEE INFOCOM 2011, 10–15 April 2011 (pp. 829–837). Shanghai, China:

IEEE.

Chen,Y.,Paxson,V., & Katz,R. H.(2010).Whats newabout cloudcomputing security? Technical Report UCBEECS-2010-5. Berkeley, CA, USA: Depart- ment of Electrical Engineering and Computer Sciences, University of CaliforniaatBerkeley. Retrievedfrom:http://www.eecs.berkeley.edu/Pubs/

TechRpts/2010/EECS-2010-5.html

Chow,R.,Golle,P.,Jakobsson,M.,Shi,E.,Staddon,J.,Masuoka,R.,etal.(2009).Con- trollingdatainthecloud:outsourcingcomputationwithoutoutsourcingcontrol.

InProceedingsofthe2009ACMworkshoponcloudcomputingsecurity(pp.85–90).

Chicago,IL:ACM.

diVimercati,S.D.C.,Foresti,S.,Jajodia,S.,Paraboschi,S.,&Samarati,P.(2007).

Adataoutsourcingarchitecturecombiningcryptographyandaccesscontrol.

InProceedingsofthe2007ACMworkshoponcomputersecurityarchitecture(pp.

63–69).Fairfax,VA,USA:ACM.

Groth,P.,Luck,M.,&Moreau,L.(2005).Aprotocolforrecordingprovenancein service-orientedgrids.InPrinciplesofdistributedsystems:8thInternationalcon- ference,OPODIS2004,15–17December,Grenoble,France(pp.124–129).Berlin, Heidelberg:Springer.

Hoff,C.,Johnston,S.,Reese,G.,&Sapiro,B.(2010).Cloudaudit1.0automatedaudit, assertion,assessment,andassuranceapi(a6)(Internet-draft).Fremont,CA,USA:

IETFNetworkWorkingGroup.

HP.(n.d.).HPcloudsystem:Integratingsecuritywithhptippingpoint(techni- calwhitepaper).PaloAlto,CA,USA:Author.RetrievedFebruary2013,from:

http://h20195.www2.hp.com/V2/GetPDF.aspx/4AA4-4247ENW.pdf

IBM.(n.d.). IBM infrastructureasa service (IaaS): Details: Security. Armonk, NY,USA:Author.RetrievedFebruary2013from:http://www-935.ibm.com/

services/us/en/cloud-enterprise/tab-details-security.html

InternationalOrganizationforStandardization(ISO).(n.d.).Internationalorganiza- tionforstandardization.RetrievedJune2011,from:http://www.iso.org/

Jansen, W., & Grance, T. (2011). Guidelines on security and privacy in public cloud computing: Special Report 800-144. Gaithersburg, MD:

National Institutes of Standards and Technology (NIST). Retrieved from:

http://www.nist.gov/manuscript-publication-search.cfm?pubid=909494 Karvelas,N.P.(2013).Proofsofsecureerasure.Athens,Greece:Mastersthesis,Uni-

versityofAthens.

Kaufman,L.M.(2009).Datasecurityintheworldofcloudcomputing.IEEESecurity andPrivacy,7,61–64.

Li,J.,Wang,Q.,Wang,C.,Cao,N.,Ren,K.,&Lou,W.(2010).Fuzzykeywordsearchover encrypteddataincloudcomputing.InProceedingsIEEEINFOCOM,2010,14–19 March2010(pp.1–5).SanDiego,CA,USA:IEEE.

Mather,T.,Kumaraswamy,S.,&Latif,S.(2009).Cloudsecurityandprivacy:Anenter- priseperspectiveonrisksandcompliance.O’ReillyMedia,Inc.

Park,J.S.,Spetka,E.,Rasheed,H.,Ratazzi,P.,&Han,K.J.(2012).Near-real-time cloudauditingforrapidresponse.InAdvancedinformationnetworkingandappli- cationsworkshops(WAINA),26thinternationalconferenceon26–29March2012 (pp.1252–1257).Fukuoka,Japan:IEEE.

PCI Security Standards Council. (2010). Payment card industry (pci) data security standard requirements and security assessment pro- cedures version 2. 0. Wakefield, MA, USA: Author. Retrieved from:

https://www.pcisecuritystandards.org/documents/pci dssv2.pdf

Perito,D.,&Tsudik,G.(2010).Securecodeupdateforembeddeddevicesviaproofs ofsecureerasure.InD.Gritzalis,B.Preneel,&M.Theoharidou(Eds.),ESORICS 2010proceedingsofthe15thEuropeanconferenceonresearchincomputersecurity 2010,Athens,Greece(pp.643–662).Berlin,Heidelberg:Springer.

Prafullchandra,H.,Owens,K.,Richter,C.,McAndrew,T.,Overbeek,D.,Chaubal, C., et al. (2011). PCI-compliant cloud reference architecture. HyTrust, Savvis, Coalfire Systems. VMWare and Cisco Systems. Retrieved from:

http://www.hytrust.com/downloads/ht wppcidssrefarch.pdf

Rasheed,H.(2011).Auditingforstandardscomplianceinthecloud:Challengesand directions.InProceedingsofthe2011internationalArabconferenceoninformation technology(ACIT2011),10–13December.Riyadh,SaudiArabia:ACIT.

Ruth,G.,&Chandrasekaran,A.(2012).Criticalcapabilitiesforpubliccloudstorage services.Stamford,CT:Gartner,Inc.Retrievedfrom:http://www.gartner.com/

technology/reprints.do?id=1-1D9C6ZM&ct=121216&st=sg

Simmhan,Y.L.,Plale,B.,&Gannon,D.(2005).Asurveyofdataprovenanceine- science.SIGMODRecord,34(3),31–36.

Subashini,S.,&Kavitha,V.(2011).Asurveyonsecurityissuesinservicedelivery modelsofcloudcomputing.JournalofNetworkandComputerApplications,34(1), 1–11.

The European Network and Information Security Agency (ENISA). (2009).

Cloudcomputing: Benefits,risks andrecommendationsfor information secu- rity. Heraklion, Greece: Author. Retrieved from: http://www.enisa.europa.

eu/act/rm/files/deliverables/cloud-computing-risk-assessment/atdownload/

fullReport

Wang,C.,Cao,N.,Li,J.,Ren,K.,&Lou,W.(2010).Securerankedkeywordsearchover encryptedclouddata.InDistributedcomputingsystems(ICDCS),2010IEEE30th internationalconferenceonJune2010(pp.253–262).IEEE.

Wang,C.,Chow,S.S.,Wang,Q.,Ren,K.,&Lou,W.(2011).Privacy-preservingpublic auditingforsecurecloudstorage.IEEETransactionsonComputers.

Wang,Q.,Wang,C.,Ren,K.,Lou,W.,&Li,J.(2011).Enablingpublicverifiability anddatadynamicsforstoragesecurityincloudcomputing.IEEETransactionson ParallelandDistributedSystems,22(5),847–859.

Zhou,M.,Zhang,R.,Xie,W.,Qian,W.,&Zhou,A.(2010).Securityandprivacyin cloudcomputing:Asurvey.InSemanticsknowledgeandgrid(SKG),2010sixth internationalconferenceon1–3November2010(pp.105–112).Beijing,China:

IEEE.

Zhu,Y.,Wang,H.,Hu,Z.,Ahn,G.J.,Hu,H.,Stephen,S.,etal.(2011).Dynamicaudit servicesforintegrityverificationofoutsourcedstoragesinclouds.InProceedings ofthe2011ACMsymposiumonappliedcomputing,SAC’11(pp.1550–1557).New York,NY,USA:ACM.

HassanRasheed,receivedhisPh.D.inComputerEngineeringfromtheUniversity ofFloridain2009.HeiscurrentlyanAssistantProfessoratTaifUniversityinTaif, SaudiArabia.HispreviousacademicandindustrialaffiliationsincludetheAirForce ResearchLab,MorganStateUniversityandtheUniversityofFlorida.Hisresearch interestsincludeinformationandnetworksecurity,businessintelligenceandtext analytics.

Referensi

Dokumen terkait