A NEW PERSPECTIVE ON PROVIDING CLOUD COMPUTING SECURITY - A Position Paper

Ashraf Matrawy, Clifford Liem, Michael Wiener, Yuan Xiang Gu, Andrew Wajs

2011

Abstract

Security issues in cloud computing are ranked high on the list of reasons why many organizations delay considering the computing paradigm for their future plans. There have been numerous discussions about the security problem in cloud computing. In this paper, we take a different stand and discuss the impact that cloud computing will have on offering security. The paper points out the unique aspects of cloud computing architecture and operation and cloud-specific security issues. These cloud-specific issues could have an impact on a number of areas of offering information security. We discuss its impact on Intellectual Property Rights (IPR) protection, organizations extending protection beyond the traditional notion of perimeter defence, and on attack surfaces. We point out how providing security in the new computing paradigm may be affected and that there might be some benefits that the cloud brings to the information security scene. In summary, in this paper, we attempt to initiate discussions around these important issues.

References

  1. Amazon (2010). Amazon web services: Overview of security processes. Amazon White Paper.
  2. Amazon (2010). Amazon web services: Overview of security processes. Amazon White Paper.
  3. Armbrust, M. et al. (2010). A view of cloud computing. Communications of the ACM.
  4. Armbrust, M. et al. (2010). A view of cloud computing. Communications of the ACM.
  5. Chen, Y. et al. (2010). What is new about cloud computing security? Technical Rep. UCB/EECS-2010-5, Univ. of California at Berkeley.
  6. Chen, Y. et al. (2010). What is new about cloud computing security? Technical Rep. UCB/EECS-2010-5, Univ. of California at Berkeley.
  7. Chow, S. et al. (2002). White-box cryptography and an aes implementation. In 9th Annual Workshop on Selected Areas in Cryptography.
  8. Chow, S. et al. (2002). White-box cryptography and an aes implementation. In 9th Annual Workshop on Selected Areas in Cryptography.
  9. CSA (2009). Security guidance for critical areas of focus in cloud computing v2.1. Cloud Security Alliance.
  10. CSA (2009). Security guidance for critical areas of focus in cloud computing v2.1. Cloud Security Alliance.
  11. ENISA (2009). Cloud computing: Benefits, risks and recommendations for information security. The European Network and Information Security Agency.
  12. ENISA (2009). Cloud computing: Benefits, risks and recommendations for information security. The European Network and Information Security Agency.
  13. Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. In Proc. of the 41st annual ACM symposium on Theory of computing.
  14. Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. In Proc. of the 41st annual ACM symposium on Theory of computing.
  15. Google (2011). Saml single signon (sso) service for google apps. http://code.google.com/googleapps/domain/sso/saml reference implementation.html.
  16. Google (2011). Saml single signon (sso) service for google apps. http://code.google.com/googleapps/domain/sso/saml reference implementation.html.
  17. Gruschka, N. and Jensen, M. (2010). Attacksurfaces: A taxonomy for attacks on cloud services. In IEEE 3rd International Conf. on Cloud Computing.
  18. Gruschka, N. and Jensen, M. (2010). Attacksurfaces: A taxonomy for attacks on cloud services. In IEEE 3rd International Conf. on Cloud Computing.
  19. Kortchinsky, K. (2009). Cloudburst, a vmware guest to host escape story. A talk in BlackHat USA.
  20. Kortchinsky, K. (2009). Cloudburst, a vmware guest to host escape story. A talk in BlackHat USA.
  21. Marshall, A. et al. (2010). Security best practices for developing windows azure applications. Microsoft White Paper.
  22. Marshall, A. et al. (2010). Security best practices for developing windows azure applications. Microsoft White Paper.
  23. Mell, P. and Grance, T. (2009). Effectively and securely using the cloud computing paradigm. In ACM Cloud Computing Security Workshop.
  24. Mell, P. and Grance, T. (2009). Effectively and securely using the cloud computing paradigm. In ACM Cloud Computing Security Workshop.
  25. Molnar, D. and Schechter, S. (2010). Self hosting vs. cloud hosting: Accounting for the security impact of hosting in the cloud. In Workshop on Economics of Information Security.
  26. Molnar, D. and Schechter, S. (2010). Self hosting vs. cloud hosting: Accounting for the security impact of hosting in the cloud. In Workshop on Economics of Information Security.
  27. Ristenpart, T. et al. (2009). Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In 'Proc. of ACM CCS.
  28. Ristenpart, T. et al. (2009). Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In 'Proc. of ACM CCS.
  29. Sun (2009). Introduction to cloud computing architecture. Sun Microsystems White Paper.
  30. Sun (2009). Introduction to cloud computing architecture. Sun Microsystems White Paper.
  31. Wyseur, B. (2009). White-box cryptography. In PhD thesis, Katholieke Universiteit Leuven, B. Preneel (promotor), 169+32 pages.
  32. Wyseur, B. (2009). White-box cryptography. In PhD thesis, Katholieke Universiteit Leuven, B. Preneel (promotor), 169+32 pages.
Download


Paper Citation


in Harvard Style

Matrawy A., Liem C., Wiener M., Xiang Gu Y. and Wajs A. (2011). A NEW PERSPECTIVE ON PROVIDING CLOUD COMPUTING SECURITY - A Position Paper . In Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8425-52-2, pages 650-655. DOI: 10.5220/0003449106500655


in Harvard Style

Matrawy A., Liem C., Wiener M., Xiang Gu Y. and Wajs A. (2011). A NEW PERSPECTIVE ON PROVIDING CLOUD COMPUTING SECURITY - A Position Paper . In Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8425-52-2, pages 650-655. DOI: 10.5220/0003449106500655


in Bibtex Style

@conference{closer11,
author={Ashraf Matrawy and Clifford Liem and Michael Wiener and Yuan Xiang Gu and Andrew Wajs},
title={A NEW PERSPECTIVE ON PROVIDING CLOUD COMPUTING SECURITY - A Position Paper},
booktitle={Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2011},
pages={650-655},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003449106500655},
isbn={978-989-8425-52-2},
}


in Bibtex Style

@conference{closer11,
author={Ashraf Matrawy and Clifford Liem and Michael Wiener and Yuan Xiang Gu and Andrew Wajs},
title={A NEW PERSPECTIVE ON PROVIDING CLOUD COMPUTING SECURITY - A Position Paper},
booktitle={Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2011},
pages={650-655},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003449106500655},
isbn={978-989-8425-52-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - A NEW PERSPECTIVE ON PROVIDING CLOUD COMPUTING SECURITY - A Position Paper
SN - 978-989-8425-52-2
AU - Matrawy A.
AU - Liem C.
AU - Wiener M.
AU - Xiang Gu Y.
AU - Wajs A.
PY - 2011
SP - 650
EP - 655
DO - 10.5220/0003449106500655


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - A NEW PERSPECTIVE ON PROVIDING CLOUD COMPUTING SECURITY - A Position Paper
SN - 978-989-8425-52-2
AU - Matrawy A.
AU - Liem C.
AU - Wiener M.
AU - Xiang Gu Y.
AU - Wajs A.
PY - 2011
SP - 650
EP - 655
DO - 10.5220/0003449106500655