This section focuses on the network, the circulatory system of cloud computing, with its crucial role in supporting cloud services and presenting unique security risks. As cloud services interconnect and rely on shared resources within centralized data centers, addressing these network-specific challenges becomes vital. The exploration of network-level challenges in this section is a natural progression in comprehensively addressing cloud security concerns. The following section delves deep into network security intricacies, spanning from the perimeter to the data layer, providing a holistic view of cloud security at the network level. As cloud services become more interconnected and reliant on shared resources within centralized data centers, understanding and mitigating security risks at the network level is increasingly critical. Each layer presents unique security challenges with varying requirements, complexities, and potential vulnerabilities.
The following subsections outline derived challenges, key metrics related to those challenges, examples, and mitigation strategies.
7.1. Challenges and security issues in the perimeter layer
Working with precisely defined, physically separated, and delimited networks makes comprehending and enforcing perimeters easy. As more cloud services become networked and frequently rely on shared resources in a centralized data centre, designing and enforcing a perimeter becomes progressively more challenging. Because of this, no high-value assets are located at the network’s edge. The perimeter layer acts as a middle layer between the user and the internet, and the user can access the cloud infrastructure.
Securing the Perimeter Layer across different cloud service models—Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)—poses unique challenges. Let's delve into these challenges with concrete examples.
i. Varied Security Requirements:
Key Metric- Security Control Granularity
Example: In IaaS, users have extensive control over their virtual machines (VMs) and networks, demanding robust security policies. In contrast, SaaS providers manage application security, relieving users but requiring trust in the provider's security measures.
ii. Access Control Complexity:
Key Metric- User Base Complexity
Example: SaaS applications may serve a vast user base, requiring intricate access control to ensure data privacy. PaaS environments, while simplifying some aspects, introduce complexities when integrating applications with different access needs.
iii. Data Handling Divergence:
Key Metric- Data Processing
Example: Data processing in IaaS may entail data transfers between VMs and storage, necessitating encryption. PaaS, on the other hand, abstracts much of this, making encryption transparent but requiring trust in the platform's security.
iv. Compliance Challenges:
Key Metric- Compliance Standards
Example: PaaS providers, handling platform-level security, must adhere to industry-specific compliance standards, posing unique compliance challenges compared to IaaS and SaaS.
v. Customization vs. Abstraction:
Key Metric- Configuration Flexibility
Example: IaaS users can tailor security configurations for VMs, while SaaS consumers rely on provider-defined security measures, striking a balance between customization and abstraction.
Understanding these challenges and their interplay with specific cloud service models is essential for devising effective security strategies. Cloud Service Providers (CSPs) employ security features like UTM (unified threat management) and WAF (Web application firewall) to thwart DoS attacks. In a DDoS attack, the victim's server is overwhelmed with numerous requests for CSP-provided services. Attackers typically use malware to commandeer a network of Internet-connected computers, forming a "zombie botnet" often used for spam emails and DoS attacks [61]. DDoS attacks primarily target the processing capabilities, memory, and bandwidth of one or more servers. These attacks come in network-level and application-level forms, with examples including HTTP flood attacks, Sync flood attacks, and XML flood attacks, which exploit network and transport layer protocols [61].
7.2. Challenges and security issues in the network layer
The network layer plays a crucial role in cloud computing, and any vulnerabilities within it can directly impact overall security. Common security challenges at this layer include activating unused ports, IP address reuse, Sybil attacks, eavesdropping, and neglecting firmware updates and security patches. Intrusions, backdoor attacks, session hijacking, and vulnerabilities stemming from flaws in the TCP/IP communication architecture are significant concerns affecting network security in the cloud [62]. In virtualized environments, all virtual machines (VMs) share a single network layer, which can introduce security risks. To address these concerns, a Demilitarized Zone (DMZ) can be used. The DMZ is a subnet that separates a local area network (LAN) from untrusted networks like the internet, enhancing security by preventing direct access to internal servers and data from the internet. It also aids in logical network segmentation and security [7], [63].
i. Resource Accessibility:
Key Metric- Network Control
Example: In IaaS, users configure networks to grant or restrict access to VMs, demanding meticulous network security planning. SaaS abstracts this complexity, but users lose control over network-level security.
ii. Virtualization Vulnerabilities:
Key Metric- Virtualization Risks
Example: Virtualized environments in IaaS introduce security concerns like VM escape attacks. PaaS simplifies network aspects but requires trust in the provider's secure management of underlying networks.
iii. Network Architecture Flaws:
Key Metric-TCP/IP Vulnerabilities
Example: TCP/IP communication architecture flaws can lead to vulnerabilities in network security across all cloud service models, affecting data transmission and user access.
iv. DMZ and Logical Disruption:
Key Metric- Network Segmentation
Example: IaaS users might implement DMZs to segregate networks, preventing unauthorized access. This strategy mitigates logical network disruption, a concern when VMs share physical servers.
v. Common Network Attacks:
Key Metric- Network Threats
Example: Threats like DNS poisoning, ARP spoofing, and packet sniffing can compromise network security in all cloud service models, emphasizing the importance of robust network-level defenses.
Similarly, cloud customers' virtual machines (VMs) are typically housed on the same physical server(s) that house the VMs of other cloud customers. There will be a physical interruption of the network due to security concerns, including sniffer, unauthorized access, man-in-the-middle attacks, and service outages [7][63].
DNS poisoning, password-based attacks, port scanning, compromised key attacks, Cross-site scripting, passive attacks, ARP spoofing, identity spoofing, packet sniffer, and phishing assaults are some common network layer techniques used to obtain access to Cloud services.
7.3. Challenges and security issues in the host layer
Security challenges in the host layer of cloud computing are influenced by the specific service delivery methods (SaaS, PaaS, and IaaS) and deployment models (private, public, and hybrid). In SaaS and PaaS services, cloud service providers typically handle host security responsibilities, while IaaS clients are generally responsible for securing the cloud hosts they provision, including virtualization software security and customer guest OS or virtual server security [64]. It's worth noting that these host layer security challenges are interconnected with broader challenges at the cloud computing architecture level. Therefore, we are summarizing these challenges here:
i. Security Responsibility Shift:
Key Metric- Host Security Ownership
Example: In SaaS and PaaS, host security responsibilities are outsourced to cloud providers, reducing user management burdens. However, in IaaS, users must safeguard their provisioned cloud hosts, covering aspects like virtualization security.
ii. Authentication and Unauthorized Access:
Key Metric- Bypassing Authentication
Example: External users or Cloud Service Providers (CSPs) may attempt to bypass authentication, gaining unauthorized access to OS, VMs, and Virtual Machine Monitors (VMMs). This security challenge impacts all cloud service models.
iii. Logging and Event Handling:
Key Metric- Threat Detection
Example: Failure to log security events or provide log files to cloud users can hinder threat detection and response, emphasizing the importance of robust logging mechanisms across IaaS, PaaS, and SaaS.
iv. Resource Impact of DoS Attacks:
Key Metric- Denial of Service Impact
Example: A Denial of Service (DoS) attack targeting a Virtual Machine Monitor (VMM) can severely impact resources like memory, processor, and network bandwidth, leading to VM service interruptions—a concern across IaaS deployments.
v. Secured VM Removal:
Key Metric- Data Security Management
Example: Attackers may attempt to restore VM data when its storage is moved to another VM, highlighting the need for secure VM data management, especially in IaaS and PaaS scenarios.
7.4. Challenges and security issues in the application layer
The application layer is a prime target for cyberattacks, situated between the user and the network. This vulnerability arises because lower network layers primarily engage with security-aware users, while web applications and Software as a Service (SaaS) are integral to cloud services. The overall security and availability of cloud services hinge on the absence of vulnerabilities in web browsers, APIs, and applications. Cloud-based applications can be exploited for malicious purposes, often through techniques like code injection. Malware is consistently introduced into the cloud ecosystem via malicious web links and websites. With the ever-growing number of internet-connected users and devices, attackers are drawn to this expanding attack vector [62].
Application security threats in the SaaS delivery model and within the Cloud computing architecture sections have been previously discussed. Here, the 10 most critical security risks to web applications, as outlined by the Open Web Application Security Project (OWASP), are presented. A comparison between these risks for the years 2017 to 2021 is depicted in Figure 9.
As per the 2021 OWASP reports, some of the security risk categories have increased from 2017 to 2021; categories like Broken Access Control, Sensitive Data Exposure, i.e., Cryptographic Failure, Security Misconfiguration, Vulnerable Outdated Components, and Insufficient Logging and Monitoring, have moved up in their positions. Surprisingly, 94% of the applications tested had broken access control and injections.
7.5. Challenges and security issues in the data layer
In a conventional on-premises application deployment model, sensitive enterprise data remains within the company's perimeter and is subject to the enterprise's physical, logical, and human access control regulations and security measures. However, in cloud architecture, enterprise data is stored outside the company's boundaries at the Cloud Service Provider's (CSP) end. This is particularly relevant in a Software as a Service (SaaS) deployment model, where sensitive data is acquired from businesses, processed by the SaaS application, and stored on the SaaS vendor's end. Ensuring the security of this data in the cloud involves addressing two key categories of challenges: protecting data during its transit and protecting data while it's stored.
Data must be encrypted during transmission over the network to prevent the leakage of sensitive information. Even though data must be encrypted within the CSP's environment, it remains accessible to end users with authorized access [60]. Security challenges at the Data Layer level also involve the potential for adversaries to gain unauthorized access to enterprise data by exploiting vulnerabilities in the data security model. These vulnerabilities encompass issues like cross-site scripting (XSS), access control weaknesses, operating system and SQL injection flaws, cross-site request forgery (CSRF), cookie tampering, hidden field tampering, insecure storage, and insecure configuration. Addressing these vulnerabilities is crucial for safeguarding enterprise data stored on the infrastructure of cloud service providers (CSP) [58]. In addition to these challenges, cloud security extends to end-to-end identity management, third-party authentication services, and identity management. Identity security plays a key role in securing data and applications while ensuring authorized access. Any weaknesses in these areas can result in data sniffing, which threatens data confidentiality, unauthorized data access and modification, data integrity, availability, and authentication features [65].
In summary, the challenges discussed in this section emphasize the complexities of ensuring data security within the Data Layer of cloud computing. These challenges collectively contribute to the broader set of issues explored in the next section, 'CHALLENGES AT THE DATA LEVEL,' where a more detailed examination of data-related challenges and their implications in the cloud computing landscape will be undertaken.
7.6. SECTION SUMMARY: THE INTERSECTION OF NETWORK-LEVEL SECURITY CHALLENGES WITH CLOUD SERVICE MODEL VULNERABILITIES
The section navigates the complex terrain of network-level cloud computing security challenges. With increasing interconnection and dependence on shared resources in centralized data centres, network layer security has assumed utmost significance. The investigation reveals that these issues affect all network layers, including the perimeter layer, network architecture, host layer, and application layer. Notably, challenges in the perimeter layer were highlighted, such as diverse security requirements, complex access controls, data management nuances, compliance complexities, and the delicate balance between customization and abstraction across various cloud service models (IaaS, PaaS, SaaS). In addition, the author delves into the complexities of the network layer, including resource accessibility, virtualization vulnerabilities, architecture faults, DMZ implementation, and common network attacks, accompanied by illustrative examples. Reflecting shifts in security responsibilities, authentication complexities, logging importance, resource impacts of DoS attacks, and secure VM data administration, host layer challenges have emerged.
In addition, the application layer's susceptibility to assaults and its central role in cloud services were emphasized, along with security risks and common threats. Lastly, the author examines data layer challenges, differentiating between protecting data in transit and at rest, emphasizing encryption, and spotlighting vulnerabilities such as XSS, access control flaws, and SQL injection. These insights collectively highlight the complexity of network-level cloud security, paving the way for a more in-depth examination of data-related challenges in the section titled 'Challenges at the Data Level.