ISSN: 2394-6881
International Journal of Engineering Technology and Management (IJETM)
Available Online at www.ijetm.org
Volume 2, Issue 2, March-April 2015, Page No. 153-162
Implementation of Self-Signed X509 for Cloud Hosted Services
Muhammad Ali*, Imran Ijaz**
Shaheed Zulfikar Ali Bhutto Institute of Science and Technology, Islamabad, Pakistan,
ABSTRACT
Over the recent years of research in Cloud Computing, different approaches are adopted for securing hosts of Cloud.
These approaches give successful results in identifying the authentic request. Sensitive organizations communicate with
each other through legitimate request. For establishing a security and privacy a PKI based authentication model is
needed. This paper signifies the new approach in implementing a Cloud Based PKI Authentication inside the existing
infrastructure of Sensitive organizations. As security is the prime concern for every organization and the requirement to
implement it varies from organization to organization, therefore each and every organization embrace their own policies
to implement it. The problem of understanding each other security policies is a big barrier and challenging for existing IT
infrastructure for implementation purposes. Different techniques and approaches have been suggested so far but
ould ’t ate the esult. Re ui e e t to “e u e Cloud host a hi es Authe ti ation is made possible through this PKI
based model which ensures all 5 security services. This PKI model is a multi-domain atmosphere between organization
and their data centers for the facilitation and resource provisioning inside the cloud platform. In this model, a
Certification Authority (CA) is implemented in the Cloud infrastructure and all users will communicated through this
mechanism having different authentication approaches for legitimate access.This article not only presents an
architecture but also the implementation of PKI model in multi domain to facilitate data and resource sharing in a secure
way.
Key Words: Public key infrastructure (PKI), certification authority (CA), X.509, certificate services.
Muhammad Ali, IJETM Volume 2, Issue 2, Page No. 153-162
Although cloud computing offers many attractive
features but still lack of trust is one of the major issue for
customers. Weak authentication schemes cause many
loop holes which invite intruders to breach the customer
data. The scope of this study will focus on authentication
behavior of customers and strengthen the user
authentication schemes. As Cloud computing is swiftly
evolving as a new prototype for delivering services of
computing as a utility. Cloud computing is relatively
similar to grid computing, in which different hardware
resources are shared to attain a common objective.
The Internet has become a main stream for all sort of
communication framework and is also vulnerable for all
known & unknown attacks. These attacks comprises
number of network threats like wiretapping, industrial
espionage, Man In the Middle attacks and fabrication of
sensitive data etc. So as to repress these dangers,
Security Services like secrecy, respectability, verification,
153
Cloud computing, as a new computation paradigm, has
been developed and deployed rapidly in recent years.
This new approach is built on top of existing Internet
technologies and is delivered as service utility. It is the
next generation in computation and continuously
growing & emerging. It is rapidly becoming one of the
most popular and trendytechnology. Cloud Computing
means to bring both the applications and services over
the cloud and then access these services through browser
by high-speed internet as and then pay cloud provider
according to usage of these services. Cloud service has
three unique features that differentiate it from
traditional hosting.
1. Cloud provider sell these services on demand, and
organization in return pay for these services.
2. Cloud computing is very Flexible solution, a user can
use services according to his need at any given time.
3. All services are managed by cloud provider and user
only needs a pc with internet access.
Page
INTRODUCTION:
The beginning of cloud starts in1969s when ARPANET
developed for research Purposes. The idea to interrelate
everybody at globe right through getting access to
programs and data from anywhere, anyplace, explained
Margaret Lewis, director at AMD. It is a basic theme that
sounds a lot like, so what we are calling it cloud
computing[2]. The scientist John McCarthy who planned
the new thought that computation being provided as a
public value and since 1960s, cloud computing has
developed with lot of varieties, with Web 2.0 being the
most current development [1].
Muhammad Ali., et. al., International Journal of Engineering Technology and Management (IJETM)
B. Cloud Service Models
i.
Infrastructure as a Service (IaaS):
The IaaS modelconsists of servers, storage appliances,
network resources and other telecommunication
e uip e t’s apa le of deploy e t a d p o idi g
services in Data Center like environment. This model
bring benefits to users for acquiring services as
mentioned above for rental basis and reduce their costs
of purchasing hardware/software etc. Google App Engine
[18] and AMAZOM Elastic Compute Cloud (EC2) are the
industry leading vendors providing IaaS like services to
community [20].
ii.
Platform as a Service (PaaS):
It is a software prototype model independent of existing
Operating Systems. Users can develop their customized
applications and deploy on their hosted server. Secondly
this model is primarily used for accessing Web Services,
SOAP and other subscriber choice provided to provision
© 2014 IJETM. All Rights Reserved.
A. Virtualization
Virtualization technology provides an interface between
various elements either from the software point of view
or from the hardware. Software virtualization consists of
applications, programs, services like providing an API to
facilitate users from connecting their network to other
locations of the web and seamlessly experience as it is in
their vicinity. Software virtualization also provides
flexibility to provision those resources which are not
available to us in our hosted cloud environment.
Techniques like Storage as a Service (STaaS) is adopted on
the main vendors of the World for its magnificent
integration of real storage atmosphere.
B. Agility
Agility refer to the term in which how optimized our
infrastructure to provides resources on time and have
99.99999% down time. Through agility and robustness
every organization can achieve its desired goals and will
stay in the market for decades. Consequently it is also
adopted over application point of view and other area of
expertise to give better results through efficient and
effective way.
C. Application programming interface (API)
APIs are used on software level to retain smoothness of
application behavior and maintaining its integrity with
other RPC (Remote Procedures Calls) through built-in
subroutines and functions. Different functions on calling
interact with its APIs to perform certain jobs. Jobs can be to
take print from the network printer and talk to print
154
A. Cloud Deployment Models
There are four commonly used cloud deployment
modelsgiven as [4].
i. Public Cloudis a model of computing providing services
to community for pay per usage. It includes several stake
holders ranging from government organizations to
services industries.
ii. PrivateCloudis a model owned, operated and managed
by a single organization or an enterprise for its
employees.
iii. HybridCloud is a model consisting of two or more
entities having distinct infrastructure (i.e., either public,
private or community cloud) to share their resources and
provide services to the community.
iv. Community Cloud is a model in which groups or
specific organizations share their cloud infrastructure
exclusively used by them. Mainly worked, operated,
managed and owned by academia or third party.
these services. It also reduces the cost and difficulty of
software buying, retaining and deployment. The Amazon
Simple Storage Service (S3) is an example of PaaS.
iii.
Software as a Service (SaaS):
The SaaS model comprises different softwares /
applications for the on-demand usage. Users are
provided different services for their choice to adopt and
deploy accordingly to their requirement. The SaaS model
is independent of location and transparent to user for
accessing their service. Benefits of this model are the cost
reduction of purchasing software along with licensing
issues, operational and maintenance. TheGoogle App
Engine, salesforce.com,Facebook.com andMicrosoft's
Azureare examples ofSaaS [19].In other words, the cloud
computing is an assortment of PaaS, SaaS and IaaS. The
employees working in an organization can be users or
providers of cloud computing services in accordance with
the organizational scope and the control over the IT
environment Chen [17].
I.
CHARACTERISTICS OF CLOUD COMPUTING
There are some key features of cloud computing given:
Page
and non-denial are least necessities for anticipation.
Association have executed a few measures to thwart
their region. These necessities are upheld by various
security arrangements. One of them is a Public Key
Infrastructure (PKI). Most of the protocols for secure
communications like email, web service, ftp, SharePoint,
virtual private networks, and authentication systems use
PKI.In this paper we will critically review Cloud
Authentication through PKI in existing infrastructure of
sensitive organization. We will also see the options
available to us, how to increase the utilization of
Applications / Hardware & Storage resources in cloud
environment and how to establish a trust relationship in
our virtualized environment to achieve the optimum
results.
Muhammad Ali., et. al., International Journal of Engineering Technology and Management (IJETM)
Second most prominent factor is the reduction of electric
power consumption, as company will maintain cool
solutions to its Data Centers and will have to install a huge
plant for running all servers by 24/7/365 days. Energy crises
are the big hurdle to bear for any business concerned
personnel. Their Data Centers will consume not only huge
amount of electric power but also acquired a backup plan
for installing a Battery backup unit for up time and in this
way all factors lead to a huge investment on their own level
is required to maintain and run all their company services.
Similarly a cloud solution provide not to purchase extra
hardware or build a Data Center but to acquire any type of
service on pay as you go method. It depends on which type
of cloud model we acquire to attain services over it and
adopting the paying method over it.
E. Location independence
In the cloud computing models the location of any user is
transparent as users are provided ID and login password to
connect their cloud over cross platform environment. Users
are able not only to connect with their Desktop PCs but a
provision of other devices like connection through
Mobile/Smart Phones and any type of wireless medium
easily and safely. Hundreds of Data Centers location in
various part of the World are providing these services over
heterogeneous and homogeneous platform to make sure
that nobody can have any sort of problem during login and
availing all the services over the cloud.
F. Reliability
Reliability is a factor on every forum it enhances the trust
© 2014 IJETM. All Rights Reserved.
G. Scalability
Scalability is the assurance for the service provider for the
performance measuring principles and gives best results if
it is overloaded. Scalability is measured in terms of fine
grained, optimized, isolated, error free and robust
architecture for the implementation of any type of service
over it. The benchmarks of scalability are the maximum
points / thresholds for measuring capacity and ensuring
optimum results with limited and non-viable resources.
H. Security Services
Security provides the main pillars to any organization:. No
matter which type of organization is holding what type of
data, it is the prime responsibility to secure its assets.
Similarly in the case of cloud computing, security can be
generalized into various portions starting from user identity
to massive data processing storage device integrity.
Security can be applied on the operating system (OS) level,
its file system, ports, I/O device management and User
access with accounting. Similarly on the cloud computing it
is applicable on the applications credentials i.e., user id and
password. Security can be applied on the services like Web
Services, Access Protocols, and RESTful APIs etc. to ensure
that the applications are providing legitimate access with
this service integration.
On the network level, there are various mechanisms to be
implemented in order to execute our cloud services over
the insecure channel like installing firewalls both in the
shape of software and hardware based to monitor
proactively for any malicious activity over the networks and
also inside the network as well. Several encryption
algorithms are developed to secure our transactions and
provide an approach to surf the cloud environment without
fear. Security also gives us the privacy of our identities
Over the cloud hosted services. Hence it will be hard to say
that without security we can achieve every milestone over
the cloud environment.
There are eight elements identified by National Institute of
Standards and Technology (NIST): governance, compliance,
trust, architecture and software isolation, identity and
155
D. Cost
Cost is the major factor in developing any type of IT setup.
It depends on the number of employees a company has
and the type of business in which the company owner
wants to excel. Similarly in the business of cloud computing,
cost factor is minimized due to several reasons. One factor
is that now all IT resources are on the Internet and usually
users do 't ha e to pu hased e IT e uip e t’s a gi g
from few servers to a big Data Centers. This facility not only
reduce their hardware cost for consuming such type of
resources and also eliminating other expenditures like the
amount given to the technical and non-technical staff for
their salaries .
and establishes bond between two different entities
(organizations, corporations, governments or even two
different countries). Consequently on the cloud computing
platform a reliable resource can extend the life and
performance of the cloud services. Reliability between APIs
and its association with other functions enhances the
portability of cloud services over un-trusted networks.
Reliability play a more special role with redundant links in
case of failure occurs and possess the better management
to business contingency plans and disaster recovery
mechanisms.
Page
spooler if another jobs is in queue. On the cloud spterm
there are many APIs which are used to create, manage and
hold the resources over the hosted platforms. Mainly built
and executed on the Platform as a Service (PaaS) and
Software as a Service (SaaS). Examples are RESTful
(Representational State Transfer), SOAP (Simple Object
Access Protocol), AWS (AMAZON Web Services) etc. based
APIs used to attain and perform its tasks.
Muhammad Ali., et. al., International Journal of Engineering Technology and Management (IJETM)
The business or venture information must be secured
with proper and dependable approaches or methodology
whether in the undertaking's own particular datacenter
or in the cloud environment. It gives a beginning stage
with a rundown of basic outsourcing necessities like
Security and Privacy Standards, Compliance and
Regulatory Issues, Service Level Agreements (SLAs),
Certificates and so on. Also, the danger administration is
likewise fundamental for the business endeavors before
movement to cloud. The danger must be precisely
moderated on the grounds that the association is
responsible for its asset security
The review, SLAs, accreditations and danger treatment
techniques being a vital structural lump of cloud security
and controls are characterized into a solitary system
examined in by Julisch and Hall [8]. An Information
Security Management System (ISMS) comprises of
strategies, techniques and components that a venture
uses to build, actualize, work, screen and enhance the
data security. The skeleton alluded to virtual ISMS is
contrasted and the traditional ISMS for those associations
where IT administrations are to some degree outsourced.
The virtual ISMS is really an organized approach to
oversee hazard and hierarchical resources over the cloud.
In addition, as cloud customer and supplier are together
in charge of information security and control in the cloud,
so they must receive virtual ISMS as a standard grumbling
administration process for the assurance of imparted
resources. In this manner, it is more essential from
customers prospective that they must think about what
they are buying with cloud.
Mohammad [9] highlighted the noteworthy key drivers
and imperatives for secure distributed computing from a
societal and mechanical prospective. The distributed
computing is a rising time of processing which is
© 2014 IJETM. All Rights Reserved.
The innate issues of information security, administration
and administration regarding control in the distributed
computing are examined by Mehmood [10]. The real
issues in cloud information security are: information
protection,
information
insurance,
information
accessibility, information area and secure transmission.
The issue of putting away information over the Trans
boarder servers is a genuine concern of customers in that
capacity sellers are administered by the neighborhood
laws and, thusly, the cloud customers ought to be
conscious of those laws. The information accessibility is
additionally an essential concern and administration
downtime must be as per the predefined SLAs. In
addition, the cloud supplier ought to guarantee the
information security including information privacy and
respectability. The cloud supplier must impart all such
concerns to the customer and manufacture trust
relationship in this association. The cloud seller ought to
give assurances of information security and certain locale
of nearby laws. The principle center of the paper is on
those information issues and difficulties which are
connected with information stockpiling area and its
movement, expense, accessibility and security.
The protection danger connected with distributed
computing has brought up genuine issues by Svantesson
and Clarke [11]. Accordingly, the cloud suppliers ought to
put set up clear and straightforward methods and
arrangements concerning legitimate structure keeping in
mind the end goal to addition clients trust. Also in the
meantime, the clients should likewise assess precisely the
information security and protection issues before going
156
II.
LITERATURE REVIEW
The essential inspiration for embracing cloud is its
minimal effort; on the other hand, on the other side,
endeavor gets to be capable and responsible for general
security of the outsourced administrations by Jansen [7].
The key security issues correlated to distributed
computing are sorted out into a few classes, for example,
information assurance, trust, character administration,
structural engineering, programming segregation and
accessibility. The association must consider the potential
security dangers before embracing the cloud. The
security of cloud framework generally relies on upon
trusted registering and cryptography.
confronting numerous difficulties of information
insurance and wellbeing. The trust, protection and client
approach towards distributed computing are the social
issues while on the other side encryption, versatility and
unwavering
quality,
information
rights
and
straightforwardness are the genuine innovative issues in
distributed computing. As per the creator, the most cloud
clients are unconscious of the danger of putting away and
transmitting private data in an imparted environment.
Hence, scratch mechanical demands like consistence,
straightforwardness, encryption, respectability and multitenure ought to be tended to painstakingly. The
straightforwardness is the greatest test for the
undertakings at present, and because of which they are
hesitant to change to distributed computing
environment. When the cloud gets to be straightforward
and the clients have full control to get to, oversee and
cover the condition of information and administrations,
at exactly that point it will help expand the trust and
minimize the social and innovative stipulations.
Page
access management, availability, incident response, and
data protection Mell and Grance [19].
Muhammad Ali., et. al., International Journal of Engineering Technology and Management (IJETM)
The distributed computing is turning into a prominent
and appealing ideal model with bunches of profits, then
again, there are some particular inquiries identifying with
its capacity to backing scientific examination by Relly et
al. [13]. The creator has mostly examined the cloud
qualities, models, and building design. The measurable
examination has its roots for information recuperation
and, discovering, advanced confirmation from law
requirement viewpoint. In distributed computing the
scientific status is not completely considered by the
majority of the associations, so there is have to return to
or create new systems to meet the current cloud
prerequisites.
Additionally,
the
criminological
© 2014 IJETM. All Rights Reserved.
The informationclassified, validation and access control
issues in distributed computing have been tended to by
proposing a structure to expand the cloud dependability
and reliability by Patil et al. [14]. A framework to uses
cryptographic calculation Diffie-Hellman for secure
correspondence as opposed to key appropriation
administration is proposed in (RSA, 2008). Such a
framework ordinarily comprises of three modules:
Administration Module, Authentication Module and
Encryption Module. Every module has diverse however
interconnected capacities. The organization module is
utilized by the cloud supplier for client enrollment and
organization. While the verification module is utilized for
confirmation of clients and encryption module utilized for
information encryption. The validation acknowledgment
is a two way transform. Firstly, the framework requires
the client to enter typical login and watchword and after
that it produces one time secret key and sends on the
client portable for verification. Once the one time secret
word is supplied, the framework verifies the client and
gives the framework access. The proposed framework
was tried on Java Remote Method Invocation (RMI) in
cloud environment (Oracle, 2007). The framework kills
the cloud over-burden and keeps it from man in the
center assault.
Mirashe et al. [15] examined the distributed computing
administration and organization models with illustrations
and its points of interest in subtle element. The creator
further characterizes the classes of cloud clients e.g.
families, group and companies. As indicated by the
creator, information security is the significant issue in
distributed computing. The client's information could
confront genuine dangers in the event that it is decoded
in plate or memory or over the system in the cloud. The
second real concern is identified with evaluating of open
cloud. The cloud suppliers are regularly hesitant to do
reviewing for their assets and base. The to wrap things up
issue is legitimate ward over the cloud. The undertakings
must consider these issues before receiving distributed
computing.
Sun et al. [16] highlight the key security, protection and
trust issues in existing environment of distributed
157
The Identity and Access Management (IAM) conventions
and norms are the paramount information security angles
talked about in by Almulla and Yeun [12]. The IAM is a
sufficient level of security for authoritative resources
through executing fitting strategies. The rising IAM
difficulties can be minimized through examining
validation, approval and reviewing issues. The IAM
lifecycle comprise on five stages: Provisioning and DE
provisioning, Authentication and Authorization, SelfService, Password Management, Compliance and Audit.
Besides, diverse guidelines and conventions like Security
Assertion Markup Language (SAML) and Open
Authentication (Oauth) convention are utilized to manage
characters in the cloud. To this end, the associations must
get ready IAM method, structure and comprehend the
IAM lifecycle before movement to cloud. The IAM ought
to likewise be legitimately executed to guarantee the
common verification, examining and approval for
distributed computing administration.
examination has advantages and disadvantages which
need to comprehend amid measurable preparation.
Additionally, the scientific examination finding in virtual
machines (Vms) has blended methodology of favorable
circumstances and impediments. Hence, the scientific
agents group is obliged to create new techniques and
strategies to conquer the distributed computing legal
investigation challenges.
Page
into the coliseum of distributed computing. Moreover,
the lawful purview issues identified with information in
local and trans-outskirt mists ought to likewise be
considered. These issues must be tended to and arranged
with common seeing in fitting way. At the point when
numerous clients utilize the cover over trans-outskirt, it
builds the legitimate ward load and the obligation of
loud supplie . I this setti g, the usto e ’s haza d a d
rights need to be tended to and saw in point of interest.
In addition, it is vital for customers to know the cloud
supplier's neighborhood laws identified with information
protection and assurance. The cloud supplier needs to
create and make information insurance systems,
arrangements and laws and afterward make mindfulness
about such laws among the clients. The expense viability
is one of the significant inspirations for the associations
ready to change to the distributed computing
independent of the in all cases security examination of
the cloud supplier.
Muhammad Ali., et. al., International Journal of Engineering Technology and Management (IJETM)
performing trusted roles to operate and maintain the
system.
The security control estimations in distributed computing
IV.
ARCHITECTURE OF PKI
are equal to the ones in the traditional IT setup by Chen
Architecture& Structural planning of a PKI is made out of
and Zhao [17]. The customer ought to know answers to
operations
and
security
approaches,
security
the seven security questions before making the choice of
administrations
and
conventions
that
help
cloud suppliers. These inquiries are about information
interoperability utilizingPublic key encryption and key
area, information isolation, recuperation, favored client
administration authentications. In PKI an automated
access, consistency consistence, scientific backing and
declaration issued by CA and requisitions are normally
feasibility on long haul premise. Besides, the customer
transformed by the Registration Authorities (RA). The
needs to only break down the information security,
obligation of a RA is to dissect singular client who
insurance and security issues all through the information
analyzes every provision and advises the CA, which is
life cycle over the cloud. The information life spin passes
closer to the level of certainty of the applicant by
through seven stages: information era, exchange,
checking the level of trust, CA issue the endorsement.
utilization, offer, stockpiling, archival and decimation. The
A. Stand Alone Root CA
information
distinguishing
proof,
information
Standalone Root CA is actualized where we require a
disconnection and protection security are the essential
disconnected from the net Root CA. Remain solitary and is
concerns and must be kept into thought amid the
not coordinated with dynamic Directory. However data
configuration and improvement of cloud-based
from the CA, for example, CDP and AIA, could still be
applications. The incorporated and complete security
distributed to Active Directory. Ordinarily the Stand Alone
arrangements are relied upon to meet the information
CA is a part of its own workgroup rather than being a part
security and insurance target top to bottom.
of a space. It is detached from the system just open to the
administrators of the CA server.
B. Enterprise Root CA
III.
COMPONENTS OF PKI
Enterprise Root CA is comparatively easy to implement as
Components of a PKI embrace system components such
there is only one server required to establish PKI and there
as one or more Certification Authorities and a
is no subordinate CA servers and certificate chaining.
certificate repository; documentation including a
Enterprise CA server is integrated with Active Directory. An
Certificate
Policy document and one or more
Enterprise CA can be used to auto enroll certificates in
Certification Practice Statements and trained personnel
an Active Directory environment.
© 2014 IJETM. All Rights Reserved.
158
The main mechanisms of PKI infrastructure are:
1) Certifying Authorities (CAs)–This components signifies
to ensure that certificates areissued and revoked with
digital certificates in PKI domain.
2) Registration Authorities (RAs)–It validates all those
requests pending for issuing certificates and identity of
each & every end users.
3) Repository –This components is used to store and
distribute certificates and revocation of certificates
through the process of certificate revocation lists(CRL).
A technique which is used to issue all certificates
periodically by the CA and are listed in the queue of
certificates that are no longer valid.
4) Archives –The basic purpose of archive is to store all
information readily available to Certificate Authority and
possessing all information to be archived which are easily
provided and no modification is recorded when the
archive process is going on.
5) End Entity - End entity are those actors for which
digitalcertificates are issued.
Page
computing and help clients to perceive the substantial
and immaterial dangers connected with its utilization. As
indicated by creators, there are three noteworthy
potential dangers in distributed computing, to be specific,
the security, protection and trust. Security has the
fundamental part in present period of since a long time
ago imagined vision of registering as utility. It can be
separated into four sub-classes: security systems, cloud
server observing or following, information classified and
keeping away from pernicious insiders' illicit operations
and administration seizing. Besides, the creators highlight
the essentialness of information security in distributed
computing. It is a key point from client viewpoint and
basic to comprehend its issues like client control over
information and legitimate purview prerequisites. Also,
the trust is a complex relationship among cloud customer
and supplier and it ought to be untimely before receiving
cloud. The trust between cloud supplier and customer
ought to be measurable and dependable to settle on
reliable choice. The trust can be isolated into four subclasses: trust assessment, trust relationship, trust degree
and trust observing.
Muhammad Ali., et. al., International Journal of Engineering Technology and Management (IJETM)
Page
159
C. Stand Alone Issuing CA
secure connection
A Stand Alone Issuing CA means that the CA server is a
VII.
PROPOSEDPKI
MODEL
FOR
INTER-CLOUD
subordinate CA server and it has gotten its CA
DOMAINENVIROMENT
certificate signed by another CA server. Typically this
This model is design to strengthen the authentication
type is used he the CA se e
o ’t e issui g
process. The idea is to build a
certificates to objects in an Active Directory domain, or
private PKI setup by a cloud service provider to issue the
using an offline policy CA server in three-tier PKI
certificates to cloud users. Every user will use his
hierarchy.
certificate provided to him by the cloud provider. The
provided certificate can be customized by the cloud
D. Enterprise Issuing CA
provider in terms of encryption algorithm like DES, AES,
An Enterprise Issuing CA is a part of an Active Directory
RSA etc. or length of the key like 512, 1024 or 2048 bits.
space and is coordinated to Active Directory. Client and
Only authorized users having valid certificate will be able
workstation records can enlist or auto enlists for
to get connected and can access the services. Certificate
authentications from this CA. The CA server gives the
revocation, validity time of certificate and certificate for
same usefulness as an Enterprise Root CA server, yet the
each service will be managed by the cloud provider to
Enterprise Issuing CA is a subordinate CA server.
maintain security. This model is highly suitable for the
V.
TIERS of PKI
organizations that cannot afford unauthorized access on
Most PKI setups will have one, a few levels. With one
their services or data. This model was implemented and
level there is just Root CA which is in charge of issuing
tested to analyze the protection from unauthorized users.
and denying all the authentications. In a two level
In our implementation, a cloud was configured using
environment there are logged off Root CA and one or
VmwareEsxi and VCloud Director. PKI was configured on
more subordinate CA servers. In a three level
some virtual machines to generate User Certificates.
environment there are a logged off Root CA, one or more
After generating certificates, certificates were distributed
subordinate arrangement CAs which can additionally be
to authorized users. Web, Ftp and Data Sharing Servers
disconnected from the net. These approaches CAs will
were created on virtual machines to host services under
administer the arrangement of the subordinate CAs
IaaS. Users from different locations were provided
underneath them, the issuing CA servers.
certificate. Connected users accessed the required
VI.
PROBLEM STATEMENT
services and data smoothly. Unauthorized users could not
Cloud setups are appealing focuses for hackers because
connect with gateway and no access to data or services.
of their constant accessibility on web and offering
This model provides additional security in addition to user
distinctive sorts of services like secure information stored
credentials.
on cloud storage. In order to authenticate clients, there is
The prime and focal objective of our PKI model was to
a need to consistently improve authentication process, so
facilitate exchange of information securely between host
that unauthorized user with malicious intention could be
and Cloud domain. List of models with detailed
stopped from getting access to the resources hosted on
architectures have been designed but we have only
cloud.
selected the most secure and obvious one among rest of
Simple login/passwords give single layer of abstraction
all.
that can be spilled or caught by utilizing key logging or
In our finalized model, we implement single tier PKI. The
information catching methods. To give more abstraction,
single tier PKI consists of three main components. A
distinctive strategies have been recommended. This
domain controller, an enterprise Root CA, web server and
paper will concentrate on actualizing PKI construction
ftp server. A domain controller will run active directory –
modeling by cloud suppliers to issue customized
integrated DNS and host LDAP CDP and AIA.
certificates to each one client that will be utilized to make
© 2014 IJETM. All Rights Reserved.
Muhammad Ali., et. al., International Journal of Engineering Technology and Management (IJETM)
Proposed Model for Accessing Services
Hosted on Cloud by using PKI
DC01.MYLOCAL.COM
LDAP CDP AND AIA Publishing Location
SRV1.MYLOCAL.COM
HTTPS CDP AND AIA Publishing Location
Web Server
CA01.MYLOCAL.COM
Enterprise Root CA
FTP Server
Cloud Hosting
Server
Email Server
Storage Server
Virtual servers Deployed on
Virtual environment
Internet
Certificate Template
Certificate Template
Certificate Template
Certificate Template
Certificate Template
Certificate Template
Users accessing Services Deployed on
cloud
Figure 1: Proposed Model
Internet information services (IIS) web server that will
host the HTTP CDP and AIA. A
a hi e a ed DC
is installed on VMware cloud. On this DC01 vm an active
di e to y fo est as i stalled a d MYLOCAL.COM
domain was created on this DC01 VM and finally DNS was
configured in order to IP to name, and name to IP
resolution.
Furthermore new VM was created with name SRV1 and
to prepare HTTP web server and CDP for AIA publication.
Afte su essful i stallatio of it, a VM ith a e CA
was created in VMware cloud. On this CA VM,
CApolicy.inf was created was for enterprise ROOT CA. In
this CApolicy.inf, URL, renewal key length, renewal
validity period and other parameter were defined. After
this step Enterprise Root CA was installed on this CA VM.
After successful installation of Root CA ,CDP and AIA were
o figu ed o it. Fi ally MY LOCAL.COM do ai Root
CA certificate is published to AIA. Ftp and data storage
Vms were configured in VMWARE cloud in order to
provide file transfer and data storage services to users.
© 2014 IJETM. All Rights Reserved.
Page
certificate. Connected users accessed the required
In our implementation, a cloud was configured using
services and data smoothly. Unauthorized users could not
VmwareEsxi and Vcloud Director. PKI was configured on
connect with gateway and no access to data or services.
some virtual machines to generate User Certificates.
This model provides additional security in addition to
After generating certificates, certificates were distributed
user.
to authorized users. Web, Ftp and Data Sharing Servers
were created on virtual machines to host services under
VIII.
CERTIFICATE FLOW PROCESS
IaaS. Users from different locations were provided
Whenever computers is connected to respective network
160
Figure 2: Average Response Time from Servers in Model
Muhammad Ali., et. al., International Journal of Engineering Technology and Management (IJETM)
The execution of actualized model was broke down on
the bases of deferral, reaction time, reachability and way
acceptance. Accessibility of CA Server and testament
activity were examined to screen the heap and its
execution. The results indicate great execution against
every assessment.. The results indicate great execution
against every assessment.
IX.
CONCLUSION
Our proposed model provides multi-level security to
protect cloud services from unauthorized access. First is
uses customize certificate issued by private PKI of cloud
service provider, and secondly user have to specify its
credentials to connect to Server to access services. Using
right certificate and right user credentials will allow the
user to access resources.
For authentication of users, different mechanism have
been adopted like Kerberos, salting technique, Operating
system based users or others methods from cloud to
cloud service providers. In traditional approach, users are
asked to enter login and password that is already
provided to them. The major issue in this authentication
technique is that logins / passwords can be hijacked or
sniffed through different methods thus accessing the
services by unauthorized users. One of the advantage of
this technique is that users have the facility to directly
access the services by using live IPs. On the other hand
this direct accesses strategy has following issues,
Exposing Live IPs, Exposing Addresses (Source and
Destination), In some cases Exposing Login IDs and
passwords (most in hashed form) too.
X.
FUTURE WORK
Open credentials are always the catchy thing for intruders
even script kiddies love to play with open credentials
although they do ’t ha e a y ea . He e i this syste
when addresses are already exposed many chances for
traffic bombing which causes the delays and Denial of
service
(DOS) for legitimate clients, clearly a compromise on
performance. Another drawback of this system is there is
© 2014 IJETM. All Rights Reserved.
REFERNCES
1. N. Lea itt, Is Cloud Co puti g Really Ready fo
P i eti e? IEEEComputer, 2009
2. L. M. Vaquero1, L. Rodero-Meri olet al, A Break i
the Clouds: Towards a CloudDefi itio , Co puter
Communication Review,Volume 39, no.1, January
2009. Online]. Available: http://ccr.sigcomm.org
/online /files/p50- v39n1l-vaqueroA.pdf
3. Pete Mell a d Ti G a e, The NI“T Defi itio of
Cloud Co puti g ,
9 http://www.nist.gov /itl/
cloud/upload/cloud- defv15.pdf
4. C .Yanpei, P. Vern, et al, What’s Ne a out Cloud
Co puti g “e u ity?, Ele t i al E gi ee i g a d
Computer Sciences .University of California, Berkeley.
Technical Report No. UCB/EECS-2010-5, January 20,
2010
5. M. Willis, Cloud Co puti g a d the E te p ise , IT
Management and Cloud, 13,February,2008. [Online]
Available: www.johnmwillis.com/ibm/cloud-compu ting -and-the- enterprise,
6. W. Iqbal,M. Dailey, et al, “LA-driven adaptive
resource management for web applications on a
hete oge eous o pute loud . In Cloud Computing ,
Heidelberg. Berlin:Springer,2009.pp. 243-253
7. W. A. Ja se , Cloud Hooks: “e u ity a d P i a y
Issues i Cloud Co puti g , 44th Ha aii I te national Conference on System Sciences ,IEEE,2011
8. K. Julis h a d M. Hall, “e u ity a d Co t ol i the
Cloud , Information Security Journal: A Global
Perspective, vol. 19, pp. 2099-309,2010
9. D.Moha
ed, “e u ity a d Cloud Co puti g: A
A alysis of Key D i e s a d o st ai ts , Information
Security Journal: A Global Perspective, vol. 20, pp.
123-127,2011
10. ). Meh ood, Data Lo ation and Security Issues in
Cloud Co puti g , I te atio al Co fe e e o
Emerging Intelligent Data and Web technologies,
IEEE, 2011
11. “ a tesso a d R. Cla ke, P i a y a d Co su e
Risks i Cloud Co puti g , Computer Law and
Security Review, vol. 26, pp. 391-397,2011
12. “. A. Al ulla a d C. Y. Yeu , Cloud Co puti g
“e u ity Ma age e t .
161
After establishment, design and execution of complete
model, the execution of every server was broke down. All
procedures were running easily without over loading the
servers and real expand in system activity.
no control for the internal legitimate client once some
employee granted for access he/she can get a full access
which will be biggest internal risk, so overcome this
problem we can add a dedicated VPN server gateway and
our future work is to design a model in which every user
have to use VPN connection and will use his certificate
provided to him by cloud provide
Page
and joined with defined domain, that computer will get
the computer certificate. For secure and reliable
communication, policy was configured in domain through
GPO to issue the certificate to users who only member of
respective domain only.
Muhammad Ali., et. al., International Journal of Engineering Technology and Management (IJETM)
13. D.Che a d H. )hao, Data “e u ity a d P i a y
P ote tio
Issues i
Cloud Co puti g ,
International Conference on Computer Science and
Electronics Engineering, IEEE.
14. Google Compute Engine, http://cloud.google.com/
products/computeengine.html
15. Google Apps, Get o li e e ail, ale da documents
and
oe
o ki g fo
you
o ga izatio ,
http://www.google.com/apps/index1.html.
16. A azo , A azo Elasti Co pute Cloud A azo
EC , http://aws.amazon.com/ec2/
17. A F a e o k fo Data “to age Cloud to P o ide
Security by Implementing Encryption through User
P i ate Key , I te atio al Jou al of E e gi g
Trends in Science and Technology (IJETST), pp.932-
938, Vol 1, No 06 (2014), August 2014, ISSN 23489480
18. "Securing Cloud Infrastructure through PKI", IEEE
International
Conference
on
Computing,
Communication and Networking Technologies
(ICCCNT), 2014. 11-13 July 2014, pp.1-6.
19. Securing user Authentication through Customized
X.509 in Cloud Computing , I te atio al Jou al of
Soft Computing and Engineering (IJSCE), pp.90-94,
Volume-4, Issue-3, July 2014, ISSN: 2231-2307
20. Desig a d I ple e tatio of PKI fo Multi Do ai
E i o e t , I te atio al Jou al of Co pute
Theory
and
Page
162
Mr. Muhammad Ali is MS (ISM) from SZABIST, Islamabad Pakistan. He is serving as Assistant Manager in Public sector
Organization. His research areas are Cloud Security, PKI and Security services through PKI under Cloud Infrastructure,
Cyber Security, Pen Testing, IT Auditing.
Mr. Imran Ijaz is a Ph.D. Scholar in SZABIST Islamabad, Pakistan. His research areas are Cloud Security, PKI and Security
services through PKI under cloud infrastructure. Supervised / Implemented a number of National level network projects.
He is serving in Fatima Jinnah Women University, Rawalpindi, Pakistan.
© 2014 IJETM. All Rights Reserved.