Security Techniques For Data Protection
Security Techniques For Data Protection
Security Techniques For Data Protection
Kire Jakimoski
Faculty of Informatics, FON University, Skopje, Republic of Macedonia
[email protected]; [email protected]
Abstract
Cloud computing has a lot of security issues that are gaining great attention nowadays,
including the data protection, network security, virtualization security, application
integrity, and identity management. Data protection is one of the most important security
issues, because organizations won’t transfer its data to remote machines if there is no
guaranteed data protection from the cloud service providers. Many techniques are
suggested for data protection in cloud computing, but there are still a lot of challenges in
this subject. The most popular security techniques include SSL (Secure Socket Layer)
Encryption, Intrusion Detection System; Multi Tenancy based Access Control, etc. Goal
of this paper is to analyze and evaluate the most important security techniques for data
protection in cloud computing. Furthermore, security techniques for data protection will
be recommended in order to have improved security in cloud computing.
1. Introduction
Cloud computing includes a group of computers that are jointly used to provide
different computations and tasks. Cloud computing is one of the most important IT
paradigms in the last few years. One of the key benefits that is offered from this IT
technology for the companies is reduced time and costs on the market. Cloud computing
is providing companies and organizations to use shared storage and computing resources.
It is better than to develop and operate with the own infrastructure. Cloud computing also
provides organizations and companies to have a flexible, secure, and cost-effective IT
infrastructure. It can be compared with the national electric grids that permit organizations
and homes to plug into a centrally managed, efficient and cost-effective energy source.
Main corporations including Google, Amazon, Cisco, IBM, Sun, Dell, Intel, HP, Oracle,
and Novell have invested in cloud computing and propose a range of cloud-based
solutions to individuals and businesses.
There are different types and models in cloud computing regarding the different
provided services. So, the cloud computing involve public cloud, private cloud, hybrid
cloud, and community cloud. Service delivery models, on the other hand, could be
categorized as SaaS (Software as a service), PaaS (Platform as a Service), and IaaS
(Infrastructure as a Service). Cloud computing could be usually classified by two ways:
by cloud computing location, and by the offered types of services. By the location of the
cloud, cloud computing is typically classified in: public cloud (where the computing
infrastructure is hosted by the cloud vendor); private cloud (where the computing
infrastructure is assigned to a specific organization and not shared with other
organizations); hybrid cloud (the usage of private and public clouds together); and
community cloud (it involves sharing of IT infrastructure in between organizations of the
same community) [1]. If the classification is based on type of offered services, clouds are
classified in these ways: IaaS (Infrastructure as a service), PaaS (Platform as a Service),
and Software as a Service (SaaS) [1].
offers Full Disk Encryption and Whole Disk Encryption in order to enable confidentiality
of the data in the cloud. Benefits of these encryption methods are that data that are
partitioned could be decrypted and data is encrypted at rest.
McAfee is vendor that enables access control in the cloud computing. It offers different
methods for access control as McAfee Single Sign On, McAfee Web Gateway, and
McAfee one time password. These kinds of security techniques enable policy
management and prevention of data to be lost. Figure 2 presents the cloud identity
manager offered by McAfee for cloud computing.
Fujitsu is another vendor that offers access control with different authorization
techniques like Virtual System Management and Central Management Authorization.
These security techniques are effective for preventing cross-site scripting and injection
attacks.
protecting the privacy of the users enabling them to set privacy policies by themselves. In
this way users are protecting their data in effective way from unauthorized access.
Authorization in the cloud is also offered by VMware which integrates service
providers’ policies with the corporate directories and different policies. Certificates or soft
tokens are used for authorization of the end users in secure way. OASIS Cloud
authorization enables security techniques based on management of authorizations. Users
logs are maintained with this method which give location of the users and information
about the used devices from the users.
useful to have re-evaluation on an annual basis of the algorithms and keys that are utilized
in order to be assured about the strength of the protection.
It is also very important organizations or corporations that are using cloud technology
to understand the security controls that are related to the data in the cloud multi-tenant
environment. Hardware Security Modules or HSMs are recommended to store the keys.
It is also recommended once per quarter a testing team to make evaluation of a random
sample of system backups with trying to restore them on a test bed environment. Systems
that are restored should be confirmed to guarantee that the operating system, application
and data from the backup are all functional and intact. Hence, if there is malware
infection, procedures of restore should utilize backup version which is considered to
predate the original infection.
7. Conclusion
The main goal of this work was to analyze and evaluate the security techniques for data
protection in the cloud computing. For that purpose we analyzed and evaluated the most
important security techniques for data protection that are already accepted from the cloud
computing providers. We classified them in four sections according to the security
mechanisms that they provide: authentication, confidentiality, access control and
authorization.
So, we successfully answered on the key questions in the cloud technology, or simply
said should cloud computing be trusted in data protection. We can conclude that if all
recommended measures are taken into account providing authentication, confidentiality,
access control and authorization, then the cloud computing can be trusted in data
protection.
We also focused on the security issues that should be taken into account in depth in
order to have proper data security in the cloud. We recommended important security
measures relating to data protection in the cloud that must be taken into account. We also
proposed a lot of issues that should be considered in order to have improved data security
in the cloud computing, like proper usage of administrative privileges, wireless access
control of the data in systems that use wireless networks, data recovery and boundary
defense in the cloud.
References
[1] L. Badger, T. Grance, R. Patt-Corner and J. Voas, “Cloud computing synopsis and recommendations
(draft), nist special publication 800-146”, Recommendations of the National Institute of Standards and
Technology, Tech. Rep. (2011).
[2] U. Khalid, A. Ghafoor, M. Irum, and M. A. Shibli, “Cloud based secure and privacy enhanced
authentication & authorization protocol”, Procedia Computer Science, 22, (2013), 680-688.
[3] T. Acar, M. Belenkiy and A. Küpçü, “Single password authentication”, Computer Networks, 57(13),
(2013), 2597-2614.
[4] G. Wang, Q. Liu, J. Wu and M. Guo, “Hierarchical attribute-based encryption and scalable user
revocation for sharing data in cloud servers”, Computers & Security, 30(5), (2011), 320-331.
[5] C. I. Fan and S. Y. Huang, “Controllable privacy preserving search based on symmetric predicate
encryption in cloud storage”, Future Generation Computer Systems, 29(7), (2013), 1716-1724.
[6] D. W. Chadwick and K. Fatema, “A privacy preserving authorisation system for the cloud”, Journal of
Computer and System Sciences, 78(5), (2012), 1359-1373.
[7] M. Hange, “Security Recommendations for Cloud Computing Providers”, Federal Office for
Information Security (2011).
[8] G. Brunette and R. Mogull, “Security guidance for critical areas of focus in cloud computing v2”, Cloud
Security Alliance, (2009), 1-76.
Authors
Kire Jakimoski, He received his B.Sc. degree in the field of
Telecommunications from the Military Academy “Mihailo
Apostolski” in Skopje, R. Macedonia in 2002, M.Sc. degree in
Electrical Engineering in the field of Telecommunications from the
Ss. Cyril and Methodius University in Skopje, R. Macedonia in 2007,
and Ph.D. in technical sciences from the Ss. Cyril and Methodius
University in Skopje, R. Macedonia in 2013. From 2002 to 2006 he
works as an Officer for Telecommunications in the Ministry of
Defense in the Republic of Macedonia. From January, 2006 to March,
2012 he works as an adviser for information security in the
Directorate for Security of Classified Information in the Republic of
Macedonia. From March, 2012 he is with the Faculty of Informatics,
FON University in Skopje. Also, he is an author/co-author of around
30 published research papers and one book. He is an Assistant
Professor and Vice Dean at the Faculty of Informatics, FON
University in Skopje, Macedonia. His research interests include
Wireless and Mobile Networks, Heterogeneous Wireless Networks,
Computer Networks, Digital Telecommunications, Information
Security.