Cloud Computing for Secured Communication
Abstract: Nowadays, group oriented applications such as video-conferencing, TV over internet, Video ondemand and e-learning has been developed which acquire multicast communication. Support formulticasting in apps means the data may be sent to a larger audience. The group's members must havesafe and simple means of communicating with one another. Encrypting the message before sending itout to the whole team is a must if you care about data security. A secret or group key must be sharedamongst the group members in order to encrypt and decode the material. Members of the group whohave been given the group key are the only ones who can read the encrypted material. In recent years,cloud computing has evolved as a viable platform for multicast data sharing across a community ofusers. Since a third company is responsible for protecting your data on the cloud, data security isanother major obstacle. However, a secret key must be produced and sent securely to cloud users whensharing the data with a group of people.
Keywords: Cloud Computing, Cloud Infrastructure, Secured Communication, Cloud network
INTRODUCTION
Cloud computing has originated with the exponential development of internet connectivity and infrastructure access. Cloud is a modern model for providing diverse applications to people on the internet, also referred to as the 'cloud,' for example web production frameworks, servers, storage and content. Cloud infrastructure often offers customers and companies different tools to use cloud technology in an easy and reliable way, without growing computing resources costs.
Business may select between private, public or hybrid cloud implementation, depending on specific business requirements and security considerations. Most organizations follow this fast-growing paradigm to satisfy their computing requirements and develop their market. Cloud infrastructure offers tools for digital networks and other software used both by a customer and the businesses of the cloud service provider, such as network capability, storage and server utility.(1) Instead of buying new hardware or services for its commercial uses, this enables consumers to use the cloud network as a commodity, technology and software as a service.
Many famous companies supply this equipment and provide cloud services. Here are some of the biggest names on the market:
· Google: Google's own private cloud is to include Google Docs, email, analytic websites, charts, Google Cloud Storage, among even more for features such as Google App Engine (Python, Java, Go).
· Microsoft: Microsoft offers its offline software apps and, in particular, the Microsoft Office 365 web platform enables its customers to shift the information and market analytics resources.
· Amazon: Amazon Web Services (AWS) provides reliable cloud services to support companies' expansion. It provides Elastic Cloud Computing (ECC), Simple Storage Service (SSS), content distribution and other capabilities.
· Salesforce.com: Salesforce.com enables customers to run cloud apps. Force.com, vmforce.com and Java developers are able to design and install company applications in the cloud.
Cloud Computing
Exploring a public scheme always starts with defining the key concepts and how the public understands them. Studying such cutting-edge and up-to-date literature yields the following functional descriptions, which form the basis for a wide variety of novel approaches to cloud computing: (2)
"Cloud computing ('cloud') is an emerging word that depicts the growth of numerous current technologies and approaches to computing into something else," writes NIST (National Institute of Standards and Technology). The cloud "decouples” IT resources like applications and data from their physical location and the means by which they are delivered.
Cloud Computing Architecture
Cloud infrastructure design focuses mostly on device product configuration for cloud, hardware, middleware and applications, cloud consumers, cloud storage, and networking. Both these modules are mainly arranged with regard to the use of the cloud consumers and end users.
A new paradigm focused on the possibility of holding large amounts of data and software is the cloud computer architecture. The aim is also to include these stored data and applications focused on consumer demands and flawless hardware and software access without substantial expenditure in own software, hardware or infrastructure. Figure 1 shows the cloud infrastructure architecture and the cloud design elements. (3)
Access Control Techniques in Cloud Computing
To resolve the security issues in cloud computing applications, access control policies are used as one of the security mechanisms to permit, deny or restricts the access to the cloud computing systems. Also, the existing access control techniques attempted to identify the users who are trying to access the system without proper authorization. According to Anderson (2010), Access Control is the security model which provides several constraints on the user’s actions, which is performed in a system based upon the rules described by the access control mechanism. Figure 1 depicts the access control view point.
Figure 1: Access Control View Point
Multiple access control mechanisms are usable, some of which are listed below:
a) Discretionary Access Control (DAC)
Access to knowledge regarding artifacts is provided by the DAC model which grants permission to the owners (restrict or access their personal objects) depending on the skill or user identification or participation of a club. (4) The DAC is deemed less secure and commercially used by the UNIX-based systems due to its flexibility in comparison with other access control methods. The DAC flow in cloud computing is shown in Figure 2.
Figure 2: Discretionary Access Control
b) Mandatory Access Control (MAC)
The MAC model (Anderson 2010) provides a central authority with access to a subject's decisions that request access to artifacts or knowledge within objects. MAC grants a class of access to any topic and entity to protect access to artifacts and the knowledge that passes within objects. A class of access is a type of authentication used to protect the flow of knowledge between dominating objects and objects. Item classifications are security codes used to identify items depending on their sensitivity. The safety standards used to reflect confidence or rules of subjects are the focus of the clearances. In cloud storage, Figure 3 displays the MAC.
Figure 3: Mandatory Access Control
c) Role-Based Access Control (RBAC)
The consumer with allocated roles shall have access to the object. The functions are determined on the basis of the job function. (5) The device functions and not the user are all the objects involved. The RBAC function in cloud computing is seen in Figure 4
Figure 4: Role-Based Access Control
Key management infrastructure in cloud computing
Control of cloud core The Cloud Core Management Client (CKMC) and Cloud Core Management Server infrastructure (CKMS). Like software, platformer, infrastructure and other basic cloud services, CKMC leaves cloud apps (as a Service). CKMS interacts with CKMC through the interoperability protocol cloud key management, which interacts with the SKMS framework and the PKI, utilizing the symmetric key management protocol and asymmetric key management protocol, as seen in Figure 5.
Figure 5: Cloud key management infrastructures
A single comprehensive protocol for communication between cloud key manager servers and cryptographic clients is established in the Cloud Key Management Interoperability Protocol (CK-MIP). Defaults to the crucial need of an extensive key management protocol by specifying a protocol that can be used by every cloud cryptography client, from the multi-locator implementations to the cloud stores. (6) It is integrated into the cloud storage infrastructure and can deploy efficient centralized key management for all of its security, authentication of certified devices, digital signatures and other encryption capabilities. A cloud infrastructure solution can consolidate main administration in a single enterprise key management system by providing provider assistance from CKMIP. It eliminates operating and maintenance costs while improving the organizational controls and regulation of a security policy by every cloud cryptographic customer, from multi-tenant deployment to cloud storage. It is integrated into the cloud storage infrastructure that enables efficient centralized key management for all its encryption, user authentication based on certificates, digital signs and other cryptographic functions. A cloud storage solution may consolidate key management inside a single company key management framework with provider assistance from CKMIP. It lowers maintenance and maintenance expenses thus reinforcing operational controls and protection policy regulation.
Security in Cloud Computing
Whether it's an IaaS, SaaS, or PaaS provider, in the cloud computing model, the cloud provider is responsible for developing, deploying, and managing the corresponding resources, applications, and services. (7) The best way to get the most out of your infrastructure and software is to take use of multi-tenancy and virtualization. Virtualization allows several users to share a single server, computer facility, data centre, and operating system. By pooling their resources, cloud providers are able to service a huge user base. As a result of multi-tenancy and virtualization, the cloud environment faces a number of security challenges, including those related to data protection, communication, and the management of resources for isolation and virtualization. (8)
Data Protection: At any given time, several users tap into the cloud's resources. Providers control the common infrastructure where users' data is kept and processed. Someone with bad intentions might potentially alter user data. The necessity of data privacy and protection in cloud environments is heightened by factors such as a lack of knowledge regarding where data is stored, regulatory concerns arising from cross-border storage, and similar factors. As a result, fundamental security concerns in cloud computing revolve around data protection issues such data confidentiality, data integrity, and data availability.
Application Security: Security concerns are unique to cloud computing environments and must be taken into account when developing or deploying application software. The remote app you're using must be genuine and virus-free. The cloud's adaptability, transparency, and public availability pose risks to application security. Another issue is how to ensure the programmes' security when they are run on remote computers. (9)
Network Security: A cloud computing can have type public or private, based on the deployment model. Service and applications are accessed from remote locations in a cloud environment. Continuous availability of cloud service without any disruption due to network security problems like Denial of Service (DOS), and other attacks are important security challenges.
Virtualization Security: The hypervisor and other management components of virtualization technologies provide the door to new types of assaults. Virtual servers and apps cannot be evaluated for safety in any meaningful way. A man-in-the-middle attack might arise at the moment of authorization for any service when using multi-tenancy in cloud infrastructures to share 7 physical resources amongst VMs (Virtual Machines).
Identity Management: Registration is when identities are created for use with cloud services. To access a cloud service, each user must first log in with their own unique identity. It's a serious problem because unauthorized users can access cloud-based services and data. A bad actor can get access to a cloud service by masquerading as a genuine user. Frequently, these bad actors take over a cloud service, making it unavailable to genuine users. It's also possible for the user to go too far when making use of the service in question.
Access Control Techniques in Cloud Computing
Access control rules are one of the security strategies used to allow, prohibit, or limit access to cloud computing systems, helping to address the security concerns that have been raised about cloud computing applications. Existing methods of access control have also made an effort to track down those who are trying to log in to the system without authorization. According to Anderson (2010), an access control mechanism describes a security model that places restrictions on the activities a user may do within a system. (10)
· Discretionary Access Control (DAC)
· Mandatory Access Control (MAC)
· Role-Based Access Control (RBAC)
Challenges & Issues In Cloud Computing
Cloud computing has a multi-tenancy feature which increases the challenge to cloud adoption. Service providers must address the number of following challenges as shown in the Figure in the cloud:
· Loss of Governance: When using cloud computing, customers cede authority to the service provider, which can compromise the safety of their data and applications in a number of ways. This means that service level agreements (SLAs) may not impose any security obligations on the provider. Thus, the phrase "policies" is used by all businesses to avoid blame for unauthorized access, usage, fraud, and deletion of client data and apps.