Page 1006 - Cloud computing: From paradigm to operation
P. 1006

7                                                     Security


            e)      insecure  service  access:  In  the  monitoring  data  collection  stage,  insecure  access  to  the  data
                    collection interfaces could cause monitoring data loss.
            f)      unauthorized administration access: Unauthorized administration access to the CSP's monitoring
                    data  collection  system,  or  the  CSC's  system  could  result  in  monitoring  data  loss.  For  example,
                    attackers may use a system vulnerability to gain unauthorized administration access to the CSC's
                    system and modify the monitoring collection destination IP address to that of the attackers.

            9.2     Security threats and challenges in monitoring data storage stage

            a)      data loss and leakage: As the cloud service environment is typically a multi-tenant one, loss or
                    leakage of data is a serious threat to both the CSC and CSP. A lack of appropriate management of
                    cryptographic information, such as encryption keys, authentication codes and access privilege, could
                    lead to significant damages, such as data loss and unexpected leakage to the outside. For example,
                    insufficient authentication, authorization, and audit controls; inconsistent use of encryption and/or
                    authentication keys; operational failures; disposal problems; jurisdiction and political issues; data
                    centre reliability; and disaster recovery, can be recognized as major threats.
            b)      service unavailability: A monitoring data storage server can be attacked by a denial of service (DoS)
                    or distributed denial of service (DDoS) attack; in addition, the monitoring data storage hardware
                    could fail and cause data loss or destruction.

            9.3     Security threats and challenges in monitoring data use stage

            a)      data misuse: CSC monitoring data could be misused by the CSP. Monitoring data could be used by a
                    CSP to maintain SLA and the operation of cloud computing platform and resources; however, CSC
                    monitoring data could also be used for other purposes by the CSP without CSC permission.
            b)      insider threats: An employee of a CSP or CSC could misuse the CSC's monitoring data for other than
                    intended purposes.
            c)      system vulnerability: Monitoring data could be lost during data usage due to system vulnerabilities.
            d)      eavesdropping: Monitoring data could be subject to eavesdropping by attackers.

            9.4     Security threats and challenges in monitoring data migration stage

            a)      data  misuse:  Monitoring  data  could  migrate  between  different  physical  locations.  It  is  very
                    important not to allow data to be misused as a result of monitoring data being transmitted to
                    different locations.
            b)      spoofing: Attackers could masquerade as the management system or data storage server of a cloud
                    monitoring service, and cause the loss or misuse of monitoring data.
            c)      tampering and intercepting: Attackers could use man-in-the-middle or other network attacks to
                    tamper and intercept monitoring data.

            9.5     Security threats and challenges in monitoring data analysis stage
            a)      data misuse: CSC monitoring data could be misused by the CSP during data analysis.
            b)      system vulnerability: Monitoring data could be lost due to a data analysis system vulnerability.
            c)      DoS attack: A monitoring data analysis server could be attacked by DoS or DDoS attack.


            9.6     Security threats and challenges in monitoring data presentation stage
            a)      data misuse: CSC monitoring data could be misused (or be presented without CSC permission) by
                    the CSP during data presentation.

            b)      system vulnerability: Reporting and analysis data could be lost due to a data presentation system
                    vulnerability.
            c)      misrepresentation: CSC monitoring data could be misrepresented during a data presentation.





            998
   1001   1002   1003   1004   1005   1006   1007   1008   1009   1010   1011