Page 1006 - Cloud computing: From paradigm to operation
P. 1006
7 Security
e) insecure service access: In the monitoring data collection stage, insecure access to the data
collection interfaces could cause monitoring data loss.
f) unauthorized administration access: Unauthorized administration access to the CSP's monitoring
data collection system, or the CSC's system could result in monitoring data loss. For example,
attackers may use a system vulnerability to gain unauthorized administration access to the CSC's
system and modify the monitoring collection destination IP address to that of the attackers.
9.2 Security threats and challenges in monitoring data storage stage
a) data loss and leakage: As the cloud service environment is typically a multi-tenant one, loss or
leakage of data is a serious threat to both the CSC and CSP. A lack of appropriate management of
cryptographic information, such as encryption keys, authentication codes and access privilege, could
lead to significant damages, such as data loss and unexpected leakage to the outside. For example,
insufficient authentication, authorization, and audit controls; inconsistent use of encryption and/or
authentication keys; operational failures; disposal problems; jurisdiction and political issues; data
centre reliability; and disaster recovery, can be recognized as major threats.
b) service unavailability: A monitoring data storage server can be attacked by a denial of service (DoS)
or distributed denial of service (DDoS) attack; in addition, the monitoring data storage hardware
could fail and cause data loss or destruction.
9.3 Security threats and challenges in monitoring data use stage
a) data misuse: CSC monitoring data could be misused by the CSP. Monitoring data could be used by a
CSP to maintain SLA and the operation of cloud computing platform and resources; however, CSC
monitoring data could also be used for other purposes by the CSP without CSC permission.
b) insider threats: An employee of a CSP or CSC could misuse the CSC's monitoring data for other than
intended purposes.
c) system vulnerability: Monitoring data could be lost during data usage due to system vulnerabilities.
d) eavesdropping: Monitoring data could be subject to eavesdropping by attackers.
9.4 Security threats and challenges in monitoring data migration stage
a) data misuse: Monitoring data could migrate between different physical locations. It is very
important not to allow data to be misused as a result of monitoring data being transmitted to
different locations.
b) spoofing: Attackers could masquerade as the management system or data storage server of a cloud
monitoring service, and cause the loss or misuse of monitoring data.
c) tampering and intercepting: Attackers could use man-in-the-middle or other network attacks to
tamper and intercept monitoring data.
9.5 Security threats and challenges in monitoring data analysis stage
a) data misuse: CSC monitoring data could be misused by the CSP during data analysis.
b) system vulnerability: Monitoring data could be lost due to a data analysis system vulnerability.
c) DoS attack: A monitoring data analysis server could be attacked by DoS or DDoS attack.
9.6 Security threats and challenges in monitoring data presentation stage
a) data misuse: CSC monitoring data could be misused (or be presented without CSC permission) by
the CSP during data presentation.
b) system vulnerability: Reporting and analysis data could be lost due to a data presentation system
vulnerability.
c) misrepresentation: CSC monitoring data could be misrepresented during a data presentation.
998