Page 1018 - Cloud computing: From paradigm to operation
P. 1018

7                                                     Security


            6       Overview

            6.1     Specification of the data in this Recommendation

            CSC data includes private data of customers stored on a cloud platform and  related data through cloud
            services for CSC, such as account information, login record and operation log.
            The difference between the terms CSC (see clause 3.1.4) and CSU (see clause 3.1.8) is further distinguished
            as follows.
            The CSC is the person or organization that enters into the legal relationship with the CSP. So the CSC could
            be an enterprise, a subsidiary, a government department or an individual consumer.
            The CSU is the person, device or application that uses the cloud service that has been contracted for. The
            CSU could be a government employee, an application running on a smartphone, an individual consumer or a
            member of a household, such as a child. The CSC usually nominates some CSUs to act as administrators and
            manage the relationship between the CSC and the CSP. A CSU always acts on behalf of a CSC. Most employee
            CSUs need to have little or no visibility of what or how the CSP operates, or the services that the CSC has
            contracted for, unless the CSC decides they need to know (e.g. administrators and internal auditors).

            A CSC can include multiple cloud tenants. A tenant can include multiple CSUs.

            6.2     Data security threats for cloud service customers
            As the cloud service environment is typically multi-tenant, loss or leakage of data is a serious threat to the
            CSC.  The  lack  of  appropriate  management  of  cryptographic  information,  such  as  encryption  keys,
            authentication codes and access privilege, could lead to significant damage, such as data loss and unexpected
            data leakage. For example, insufficient authentication, authorization and audit controls; inconsistent use of
            encryption or authentication keys; operational failures; disposal problems; jurisdiction and political issues;
            data centre reliability and disaster recovery, can be recognized as major sources of this threat and may be
            associated with the challenges.
            As for the security of storage data, since all CSC data is actually stored in the equipment of CSPs, and the
            storage resources is shared by different CSCs, it may face several risks, including:
            1)      CSP insiders with privileges can gain unauthorized access resulting in leakage of CSC data;
            2)      malicious users or hackers can also gain unauthorized access resulting in leakage of CSC data;
            3)      cross-border data flow can lead to data leakage, especially for sensitive data;
            4)      software and hardware failures, power outages and natural disasters can result in data loss.

            Data  security  also  lies  in  the  process  of  transmission.  Data  can  be  stolen  or  tampered  with  during
            transmission, thus lead to confidentiality leakage, if the data is not encrypted properly. If CSCs have not
            adopted adequate encryption, CSPs should verify the integrity of the data and take corresponding encryption
            measures.

            Another threat is the leakage of residual data. When a CSC unsubscribes its service, its data is cleared and
            the storage space released or reallocated to other CSCs. It is the responsibility of the CSP to ensure that the
            residual data of one CSC or tenant cannot be recovered by another.

            6.3     Existing requirements related to about data security

            The security framework for cloud computing specified in [ITU-T X.1601] provides the requirements related
            to data security, including data isolation, protection and confidentiality protection.
            1)      Data isolation

                    In  a  cloud  computing  context,  a  tenant  is  prevented  from  accessing  data  belonging  to  another
                    tenant, even when the data is encrypted, except when explicitly authorized. Data isolation may be
                    realized  logically  or  physically,  depending  on  the  required  isolation  granularity  and  the  specific
                    deployment of cloud computing software and hardware.

                    NOTE – In cloud computing, isolation occurs at the tenant level. A given CSC may have multiple tenants in the
                    cloud, for example, to separate different subsidiaries, divisions or business units.


            1010
   1013   1014   1015   1016   1017   1018   1019   1020   1021   1022   1023