Unit Iv
Unit Iv
UNIT IV
RESOURCE MANAGEMENT AND SECURITY IN CLOUD
Inter Cloud Resource Management – Resource Provisioning Methods –
Security Overview – Cloud Security Challenges – Data Security –Application
Security – Virtual Machine Security.
Inter Cloud Resource Management:
Even as the three basic services are different in use, they are built on top
of each other. In practical there are five layers required to run cloud
applications. The functional layers of cloud computing services are shown
in Fig. 4.1.1.
Cloud service providers offer cloud services by signing SLAs with end-
users.
- The SLAs must commit appropriate resources, such as CPU, memory,
and bandwidth that the user can use for a preset time.
The lack of services and under provisioning of resources would contribute
to violation of the SLAs and penalties.
- The over provisioning of resources can contribute to under-use of
services and, as a consequence, to a decrease in revenue for the
supplier.
The design of an automated system to provision resources and services
effectively is a difficult task.
- The difficulties arise from the unpredictability of consumer demand,
software and hardware failures, power management and disputes in
SLAs signed between customers and service providers.
Figure 4.6
An IGG is aware of the peering terms with other grids, selects suitable
grids that can provide the required resources, and replies to requests
from other IGGs.
Request redirection policies determine which peering grid Inter-Grid
selects to process a request and a price for which that grid will perform
the task.
An IGG can also allocate resources from a cloud provider.
The cloud system creates a virtual environment to help users deploy
their applications. These applications use the distributed grid resources.
The Inter-Grid allocates and provides a distributed virtual environment
(DVE). This is a virtual cluster of VMs that runs isolated from other virtual
clusters.
A component called the DVE manager performs resource allocation and
management on behalf of specific user applications.
The core component of the IGG is a scheduler for implementing
provisioning policies and peering with other gateways.
The communication component provides an asynchronous message-
passing mechanism. Received messages are handled in parallel by a thread
pool.
The user may give up the service by cancelling the demand, resulting in
reduced revenue for the provider.
Both the user and provider may be losers in resource provisioning without
elasticity.
Three resource-provisioning methods are presented in the following
sections.
- (1)The demand-driven method provides static resources and has been
used in grid computing for many years.
Figure 4.2
All three methods have demanded a few VM instances initially.
Gradually, the utilization rate becomes more stabilized with a maximum
of 20 VMs (100 percent utilization) provided for demand-driven provisioning
in Figure 4.2(a).
However, the event-driven method reaches a stable peak of 17 VMs toward
the end of the event and drops quickly in Figure 4.2(b).
The popularity provisioning shown in Figure 4.2(c) leads to a similar
fluctuation with peak VM utilization in the middle of the plot.
Cloud Security
Cloud Security
Software-as-a-Service Security
Cloud computing models of the future will likely combine the use of SaaS
(and other XaaS’s as appropriate), utility computing, and Web 2.0
collaboration technologies to leverage the Internet to satisfy their
customers’ needs.
New business models being developed as a result of the move to cloud
computing are creating not only new technologies and business
operational processes but also new security requirements and challenges
as described previously.
As the most recent evolutionary step in the cloud service model (see
Figure 4.5),
SaaS will likely remain the dominant cloud service model for the expected
future and the area where the most critical need for security practices
and oversight will reside.
Fig 4.5
The technology analyst and consulting firm Gartner lists seven security
issues which one should discuss with a cloud-computing vendor:
1. Privileged user access
- Inquire about who has specialized access to data, and about the
hiring and management of such administrators.
2. Regulatory compliance
3. Data location
- Does the provider allow for any control over the location of data?
4. Data segregation
- Make sure that encryption is available at all stages, and that these
encryption schemes were designed and tested by experienced
professionals.
5. Recovery
- Find out what will happen to data in the case of a disaster. Do they
offer complete restoration? If so, how long would that take?
6. Investigative support
7. Long-term viability
Data Security:
Physical security defines how you control physical access to the servers
that support your infrastructure. The cloud still has physical security
constraints. After all, there are actual servers running somewhere.
When selecting a cloud provider, you should understand their physical
security protocols and the things you need to do on your end to secure
your systems against physical vulnerabilities.
The ultimate challenge in cloud computing is data-level security, and
sensitive data is the domain of the enterprise, not the cloud computing
provider.
Security will need to move to the data level so that enterprises can be sure
their data is protected wherever it goes. For example, with data-level
security, the enterprise can specify that this data is not allowed to go
outside of the United States.
It can also force encryption of certain types data, and permit only
specified users to access the data.
It can provide compliance with the Payment Card Industry Data Security
Standard (PCI DSS).
True unified end-to-end security in the cloud will likely require an ecosystem
of partners.
Data Control
The big gap between traditional data centers and the cloud is the location
of your data on someone else’s servers.
Companies who have outsourced their data centers to a managed services
provider.
The main practical problem is that factors that have nothing to do with your
business can compromise your operations and your data.
For example, any of the following events could create trouble for your
infrastructure:
- The cloud provider declares economic failure and its servers are
seized or it ceases operations.
Application Security
Application Security
Although product engineering will likely focus on the application layer, the
security design of the application itself, and the infrastructure layers
interacting with the application, the security team should provide the
security requirements for the product development engineers to
implement.
This should be a collaborative effort between the security and product
development team.
External penetration testers are used for application source code reviews,
and attack and penetration tests provide an objective review of the security
of the application as well as assurance to customers that attack and
penetration tests are performed regularly.
Fragmented and undefined collaboration on application security can result
in lower-quality design, coding efforts, and testing results.
Since many connections between companies and their SaaS providers are
through the web, providers should secure their web applications by following
Open Web Application Security Project (OWASP) guidelines for secure
application development and locking down ports
LAMP is an open-source web development platform, also called a web stack,
that uses Linux as the operating system, Apache as the web server, MySQL as
the relational database management system RDBMS, and PHP as the object-
oriented scripting language.
o Perl or Python is often substituted for PHP.
o
To overcome the security attacks on VMs, Network level IDS or Hardware level
IDS can be used for protection, shepherding programs can be applied for code
execution control and verification and additional security technologies can be
used.
The additional security technologies involve the use of RIO's v Safe and v
Shield software, hypervisor enforcement and Intel VPro technologies, with
dynamic optimization infrastructure or using the hardened OS environment or
are using isolated sandboxing and execution.
The security software loaded on a virtual machine should be filled with two-
way state full Firewall which enables virtual machine isolation and
localization, enabling tighter policy and the flexibility to transfer the virtual
machine from the on premises to cloud resources to make it easier for the
centralized management of the server firewall policy.
The integrity monitoring and log inspection should be used for virtual
machine level applications.
.