0% found this document useful (0 votes)
35 views25 pages

SPC 1

The document provides an overview of cloud security, emphasizing its importance in protecting data, applications, and infrastructure in cloud computing environments. It outlines key objectives such as confidentiality, integrity, availability, authentication, and non-repudiation, along with core components like identity management and encryption techniques. Additionally, it discusses the role of digital signatures in ensuring authenticity and integrity of data in cloud services.

Uploaded by

22z137
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views25 pages

SPC 1

The document provides an overview of cloud security, emphasizing its importance in protecting data, applications, and infrastructure in cloud computing environments. It outlines key objectives such as confidentiality, integrity, availability, authentication, and non-repudiation, along with core components like identity management and encryption techniques. Additionally, it discusses the role of digital signatures in ensuring authenticity and integrity of data in cloud services.

Uploaded by

22z137
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

🌐 Overview of Cloud Security

✅ Introduction to Cloud Computing

Cloud computing is a model that allows on-demand access to shared computing


resources such as servers, storage, databases, applications, and services over the
Internet. While cloud computing offers flexibility, scalability, and cost-efficiency, it also
brings new security and privacy challenges.

🔐 What is Cloud Security?

Cloud Security refers to a set of policies, technologies, controls, and practices


designed to protect:

● Data

● Applications

● Infrastructure
that are associated with cloud computing environments.

It aims to safeguard cloud-based systems from internal and external security threats
and ensure compliance with regulatory standards.

Key Objectives of Cloud Security

Cloud security focuses on five key objectives (often aligned with CIAAN model):

1. Confidentiality – Ensuring that sensitive data is not disclosed to unauthorized


entities.

2. Integrity – Preventing unauthorized modification of data.

3. Availability – Ensuring resources are accessible when needed.

4. Authentication – Verifying the identity of users or systems.

5. Non-repudiation – Guaranteeing that actions cannot be denied after they are


performed.
☁️Why Cloud Security is Important

1. Multi-Tenancy: In public clouds, multiple users share the same physical


infrastructure. Without proper isolation, data leaks or attacks are possible.

2. Data Stored Remotely: Data resides in remote data centers, increasing risk of
unauthorized access.

3. Internet Accessibility: Cloud services are accessible via the Internet, exposing
them to cyber threats like phishing, DoS, DDoS, and man-in-the-middle attacks.

4. Compliance Requirements: Organizations must meet legal and industry-


specific regulations such as GDPR, HIPAA, ISO 27001, etc.

5. Dynamic Nature: Cloud workloads are highly dynamic. Security controls must
adapt quickly to changes.

🔧 Core Components of Cloud Security

1. Identity and Access Management (IAM)

● Controls who can access what resources.

● Examples: AWS IAM, Azure AD, Google Cloud IAM.

2. Data Protection Techniques

● Encryption (at rest and in transit), masking, tokenization.

● Example: AWS KMS (Key Management Service) for managing encryption keys.

3. Network Security

● Firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs.

● Example: Azure Network Security Groups (NSGs).


4. Security Monitoring and Logging

● Real-time threat detection, audit logging, and activity monitoring.

● Tools: AWS CloudTrail, Google Cloud Operations Suite.

5. Compliance and Governance

● Ensures cloud setups adhere to required security standards.

● Tools: AWS Config, Azure Policy.

⚙️Security Models in Cloud

1. Shared Responsibility Model

○ Cloud Provider: Security of the cloud (hardware, software, networking,


data centers).

○ Cloud Customer: Security in the cloud (data, identity, applications).

2. Service Models and Security

○ IaaS: Customer secures OS, apps, data.

○ PaaS: Provider secures platform; user handles app logic and data.

○ SaaS: Provider handles almost everything; user manages access control.

🧪 Examples of Cloud Security in Practice

● AWS encrypting data in S3 buckets

● Google Cloud using IAM roles for resource access

● Microsoft Azure applying DDoS protection on virtual networks


📌 Conclusion

Cloud Security is an essential part of cloud computing that ensures confidentiality,


integrity, and availability of data and services. As cloud adoption grows, so do the
threats — making robust cloud security frameworks, tools, and best practices
critical to protect data, build user trust, and ensure regulatory compliance.

🔐 Security Services in Cloud Computing


Cloud Security services are essential to protect the data, applications, and
infrastructure within a cloud environment. These services ensure that cloud
systems are secure, trusted, and compliant with privacy and regulatory
requirements.

1 Confidentiality
1️⃣
✅ Definition:

Confidentiality means ensuring that data is accessible only to authorized users


and is protected from unauthorized disclosure.

☁️In Cloud:

● Data is often stored in shared environments (multi-tenant).

● Data is transmitted over public networks, making it vulnerable to


eavesdropping and man-in-the-middle attacks.

🔐 Techniques Used:

● Encryption:

○ At rest: Data stored in cloud storage is encrypted (e.g., AES-256).

○ In transit: Data sent over networks is encrypted using TLS/SSL.

● Access Control:

○ IAM (Identity and Access Management) policies restrict who can


access what data.
● Tokenization:

○ Sensitive fields are replaced with unique tokens (used in


finance/healthcare data).

🧪 Example:

AWS S3 provides server-side encryption for stored data and allows the use of
KMS (Key Management Service) to manage encryption keys securely.

2️⃣Integrity
✅ Definition:

Integrity ensures that data remains unaltered during transmission or storage,


either accidentally or maliciously.

☁️In Cloud:

● Data can be corrupted due to software bugs, malware, or unauthorized


modification.

● Integrity is crucial for financial records, health data, and legal documents
stored in the cloud.

🔐 Techniques Used:

● Hashing Algorithms:

○ Algorithms like SHA-256 or SHA-3 produce a unique digital


fingerprint (hash) of data.

● Digital Signatures:

○ Verifies both the source and the content of the message.

● Version Control & Checksums:

○ Cloud services (like AWS S3 or Azure Blob Storage) use ETag or


CRC values to verify integrity.
● Immutable Storage:

○ Data cannot be changed once written (e.g., for compliance logs).

🧪 Example:

Azure Blob Storage uses MD5 checksums to detect accidental data corruption
during upload or download.

3️⃣Authentication
✅ Definition:

Authentication is the process of verifying the identity of users or systems before


granting them access.

☁️In Cloud:

● Authentication ensures only verified users/systems can interact with cloud


resources.

● Used in both human users (e.g., admins, employees) and machine-to-


machine communication (e.g., APIs).

🔐 Techniques Used:

● Password-based Authentication

● Multi-Factor Authentication (MFA) – adds an extra layer of security (OTP,


biometrics)

● Single Sign-On (SSO) – users log in once to access multiple services

● Federated Identity – integrates third-party identity providers (e.g., Google,


Facebook)

● API Keys and OAuth Tokens – used for programmatic access

🧪 Example:

AWS uses IAM user credentials combined with MFA to securely authenticate
users before they can access the AWS Management Console.

4️⃣Non-Repudiation
✅ Definition:

Non-repudiation ensures that a user cannot deny the authenticity of their action
or communication.

☁️In Cloud:

● Important for legal, audit, and forensic purposes.

● Ensures that every access, upload, or delete action is recorded and


traceable.

🔐 Techniques Used:

● Digital Signatures – binds the user's identity to the document/action.

● Timestamps – record the exact time when the action occurred.

● Logging and Auditing – cloud providers offer detailed activity logs.

● Blockchain (optional) – for tamper-proof, decentralized record-keeping.

🧪 Example:

Google Cloud’s Cloud Audit Logs record all administrative activities with user ID,
IP address, time, and action – useful in non-repudiation cases.

5️⃣Access Control
✅ Definition:

Access Control determines who can access which resources in the cloud and
under what conditions.

☁️In Cloud:
● Used to restrict unauthorized actions.

● Supports principle of least privilege – users only get access to what they
absolutely need.

🔐 Types of Access Control:

● Discretionary Access Control (DAC) – object owner decides permissions.

● Mandatory Access Control (MAC) – strict policies enforced by the system.

● Role-Based Access Control (RBAC) – access based on user’s role.

● Attribute-Based Access Control (ABAC) – access based on attributes like


department, location, time, etc.

📦 Tools Used in Cloud:

● AWS IAM Policies

● Azure Role-Based Access Control (RBAC)

● Google Cloud IAM Roles

🧪 Example:

In AWS, a user with the “S3ReadOnlyAccess” role can view contents of an S3


bucket but cannot modify or delete them.

🔐 Basics of Cryptography in Cloud Computing

✅ Introduction to Cryptography
Cryptography is the practice of securing data by converting it into an unreadable
format (called ciphertext) so that only authorized parties can read or process it.

In cloud computing, cryptography is essential to:

● Protect confidentiality and integrity of data


● Secure data at rest (stored) and in transit (transferred)

● Ensure trust and compliance in multi-tenant environments

🧩 Types of Cryptography
Cryptography is broadly categorized into two main types:

1️⃣Conventional (Symmetric) Cryptography


✅ Definition:

In symmetric cryptography, the same key is used for both encryption and
decryption.

🔁 How it Works:

● Sender encrypts the data using a secret key.

● Receiver decrypts it using the same key.

● Key must be shared securely.

🔐 Common Algorithms:

● AES (Advanced Encryption Standard)

● DES (Data Encryption Standard)

● Blowfish, RC4

☁️In Cloud Computing:

● Used to encrypt large volumes of data efficiently (e.g., stored in cloud


storage).

● Cloud providers use symmetric encryption for data-at-rest.


🧪 Example:

● AWS S3 uses AES-256 encryption to encrypt files stored in buckets.

● Azure Storage offers Storage Service Encryption (SSE) using symmetric


keys.

⚠️Limitations:

● Secure key distribution is difficult.

● Less suited for scenarios involving multiple users or external parties.

2️⃣Public-Key (Asymmetric) Cryptography


✅ Definition:

Asymmetric cryptography uses a pair of keys:

● Public key (used to encrypt)

● Private key (used to decrypt)

🔁 How it Works:

● The sender encrypts data using the recipient's public key.

● The recipient decrypts it using their private key.

● Public keys can be shared openly, while private keys are kept secret.

🔐 Common Algorithms:

● RSA (Rivest-Shamir-Adleman)

● ECC (Elliptic Curve Cryptography)

● Diffie-Hellman (for key exchange)


☁️In Cloud Computing:

● Used for authentication, digital signatures, and key exchange.

● Secures communication between client and cloud (e.g., SSL/TLS).

● Cloud providers use public-key cryptography to protect keys, authenticate


users, and establish trust.

🧪 Example:

● In AWS Key Management Service (KMS), RSA is used for key wrapping.

● HTTPS connection to cloud services (e.g., Google Drive) uses TLS, which
is based on public-key cryptography for secure data exchange.

✅ Advantages:

● No need to share secret keys.

● More secure in open environments like cloud.


🏁 Conclusion
Cryptography is a core component of cloud security, ensuring that data and
communication remain secure even in a shared, remote, and internet-facing
environment. Both conventional (symmetric) and public-key (asymmetric) cryptography
are used together in cloud to provide performance, security, and scalability

✅ Introduction to Authentication
Authentication is the process of verifying the identity of a user, device, or system
before granting access to cloud resources. It ensures that only authorized users or
systems can access sensitive cloud data or services.

In cloud computing, authentication is the first line of defense and plays a vital role in
access control, confidentiality, and identity management.

📦 Purpose of Authentication in Cloud


Cloud environments are public-facing, making strong authentication essential. It helps
in:

🔐 Identity Verification: Confirms that the user is genuine and authorized.

Access Control: Grants or denies access based on credentials.

📄 Compliance & Auditing: Maintains secure logs for user access.


🔄 Federated Access: Allows users to log in using corporate or third-party credentials
(like Google or Facebook).

🔑 API Security: Ensures only trusted apps access cloud APIs.

⚙️How Authentication Works in Cloud


1. User Input: Enters login credentials (username/password or tokens).

2. Verification: The system validates credentials via IAM or identity provider.

3. Access Token Issued (if successful).

4. Access Granted: Based on policies or roles assigned.

🧪 Example Flow:

● Login → AWS IAM verifies → MFA triggered → Token issued → S3 access


allowed

📌 Types of Authentication Methods

Method Description Cloud Usage

Password-based Simple login with Basic user access


username/password

Multi-Factor Adds OTP or biometrics AWS, Azure, GCP


Authentication (MFA) after password

Single Sign-On (SSO) One login for all services Google Workspace,
Microsoft 365
Federated Identity Uses identity providers Google/Facebook Login,
(OAuth, SAML) Azure AD

Certificate-based Auth Uses public/private key pairs Secure machine or API


communication

Biometric Auth Uses fingerprint, face, retina Enterprise cloud apps


(mobile/devices)

☁️Role of Authentication in Cloud Computing


1. 🔐 User Identity Verification

● IAM (Identity and Access Management) verifies users.

● Prevents identity spoofing.

2. 📁 Resource Access Control

● Cloud policies define who can access what (Role-Based Access Control).

● Example: Admin vs Developer vs Viewer.

3. 🔄 API Authentication

● APIs use OAuth tokens or API keys to validate apps.

● Ensures only authorized apps interact with cloud systems.

4. Compliance & Auditing

● Logs all access attempts (successful and failed).

● Used in forensics and compliance reporting.


🌐 Real-Time Scenario: AWS IAM + MFA
📝 Scenario:
A user tries to access the AWS Console.

1. Enters username/password (1st factor)

2. Prompted for OTP from mobile app (2nd factor)

3. AWS IAM validates both

4. Access is granted to only allowed services

🟢 Ensures: Strong identity check, no unauthorized access.

📊 Comparison Table: Authentication vs Authorization

Feature Authentication Authorization

Definition Verifies identity Grants permission to


resources

Happens ✅ Yes ❌ After authentication


First?

Involves Username, password, Policies, roles, access rules


tokens

Example Login to AWS Allowing S3 read/write

🧠 Benefits of Authentication in Cloud


✅ Prevents unauthorized access to resources
✅ Enables secure app-to-app communication
✅ Helps in regulatory compliance (GDPR, HIPAA)
✅ Supports identity federation for large orgs
✅ Enables secure DevOps pipelines

⚠️Challenges & Limitations


❌ Weak password-based auth is prone to brute-force attacks
❌ Token/session hijacking risks without HTTPS
❌ User fatigue due to multiple MFA prompts
✅ Solutions: Use federated identity, SSO, biometric and hardware-backed
MFA

🏁 Conclusion
Authentication is a fundamental pillar of cloud security. It ensures that only legitimate
users and devices can access cloud services, preventing unauthorized use and data
breaches. When integrated with tools like MFA, IAM, and SSO, authentication builds a
strong identity perimeter, making the cloud more secure, scalable, and compliant.

✅ Let me now give you the second topic in the same format:

✅ Introduction to Digital Signatures


A Digital Signature is a cryptographic mechanism that validates the authenticity,
origin, and integrity of digital data. It is the digital equivalent of a handwritten
signature or seal, used to sign documents, transactions, and code securely.

Digital signatures are a core part of data protection, trust, and accountability in cloud
computing.

📦 Purpose of Digital Signatures in Cloud


In cloud services, digital signatures are used for:
✅ Authenticity: Confirms who created or sent the data
✅ Integrity: Ensures the data has not been modified
✅ Non-repudiation: The sender cannot deny the action later
✅ Compliance: Used in legal, medical, and financial systems
✅ Code and Document Signing: Ensures trusted deployments

⚙️How Digital Signatures Work


1. Sender creates a hash of the message.

2. Hash is encrypted with the sender’s private key.

3. This encrypted hash = Digital Signature

4. Receiver:

○ Hashes the received data

○ Decrypts the signature using sender’s public key

○ Compares the two hashes

If both hashes match ➡️Data is authentic and unchanged.

🔐 Algorithms Used
● RSA (Rivest–Shamir–Adleman) – widely used

● DSA (Digital Signature Algorithm) – NIST standard

● ECDSA (Elliptic Curve DSA) – efficient and secure

☁️Role of Digital Signatures in Cloud Computing


1. ✅ Code Signing

Used in CI/CD pipelines to verify that code hasn’t been tampered with before deploying
to production (DevSecOps practice).
2. 📄 Document Signing

Legal and financial documents are signed digitally and stored in cloud for compliance.

3. 🔐 Secure API Communication

Ensures that APIs accept requests only from authenticated and trusted sources.

4. 📝 Certificate Authorities (CA)

Cloud PKI services issue certificates for users, apps, and systems (used in HTTPS,
SSL/TLS).

🌐 Real-Time Scenario: Azure Key Vault Code Signing


📝 Scenario:
A cloud development team builds a web application. Before deploying:

1. They generate a SHA-256 hash of the code archive.

2. The hash is signed using Azure Key Vault’s private key.

3. When the application is deployed, systems validate the signature.

🟢 Ensures: The code was not tampered with in transit.

📊 Comparison Table: Digital Signature vs Handwritten


Signature

Feature Digital Signature Handwritten


Signature

Medium Electronic (digital) Physical (paper)

Verification Cryptographic Manual


Tamper ✅ Yes ❌ No
Detection

Legally Binding ✅ Yes (with e-signature ✅ Yes


laws)

Used In Cloud? ✅ Extensively used ❌ No

🧠 Benefits of Digital Signatures in Cloud


✅ Prevents data tampering
✅ Ensures authenticity in multi-tenant environments
✅ Supports compliance (GDPR, HIPAA, eIDAS)
✅ Improves trust in software/code pipelines
✅ Enables secure communications

⚠️Challenges & Limitations


❌ If private key is compromised, all signatures are invalid
❌ Complex key management without PKI services
✅ Solution: Use Cloud HSMs (Hardware Security Modules) and KMS (Key
Management Services)

🏁 Conclusion
Digital signatures ensure trust, integrity, and accountability in cloud services. They
are widely used in secure file transfers, e-contracts, software deployments, and
API security. By using public-key infrastructure and cryptographic hashing, digital
signatures build confidence in cloud-based communications and processes.

✅ Introduction to Hash Functions in


Cloud Computing
A hash function is a mathematical algorithm that takes an input of any size (e.g., a file,
message, password) and converts it into a fixed-length string of characters, known
as a hash value or digest.

In cloud computing, hash functions are essential for verifying data integrity,
securing passwords, enabling digital signatures, and detecting unauthorized
changes in stored or transmitted data.

📦 Purpose of Hash Functions in Cloud


Hash functions are widely used in cloud computing for:

🔐 Ensuring data integrity during storage or transmission


🔑 Supporting secure authentication and password storage
📄 Enabling digital signatures and public-key infrastructures
🔁 Data deduplication by identifying identical content
📂 Fast file comparison to detect tampering or corruption

⚙️How a Hash Function Works


A hash function performs the following:

1. Takes any size input (e.g., a 10MB file)

2. Processes it using a hashing algorithm

3. Outputs a fixed-size hash value

🧪 Example with SHA-256:

Input: "cloudsecurity"
Output:
fe0a76391b1e9f3b6fdc03e53ff3318e0db448dce0a10a793e1b4fc4ec96d4b6

● A single-bit change in input drastically changes the hash.

● This ensures data sensitivity and integrity validation.


📌 Essential Properties of a Good Hash Function

Property Explanation

Deterministic Same input always results in same output

Pre-image Difficult to derive original input from hash


resistant

Collision Very hard to find two different inputs that produce the
resistant same hash

Avalanche effect Small change in input → major change in output

Fast computation Should be quick to compute even for large inputs

Fixed output size Output is always same length regardless of input size

🔐 Types of Cryptographic Hash Functions

Functio Output Security Status Used For


n Length

MD5 128-bit Weak (collision-prone) Legacy systems

SHA-1 160-bit Deprecated (vulnerable) Obsolete in secure


applications

SHA- 256-bit ✅ Strong & widely used Cloud integrity, digital


256 signatures

SHA-3 256/512-bit ✅ Next-gen secure Post-quantum security (in


future)

Bcrypt Variable ✅ Best for password Authentication systems


hashing

☁️Role of Hash Functions in Cloud Computing


1 1️⃣Password Security (Authentication)

● Passwords are not stored in plain text.

● They are passed through a hash function (like SHA-256 or Bcrypt).

● The output hash is stored in cloud databases (e.g., AWS Cognito, Firebase
Auth).

● During login, the entered password is hashed again and compared to stored
hash.

✅ Even if the database is hacked, actual passwords remain hidden.

2 2️⃣Data Integrity Verification

● Hash values are generated before uploading and after downloading files.

● If both hashes match, the data is unchanged.

● If they differ, tampering or corruption is detected.


🧪 Example:
Amazon S3 uses MD5 or SHA-256 for file upload integrity checks (ETags).

3 3️⃣
3️⃣Digital Signatures

● A hash of a message/document is digitally signed using private keys.

● Hash functions ensure that even a tiny change in the original document will result
in a different signature.

● Used in secure communication, contracts, and blockchain.

4️⃣ Deduplication in Cloud Storage

● Hash values act as unique IDs for content.

● Duplicate files generate the same hash → only one copy is stored.

● Saves storage space and improves efficiency.

🧪 Example:
Google Drive and Dropbox use SHA hashing to manage versions and remove
duplicates.

🌐 Real-World Cloud Example: AWS S3 with Hash


Functions
📝 Scenario:
A financial firm uploads encrypted records to Amazon S3.

● Before upload: Client computes SHA-256 hash of the file.

● After upload: AWS S3 computes hash again.

● ✅ If they match → Data is intact.

● ❌ If they differ → Upload is rejected.


This ensures end-to-end data integrity and prevents silent data corruption.

📊 Hash Function vs Encryption (Comparison)

Feature Hash Function Encryption

Purpose Verify data integrity Protect data confidentiality

Reversibility ❌ No (one-way) ✅ Yes (decrypt using key)

Output Fixed Variable (depends on input/key


Length size)

Use Cases Passwords, file integrity, digital Secure emails, files, databases
signatures

🧠 Benefits of Hash Functions in Cloud


✅ Strong data verification and integrity
✅ Secure password storage
✅ Digital signature support for secure communication
✅ Detects file tampering, duplication, or corruption
✅ Efficient performance for large-scale systems

⚠️Challenges and Mitigation

Challenge Solution

Collision Attacks (e.g., MD5, Use SHA-256, SHA-3 only


SHA-1)

Rainbow Table Attacks Use salting for password hashes

Slow Algorithms for Real-Time Use efficient hashes like BLAKE2,


SHA-3

🏁 Conclusion
Hash functions are foundational tools in cloud security. They ensure data integrity,
support authentication, enable digital signatures, and assist in efficient cloud
storage. With secure and modern hash algorithms (like SHA-256 or Bcrypt), cloud
providers can detect data tampering, secure sensitive data, and build trust in their
services.

🔐 By combining hash functions with encryption, access control, and identity


management, organizations can achieve a comprehensive cloud security
architecture.

You might also like