Security of Cloud Computing, Storage, and Networking Mohamed Hamdi School of Communication Engineering, Technopark El Ghazala, 2083 Tunisia Email: mmh@supcom.rnu.tn Abstract—Convergence and ubiquity are the key character- istics of tomorrows service provision infrastructures. Cloud architectures will constitute cost-efficient backbones that will support the transmission, storage, and computing of the appli- cations contents. These architectures can be used for business, scientific, and pervasive computing purposes. The diversity of the services delivered through cloud infrastructures increases their vulnerability to security incidents and attacks. The cost and complexity reduction requirements render the design and development of protection mechanisms even more challenging. In addition, key design features such as confidentiality, privacy, authentication, anonymity, survivability, dependability, and fault- tolerance are, in some extent, conflicting. The objective of this tutorial is to present the state-of-the-art of security and explore research directions and technology trends to address the protec- tion of cloud communications and networking infrastructures. An emphasis will be made on the collaboration of mobile devices in cloud based infrastructures. The fundamental concepts of cloud computing security will be explored, including cloud security services, cloud security principles, cloud security requirements, and testing techniques. Keywords Cloud computing security; risk analysis; dis- tributed attacks and threats; software and data isolation. I. I NTRODUCTION Cloud computing is clearly one of today’s most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. This technology holds the potential to eliminate the requirements for setting up of excessively expensive com- puting infrastructure for the IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow many-fold increase in the capacity or capabilities of the existing and new software. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. When thinking about solutions to cloud computing adoption problem, it is important to realize that many of the issues are essentially old problems in a new setting, although they may be more acute. For example, corporate partnerships and off- shore outsourcing involve similar trust and regulatory issues. Similarly, open source software enables IT departments to quickly build and deploy applications, but at the cost of control and governance. Moreover, virtual machine attacks and Web service vulnerabilities existed long before cloud computing became fashionable. In a cloud computing environment, the entire data reside over a set of networked resources, enabling the data to be accessed through virtual machines. Since these datacenters may lie in any corner of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and taken care of. Also, one can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario. In this chapter, the fundamental concepts of cloud computer security will be explored, including cloud security services, cloud security principles, cloud security requirements, and testing techniques. The purpose of the chapter is to convey to the reader the ability to: ” Understand security management challenges and opportunities in cloud environments ” Examine cloud computing risk, threats, and vulnerabilities ” Specify, validate, and implement preventive and reactive security poli- cies for in a virtual environment ” Develop business continuity and disaster recovery plans for cloud computing ” Conduct security investigation missions to analyze attacks against cloud computing This chapter addresses various aspects related to the security of cloud computing. The following items give an overview of the most important issues that will be discussed in the following sections: Overview on cloud infrastructures: Cloud infrastructures allow the delivery of computing, storage, and networking as services rather than products. This section provides an overview on the cloud delivery and deployment models. The terminology introduced by the US National Institute for Standards and Technology (NIST) will be used. Three models will be covered in this context: (a) Software as a Service (SaaS), (b) Platform as a Service (PaaS), and (c) Infrastructure as a Service (IaaS). The major benefits brought by cloud computing, including flexibility and resiliency, cost-effectiveness, data-centric storage, and scalability, will be highlighted. Risk and threat analysis in cloud computing: This section gives a detailed technical analysis of some attacks that have been recently conducted against cloud infrastruc- tures. To imbue a practical flavor to the attendee, a study of the attacks that have targeted cloud infrastructures (study of recent cases: Yahoo, SONY, ) will be presented. These attacks have been selected from concrete cases cited by the CSI/FBI crime and security survey and the 978-1-4673-1382-7/12/$31.00 ©2012 IEEE 1