TELKOM
NIKA
, Vol. 11, No. 12, Decem
ber 20
13, pp.
7316
~73
2
3
e-ISSN: 2087
-278X
7316
Re
cei
v
ed
Jun
e
23, 2013; Revi
sed
Jul
y
2
4
, 2013; Acce
pted Augu
st 15, 2013
Resear
ch on the Information Security Problems in
Cloud Calculation’s Environment
Xia Hu, Min Zhou*, Qing Xia
Schoo
l of Man
agem
ent, Chi
n
a Univ
ersit
y
of Minin
g
an
d T
e
chno
log
y
,
Xuz
hou 2
2
1
116, C
h
in
a
*Corres
p
o
ndi
n
g
author, e-ma
i
l
: xzkdzm@
1
6
3
.com
A
b
st
r
a
ct
W
i
th the dev
el
op
me
nt of tech
nol
ogy, clo
ud c
a
lcul
atio
n b
e
co
mes
a w
i
de
ly u
s
ed tech
no
logy
and
i
s
regar
ded as th
e third IT
revolution fol
l
ow
in
g
the co
mputer
s and the Inter
net. Clou
d
cal
c
ulati
on be
nefi
t
s
ordi
nary us
ers
to enj
oy hi
gh-
end IT
service
s
by makin
g
it
turn into th
e real
basic r
e
so
urces thro
ugh
IT
techno
lo
gy, resource sh
arin
g and hi
gh c
once
n
tratio
n.
W
h
ile clo
ud c
a
lcul
atio
n offers a variety of
convenience, it is very vulner
able to m
a
licious attacks of stealin
g service or data because the cloud
stores a larg
e amou
nt of valuab
le
infor
m
ati
on ab
out user
s'
data, privac
y informatio
n
and so o
n
. W
h
il
e
dea
lin
g w
i
th cloud co
mputi
n
g
,
confidenti
a
l d
a
ta can b
e
sec
u
red fro
m
the u
nauth
o
ri
z
e
d
ac
cess and i
n
tern
a
l
threats. T
hen
only
after reso
l
v
ing
its securit
y
issues, it
is
a
b
le to
op
erate
successful
ly. T
h
is p
a
p
e
r at fir
s
t
introd
uces the
conce
p
t an
d character
i
stics o
f
cloud
c
a
lcu
l
at
ion
and th
en
el
abor
ates the c
u
rrent situ
ation
of cloud ca
lcul
ation's secur
i
ty. Then it analy
z
e
s
th
e secu
rit
y
risks of clou
d calcu
l
atio
n. In order to
mak
e
use of the clou
d ben
efits to full ex
tent, these risks need to b
e
addr
essed fir
s
t. In
this pape
r w
e
present the
ma
jor secur
i
ty issues in clo
u
d
comp
uting. S
o
me
of the counter
me
asures
t
hat can be imp
l
e
m
e
n
ted ar
e
also su
gg
ested
.
Ke
y
w
ords
: clo
ud calc
ulati
on,
infor
m
ati
on sec
u
rity
Copy
right
©
2013 Un
ive
r
sita
s Ah
mad
Dah
l
an
. All rig
h
t
s r
ese
rved
.
1. Introduc
tion
In rece
nt years, comp
uter tech
nolo
g
y is devel
oping fas
t
er and fas
t
er. At
the s
a
me time,
the develop
m
ent of Intern
et techn
o
logy
prom
ot
es th
e gene
ratio
n
of many ne
w techn
o
logie
s
.
Con
c
e
p
tion
s of cloud cal
c
ulation, networki
ng,
and smarter pl
anet
and so on g
enerate re
ce
ntly.
Becau
s
e of t
he ne
w tech
nologi
es, thei
r appe
aran
ce
is a con
c
e
r
n
,
and they develop ra
pidl
y.
Curre
n
tly, cloud cal
c
ul
atio
n has
step
p
ed into
the
substa
ntive st
age of devel
opment. So i
t
s
se
curity probl
ems al
so be
come the hotspot issu
es
in the res
e
arc
h
of the IT field [
1
].
With the
po
pularity of
compute
r
s, m
o
re
and
more job
s
n
eed
to be d
one
on th
e
comp
uter. U disk
be
co
me
s
the esse
ntial
goo
ds
of
stude
nts a
n
d
staffs a
s
st
udent
s have
to
compl
e
te the home
w
o
r
k or
pape
rs an
d staff want
to
work in their o
w
n home. Every day before
leaving the lab or the com
pany, you need to copy
all the unfinish
ed things into
U disk, whi
c
h
will be
copied into their
computers agai
n wh
en they
get hom
e. You take
the same
job at
office
in the morni
ng. And som
e
times, forg
e
tting some file or pro
g
ra
m will lead to all the wo
rk
uncomplete
d
.
These
situati
ons
often ta
ke pl
ace. Th
erefo
r
e, it is pro
p
o
s
ed th
at wheth
e
r fil
e
s a
n
d
appli
c
ation
s
can be saved
throug
h the n
e
twork. So
lo
ng as the
r
e n
e
twork exi
s
ts,
U disk is n
o
t
need
ed to co
py.
Clou
d is a
c
tu
ally a remote
host to sto
r
e
use
r
s' data, inclu
d
ing file
s, application
s
and so
on. Since ju
st stori
ng
can
n
o
t satisfy ou
r
need
s,
the
co
nce
p
t of clo
u
d
cal
c
ul
ation.
Then va
riou
s
operation
s
of files and a
ppli
c
ation
s
can b
e
reali
z
ed o
n
the remote h
o
st.
Clou
d calcula
t
ion is an emergin
g
con
c
e
p
t in
recent years. Use
r
s c
an store ap
pli
c
ation
s
and file
s u
s
e
d
freq
uently in a remote
server, a
nd th
en u
s
e a
n
y compute
r
via the Internet to
acce
ss an
d use the
s
e a
pplication
s
and files.
Simply spea
king
, cloud cal
c
ulation move
s
person
a
l inf
o
rmatio
n fro
m
the com
puter to
the
netwo
rk. A
s
lon
g
as t
he Intern
et is
approa
cha
b
le
, all of
the files ca
n be ha
ndled throug
h just a networki
ng compu
t
er. In this way,
all informatio
n pro
c
e
ssi
ng
and sto
r
ag
e can be a
c
hiev
ed throu
gh Web termin
al.
Clou
d cal
c
ul
ation is the
cal
c
ulatio
n m
ode
by p
r
ovi
d
ing dyna
mic scalable vi
rtualized
resou
r
ces in
a service m
anne
r via the Internet. It is a pay-pe
r-u
se mo
del that provide
s
a
conve
n
ient, on-d
e
ma
nd netwo
rk a
ccess enter th
e sha
r
ed po
ol of configu
r
able
comp
uting
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
e-ISSN:
2087
-278X
Re
sea
r
ch on
the Inform
ation Secu
rity Problem
s
in Clo
ud Cal
c
ul
ation
’
s
Enviro
nm
ent (Hu Xia
)
7317
resou
r
ces (reso
urce
s include net
works, serve
r
s,
stora
ge, app
lication
s
, se
rvices). The
s
e
resou
r
ces
ca
n be q
u
ickly
provide
d
, whi
c
h
simply ne
ed putting fe
w man
age
me
nt job o
r
seld
om
intera
ct with servi
c
e p
r
ovi
ders. The co
nce
p
t of
clou
d cal
c
ulation
has b
een wi
d
e
ly applied in
to
the pro
d
u
c
tio
n
enviro
n
me
nt, such a
s
the dom
esti
c
Ali Cloud
and
XenSystem
of the com
p
a
n
y
Clou
d Valley
as
well a
s
v
e
ry matu
re I
n
tel and IBM
abro
ad.
With the expa
nd
ing sco
pe of
all
kind
s of
clo
u
d
calc
ulat
ion’
s
serv
i
c
e
s
, its influen
ce is im
measurable.
No
w, cloud computing i
s
invading almo
st all
Information Technolo
g
y industri
e
s.
As the
numbe
r of de
pend
ents o
n
the clou
d se
rvices
sho
o
ts
up, the se
cu
rity issue ha
s becom
e an
overwhelmin
g
problem. A
c
cordi
ng to the resea
r
ch
of
the schol
ars,
the seven famous
se
cu
rity
issue
s
in clo
ud co
mputin
g are p
r
ivileg
ed user
a
c
ce
ss, regul
atory complian
c
e
,
data locatio
n
,
data seg
r
eg
a
t
ion, recove
ry Investigative repor
t, and long term viability [2]. Other studie
s
ha
ve
also
put forward that the
key se
curity a
nd priva
c
y issues li
ke
a
c
ce
ss
co
ntrol, au
thenticatio
n a
nd
identificatio
n, availability,
policy integra
t
ion,
audit and so on [3].
Some Chine
s
e sch
olars ha
ve
cla
ssifie
d
the
se
curity issu
es into
six cat
egori
e
s. T
h
e need fo
r m
onitorin
g
, the
cloud
se
rver,
data confid
en
tiality, malicio
us insi
ders a
c
tiviti
es, servi
c
e hija
cki
ng, issue
s
due to multi tenancy
and
so on
a
r
e de
alt with
[4]. Other studies
su
gge
sted vari
ou
s se
curity issues li
ke trust,
confid
entiality and priva
c
y, integrity and
availability [5].
2. Ne
w
Alloc
a
tion Algori
t
hm based o
n
Ant
Colon
y
Optimization
Algorithm of
ant col
ony is an algo
rithm
of
resource
s' allocation in
the enviro
n
ment of
clou
d cal
c
ul
ation [6-8]. It refers to the Map /
Red
u
ce syst
ems that ea
ch unit clo
u
d
environ
ment
s Maste
r
a
nd
Slave ea
ch u
n
it is divide
d i
n
to two
role
s
of Maste
r
a
n
d Slave. Ma
ster
deploy
s the node
s of Na
meNo
de an
d
JobT
ra
cker
,
while Slave
configu
r
e
s
the nod
es of
Data
Nod
e
an
d Tas
k
T
r
a
c
k
e
r.
Duri
ng re
so
urce allo
cation,
the major job of
configuri
ng the node
s in the unit a
nd ea
ch
node cl
uste
r unde
r the juri
sdi
c
tion of the unit work togethe
r to allot nodes. Th
e node
s in all
units of clou
d environm
e
n
t are divided into tw
o community structures. And
all major nodes
maste
r
JobT
racker
and
attach
ed n
ode
s slave Ta
skT
r
acke
r a
r
e
re
spe
c
tively co
nsid
ere
d
a
s
a
cla
ss. T
he m
a
jor n
ode i
s
resp
on
sible fo
r all ta
sks of
sche
duling
an
d co
nstituting
a job. Th
e da
ta
sou
r
ces of th
ese ta
sks are dist
ribute
d
in the mi
rro
r
slices
of diffe
rent u
s
e
r
s which
are in th
e
resou
r
ces st
orag
e of atta
che
d
node
s. The main no
de monitors the task'
s exe
c
ution and re-
execute
s
the
failed task or
deal with e
rro
rs. The atta
ched no
de is resp
on
sible fo
r impleme
n
tin
g
tasks assig
n
ed by the master n
ode. After getti
ng
the major no
de's di
strib
u
tion, the attache
d
node
start
s
to loo
k
for a
suitable
comp
uting no
de
fo
r the p
r
ep
arat
ion of its
sub
o
rdin
ate na
m
e
d
stora
ge
nod
e
.
Firstly, the
attache
d
no
d
e
begi
ns to
detect th
e a
m
ount of it
s
own
co
mputi
n
g
res
o
u
r
c
e
s.
I
f
the comp
ut
ing
resou
r
ce
s lef
t
can meet
the usag
e amo
unt for
users to submit jobs,
its own co
mp
uting re
so
urces i
s
allo
cate
d. If the
remaining
re
sou
r
ce
s are in
suf
f
icient to me
et
the minimum
amount of computing
resource
s for users to su
bmit
jobs, it begins to sea
r
ch
for
other suitabl
e comp
uting
reso
urce
s i
n
the
clou
d
computin
g environ
ment.
Ant allocation
algorithm introduced bel
ow will be implemented in th
is part. Search
work starts in a certai
n
rang
e in orde
r to prevent the netwo
rk o
v
erhea
d
from
increa
sin
g
. If the
appro
p
ri
ate reso
urce
s
still can not b
e
found, the attache
d
nod
e poses to re
que
st the re
moval of mirr
or sli
c
e
s
of users'
data to the major job of co
nfigurin
g the node
s.
The slave no
de domain i
s
regarded a
s
an undire
cte
d
graph G (V
, E), where V is the
colle
ction of all
the slave node
s
in
the region
al
Are
a
and E i
s
the
netwo
rk colle
ction
con
n
e
c
ting
the slave no
de. The clou
d calculation
evenly
divid
ed into seve
ral su
b-regio
n
s, and the
n
assign
s the same numb
e
r of ants to each region.
Each group of an
ts only make
s a rese
arch i
n
their res
p
ec
tive regions
.
Its
metric
s
to be
con
s
id
ere
d
is as the follo
wing p
a
ra
met
e
rs.
Expected executio
n time: time_cost (e) refe
rs to the elapse
d
time that computing
resou
r
ces of the end of the
path e han
dle
such wo
rk.
Network dela
y
: delay (e), refers to the m
a
ximum network late
ncy th
e path e pro
d
u
ce
s.
Network b
a
n
d
width: b
and
width
(e),
ref
e
rs to the m
a
ximum netwo
rk
ban
dwi
d
th
the path
e provide
s
.
Ho
w the diversity and preferen
ce of ne
eds
of clo
ud cal
c
ulatio
n re
sou
r
ces g
uarante
e
QoS? After
synthe
sizi
ng the time of
expec
te
d executio
n and netwo
rk del
a
y
,
the variable
quantity td in
(t, e) repre
s
e
n
ts the usag
e
of co
mputing
reso
urce
s the end of e calculate for i in
the time t.
Evaluation Warning : The document was created with Spire.PDF for Python.
e-ISSN: 2
087-278X
TELKOM
NIKA
Vol. 11, No
. 12, Dece
mb
er 201
3: 731
6 – 7323
7318
Suppo
se the
feature
set of a vi
rtual machine re
so
urce
VM i.
R
i
r
i
1
,
r
i
2
,
r
i
3
,
r
i
4
,
r
im
,
m
∈
1,
5
Here rim re
prese
n
ts a K-di
mensi
onal di
agon
al matrix, respe
c
tively, CPU, the numbe
r
of memory, b
and
width, co
sts and failure rate of the co
untdo
wn.
Re
sou
r
ce VM i describe th
e matrix-v
ect
o
r of perfo
rm
ance's d
e
scri
p
tion is:
VM
i
E
i
1
,
E
i
2
,
E
i
3
,
E
i
4
,
E
im
,
m
∈
1,
5
Her
e
E
im
indicates the eig
e
n
value the r
im
c
o
rres
ponds
to.
The de
scripti
on of QoS i
n
task
gen
erally
adopts t
he pa
ramete
r indexe
s
of time of
compl
e
ting t
a
sk, network band
width,
co
st, re
lia
bility and
so o
n
to qua
ntify the QoS. Fo
r
example, Qo
S description
s of time of completing
task
inc
l
ude the
s
t
arting time, c
o
mpleted time,
endin
g
time, etc. Wh
en u
s
ing, the tim
e
of com
p
leti
ng all the ta
sks
can b
e
selecte
d
a
s
the
evaluation in
dex.
Usually the g
eneral expe
cted vectors of
cla
ss i ca
n b
e
descri
bed a
s
:
E
i
e
i
1
,
e
i
2
,
e
i
3
,
e
i
4
,
e
im
,
m∈
1,
5
Her
e
e
im
den
ote the gene
ral expectatio
n
s of CPU,
m
e
mory, band
width, etc. an
d satisfy:
m
∑
e
ij
1
j
1
As in the clo
ud com
putin
g environm
e
n
t, the
specif
ic cir
c
um
st
an
ce
s of
reso
u
r
ce
s is
unkno
wn an
d
the netwo
rk does
not ha
ve a fixed
topology, the d
i
stributio
ns
of stru
cture an
d
resou
r
ces in the clo
ud co
m
puting enviro
n
ment as
well
as the actual
si
tuation are unpredi
ctable
.
In this ca
se, cal
c
ulatin
g the locatio
n
of the
com
puting
reso
urce
s an
d quality is u
n
kn
own for the
data nod
es.
Takin
g
advan
tage of ant colony algo
rith
m can find ou
t the computi
ng re
sou
r
ce
s in
unkno
wn network topolo
g
i
e
s and pick o
u
t the most
a
ppro
p
ri
ate one or more to
assign user for
work u
n
til cu
stomers' ne
ed
s are met. When the
sea
r
ch begin
s
, the
slave no
de send
s out que
ry
messag
es. T
hese messag
es play the ro
le of the
ant in the colony algorith
m
. All
the ants follow
the prin
cipl
e
that the m
o
re p
h
e
r
omo
nes, t
he l
a
rg
er p
r
ob
ability of node
s
while the fe
wer
pheromo
n
e
s
, the smalle
r prob
ability of node
s to
sele
ct the next hop no
des a
nd lea
v
e
pheromo
ne in
the path of node
s.
3. Problems of Cloud
Cal
c
ulation in the Histor
y
Clou
d cal
c
ul
ation benefits ordina
ry use
r
s to
enjoy high-e
nd IT se
rvice
s
by making it
turn into th
e real
ba
sic resou
r
ces t
h
rou
gh IT t
e
ch
nolo
g
y, reso
urce
sha
r
ing a
nd hi
g
h
con
c
e
n
tration
.
But
it has diminish
ed the use
r
s'
cont
rol
.
Thus, data se
curity and
privacy issu
e
s
will face a h
u
ge threat for i
ndividual u
s
e
r
s of cl
oud
ca
lculatio
n.
While cl
oud
calcul
ation offers a vari
ety of convenien
ce, it is very vulnerable to
malicio
us att
a
cks of steal
ing se
rvice o
r
data
be
cau
s
e the clo
u
d
store
s
a large amou
nt of
valuable information about
users' data, privacy
information and so on. Not only the
malicio
us
attackers ma
y do harm to it, but even
the legi
timate users of cloud cal
c
ul
ation who ab
use
resou
r
ces
or intern
al staff
in the
clou
d
com
puting
o
perato
r
s a
r
e
likely to h
a
rm it. Sufferin
g
severe atta
cks, clo
ud
com
puting
syste
m
will be
faced with th
e d
ange
r of
colla
pse
and th
en
will
not be able to
provide relia
ble se
rvice
s
[9].
Many exampl
es illustrate the cloud se
curity issues
can not be ignored.
In March 20
11, Google
Mail bro
k
e o
u
t the
large-scale spill of
users' data.
About
150,00
0 Gma
il users found
all messa
ge
s and chats i
n
their delete
d
. Parts of the use
r
accou
n
ts
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
e-ISSN:
2087
-278X
Re
sea
r
ch on
the Inform
ation Secu
rity Problem
s
in Clo
ud Cal
c
ul
ation
’
s
Enviro
nm
ent (Hu Xia
)
7319
were re
set. Google'
s data sho
w
e
d
that the numbe
r
of users affecte
d
by
this incident accounte
d
for 0.08 pe
rcent of total subscrib
er.
In April 2
011,
hacke
rs inva
ded the
Sony
's d
a
ta
serve
r
s in th
e Unite
d
States.
Not
only
the Sony's
PlayStation site
wa
s intru
ded, but So
ny PS3, music, a
n
imatio
n clo
ud
serv
ice
netwo
rk and Qrio
city
use
r
profile
info
rm
ation
we
re
st
olen. It influe
nce
d
77 milli
on u
s
ers a
n
d
57
cou
n
trie
s and
region
s.
In that same
month, Ama
z
on
Clou
d suffer
ed the e
v
ent of cloud
comp
uting secu
rity
whi
c
h is the
most serio
u
s
in the history
of Amaz
on. That is the d
o
wntime of th
e Amazo
n
da
ta
cente
r
se
rver
in a large a
r
e
a
.
A seri
es of
se
curity in
cid
ents
sho
w
p
eopl
e
pay m
o
re
attention
to clo
ud
co
mputing
s
e
c
u
rity iss
u
es
in the fac
e
of devas
tating lo
sse
s
from
the attack to clou
d cal
c
ulat
ion.
4. Threats in the Compu
t
er Ne
t
w
o
r
ks
4.1. Lack of
Autonomy
o
f
the
Core Te
chnolog
y
of
Compu
t
er Net
w
o
r
ks an
d Soft
w
a
re
Duri
ng the proce
s
s of Chi
na's info
rmati
on
con
s
tructi
on, indepe
nd
ent techni
cal
sup
port
is sca
r
e an
d i
n
formatio
n infrast
r
u
c
ture i
n
the net
wo
rk secu
rity is defi
c
ient. CP
U ch
ips, ope
ratin
g
sy
st
em
s an
d
dat
aba
se
s,
f
i
rewall
s a
n
d
gateway
sof
t
ware, et
c. u
s
ed by o
u
r
comp
uters a
r
e
mostly dep
en
dent on imp
o
r
ts. The n
e
twork
equi
p
m
en
t and software whi
c
h ou
r compute
r
s u
s
e
are ba
sically exotic. Due to thes
e factors, security performa
n
ce
of
Chin
a's comp
uter netwo
rk is
greatly redu
ced an
d is
co
n
s
ide
r
ed
as th
e gla
ss
netwo
rk
whi
c
h i
s
e
a
s
y to hit and
peep. Be
cau
s
e
of lack of ind
epen
dent te
chnolo
g
y, our
netwo
rk i
s
in
the se
cu
rity threat
s of mu
ch info
rmatio
n,
su
ch a
s
e
a
ve
sdroppi
ng, int
e
rferen
ce, attacks,
su
rveill
ance an
d fra
ud. Then
net
work
se
cu
rity is
in a very fra
g
ile state. Me
anwhile, Chi
n
a's n
e
tw
o
r
k secu
rity syste
m
has
many
trouble
s
in th
e
forecastin
g, resp
ondi
ng an
d recovery ca
pabilitie
s.
4.2. Hacking
Hackin
g into a com
puter
system po
se
s a gre
a
t threat
to the inform
ation se
cu
rity of the
entire
network [10]. Due t
o
de
sign
or
man-m
ade
causes,
com
p
uter
o
peratin
g syste
m
s
a
nd
appli
c
ation software
syst
ems often h
a
ve some
flaws or vuln
erabilitie
s. Throu
gh the
s
e
vulnera
b
ilities, an attacker can invade
or c
ontrol the comp
uter sy
stem, and even destroy
comp
uter sy
stem. Usually
it needs 6 months fr
o
m
discove
ring
the vulnera
b
ility
to exploit i
t
further to carry out an attack. Hackers f
i
nd a vu
lnerability of
the computer network sy
stem to
hacke
r comp
uter sy
stem
s
in ord
e
r to
st
eal pa
sswo
rd
s, intercept o
r
tampe
r
with
data, tran
sm
it
the virus an
d
the destru
c
t
the co
mp
uter system
s, an
d sometim
e
s
even ca
use p
a
ralysi
s of the
entire co
mpu
t
er. Most of the su
cc
es
sf
ul inv
a
sio
n
s
re
sult
f
r
om
the internal network wh
ile
curre
n
tly most of the intrusion detection
system
s ar
e
difficult to detect attacks from the internal
netwo
rk. A
s
the informati
on network
speed of
Chin
a's
colle
ge
s and unive
rsities in
crea
se
s,
hacke
rs h
a
ve
sufficient ba
ndwi
d
th re
so
urces to attack the targ
et host in a more subtle an
d
eas
y way.
4.3. Infection
of Compu
t
e
r
Virus and Intrusion o
f
Net
w
o
r
k Spy
w
a
r
e
While the
speed that
co
mputer viruses
sp
read th
roug
h the In
ternet an
d variou
s
stora
ge medi
a rapidly increase, who
s
e
harm is al
so gro
w
ing. Espe
cially net
work worm i
s
a
colle
ction of
the tradition
a
l
comp
uter vi
ruse
s,
worm
s and te
ch
no
logie
s
of hacking. It has
a
cap
ability of a
u
tonomo
u
s at
tack, whi
c
h is independ
ent on the human
operators. What's more, i
t
can in
stall ba
ckdoo
rs on the infected h
o
st. Aiming
at multiple system vulnerabi
lities, it can be
spread
rapi
dl
y by way of self-rep
rod
u
ct
ion. T
hen the
probl
ems
of netwo
rk
co
ng
estion, serve
r
outage
s and informatio
n leaka
ge turn o
u
t. Inter
net Spyware has q
u
ickly becom
e a new threat
of informatio
n se
cu
rity in
the network.
Spyware
refe
rs to
the p
r
o
g
ram th
at inv
ading
co
mput
er
aims to i
n
te
rce
p
t u
s
er's
acce
ss to
comput
e
r
keyboard, scree
n
inform
ation
and n
e
two
r
k
con
n
e
c
tion information wit
hout the kno
w
n or explic
it authori
z
atio
n of user
s. And the program
is
also diffi
cult to clea
r fro
m
the compute
r
.
Comp
uter viruse
s g
ene
rall
y enter into th
e com
pute
r
b
y
way of softwa
r
e bun
dling, e
-
mail an
d visit to website
s
, etc.
5. Securit
y
Problems Aris
e b
y
Cloud Calculation
Clou
d cal
c
ul
ation brin
gs huge bu
si
ness
op
po
rtunities fo
r the co
mpa
n
ies a
n
d
manufa
c
turers [11]. These
compa
n
ies a
nd manufa
c
t
u
re
rs have set up depart
m
ents to lau
n
ch
Evaluation Warning : The document was created with Spire.PDF for Python.
e-ISSN: 2
087-278X
TELKOM
NIKA
Vol. 11, No
. 12, Dece
mb
er 201
3: 731
6 – 7323
7320
the servi
c
e o
f
cloud cal
c
u
l
ation. As the most
impo
rtant asset o
f
a company
, data secu
ri
ty
sho
u
ld be
pa
id enou
gh att
ention by the
comp
any
. So se
cu
rity problem
s of cl
oud calculati
o
n
have bee
n pu
t on the agen
da. As clou
d-based servic
es grow, cl
ou
d comp
uting
servi
c
e
s
will
be
provide
d
by a number of chambe
rs of service
comm
erce inste
ad of by only on
e comp
any. If a
comp
any sig
ned
a clo
ud comp
uting co
ntract with
a
outso
urce
r, whi
c
h al
so
m
a
ke
s
cont
ra
cts
with other ou
tsource
rs, and other outso
urcers do
the
same thing, that compa
n
y's co
nfidentia
l
document
s will be passe
d throug
h the layers to re
a
c
h the hands of a lot of busine
s
se
s by the
busi
n
e
ss
with
whom th
at company
cont
ract. The
n
the
se
curity ri
sks raised i
s
hu
g
e
. Comp
anie
s
need a lot
of cou
r
age t
o
put confid
ential do
cu
m
ents to the
servi
c
e p
r
ovi
ders of clo
u
d
cal
c
ulatio
n.
For exampl
e, the investme
nt bank em
pl
oyees u
s
e
s
Googl
e Spre
adsheet
s to manag
e
the list of e
m
ployee
s'
so
ci
al se
cu
rity nu
mbers, so
co
mpany G
oogl
e is
re
spo
n
si
ble for
protect
i
ng
the informatio
n of these e
m
ployee
s' so
cial secu
rity from ha
ckers and the internal data lea
k
s.
Banks do
not need to b
ear
this re
sp
on
si
bility.
Howev
e
r, there may
be governme
n
t investigato
r
s
to order G
o
o
g
le to hand over those social
security numbers wi
thout informi
ng the data'
s
owners. And some
com
p
anies online are even willi
ng to share the users' sensitive data with
marketing
co
mpanie
s
. Go
ogle'
s priva
c
y
policy state
s
that if the company re
qui
res p
r
oviding t
he
relevant dat
a
,
it should ha
ve the better rea
s
on
s
to meet any ap
plica
b
le la
w, regul
ation, le
gal
pro
c
e
ss or enforcea
b
le deman
ds of
govern
m
ent
. Then it wi
ll sha
r
e the
data with t
h
e
govern
m
ent.
Gene
rally sp
eaki
ng, the information
se
curity
proble
m
s bro
ught by clou
d cal
c
ulat
ion are
in the followin
g
area
s.
5.1. Risks ag
ainst th
e Sy
stem Reliabilit
y
As the clo
u
d
store
s
a la
rge num
ber o
f
user
s' b
u
si
ness data, p
r
ivacy informa
t
ion or
other valu
abl
e inform
ation
,
it is vulnera
b
le to
get att
a
cks. T
h
e
s
e
attacks m
a
y come
from th
e
malicio
us att
a
cks
stealin
g
the service
s
or dat
a, the legitimate
users of cl
oud calcul
ation
abu
sing reso
urces, o
r
the internal pe
rsonnel in the clou
d cal
c
ula
t
ion. When g
e
tting a serio
u
s
attack, clo
u
d
computing system is likel
y to
face the danger of collap
s
e and be unable to
provide hi
ghl
y reliable service.
5.2. Blur of the Security
Bound
ar
y
The te
chn
o
lo
gy of virtualization is a
key
tech
n
o
logy i
n
achieving
the cl
oud
calculation.
The
sha
r
ed
d
a
ta po
ssess t
he bo
rde
r
le
ss cha
r
a
c
teri
stic. And the
n
u
mbe
r
of servers
and
end
-
use
r
s i
s
very large so dat
a stora
ges di
stribut
e
d
. Du
e to the above reaso
n
s, i
t
cannot define
boun
dari
e
s a
s
cle
a
rly so t
he tradition
al netwo
rk, which result to be difficult to provide adeq
ua
te
prote
c
tion me
asu
r
e
s
.
5.3. Auditabi
lit
y
Users them
selves ta
ke th
e ultimate re
spo
n
si
bility for the integ
r
ity and
se
curity
of their
own d
a
ta. Traditional
serv
ice provide
r
s are admitte
d
to provide service
s
for e
n
terp
rises aft
e
r
passin
g
the external audi
ts and safety certificat
ion.
Howeve
r, as the new, high-te
ch se
rvi
c
e
provide
r
s, so
me clo
ud co
mputing
p
r
ovi
ders refu
se to
accept such
a
r
e
view
. F
o
r
s
u
c
h
pr
o
v
id
ers
,
is for
security reas
ons. Out
of the secu
rity considerati
on, users will
only use their servi
c
es to do
s
o
me grunt work
rather than to
c
o
mplete the large-sc
ale work
.
5.4. Acce
ss
of Priv
ileged Users
Deali
ng with sen
s
itive information out
si
de of
the company may be at risk, be
cau
s
e it
will bypa
ss th
e co
rp
orate
IT dep
artme
n
t to take
th
e p
h
ysical, logi
cal and
man
u
a
l
cont
rol fo
r th
is
informatio
n. If a company
decide
s
to use
cl
oud
co
mputing serv
ice
s
, it must have a goo
d
kno
w
le
dge of
admini
s
trato
r
s d
ealin
g wit
h
these
i
n
formation, and
require service provid
ers to
offer the admi
n
istrato
r
s' inf
o
rmatio
n in d
e
tail.
5.5. Data
Bits
Users taking
clou
d comp
uting servi
c
e
s
are
not clea
r about the pla
c
e wh
ere thei
r data
store
d
exa
c
tl
y and eve
n
the lo
cation
a
nd the
co
unt
ry their
data
place in. F
o
r the
sa
ke
of
se
curity, the
use
r
s
sh
ould
ask clo
ud
computing
pro
v
ider whethe
r their d
a
ta i
s
sto
r
ed i
n
a
locatio
n
for speci
a
lized juri
sdi
c
tion an
d abi
de by the
agre
e
me
nt of local priva
c
y.
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
e-ISSN:
2087
-278X
Re
sea
r
ch on
the Inform
ation Secu
rity Problem
s
in Clo
ud Cal
c
ul
ation
’
s
Enviro
nm
ent (Hu Xia
)
7321
5.6. Data Pri
v
ac
y
At
first, data in
the cloud is stored in
the servers arou
nd the world in random
.
Therefore, u
s
ers
do not know
wh
e
r
e t
heir data i
s
stored in p
a
rti
c
ula
r
. In addi
tion, after en
d-
use
r
s delive
r
their d
a
ta to
the clo
ud
co
mputing
p
r
ovi
ders, the p
r
io
rity
acce
ss to
the data
ha
s
been
ch
ange
d. In other
wo
rds,
clou
d co
mputing p
r
ov
i
ders enj
oy the prio
rity to h
a
ve acce
ss. So
how to en
su
re the confid
e
n
tiality of data become
s
very importa
nt.
5.7. Data
Re
cov
e
r
y
Even if the use
r
do
es n
o
t kno
w
the
spe
c
ific l
o
cation of data
'
s storage, b
u
t clou
d
comp
uting providers sho
u
l
d
tell the user wh
at
prob
lems and
situation
s
the use
r
data an
d
servi
c
e
s
will appe
ar if system is in troub
le. In
fact, all
the data and appli
c
ation
s
without ba
ckup
will eme
r
ge
probl
em
s. What users ne
ed to kn
ow
i
s
that wh
eth
e
r cl
oud
com
puting p
r
ovid
ers
have the abili
ty to recover
data and if so
, how long it take
s to re
cov
e
r data.
5.8. Data Isol
ation
In the clo
ud
comp
uting
system, the dat
a of a
ll users is in a
sha
r
e
d
enviro
n
men
t. Data
encryption pl
ays a rol
e
in
the dat
a secu
rity, but it is still not enoug
h. Use
r
s sh
o
u
ld not only b
e
awa
r
e wheth
e
r so
me data
is sep
a
rate
d
from other
d
a
ta by the clo
ud com
puting
provide
r
s, b
u
t
also ne
ed to
know
wheth
e
r en
cryption
servic
es a
r
e
design
ed an
d tested by experts. If the
encryption
system g
o
e
s
wrong, th
e sy
stem will
have
major
pro
b
le
ms a
nd all th
e data
will b
e
unabl
e to con
t
inue to use.
5.9. In
v
estigativ
e Support
In the cl
oud
computing
env
ironm
ent, be
cause data
fro
m
multiple u
s
ers may b
e
stored
together an
d may be transferre
d betwe
en multiple hos
ts an
d data
centers, it is
hard to inqui
re
into the improper o
r
illeg
a
l activities. If t
he cloud comp
uting providers do n
o
t have such
measures, it is difficult to invest
igate th
e spe
c
ific situ
ations of
violations an
d find out the culprit
in the event of violations.
5.10. Long-term Viabilit
y
In the ideal case, the clo
u
d
comp
uting prov
ide
r
s will
not go bankrupt or be pu
rcha
se
d
by large com
panie
s
. Ho
wever, use
r
s still need to
confirm their data in orde
r to ensure the
se
curity of th
eir data. So if
this p
r
obl
em
occurs
, the
d
a
ta will n
o
t b
e
affected.
Users
need
to
ask
the clou
d co
mputing p
r
ovi
ders ho
w to
get bac
k thei
r data an
d whether th
e ba
ck
data can
be
importe
d into alternative ap
plicatio
ns.
6. Method
s of Ensuring Cloud Compu
t
ing Security
Problems
Although the
r
e are a vari
ety of conce
r
ns, clo
ud calcul
ation ind
eed po
ssesses the
potential for developm
ent
[12]. Enterprise
s ca
n dr
amatically re
duce IT
cost
s,
signif
i
c
ant
l
y
improve effici
ency and in
crease jobs' flexibility
th
roug
h the use of cloud co
mputi
ng se
rvice
s
. As
long a
s
findin
g
a co
mplete
se
curity soluti
on, clo
ud cal
c
ulatio
n ca
n
get the prom
otion in a la
rg
er
scale [13].
For thei
r safe
ty, although there i
s
not a ce
rtified
soluti
on, many sol
u
tions exi
s
t.
6.1. Encr
y
p
tion of the Fil
es Sav
e
d
Files
whi
c
h h
a
ve been
en
crypted
by the encry
ption
techn
o
logy can be d
e
cryp
ted with
the pa
sswo
rd
s. Even if the data is u
p
lo
aded to
a
re
mote data
ce
nter el
se, the
encryption
can
also play a protective rol
e
. There are already
en
cryp
tions strong
enou
gh to use. That is, as
long a
s
usin
g
the uncracka
b
le pa
sswo
rd
s, no one
but
the own
e
r ca
n get acce
ss
to his se
nsitiv
e
information.
6.2. Encr
y
p
tion of Emails
At present there a
r
e al
rea
d
y a numbe
r of
sophi
stica
t
ed encryptio
n software,
such a
s
True
Crypt, which can en
crypt files before they are out
of your control so as to play a protective
role.
Howeve
r, be
cau
s
e
e
m
ail is in
the
format
that t
he voyeurs
a
r
e
still ca
pabl
e to acce
ss to
rea
c
h so
meo
ne's inb
o
x, the above method
s can
not
guarante
e
the security of
e-mail conten
t.
Evaluation Warning : The document was created with Spire.PDF for Python.
e-ISSN: 2
087-278X
TELKOM
NIKA
Vol. 11, No
. 12, Dece
mb
er 201
3: 731
6 – 7323
7322
In ord
e
r to e
n
s
ure mail
se
curity, there a
r
e also
p
r
og
ra
ms
that can b
e
used,
such as Hu
shmail,
whi
c
h can be
use
d
online
a
nd automati
c
ally
encrypt al
l message
s receive
d
[14].
6.3. Use of
Good Serv
ic
es
Even if
the fi
le is encrypted, a lot of activi
ty online
on the network is still difficult to
obtain p
r
ote
c
tion, esp
e
ci
al
ly in relatio
n
to mani
pul
ate
files on
the I
n
ternet, n
o
t just saving th
e
document
s. This me
an
s that the use
r
s still need
to
seri
ou
sly con
s
ide
r
wh
ethe
r they need to
use the
s
e se
rvice
s
. Experts recomme
n
d
to use
the
services
with great re
put
ation, beca
u
se
they gene
rall
y can not ta
ke their b
r
an
d
s
to advent
u
r
e. They will n
e
ither all
o
w t
he o
c
curren
ce of
data breaches, nor
will they s
hare data with marketers.
6.4. Conside
r
ation of Bu
siness Mod
e
ls
Before the d
e
ci
sion which
internet se
rvice ar
e wo
rth
y
of trust is made, their p
r
ofitable
method
s sh
o
u
ld be consi
dere
d
. Some
Internet app
lication
servi
c
e
s
ch
arg
e
and some a
r
e
funded by a
d
v
ertising. T
h
e
servi
c
e
with fees m
a
y be safer than
ad-f
unde
d se
rvices. Adverti
s
in
g
provide e
c
on
omic stimul
u
s
for Internet
applicatio
n provide
r
s. Pro
v
iders
colle
ct detailed use
r
s'
data to offer data for advertise
rs so that they
can target on advertisin
g
. Thus, the use
r
s'
informatio
n may fall into th
e hand
s of cri
m
inals.
6.5. Stateme
n
t of Readin
g the priv
ac
y
Most of Internet appli
c
ati
on service p
r
ovid
e
r
s
acknowl
edge
d i
n
their
policy that if
requ
este
d la
w enforce
me
nt officials of gover
n
m
ent
pose the de
mand,
they will hand over
the
related data
of users. Since al
mo
st all the privacy policie
s abo
ut the Internet applicatio
n
servi
c
e
s
hav
e the loo
phol
es, data
ca
n
be shared in
some
certain
circum
stan
ce
s, incl
udin
g
the
above
situations. But u
s
e
r
s n
eed to
know
what
inf
o
rmatio
n ma
y be sha
r
e
d
so that you
can
determi
ne wh
ich data ca
n be stored in the clou
d
com
puting enviro
n
ment and which are kept
by
yourself.
6.6. Filtratio
n
Web
s
e
n
se a
nd othe
r com
panie
s
provid
e a
system, whi
c
h
can
m
onitor which data
is
out of the current netwo
rk to auto
m
a
t
ically pr
even
t sensitive d
a
ta from tra
n
smi
ssi
on. F
o
r
example, ide
n
tity card nu
mbers with
a unique
di
g
i
tal arra
nge
ment by this system. Such
system
s ca
n
also be co
n
f
igured to facilitate di
ffere
nt users in the sam
e
co
mpany to enjoy
different deg
rees of fre
edo
m of exportin
g
data.
7. Conclusio
n
Clou
d calcula
t
ion ca
n b
r
ing
great
co
nven
ienc
e for th
e
use
r
s and
achieve data
sh
aring.
Mean
while it
s se
curity issu
es
can
not be
ignored.
Onl
y
when it
s se
curity is en
su
red,
can u
s
e
r
s
use cl
oud computing
services at ea
se. Other
wi
se
, they are
worrie
d abou
t leaking the
i
r
informatio
n, whi
c
h will ma
ke the cl
oud
comp
uti
ng se
rvice p
r
ovide
r
s lose a lot of users.
There has n
o
t been a sound progra
m
to pr
otect information in cloud co
mputing
environ
ment as so
fa
r.
T
hus as
lon
g
as
th
e
cl
oud
com
puting
service
provid
ers mu
st work
hard
e
r, they can make a se
t of such
programs
to get more cus
t
omers
.
Ackn
o
w
l
e
dg
ment
This pa
pe
r was supp
orted
by a grant from
the Fund
amental Research Fu
nd
s for the
Central Univ
ersity (NO. 2
013XK01
)
an
d the
Funda
mental Re
se
arch Fun
d
s f
o
r the Ce
ntral
University (NO. JG10
148
7
)
.
Referen
ces
[1]
Na Je
ya
nth
i
, H
ena S
h
a
b
e
eb,
NChSN
I
y
eng
a
r
. A Stud
y on
Securit
y
T
h
rea
t
s in Cl
ou
d.
Internati
ona
l
Journ
a
l of Clo
u
d
Co
mp
uting
a
nd Servic
es Scienc
e
. 201
2; 1(3): 84-88.
[2]
Ziy
u
an
Wang.
Security an
d
Privacy Issues w
i
thin the
Clou
d
Co
mput
ing
. T
he 3
rd
International
Confer
ence
on
Computati
o
n
a
l
and Informati
o
n
Scienc
es. Ch
eng
du. Ch
ina.
201
1; 1: 175-1
78.
[3]
Da
w
e
i Su
n, Gu
iran C
h
a
ng, L
i
n
a
Sun,
Xi
ng
w
e
i
W
ang.
Survey
i
ng a
nd A
naly
z
i
ng Sec
u
rity, Pri
v
acy an
d
T
r
ust Issues i
n
Clou
d
Co
mp
uting Envir
o
n
m
e
n
ts
. 2011 Internati
o
n
a
l C
onfere
n
ce on
Advanc
ed i
n
Contro
l Engi
ne
erin
g and Infor
m
ation Sci
enc
e. Dali. Ch
ina.
201
1; 1: 2852-
285
6.
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
e-ISSN:
2087
-278X
Re
sea
r
ch on
the Inform
ation Secu
rity Problem
s
in Clo
ud Cal
c
ul
ation
’
s
Enviro
nm
ent (Hu Xia
)
7323
[4]
Dimitrios Ziss
is
, Dimitrios
Lek
kas. A
ddress
i
n
g
Cl
oud
Com
p
uting S
e
cur
i
t
y
I
ssues.
F
u
ture Generati
o
n
Co
mp
uter Systems
. 2
012; 2
8
: 583–
59
2.
[5]
Z
hang
XJ, MENG QC,
QU
W
F
. A Job Sched
uli
ng
for Service Grid Us
ing Ant Col
o
n
y
Alg
o
rithm
.
Co
mp
uter Engi
neer
ing
. 2
006;
32(8): 21
6-2
1
8
.
[6]
PAN DR, YUA
N
YB. Improve
d
QoS Routi
n
g
Algorithm B
a
s
ed on th
e Ant
Net.
Mini-Micr
o System
s
.
200
6; 27(7): 11
69-1
174.
[7]
HUA Xia-
yu, Z
H
ENG Jun, HU W
en-xin. Ant
Col
o
n
y
Optim
i
zation Al
gorith
m
for Computi
ng Res
ourc
e
Alloc
a
tion B
a
s
ed o
n
Clo
ud
Comp
uting E
n
vironme
n
t.
Jo
urna
l of East Chin
a Nor
m
al
Univers
i
ty
(Natural Sc
ien
c
e)
. 2010; 1(
1): 127-1
34.
[8]
YIN Jue-q
i
on
g.
Anal
ys
is of Sit
uatio
n a
nd Pr
o
b
lems
of Clo
ud
Comp
uting.
C
o
mputer K
n
o
w
l
edg
e a
nd
T
e
chnolog
y. 2
009; 5(3
3
): 930
2-93
03.
[9]
YANG Yi, LAI Ying-c
hun. T
he Securit
y
Issu
es un
der the C
l
ou
d Com
putin
g Enviro
nme
n
t.
Co
mpute
r
Know
led
ge a
n
d
T
e
chno
lo
gy
. 200
9; 5(16): 41
54-4
156.
[10]
YANG Z
h
e
x
i,
XUE
Hu
ach
eng. Informati
zation E
x
pect
a
tion
w
i
th C
l
oud
Comp
utin
g in
Chi
na.
T
E
LKOMNIKA Indon
esi
an Jou
r
nal of Electric
al Eng
i
ne
eri
n
g
.
2012; 1
0
(4): 8
76-8
82.
[11]
Bo Ming
xi
a, etc. Research o
n
t
he Architecture of Cloud
Comp
uting Se
curit
y
.
Information network
security
. 201
1; 8: 79-82.
[12]
F
a
-Cha
ng Ch
e
ng, W
en-Hsi
n
g
Lai. Creati
ng t
he
Envir
onm
en
t for the Prosperit
y
of Clou
d
Comp
uting
T
e
chnolog
y.
T
E
LKOMNIKA Indo
nesi
an Jo
u
r
nal of Electric
al Eng
i
ne
eri
n
g
.
2012; 1
0
(4): 8
64-8
7
5
[13]
T
edd
y
Mantor
o, Andri Z
a
kar
i
ya. Securin
g
E-mail Commu
nicati
on Usin
g
H
y
bri
d
Cr
ypto
s
y
stem o
n
Andro
i
d-b
a
se
d
Mobil
e
D
e
vice
s.
T
E
LKOMNIKA Indon
esi
a
n
Journ
a
l of El
e
c
trical En
gin
e
e
r
ing
. 2
012
;
10(4): 82
7-8
3
4
.
Evaluation Warning : The document was created with Spire.PDF for Python.