Datasheet

Chapter 1 Internet Era: E-Commerce 35
Operational Aspects
The operations aspect of cloud computing security should address its nodes
(hosts) and its communication network.
Host-Level Security
Host-level security issues are those that make a host apprehensive about afliat-
ing itself to the cloud computing system. The main issue here is data protection.
Whenever a host is affiliated to the infrastructure, one of the chief concerns is the
protection of an already-existing data in the host. The concern stems from the fact
that the host submitting the job may be untrusted or unknown to the host run-
ning the job. To the host running the job, the job may well be a virus or a worm
that can destroy the system. This is called the data protection issue.
To address the data protection issue, you need to implement isolation so that
access to data is restricted to the cloud computing or external applications. As
noted in theEffective Connement section, various isolation techniques exist
to accomplish data protection.
Network
In the context of cloud computing, network security issues assume significant
importance primarily because of the heterogeneity and high-speed require-
ments of many of the applications running in it. Moreover, the infrastructure
inherits some of the generic network issues as well. Access control and isolation
are important requirements for traffic flowing through the networks. In this
area, integration with virtual private networks (VPN) andrewall technologies
also gain significance. Routing of packets in networks based on routing tables
is a specific network issue. Attacks in routing include link and router attacks,
which may cause significant destruction. Many of the issues still require further
research. Multicasting is an efficient means of information dissemination and is
also an important factor for cloud computing infrastructure security. Participant
authentication, key management, and source authentication are specific secu-
rity issues in multicasting. Another topic of interest is the integration of sensor
networks. Several sensor network attacks, such as sybil attacks, wormhole and
sinkhole attacks, and node hijacking, will need to be tackled before the sensor-
cloud vision can be realized. Below is the list of some practical security issues
in high performance interconnects:
MAC (Mandatory Access Control):
Many of the Web services solutions
cannot work effectively with firewalls and VPN solutions, which have
become ubiquitous in today’s enterprises. The area requires significant
additional research.
Routing:
The routing technologies available today are inherited from
traditional networking. Most routing protocols use digital signatures and
624463c01.indd 35 3/29/11 2:26:37 AM