|
Topic development for Research Projects in Theses and Dissertations related to Cloud Computing Security, Cloud-Let Security and Virtualisation Security Frameworks: By Sourabh Kishore ETCO INDIA - In Service to Learners Since 1983 This is a mobile friendly page: please click here for visiting the full article page Please contact us at consulting@etcoindia.co.in or consulting@etcoindia.net.in to discuss your interest area in cloud computing and virtualisation security research. Cloud computing security is a rapidly emerging research area amidst growing security concerns among the companies availing cloud hosting services for their critical IT systems. The virtual closed user group (V-CUG; also called Virtual Private Cloud) mode of cloud computing operation, upon a massive shared real infrastructure shared among thousands of clients, is not yet well understood in the academic and even in the professional worlds. There are many unanswered questions because a direct analogy with self hosted infrastructure systems is not yet established. Regulators across the world are facing tough challenges in allowing the companies to host their critical IT infrastructures on cloud computing platforms. Protection of user sessions from the threats on the Internet takes us back to the old era of Zone based Firewall security system which was solved by establishing the Public, Secured and De-Militarised zones. Intrusion Detection and Prevention systems extended added advantages to the Zone based Security System. However, cloud computing hosting requires the user sessions to traverse the Internet. Then where does the Zone based Security comes in picture? If this is the only way to access the cloud hosted resources, then what is the solution for secured access to cloud computing resources? Assuming that IP-VPN tunneling using IKE with IPSec and 3DES/AES encryption is the solution to protecting Internet exposed user sessions, how many tunnels will the cloud hosting providers terminate at their end? Which VPN aggregator can support millions of tunnels? What will be the WAN overload? What will be the performance? Is it really feasible having millions of IP-VPN tunnels to secure cloud computing clients? Please keep in consideration that this is just one area of security because the issues of Server operating systems, LAN, applications, web services, platforms, etc. security at the cloud hosting end is still unaddressed. What are service providers doing to ensure that one client do not get even accidental access to the data of another client? Let us begin with the fundamentals. Cloud computing infrastructures employ the same IT components that corporations have been using in their self hosted infrastructures. However, clouds are deployed at massive scales with virtualization as their core technology. The security threats and vulnerabilities are the same that the world has been witnessing in self hosted real and virtual infrastructures. In self hosted environments, corporations have kept themselves secured by operating within CUG (Closed User Group) environments, which are protected from the external world through peripheral devices like Zone based Firewalls, Intrusion Prevention Systems, Network Admission Control, Anomaly Control, Antivirus/Antispyware, etc. All users in the CUG go through an organized authorization system to achieve privilege levels on the secured computers, and their activities are logged and monitored. In cloud hosted scenario, the CUG breaks completely. In fact there is no real CUG - as it becomes virtual (Virtual CUG or Virtual Private Cloud). The sessions between users and servers, that were highly protected on private IP addresses on CUG LANs, get exposed to public IP addresses of the Internet. The security controls are out of the hands of the end customers, as the service providers own the clouds. The end user files and data gets spread across multiple physical hosts, with no identifiers determining the location of a component of a file/folder and its data. The service providers, on the other hand, use real components for the entire cloud and only virtual components for the end customers. Hence, personalisation becomes a major problem, because there is nothing real; everything is just virtual everywhere - the authentications, authorizations, accounting, file locations, database locations, sessions, application demands, servers, networking, and everything else that an IT architect can imagine within an IT infrastructure. The end users get virtual screens to manage their personalized work areas in a Virtual Private Cloud. For mobile cloud computing, the concept of Cloudlets is used that serves mobile cloud access for nearest mobile phones and tablets over minimum possible number of hops to a massive cloud infrastructure. The challenge is related to going back to the olden days of security controls, prevalent in real CUG environments, and implementing them on the virtual CUG environments. In your study, you can pick one of the prominent security challenges - like access control, network control, de-militarized zones, web services control, file/folder security controls, etc. In fact, you should prefer to choose an area that can be simulated on a network modelling and simulation platform - like OPNET, Cisco Packet Tracer, OMNET++, etc. Do not try to address more than one areas in your thesis, because your study would tend to get generalised. I propose that you should study the following security problem areas in your dissertation/thesis project about Cloud Computing Security. For defining a unique, narrow, and focussed research topic please contact us at consulting@etcoindia.co.in or consulting@etcoindia.net.in to get more topic suggestions and to discuss your own original, narrow, and focussed research topic with aim, objectives, and hypotheses / research questions. (1) Cross-border flow of data (2) Data proliferation (3) Data visibility across virtual boundaries (4) Identity and privilege threats (5) Inadequate data backup and recovery (6) Inadequate risk management by cloud service providers (7) Inappropriate services accountability (8) Insider threats (9) Internet-based exploits (10) Lack of auditing and forensics support (11) Lack of standardisation (12) Multi-tenancy and virtualisation threats (13) Network-level threats (14) Poor user control on their private computing and storage environments (15) Unclear ownership of data lifecycle stages (16) Undetermined physical location of data (17) Unreliable data availability (18) Unreliable virtual boundaries (19) Vendor Lock-in (20) Weaker boundaries of shared composite services (21) Denial of Service (DoS) (22) Distributed Denial of Service (DDoS) (simultaneous DoS attacks from multiple sources) (23) Attacks on Virtual Machine Monitors (VMMs) (24) Virtualization Exploits (25) Vulnerabilities of HTML5 and embedded codes in third party websites (26) Cross-Site Scripting (XSS) breach and mutation and Cross Site Session Requests Forgery (XSSRF) (27) SQL script injections (28) Cross virtual channel attacks (29) Attack signatures and attack-like behaviours (30) Distributed intrusion mechanisms (31) Cloud attack surfaces and launchpads (32) XML scripts and XML data files corruption [example, Type '0' XSS exploit on Document Object Models (DOMs)] (33) Service-oriented system exploits (34) Coordinated attacks by a network of attackers (35) Cyber terrorism through cloud computing (36) Threats and Vulnerabilities related to Internet of Things (IoT) (37) Threats and Vulnerabilities related to cloud-based manufacturing and controls systems and to cloud-based supply chains (38) Hypervisor exploitation risks (39) Virtual Machines sessions hijacking (40) Administrator sessions hijacking (41) Scripts and Code injections in virtual networking switches and routers in Software Defined Networking (SDN) (42) Malicious code writing through regular and approved cloud-based APIs (43) Installing sensor scripts for enumerating and manipulating access control lists in Software Defined Networking (SDN) (44) Malware designed for subversion of DNS responses (DNS poisoning) (45) Protocol weakness exploitation (46) Exploiting Openflow controllers and switches in Software Defined Networking (SDN) (47) Eavesdropping and messages hijacking in the control and management planes in Software Defined Networking (SDN) (48) Hijacking the control and management plane sessions in Software Defined Networking (SDN) (49) Eliminating or manipulating the attack traces for fooling the cloud forensics (50) Traffic sniffing and spoofing in the data plane In addition to the security threat areas, you may like to study the possible security solutions in the following study areas related to Cloud Computing and virtualization security. For defining a unique, narrow, and focussed research topic please contact us at consulting@etcoindia.co.in or consulting@etcoindia.net.in to get more topic suggestions and to discuss your topic. Further, we also offer you to develop the "problem description and statement", "aim, objectives, research questions", "design of methodology and methods", and "15 to 25 most relevant citations per topic" for three topics of your choice of research areas at a nominal fee. Such a synopsis shall help you in focussing, critically thinking, discussing with your reviewer, and developing your research proposal. To avail this service, Please Click Here for more details. In addition to the security threat areas, you may like to study the possible security solutions in the following study areas related to Cloud Computing and virtualization security. (1) Access controls protected within virtual boundaries (2) All types of access controls: physical, logical, networking, systems, and applications (3) All types of controls against exploits: firewalls, IDS, IPS, web services filtering, spam and malware filtering, (4) Applicable regulations and compliance needs for cloud user and cloud service provider organisations (5) Appropriate usage of data as per classification and criticality levels (6) Auditing, monitoring, and assurance of security controls (7) Availability levels on cloud computing (8) Backups and recovery on cloud computing (9) Certification and assurance of cloud-based services (10) Change management on the clouds (11) Confidentiality, integrity, availability, reliability, trust, and privacy (12) Cryptography on the clouds (13) Data classification as per criticality and applying multi-level controls (14) Data discovery, auditing, and legal/statutory compliance (15) Data retention and destruction (16) Defining, implementing, and controlling data ownership (17) Incident and problems identification, reporting, reviewing, and resolution (18) Information access and handling procedures and the related non-disclosure agreements (19) Management of security resources on the clouds (20) Multi-cloud data storage and synchronised data backups on multiple clouds (21) Operations continuity on the clouds (22) Private networks on the clouds (23) Protection of personal and business data (24) Requirements of internal personnel and their roles and responsibilities (25) Risk management on cloud computing (26) Security auditing - both internal and external (27) Subcontracting on clouds (28) Systems security on cloud computing (29) Distributed Intrusion Detection and Prevention (30) Agents-based Security (using static and mobile agents) (31) Protection of government and defense networks (32) Protection of RFIDs and Internet of Things integrated with cloud computing (33) Protection of cloud-based manufacturing, cloud-based process engineering, and cloud-based controls systems (34) Protection of cloud-based supply chains (35) Protection of smart home networks (36) Identity protection of cloud-based users (37) Protection of cloud-integrated sensor networks (38) Non-proliferation regulations and controls for cloud-based databases (39) Privacy and Trust relationships on cloud computing (40) Study of Cloud Controls Matrix developed by Cloud Security Alliance (41) Study of Cloud Computing Standards (some of the new standards are listed later in this article) (42) Cloud-based intelligence to detect the emerging threats proactively (43) Behavioural data mining and analytics to detect rogue virtual machines (44) Hybrid security for securing a combination of physical and virtual information assets (45) Survival and resilience of sensitive data in virtual data centres (46) Securing embedded systems linked with the clouds (47) Securing location-based services in mobile cloud computing (48) Securing cloud-based data communications and cloud telephony (49) Securing cloud-based collaboration tools (50 Securing XML data files and XML queries in SaaS (51) Model-based security for the service abstraction layer (52) Model-based security for the cloud dispatchers and service allocators (53) Hypervisor-specific security controls (54) Encrypted message flows in Openflow management and control layer for virtual switching (55) Adaptive traffic monitoring, attack detection, and mitigation (56) Dynamic access control lists (replacing static access control lists) (57) Baysean inspections and signature-based intrusion detection at Internet Exchange Points (IXPs) (58) Advanced trust relationships between management and control tools (59) Securing administrative stations and Virtual Machine Monitors (VMMs) (60) Intelligent detection and isolation of rogue and compromised virtual machines (61) Dynamic constitution and enforcement of security policies by mobile intelligent agents (62) Binary protection algorithms (63) Advanced transport and storage encryption and protecting the cryptographic keys (64) Advanced security practices in API coding and application packaging (65) Advanced security test cases in the Software Development Life Cycle (66) Anti-phishing and anti-social-Engineering methods and techniques for protecting cloud administrators (67) Methods and techniques for multi-level validation of session redirects and forwards (68) Security of cloud objects references (69) Detecting and preventing forgeries through XSS mutations and XSSR (cross site session requests) (70) Managing broken sessions and broken authentication requests (71) Advanced deceptive techniques to attract hackers into Honey Pots or Honey Nets (72) Deep learning of anomalies in embedded systems in Industrial Internet of Things (both sensors and actuators) (73) Correlation of alerts and alarms received from Industrial Internet of Things to detect malicious attempts (74) Integrated mobile security agents in Industrial Internet of Things (both sensors and actuators) (75) Real-time machine learning sensing false positives in Industrial Alerts and Alarms received from Industrial Internet of Things Currently, cloud computing service providers are operating in three different modes - Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Security solutions services in cloud computing is still mystery for the customers although service providers have implemented all standard technologies that you can imagine: stateful inspection firewalls, Intrusion Detection and Prevention devices, Web services firewalls, Application firewalls, Spam filters, Antivirus, Anti-Spyware, Gateway Level File Inspections, etc. These security services are integrated through the framework of Unified Threat Management (UTM). However, customers are not able to specifically identify the controls applicable on their files/folders because they do not know the physical location of them (as you must be knowing, files get distributed into multiple virtual machines spread across multiple data centres). In this context, a new concept is evolving. It is called "Security as a Service (SECaaS). In Security-as-a-service, a service provider builds a lot of controls for the customers that can be shared through "subscription model" (similar to the cloud computing model) and can assure security for the customers' assets by seamlessly integrating their solutions with the Cloud Hosting service providers. The customer just needs to buy an Internet leased line connection with dedicated public IPs to the SECaaS service provider and will get all the controls applicable on their hosted environments. Security as a service for cloud hosting users is a rapidly emerging concept in which, the security controls for the end users are managed by a third party, that allow the user sessions from thousands of clients through their systems and ensure optimum protection and personalization. Their services span from network security controls to application security controls. The Internet Leased Circuit Connection to the SECaaS provider serves as a backhaul connection to the Cloud Hosting provider with appropriate peering between the security controls and the infrastructure maintained by the cloud provider (at all levels of the OSI seven layers) and the corresponding client environment for the customers. In addition to the suggestions above, please contact us at consulting@etcoindia.co.in or consulting@etcoindia.net.in to get more topic suggestions and to discuss your topic. We will be happy to assist you in developing your narrow research topic with an original contribution based on the research context, research problem, and the research aim, and objectives. Further, we also offer you to develop the "problem description and statement", "aim, objectives, research questions", "design of methodology and methods", and "15 to 25 most relevant citations per topic" for three topics of your choice of research areas at a nominal fee. Such a synopsis shall help you in focussing, critically thinking, discussing with your reviewer, and developing your research proposal. To avail this service, Please Click Here for more details. Please visit the page on VIRTUALISATION, CLOUD COMPUTING, AND UNIFIED THREAT MANAGEMENT SYSTEM to read more about the fundamental concepts. With Sincere Regards, Sourabh Kishore. Apologies for the interruption!! Please continue reading!! I will give you an example of Security-as-a-Service on cloud computing through Unified Threat Management (UTM). When you hire E-Mail services from Google Apps or any other cloud hosted application service provider, you get a control panel screen through which you can maintain the mailboxes for your company. All the configurations can be triggered through icons. There will be separate icons through which you can configure your own security controls, specific to your own subscription only. Some examples of the icons are - Account Level Filtering, User Level Filtering, E-Mail Authentication, Spam Assassin, SSL configuration panel, etc. Every cloud hosting user that maintains a secured business on the Internet is aware of these icons. These are security controls specific to a company (virtual closed user group), - but this doesn't mean that the cloud hosting provider has installed any dedicated security device for the company. These devices work in shared mode for thousands of companies that have hosted their services on the same cloud. In fact the cloud hosting provider has implemented additional configurations to provide dedicated services to cloud subscribers. Let us take an example of E-Mail Authentication. Guess what they would have implemented? - just an LDAP Server!! What is there in an LDAP server? - User Accounts, Group Accounts, Authorizations, Privileges, etc!! Where are the privileges and authorizations configured? - on network objects (files, folders, databases, Mail boxes, etc.)!! Now what they have added on the cloud? They have added a method to ensure that a company's domain account has become a network object for them. How will this happen? They have created customized Web Services on E-Mail Servers (like MS Exchange, Q-Mail, or Send mail) in such a way that each server can host mailboxes for multiple domains and there can be a super user who is the owner of the domain and all mailboxes under it. To provide privileges to the super user, they have integrated the LDAP server with the customized mail server through appropriate web programming such that the LDAP server recognizes the domain as the network object and the super user as its owner. This customizing also results in a combined administration panel for both e-mail server and the LDAP server, to enable the user company to implement their own security controls. Similar settings can be implemented for other services as well. Given the huge volumes, these security applications (LDAP, Spam filter, IPS, Web Services Firewalls, etc.) are massive and hence a Security as a Service provider is needed to work closely with the cloud hosting service provider. Cloud computing hosting can be viewed as external virtualization, which is an extended IT infrastructure for companies that are geographically dispersed. You may like to study how the principles of IT security management, IT governance, and IT service continuity can be fulfilled by keeping some part of IT services internal and other services extended to multiple Cloud service providers. To gauge the principles, you may need help from some global standards and best practices as listed below: (a) ISO 27001 / 27002 - Information Security (this is related to IT Risk Management as well with build in controls for IT Business Continuity and Disaster recovery) (b) ISO 27017 / 27018 - Information security standards based on ISO 27001 / ISO 27002 with dedicated controls for virtualisation network architectures and cloud computing (c) ISO 27005, COBIT, RISK IT - IT Risk Management (d) Val IT - Value proposition to Business by IT (includes IT Service Continuity) (e) ITIL Versions 2 and 3 - IT Service Continuity is an integral part of overall Service Management Framework (f) PAS 77 - dedicated standard for IT Service Continuity Management (g) ISO 24762:2008 - dedicated standard for ICT Disaster Recovery Services (h) Cloud Security Alliance (CSA) set of controls in the Cloud Controls Matrix (CCM) drawn from a variety of existing security standards ensuring cloud security compliance to diverse regulations In addition to the suggestions above, please contact us at consulting@etcoindia.co.in or consulting@etcoindia.net.in to get more topic suggestions and to discuss your topic. We will be happy to assist you in developing your narrow research topic with an original contribution based on the research context, research problem, and the research aim, and objectives. Further, we also offer you to develop the "problem description and statement", "aim, objectives, research questions", "design of methodology and methods", and "15 to 25 most relevant citations per topic" for three topics of your choice of research areas at a nominal fee. Such a synopsis shall help you in focussing, critically thinking, discussing with your reviewer, and developing your research proposal. To avail this service, Please Click Here for more details. Your topics may comprise of these frameworks combined with actual security controls possible on cloud hosting through service providers. The studies may be carried out by studying various security attributes by modelling and simulating them on appropriate network modelling tools (OPNET, Cisco Packet Tracer, OMNET++, etc.), or by conducting surveys and interviews of experienced IT professionals that are managing cloud hosted services for their end users. Please contact us at consulting@etcoindia.co.in or consulting@etcoindia.net.in to discuss your interest area in cloud computing security. We will help you to formulate appropriate topics, their descriptions, and your research aims and objectives, supported by most relevant literatures. We have helped many students in completing their research projects on IT security and IT governance on cloud computing. There are no dearth of topics as this is an emerging field that is actively targeted for academic research studies. However, it should be kept in mind that the research studies in this field should yield firm and actionable outcomes, in the form of IT security strategies, IT governance strategies, architectures and designs for the end users of Cloud Computing Hosting and for the service providers that are still struggling to convince the global regulators that cloud computing security is in no way inferior to traditional self hosted IT infrastructure security. The standards and global best practices (listed above) can definitely add value, although the implementation plans for cloud hosting end user companies should evolve from academic research studies. In addition to the suggestions above, please contact us at consulting@etcoindia.co.in or consulting@etcoindia.net.in to get more topic suggestions and to discuss your topic. We will be happy to assist you in developing your narrow research topic with an original contribution based on the research context, research problem, and the research aim, and objectives. Further, we also offer you to develop the "problem description and statement", "aim, objectives, research questions", "design of methodology and methods", and "15 to 25 most relevant citations per topic" for three topics of your choice of research areas at a nominal fee. Such a synopsis shall help you in focussing, critically thinking, discussing with your reviewer, and developing your research proposal. To avail this service, Please Click Here for more details. Copyright 2020 - 2026 ETCOINDIA. All Rights Reserved |
Please contact us at consulting@etcoindia.co.in or consulting@etcoindia.net.in to discuss your topic or to get ideas about new topics pertaining to your subject area. |