|
Topic development for Research Projects in Theses and Dissertations related to Cloud Computing Security, Cloud-Let Security and Virtualisation Security Frameworks: By Sourabh Kishore This is a mobile friendly page: please click here for visiting the full article page |
Copyright 2011 EPROINDIA. All Rights Reserved |
Cloud computing security is a rapidly emerging research area amidst growing security concerns among the companies availing cloud hosting services for their critical IT systems. The virtual closed user group (V-CUG) mode of cloud computing operation, upon a massive shared real infrastructure shared among thousands of clients, is not yet well understood in the academic and even in the professional worlds. There are many unanswered questions because a direct analogy with self hosted infrastructure systems is not yet established. Regulators across the world are facing tough challenges in allowing the companies to host their critical IT infrastructures on cloud computing platforms. Protection of user sessions from the threats on the Internet takes us back to the old era of Zone based Firewall security system which was solved by establishing the Public, Secured and De-Militarised zones. Intrusion Detection and Prevention systems extended added advantages to the Zone based Security System. However, cloud computing hosting requires the user sessions to traverse the Internet. Then where does the Zone based Security comes in picture? If this is the only way to access the cloud hosted resources, then what is the solution for secured access to cloud computing resources? Assuming that IP-VPN tunneling using IKE with IPSec and 3DES/AES encryption is the solution to protecting Internet exposed user sessions, how many tunnels will the cloud hosting providers terminate at their end? Which VPN aggregator can support millions of tunnels? What will be the WAN overload? What will be the performance? Is it really feasible having millions of IP-VPN tunnels to secure cloud computing clients? Please keep in consideration that this is just one area of security because the issues of Server operating systems, LAN, applications, web services, platforms, etc. security at the cloud hosting end is still unaddressed. What are service providers doing to ensure that one client do not get even accidental access to the data of another client? Let us begin with the fundamentals. Cloud computing infrastructures employ the same IT components that corporations have been using in their self hosted infrastructures. However, clouds are deployed at massive scales with virtualization as their core technology. The security threats and vulnerabilities are the same that the world has been witnessing in self hosted real and virtual infrastructures. In self hosted environments, corporations have kept themselves secured by operating within CUG (Closed User Group) environments, which are protected from the external world through peripheral devices like Zone based Firewalls, Intrusion Prevention Systems, Network Admission Control, Anomaly Control, Antivirus/Antispyware, etc. All users in the CUG go through an organized authorization system to achieve privilege levels on the secured computers, and their activities are logged and monitored. In cloud hosted scenario, the CUG breaks completely. In fact there is no real CUG - as it becomes virtual. The sessions between users and servers, that were highly protected on private IP addresses on CUG LANs, get exposed to public IP addresses of the Internet. The security controls are out of the hands of the end customers, as the service providers own the clouds. The end user files and data gets spread across multiple physical hosts, with no identifiers determining the location of a component of a file/folder and its data. The service providers, on the other hand, use real components for the entire cloud and only virtual components for the end customers. Hence, personalisation becomes a major problem, because there is nothing real; everything is just virtual everywhere - the authentications, authorizations, accounting, file locations, database locations, sessions, application demands, servers, etc. The end users get virtual screens to manage their so called personalized cloudlet on a massive cloud infrastructure. The challenge is related to going back to the olden days of security controls, prevalent in real CUG environments, and implementing them on the virtual CUG environments. In your study, you can pick one of the prominent security challenges - like access control, network control, de-militarized zones, web services control, file/folder security controls, etc. In fact, you should prefer to choose an area that can be simulated on a network modelling and simulation platform - like OPNET, Cisco Packet Tracer, OMNET++, etc. Do not try to address more than one areas in your thesis, because your study would tend to get generalised. I propose that you should study the following areas in your dissertation/thesis project about Cloud Computing Security: You may like to study data security services in Cloud Computing environments. Data Security services in cloud computing is still mystery for the customers although service providers have implemented all standard technologies that you can imagine: stateful inspection firewalls, Intrusion Detection and Prevention devices, Web services firewalls, Application firewalls, Spam filters, Antivirus, Anti-Spyware, Gateway Level File Inspections, etc. But customers are not able to specifically identify the controls applicable on their files/folders because they do not know the physical location of them (as you must be knowing, files get distributed into multiple virtual machines spread across multiple data centres). Your topics may comprise of these frameworks combined with actual security controls possible on cloud hosting through platforms of cloud service providers. The studies may be carried out by studying various security attributes by modelling and simulating them on appropriate network modelling tools (OPNET, Cisco Packet Tracer, OMNET++, etc.), or by conducting surveys and interviews of experienced IT professionals that are managing cloud hosted services for their end users. Please contact us at consulting@etcoindia.co or consulting@etcoindia.net to discuss your interest area in cloud computing security. We will help you to formulate appropriate topics, their descriptions, and your research aims and objectives, supported by most relevant literatures. We have helped many students in completing their research projects on IT security and IT governance on cloud computing. There are no dearth of topics as this is an emerging field that is actively targeted for academic research studies. However, it should be kept in mind that the research studies in this field should yield firm and actionable outcomes, in the form of IT security strategies, IT governance strategies, architectures and designs for the end users of Cloud Computing Hosting and for the service providers that are still struggling to convince the global regulators that cloud computing security is in no way inferior to traditional self hosted IT infrastructure security. The standards and global best practices (listed above) can definitely add value, although the implementation plans for cloud hosting end user companies should evolve from academic research studies. |
Please contact us at consulting@etcoindia.co or consulting@etcoindia.net to discuss your topic or to get ideas about new topics pertaining to your subject area. |
Electronic Publishing and Research Organisation India (EPROINDIA) - formerly the ePublishing and research division of ETCO India |