MAY 20, 2013 12:12 PM
![]() | It's the High-Tech Wild, Wild West out there! |
Understanding cloud security risks is related to understanding the relationships and dependencies between cloud computing models and how they are deployed. IaaS forms the foundation of the service model architecture, PaaS builds upon IaaS, and SaaS in turn builds upon PaaS; and information security issues and risks are inherited just as capabilities are.
There are significant trade-offs to each cloud computing model in terms of integrated features, complexity versus openness (extensibility), and security. The lower down the stack, the cloud service provider stops bearing responsibility, and the consumer becomes responsible for more security capabilities and management. Table 1 provides concise information in this direction.
Table 1. Cloud Service Models — Integrated features, Extensibility, and Security
| Service Model | Integrated Features | Extensibility | Security |
|---|---|---|---|
| SaaS |
|
|
|
| PaaS |
|
|
|
| IaaS |
|
|
|
Note: CSA points that derivative classifications may yield when scope or capabilities and functionality within each model is narrowed, or functional coupling of services and capabilities across models is employed. For example, Storage as a Service is a specific IaaS sub-offering.
So, cloud computing may present different risks than traditional IT solutions, because of the cloud service models employed, the operational models, and the technologies used to enable cloud services. As discussed in previous posts, multi-tenancy allows seemingly limitless scalability and an alternative to expensive data-center infrastructure. However, it requires building adequate security into every aspect of a SaaS application, as well as for every IaaS virtual service. This can be achieved through:
- Filtering — creation of an intermediary layer between a tenant and data source
- Permissions — use of access control lists
- Encryption — obscure each tenant's critical data
- Or some combination of the above techniques.
A concise version of the discussed by NIST multi-tenancy risks is provided in Table 2.
Table 2. Multi-tenancy Risks and Mitigation
| Deployment Model | Multi-tenancy Risks and Mitigation | ||
| General | Implications: Workloads of different consumers may reside:
Consumers security could be compromised by flaw in:
Multi-tenancy risks:
| ||
| Private | On-site | Implications:
Risks mitigation:
| |
| Outsourced | Implications:
Risks mitigation:
| ||
| Community | On-site | Implications:
Risks mitigation:
| |
| Outsourced | Implications:
Risks mitigation:
| ||
| Public | Implications:
Risks:
Risks mitigation:
| ||
Anyone have thoughts or sources that will help readers understand cloud security? Please share here!

Irena Bojanova, Ph.D., is Founder of IEEE CS Cloud Computing STC, an Associate editor of IEEE Transactions on Cloud Computing, and an Editorial Board Member of IEEE CS IT Professional. She is a professor and program director, Information and Technology Systems, at University of Maryland University College, managed academic programs at Johns Hopkins University and PIsoft Ltd., and co-started OBS Ltd., (now CSC Bulgaria). Her current research interests include cloud computing, web-based systems, and educational innovations. She is a member of the IEEE and can be reached at ibojanova@umuc.edu.


















