tention in Cloud computing, and therefore should be
a part of the SLA. These are ”access control”, ”audit,
verification and compliance” and ”incident manage-
ment and response”. Together with ”secure resource
pooling” and ”secure elasticity” these five categories
can be used in a structured approach to pick the right
security mechanisms for a particular service.
Figure 2 illustrates our proposed framework. The
security mechanisms are divided into three main ser-
vice categories, depending on the particular Cloud re-
sources that are used. These are storage, processing
(CPU and memory), and network. These three re-
sources can be virtualized and offered as Infrastruc-
ture as a Service (IaaS), they can be used to offer
a Platform as a Service (PaaS), or applications can
run on top of these physical resources and being of-
fered as Software as a Service (SaaS). The security
mechanisms suggested for the framework are related
to Secure Resource Pooling (RP), Secure Elasticity
(E), Access Control (AC), Audit, Verification & Com-
pliance (AU) and Incident Management & Response
(IM); these will be further described below.
4.1 Secure Resource Pooling
Resource pooling in Cloud computing today is
achieved by using virtualization either at the hardware
level (as with Amazon Web Services
2
) or at the appli-
cation level (as with Google Docs
3
). Both techniques
enable multi-tenancy, i.e., different users share the
same resources, and virtualization ensures the isola-
tion of data and applications owned by different users.
The sharing of physical resources in the Cloud
give rise to new security threats. One of the most im-
minent is unauthorized access to applications or data
through the hypervisor (Christodorescu et al., 2009),
which may occur if proper isolation of applications
and data is not achieved. It is therefore necessary to
make sure that protection mechanisms exist and that
they are stated in the SLA. In the framework outlined
in Figure 2 this is illustrated as ”RP1: Data isolation”
and ”RP8: Application isolation”, which are related
to storage services and processing services, respec-
tively. Moreover, resource sharing implies that the
customers need guarantees that their property remains
confidential (RP3: Data encryption) and is integrity
protected (RP6: Data integrity, RP12: Application in-
tegrity), that their data and applications are properly
deleted from the physical hardware when requested
(RP2: Data deletion), and that the data can be brought
back in-house if necessary (RP5: Data portability,
RP7: Data back-up). The customer should also have
2
http://aws.amazon.com
3
http.//docs.google.com
the possibility to put restrictions on the geographic
location of storage and processing (RP4: Data loca-
tion, RP9: Application location). Regarding network
services (inside Clouds, between Cloud data centers
and between the Cloud and the customer’s premises),
the customer should make sure that his traffic is prop-
erly protected (RP13: Network encryption, RP15: In-
tegrity protection) and isolated from other customers
traffic (RP14: Traffic isolation).
4.2 Secure Elasticity
Cloud computing promises rapid scalability of re-
sources, scaling up and releasing resources as needed.
This elasticity is also enabled by virtualization.
Adding more virtual resources on the same physical
machine does not in itself pose any new threats, but
migrating virtual resources to new physical resources
requires a secure migration process (E1: Secure data
migration, E2: Secure virtual machine migration), in-
cluding the actual network transfer. It must also be
ensured that the new physical resource fulfils the same
security requirements.
4.3 Access Control
Access control is especially important in the Cloud,
where both competing customers sharing the same re-
sources as well as insider personnel may try to gain
unauthorized access to the customer’s data. The re-
source must also be protected from unauthorized re-
mote access. It is therefore crucial to make sure that
proper access control mechanisms are implemented
(AC1: Identity management, AC2: Access manage-
ment, AC3: Key management), and that there are
strict restrictions on e.g. who may enter Cloud dat-
acenters (AC4: Internal security control).
4.4 Audit and Verification
The possibility to audit and verify the security of a
service is very often crucial to the customer, however
in the Cloud this is often not standard practice. Cus-
tomers may require access to server logs, failed log-
in attempts records or database change records (AU1:
Logging) and sometimes also the possibility to audit
the activity on specific Cloud resources (AU2: Audit-
ing). In addition, the customers may want to make
sure that a security certification scheme exists and
is adapted to the Cloud infrastructure (AU3: Certi-
fication). Customers may also have privacy concerns
(AU4: Customer privacy).
SECURITY IN SERVICE LEVEL AGREEMENTS FOR CLOUD COMPUTING
639