NEWS FROM THE 2009 BLACK HAT BRIEFINGS

Advantages of cloud computing can come with a serious price tag

LAS VEGAS — Cloud computing promises cost savings, increased flexibility and improved remote access to resources, but these advantages come at a cost, a researcher warned at the Black Hat Briefings security conference.

Data and application owners can lose control over their resources, the perimeter protecting them, and the access controls that allow their use, said Alex Stamos of iSEC Partners. Owners also can lose important legal protection by turning data over to a third-party host, he added.

Cloud computing is one of the big new things in computing. But the technology, the rules governing it and even the language describing it are not mature, Stamos said.

“The term 'cloud computing' is useless at this point,” he said. It does not mean virtualization or remote back-up. “Most stuff called cloud computing isn’t. It is more of a marketing term now.”

He defined cloud computing as distributed, general-purpose hosts holding applications and distributed data storage, with software tying it together to enable it all to move smoothly and reliably from one system to another.

Stamos predicted a cloud bubble burst as users discover that it does not necessarily provide all of the ease of use and returns being promised.

Although perimeter security is now recognized as inadequate IT protection by itself, its loss is a threat, Stamos said. “Making something a little harder” for hackers “has value.”

Focusing on software as a service, one element of cloud computing, he said most providers do not have the audit logs needed to recover from a serious breach. Access controls can be reclaimed to a degree by using a single sign-on scheme that returns control of policies and enforcement to the user, but this also eliminates some of the advantages of cloud computing.

One area often not considered in cloud computing is the possible exposure to legal liability. Most agreements with service providers relieve the host of any liability, but they also prohibit malicious traffic, which can prevent a data owner from conducting penetration testing of the systems holding the data.

Under current federal policy, there also is little protection to the data owner from law enforcement or regulatory search and seizure. Data can be seized without warrant and without notice to the owner if it is hosted by a third party, Stamos said.

“You have massively less protection if you are cloud computing than if you own your own machines,” he said.

About the Author

William Jackson is freelance writer and the author of the CyberEye blog.

Reader Comments

Mon, Aug 3, 2009 Jeremiah McEnerney

The term, Cloud, to describe what is happening in the IT industry is going to suffer a severe backlash. The are a number of better and more descriptive terms. Some examples include: OnDemand, Elastic, Performance-based Computing or XaaS. As judy collins says, "its clouds illusions I recall

Fri, Jul 31, 2009 Eric Novikoff Mountain View, CA

I think Stamos's points are valid, and as a provider of managed cloud services, I often try to get customers to focus on the benefits of the technology rather than the marketing hype surrounding it. However, Stamos ignores the non-virtual reality of real savings in deployment costs that the underlying technologies used to provide cloud computing can provide. Especially for incremental use of computing such as in new projects, limited-time projects, or applications where usage grows or varies over time, cloud computing can deliver real savings over deploying your own computing resources, not just in the computing charges alone but also the labor required to maintain a self-owned data center. These potential savings will continue to drive the resolution of the issues that he brought up. -Eric Novikoff PrimaCloud http://www.primacloud.com

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above