HOW SECURE IS CLOUD COMPUTING? Michael Becker. Summary  This article is about the security flaws and our growing dependence on cloud computing such as.

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Verifiable Resource Accounting for Cloud Computing Services Vyas Sekar, Petros Maniatis ISTC for Secure Computing 1.
Digital Signatures and Hash Functions. Digital Signatures.
Outcomes By the end of this session, participants will be able to:
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
 Max Planck Institute for Software Systems Towards trusted cloud computing Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues MPI-SWS.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Introduction Cloud characteristics Security and Privacy aspects Principal parties in the cloud Trust in the cloud 1. Trust-based privacy protection 2.Subjective.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
By, Casey Riva. The Craze Of The Cloud Why is Cloud Computing becoming so popular? People are always on the move, this drives to a demand for more portable.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Data Privacy for data in transit and The Semantic Web Mike Davies.
Cloud Computing ity-notre-dame-logo.jpg Matthew Cunningham Selina Sambar Maria Skorcz.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
How Secure is your Information? -Brad Murphy. An internet cloud is a large server at a separate point in the world where people store their data. Clouds.
Confidential The Power to Connect. Business presentations in boardrooms, conference rooms and outside the office are always in high demand. With CircleHub,
Fine-Grained Access Control (FGAC) in the Cloud Robert Barton.
Boeing’s IT Benefits Information Technology & Information Systems The Boeing computing environment is probably one of the most interesting in the world.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Spring Semester 2009 IT Policy and Technology: Japan and Global IT Environment 世界のなかの日本としての IT 政策と技術 Jun Murai Masaaki Sato Jun Takei May 21, Privacy.
Introduction to Cloud Computing Cloud Computing : Module 1.
Introduction to Cloud Computing
SSD: Cryptography. Learning Outcomes After the scenario has been completed, you are expected to be able to: Explain the relative strengths of encryption.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted. For HP.
An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Cloud Project. SaaS: Software-as-a-Service Also known as an on-demand software, SaaS is an application that can be accessed from anywhere on the world.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
NIMS MIDDLE SCHOOL PASSWORD BRIEF. What is a Password?  It is a string of alphanumeric characters that can be used to allow access to multiple things.
Cloud Computing May November 2015 Author A bad book is as much of a labor to write as a good one; it come as sincerely from the author’s soul.
Copyright 1999 S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 41b Cryptography and Its Applications.
GOTBACKUP THE BEST BACKUP SOLUTIONS. SIGN UP TODAY! CLICK HERECLICK HERE.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
The Binary System By Michael Kaesler. What Is the Binary System The Binary System is the system of which information and Data is sent from one part of.
Pro Software Patentability Katie Jones Emma Boston Rodney Ezzard Alfred Williams Katie Jones Emma Boston Rodney Ezzard Alfred Williams.
Risks and Protection. What are the risks of shopping online? Spend 2 minutes identifying risks associated with shopping online card details could be stolen.
CRM COMPUTING A Look At the Advantages and Disadvantages Madison Garvin.
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
The Digital Battery From: Budd, T.A. "Protecting and Managing Electronic Content with a Digital Battery". IEEE Computer (2001) 2-8. Steve Lord.
United States Department of Agriculture Animal and Plant Health Inspection Service Plant Protection and Quarantine Electronic Exchange and the Cloud IPPC.
Security of, privacy of and access to personal/confidential information/data.
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
#SummitNow Alfresco Deployments on AWS Cost-Effective, Scalable & Secure Michael Waldrop Director, Solutions Engineering .
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
Tools and equipment are an essential part of many industries, providing the means for individuals to do their jobs accurately and proficiently across.
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
Real time Stock quotes by web Service and Securing XML for Web Services security. Bismita Srichandan
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
Phone:
ORGANIZATIONAL BEHAVIOR - 5 Motivation. What is it motivation? What are the differences between motivation and stimulation? Why motivation is important.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
BTEC ICT Level 3 Unit 8 E-Commerce
Introduction to Barracuda IM Firewall
Microsoft Azure Virtual Machines
Encrypting Confidential Student
Cryptography Reference: Network Security
Cryptography Reference: Network Security
Topic 1: Data, information, knowledge and processing
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Computer Security Security Concepts September 20, 2018
is not secure is not secure..
Why we should be texting with our customers
21st Century Learning Spaces
Cryptography Reference: Network Security
BTEC ICT Level 3 Unit 8 E-Commerce
Presentation transcript:

HOW SECURE IS CLOUD COMPUTING? Michael Becker

Summary  This article is about the security flaws and our growing dependence on cloud computing such as Google apps and Amazon’s EC2.  Whitfield Diffe, a cryptography and security researcher at the University of London, talks about these security flaws and how they can be prevented.

Security Implications of Cloud Computing  Even though this is a very economical solution to computing, it forces us to use organizations in which we have no control over.  Diffe makes the analogy that our dependence on cloud computing is like our dependence on public transportation.  For instance when flying, we have to follow rules and schedules that we wouldn’t otherwise follow if we had our own private jet.

Severity of Cloud Computing Problems  For the general population, people are trusting confidential information with a public company, such as Gmail.  Another other class of people do not trust cloud computing and have started to use encryption. They will not send anything to cloud computing companies that is not already encrypted.  For the most part cloud computing is fairly safe, but it really depends on the company you are using.

Encrypted Search and Computation Solutions  It has been suggested for the cloud to use an encryption scheme to help protect the information from other people. The only problem with this is with the current encryption schemes, it will take away from the economical benefit in cloud computing and this is the whole reason cloud computing is used.  Though you can personally encrypt data before the information is sent out to help better protect sensitive information.

More Practical Solutions for Security  Since a full cryptographic solution is far off, we must find another more practical solution for today.  This first step will have to be in overall computer security. One example will be having the providers using more secure operating systems, such as Solaris.  Also keeping a good security center with a very limited number of employees working there and should never be able to access customer data.