Week 10 - Thursday.  What did we talk about last time?  Database inference  Data mining.

Slides:



Advertisements
Similar presentations
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Advertisements

Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
By Adam Balla & Wachiu Siu
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 6 2/13/2015.
Emerging Platform#6: Cloud Computing B. Ramamurthy 6/20/20141 cse651, B. Ramamurthy.
By: Kathleen Walters CLOUD COMPUTING Definition Cloud computing allows multiple computers to connect to one main network. Instead of installing different.
Public cloud definition Public cloud is a cloud in which Cloud infrastructure is available to the general public. Public cloud define cloud computing.
Cloud Computing (101).
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
Be Smart, Use PwrSmart What Is The Cloud?. Where Did The Cloud Come From? We get the term “Cloud” from the early days of the internet where we drew a.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Engineering the Cloud Andrew McCombs March 10th, 2011.
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
Cloud computing Tahani aljehani.
Chapter-7 Introduction to Cloud Computing Cloud Computing.
EA and IT Infrastructure - 1© Minder Chen, Stages in IT Infrastructure Evolution Mainframe/Mini Computers Personal Computer Client/Sever Computing.
Plan Introduction What is Cloud Computing?
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
Cloud Computing Cloud Security– an overview Keke Chen.
Clouds on IT horizon Faculty of Maritime Studies University of Rijeka Sanja Mohorovičić INFuture 2009, Zagreb, 5 November 2009.
Cloud Computing Source:
Introduction to Cloud Computing
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Cloud Computing.
3 Cloud Computing.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
“Clouds: a construction zone” (and Why PaaS is the future…) Matt Thompson General Manager, Developer & Platform Evangelism Microsoft.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Cloud Computing Definitions Cloud The set of hardware, networks, storage, services and interfaces that combine to deliver computing as a service Cloud.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Geographic Information Systems Cloud GIS. ► The use of computing resources (hardware and software) that are delivered as a service over the Internet ►
Week 9 - Friday.  What did we talk about last time?  Database security requirements  Database reliability and integrity  Sensitive data.
Introduction to Cloud Computing
In the name of God :).
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Cloud Computing. Cloud Computing defined Dynamically scalable, device-independent and task-centric computing resources are provided online, with all charges.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
Overview Abstract Vulnerability: An Overview Cloud Computing Cloud-Specific Vulnerabilities Architectural Components and Vulnerabilities Conclusion.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Cloud Computing May November 2015 Author A bad book is as much of a labor to write as a good one; it come as sincerely from the author’s soul.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Speaker: Meng-Ting Tsai Date:2010/11/25 The Information Assurance Practices of Cloud Computing Vendors IEEE Communications Society.
HUSKY CONSULTANTS FRANKLIN VALENCIA WIOLETA MILCZAREK ANTHONY GAGLIARDI JR. BRIAN CONNERY.
| nectar.org.au NECTAR TRAINING Module 1 Overview of cloud computing and NeCTAR services.
Chapter 8 – Cloud Computing
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Web Technologies Lecture 13 Introduction to cloud computing.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Cloud Computing 3. TECHNOLOGY GUIDE 3: Cloud Computing 2 Copyright John Wiley & Sons Canada.
CS 6027 Advanced Networking FINAL PROJECT ​. Cloud Computing KRANTHI ​ CHENNUPATI PRANEETHA VARIGONDA ​ SANGEETHA LAXMAN ​ VARUN ​ DENDUKURI.
Clouding with Microsoft Azure
Unit 3 Virtualization.
Week 4 - Wednesday CS 113.
Cloud Security– an overview Keke Chen
Andrew McCombs March 10th, 2011
Introduction to Cloud Computing
AWS. Introduction AWS launched in 2006 from the internal infrastructure that Amazon.com built to handle its online retail operations. AWS was one of the.
Network Services, Cloud Computing, and Virtualization
Cloud Computing.
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
3 Cloud Computing.
Cloud Computing: Concepts
Presentation transcript:

Week 10 - Thursday

 What did we talk about last time?  Database inference  Data mining

P HIFE D AWG

 Salah Abdeslam is believed to be a key terrorist Paris attacks of last November  Europol listed him as the most wanted criminal out of a group of 57  He was captured by Belgian police a few days ago after being on the run for four months  How was he found?

 After the attacks, the car he was riding in was stopped by the French, but they didn't know who he was  Poor cooperation in the intelligence community  He has been hiding in Molenbeek, an area with a lot of Islamic fundamentalist sympathizers  Raids produced both physical evidence and digital devices  Intelligence tracked him to Molenbeek using cell phone metadata  A social network of sympathizers was mapped out, both physically and logically  The final information that led to the gun battle and arrest:  An "unusually large" pizza order  Follow the story:  security-forces-373d167a3066#.v7n4u5612

 Data mining means looking for patterns in massive amounts of data  These days, governments and companies collect huge amounts of data  No human being could sift through it all  We have to write computer programs to analyze it  It is sort of a buzzword, and people argue about whether some of these activities should simply be called data analysis or analytics

 We have huge databases (terabytes or petabytes)  Who is going to look through all that?  Machines of course  Data mining is a broad term covering all kinds of statistical, machine learning, and pattern matching techniques  Relationships discovered by data mining are probabalistic  No cause-effect relationship is implied

 It is a form of machine learning or artificial intelligence  At the most general, you can:  Cluster analysis: Find a group of records that are probably related ▪ Like using cell phone records to find a group of drug dealers  Anomaly detection: Find an unusual record ▪ Maybe someone who fits the profile of a serial killer  Association rule mining: Find dependencies ▪ If people buy gin, they are also likely to buy tonic

 Social media providers have access to lots of data  Facebook alone has details about over a billion people  Can they find hidden patterns about your life?  Should they inform the police if they think they can reliably predict crime?  What about data the government has?  For research purposes, some sets of "anonymized" data are made public  But researchers often discover that the people involved can be discovered anyway

 Privacy issues are complex  Sharing data can allow relationships to become evident  These relationships might be sensitive  Integrity  Because data mining can pull data from many sources, mistakes can propagate  Even if the results are fixed, there is no easy way to correct the source databases  Data mining can have false positives and false negatives

 Cloud computing are flexible, Internet-based services that gives users access to computational resources on demand  Cloud computing allows small companies to store and process data without the up-front costs of a data center  Cloud computer services are growing rapidly, fueled by:  High-speed networking  Low cost computers and storage  Hardware virtualization technology

 Since cloud computing is a buzzword, we want to define clouds as having five characteristics: 1. On-demand self-service: You can ask for more resources 2. Broad network access: You can access services from lots of platforms 3. Resource pooling: The provider has lots of stuff for you to use that can be dynamically assigned 4. Rapid elasticity: Services can quickly and automatically be scaled up or down 5. Measured service: You pay for computing like a utility

 Infrastructure as a Service (IaaS)  Processing, storage, and networks are in the cloud  You get (virtual) machines, but you're responsible for what's on them  Platform as a Service (PaaS)  Languages, tools, and APIs are provided  You have to develop applications  Software as a Service (Saas)  You get everything  You're using software and doing computations, but it's happening in the cloud

Applications Application Platform: Tools and APIs Virtual Machines and Storage Hypervisor Hardware Administered by SaaS Administered by IaaS Administered by PaaS

 Private cloud: the cloud infrastructure is operated by and for the owning organization  Community cloud: the cloud is shared by organizations usually with a common goal  Public cloud: owned and operated by for- profit companies that make the service available to everyone  Hybrid cloud: two or more clouds connected together

 Should your business move to the cloud?  There are steps you should take to determine the risk and value of doing so:  Identify assets you want to move to the cloud  Determine what additional vulnerabilities you will have on the cloud  Estimate the likelihood that those vulnerabilities will be exploited  Compute expected loss  Select new controls  Project total savings  It may or may not save you money to move the cloud

 Which model should you use?  Even if you want public, there are many choices:  Amazon Web Services and EC2  Google App Engine (PaaS)  Google Compute Engine (IaaS)  Microsoft Azure (PaaS and IaaS)  Important issues:  Authentication and access control  Encryption  Logging  Incident response  Reliability  Vendor lock-in makes it hard to change providers

 Just using the cloud can have security benefits  Geographic diversity  Platform diversity  Infrastructure diversity  Cloud platforms often support mutual authentication  Cloud storage  There are risks when you share data on a platform  Consider how sensitive the data is  Consider how data sharing will be done  Are there laws or other regulations that apply?  Side channel attacks may be possible against other users of the same cloud

 Dropbox is a popular cloud service for backing up and synchronizing data  On June 19, 2011, a bug in their software accepted any password for any account  Dropbox said that files would be encrypted using the user password  But they weren't!  When using a cloud service, it pays to look into the details

 Managing identities and authentication in a cloud can be challenging:  There are many computers communicating with each other  A hybrid cloud may have different authentication requirements within it  Federated identity management is sharing identity information across different trust domains  There are systems for it, but it's a complex problem  It can provide single sign-on capabilities

 IaaS gives the user a lot of control  In other words, ways to be unsecure  IaaS hosts can usually be controlled in more ways than traditional hosts  Good because it allows for robust logging and monitoring  Bad because there are more vulnerabilities attackers can try  If you delete a file, it might not be gone, and someone else might be using the same hardware  Authenticate command line interfaces strongly  Use virtual machines that will only run specific applications  Application whitelisting

 Privacy laws  Web privacy  No class Friday or Monday!

 Read Sections 9.1 – 9.5  Work on Project 3  Work on Assignment 4  Due next Friday