A Seminar on Securities In Cloud Computing

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

IT Industry & Cloud Computing. Trends ‘2011- The year of high salaries and immense job opportunities for IT job seekers’ (Source – Blog.Timesjobs.com)
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
High Performance Computing Course Notes Grid Computing.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 6 2/13/2015.
Security Issues and Challenges in Cloud Computing
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Using Digital Credentials On The World-Wide Web M. Winslett.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Cloud Computing (101).
Cloud Usability Framework
A Seminar on Securities In Cloud Computing Presented by Sanjib Kumar Raul Mtech(ICT) Roll-10IT61B09 IIT Kharagpur Under the supervision of Prof. Indranil.
Osama Shahid ( ) Vishal ( ) BSCS-5B
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Topic 5: Basic Security.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
CLOUD COMPUTING. What is cloud computing ??? What is cloud computing ??? Cloud computing is a general term for anything that involves delivering hosted.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Introduction to Network Systems Security Mort Anvari.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
DM Collaboration – OMA & BBF: Deployment Scenarios Group Name: WG5 - MAS Source: Tim Carey, ALU, Meeting Date:
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
SEMINAR ON.  OVERVIEW -  What is Cloud Computing???  Amazon Elastic Cloud Computing (Amazon EC2)  Amazon EC2 Core Concept  How to use Amazon EC2.
Distributed Systems Architectures Chapter 12. Objectives  To explain the advantages and disadvantages of different distributed systems architectures.
Distributed Systems Architectures. Topics covered l Client-server architectures l Distributed object architectures l Inter-organisational computing.
Dr. Ir. Yeffry Handoko Putra
Unit 3 Virtualization.
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
“Security” in cloud computing
Instructor Materials Chapter 7: Network Evolution
Chapter 6: Securing the Cloud
© 2002, Cisco Systems, Inc. All rights reserved.
COMP532 IT INFRASTRUCTURE
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Network Security Basics: Malware and Attacks
VIRTUALIZATION & CLOUD COMPUTING
Building Distributed Educational Applications using P2P
Cloud computing-The Future Technologies
Walter Binder Giovanna Di Marzo Serugendo Jarle Hulaas
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
e-Health Platform End 2 End encryption
Module 8: Securing Network Traffic by Using IPSec and Certificates
Distribution and components
Grid Computing.
Firewalls.
Systems Analysis and Design With UML 2
Oracle Solaris Zones Study Purpose Only
Introduction to Cloud Computing
#01 Client/Server Computing
Cloud Computing.
Cloud Testing Shilpi Chugh.
EIS Fast-track Revision Om Trivedi Enterprise Information Systems
A Seminar on Securities In Cloud Computing
Lecture 1: Foundation of Network Security
Introduction to Databases Transparencies
Module 8: Securing Network Traffic by Using IPSec and Certificates
Fundamental Concepts and Models
ONLINE SECURE DATA SERVICE
Understanding Android Security
Erica Burch Jesse Forrest
Security in SDR & cognitive radio
Designing IIS Security (IIS – Internet Information Service)
Basics of Cloud Computing
Preventing Privilege Escalation
#01 Client/Server Computing
Presentation transcript:

A Seminar on Securities In Cloud Computing Presented by Sanjib Kumar Raul Mtech(ICT) Roll-10IT61B09 IIT Kharagpur Under the supervision of Prof. Indranil Sengupta HOD,Computer Science

Content What is Cloud Computing Cloud Architecture Cloud Structure Types of security in cloud computing Security concern Data Confidentiality in cloud computing. Problem in cloud computing. Conclusion References

What is Cloud Computing It is an Internet-based computing technology, where shared resources such as software, platform, storage and information are provided to customers on demand. Cloud Computing is a computing platform for sharing resources that include infrastructures, software, applications, and business processes. Cloud Computing is a virtual pool of computing resources.It provides computing resources in the pool for users through internet.

Cloud Architecture A Basic Cloud Network

Cont.. Components of cloud computing Front end The front end is the client’s network or computer, and the applications used to access the cloud. Back end The back end is the ‘cloud’ itself, which comprises of various computers, servers and data storage devices.

Cloud structure and Types The user can access any service which he/she wants for a specific task and for a specific amount of time.

Types Public cloud: In public clouds, multiple customers share the computing resources provided by a single service provider. Private cloud: In the private cloud, computing resources are used and controlled by a private enterprise.

Cont.. Hybrid cloud: A third type can be hybrid cloud that is typical combination of public and private cloud. Community cloud: Several organizations jointly construct and share the same cloud infrastructure as well as policies,requirements, values, and concerns.

Models of Cloud Computing Model 1:Infrastructure as a service(Iaas) Model 2:Platform as a Service(PaaS)

Cont.. Model 3:Software as a Service(SaaS) Model 4:Business Process as a Service(BaaS)

Types of Security in Cloud Computing 1-Data Security It focuses on protecting the software and hardware associated with the cloud. 2-Network Security Protecting the network over which cloud is running from various attacks – DOS, DDOS, IP Spoofing.

Security Concern There are multiple issues in a cloud computing. Loss of Control The first issue associated with cloud computing is the loss of control of an organisation’s data. Data retention Another issue associated with cloud computing can be seen with how old data is managed. Once data is used it is generally stored indefinitely in the cloud.

Implementing and achieving security The company secure the data by establish an information security policy (InSPy). Security through password protection

Data Confidentiality Protection Confidentiality is defined as the assurance that sensitive information is not disclosed to unauthorized persons, processes, or Devices. Users’ confidential data is disclosed to a service provider if all of the following three conditions are satisfied simultaneously

Cont.. 1) the service provider knows where the users’ confidential data is located in the cloud computing systems. 2) the service provider has privilege to access and collect the users’ confidential data in cloud. 3) the service provider can understand the meaning of the users’ data.

Problems With Current Cloud Computing Cloud computing system architecture

Cont.. The following are the major problems of current cloud computing system: A. Each service provider has its own software layer, platform layer and infrastructure layer. When a user uses a cloud application from a service provider, the user is forced to use the platform and infrastructure provided by the same service provider, and hence the service provider knows where the users’ data is located and has full access privileges to the data.

Cont.. B. The user is forced to use the interfaces only provided by the service provider, and users’ data has to be in a fixed format specified by the service provider, and hence the service provider knows all the information required understanding users’ data. Therefore, we cannot prevent service providers from satisfying all of the three Conditions

Cont.. Approach to Protect Confidentiality: In our approach,we have the following seven entities: Software Cloud,Infrastructure Cloud, Software Service Broker, Infrastructure Service Broker, Software Service Attestation Authority, DataObfuscator and Data De-obfuscator

McCabe’s Cyclomatic Complexity Measures Approach to protect confidentiality

Cont.. Our approach makes sure that any of these entities in a cloud computing system does not satisfy the three conditions simultaneously. Software Cloud: A Software Cloud provides software as a service upon users’ requests. Each software cloud may contain multiple software services, and each software service can be discovered and accessed by users through Software Service Broker. .

Cont.. Infrastructure Cloud: An Infrastructure Cloud provides virtualized system resources, such as CPU, memory, and network resources. An authenticated user can request a virtual machine on which the user can deploy any platform or operating system to execute a software service instance. Software Service Broker:It provides identity anonymization service, by which users can use pseudonyms instead of their true identities so that the users can acquire service instances

without revealing their identities. Infrastructure Service Broker:It helps users automatically discover and useavailable infrastructure services. It also provides identity anonymization service to prevent the system from revealing users’ true identities. The Software Service Attestation Authority (SSAA):The SSAA is a third party authority to verify that a service instance does not perform any malicious activity that may disclose users’ confidential data

Cont.. A Data Obfuscator: A Data Obfuscator is a middleware provided by a user that can be deployed on a virtual machine in an infrastructure Cloud. The Data Obfuscator provides an operating system environment for software service instance to be run in an Infrastructure Cloud. A Data De-obfuscator: It de-obfuscates obfuscated data so that a user can see the plain data. A Data De-obfuscator remains in the user’s personal computer all the time.

Summary. S1) a) A user requests a Software Service Broker to find a software service by providing the specification of the software service. b) The Software Service Broker performs automatic service discovery to find a service instance in the Software Cloud that satisfies the user’s requested service requirement specification. c) The Software Service Broker acquires the discovered software instance using an anonymous credential. S2) a) The Software Service Broker deploys the acquired service instance to the testing platform of a

Cont.. SSAA. The SSAA verifies whether the service instance performs according to the service description, and the service instance does not transmit users’ data to any unauthorized entity. b) After the verification procedure, the software service instance is sent back to the Software Service Broker. S3) a) The user asks the Infrastructure Service Broker to find an infrastructure service compatible to the service instance. b) The Infrastructure Service Broker discovers an infrastructure service provider, who has the capability to execute the acquired software service instance.

Cont.. S4) The user requests the infrastructure service provider to set up a virtual machine and then deploys the Data Obfuscator on the virtual machine using the Agent Deployment Plans (ADPs), for automated middleware deployment and migration in service based systems . S5) a) The service instance acquired in S1) is sent to Infrastructure Service Broker. b) The service instance is deployed on the workflow of the Data Obfuscator set up in S4). S6) a) The user sends his/her data to the workflow to process.

An Illustrative Example An example of online video conferencing to illustrate our approach

Cont.. S1) a) The leader of the group requests a Software Service Broker to find the Voice Communication Service, Video Communication Service, File Sharing Service and Instant Messaging Service. b) The Software Service Broker discovers the services. c) The Software Service Broker downloads the service instances of the five software services. S2) a) The Software Service Broker deploys the service instances to the testing platform of a SSAA. b) The SSAA verifies the software service instances. S3) a) The leader of the group requests an Infrastructure Service Broker to find an infrastructure service compatible to the service instances. b) The Infrastructure Service Broker discovers an infrastructure service.

Cont.. S4) A virtual machine is set up in the infrastructure cloud. The leader of the group deploys the Data Obfuscator on the virtual Machine. S5) a) The service instances are sent to the Infrastructure Service Broker. b) The service instances are deployed on the Data Obfuscator. The five service instances are composed to a workflow. The workflow provides all the functionalities for online conferencing. S6) a) The users of the group send their input data to the workflow to process. During the processing of the users’ input data, the input data is obfuscated. After completing the processing, a service response of the workflow is sent to all the users of the group that the processing of their input data has been completed.

Conclusions Here an approach to protecting users’ confidential data in cloud computing. Our approach is based on three features: (1) separation of software service providers and infrastructure service providers, (2) hiding information about the owner of data and (3) data obfuscation.

References [1] Stephen S. Yau and Ho G, ”Protection of users’ data confidentiality”from ACM digital library. [2] J. Heiser and M. Nicolett, “Assessing the security risks of cloud computing,”from ACM digital library. [3] La’Quata Sumter,” Cloud Computing: Security Risk” from ACM digital library. [4] Gary Anthes,”Security in the Cloud” november 2010 | vol. 53 | no. 11 | communications of the acm 11. [5] S N Dhage, B B Meshram,” Cloud Computing Environment” International Conference and Workshop on Emerging Trends in Technology (ICWET 2011) – TCET, Mumbai, India.

Thank you Any Query ?