Cloud Security– an overview Keke Chen

Slides:



Advertisements
Similar presentations
© 2012 Open Grid Forum Simplifying Inter-Clouds October 10, 2012 Hyatt Regency Hotel Chicago, Illinois, USA.
Advertisements

Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Dr. Bhavani Thuraisingham June 2013
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Lecture 11 Reliability and Security in IT infrastructure.
Cloud Usability Framework
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Prabath Siriwardena Senior Software Architect. An open source Identity & Entitlement management server.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
©2012 Check Point Software Technologies Ltd. Cloud Security Tamir Zegman Architect.
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
Cloud Computing Cloud Security– an overview Keke Chen.
Cloud Computing & Security Issues Prepared by: Hamoud Al-Shammari CS 6910 Summer, 2011 University of Colorado at Colorado Springs Engineering & Applied.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Climate Sciences: Use Case and Vision Summary Philip Kershaw CEDA, RAL Space, STFC.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
In the name of God :).
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
1 Suronapee Phoomvuthisarn, Ph.D. / NETE4631:Cloud Privacy and Security - Lecture 12.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Daniel Cuschieri Information Security Distance Learning Weekend Conference August 2013.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Role Activity Sub-role Functional Components Control Data Software.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
WSO2 Identity Server. Small company (called company A) had few services deployed on one app server.
Web 2.0: Concepts and Applications 6 Linking Data.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Clouding with Microsoft Azure
Lecture 6: Cloud Computing
Unit 3 Virtualization.
Presented by Edith Ngai MPhil Term 3 Presentation
Security on OpenStack 11/7/2013
Threat Modeling for Cloud Computing
Reduce Risk Across Hybrid IT
Chapter 6: Securing the Cloud
Understanding The Cloud
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Cloud computing-The Future Technologies
Hot Topics:Mobility in the Cloud
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Federated IdM Across Heterogeneous Clouding Environment
Power BI Security Best Practices
Cloud Computing Kelley Raines.
Cloud Security.
Reduce Risk Across Hybrid IT
Network Services, Cloud Computing, and Virtualization
Cloud Computing Team Members: Aleksandra Knezevic Willie Robbins
Secure & Unified Identity
Cloud Computing ISY143.
Subra Kumaraswamy, Sun Tim Mather, RSA 04/21/09 | Session ID: HOT-105
Securing Cloud-Native Applications Jason Schmitt CEO
אבטחת ענן כמאל יאסין & סיון שני.
Cryptography and Network Security
Cloud Computing: Concepts
Computer Science and Engineering
NIST Cloud Computing Reference Architecture
Network customization
Designing IIS Security (IIS – Internet Information Service)
Cloud and Database Security
IT Management Services Infrastructure Services
Cryptography and Network Security
Client/Server Computing and Web Technologies
Cloud Computing for Wireless Networks
Presentation transcript:

Cloud Security– an overview Keke Chen Cloud Computing Cloud Security– an overview Keke Chen

Outline Introduction Infrastructure security Data security Identity and access management

Introduction Many security problems in non-cloud environment are still applicable We focus on cloud-specific problems Reference book “cloud security and privacy”

overview

Infrastructure security IaaS, PaaS, and SaaS Focus on public clouds No special security problems with private clouds – traditional security problems only Different levels Network level Host level Application level

Network level confidentiality and integrity of data-in-transit Amazon had security bugs with digital signature on SimpleDB, EC2, and SQS accesses (in 2008) Less or no system logging /monitoring Only cloud provider has this capability Thus, difficult to trace attacks Reassigned IP address Expose services unexpectedly spammers using EC2 are difficult to identify Availability of cloud resources Some factors, such as DNS, controlled by the cloud provider. Physically separated tiers become logically separated E.g., 3 tier web applications

Host level (IaaS) Hypervisor security Virtual machine security “zero-day vulnerability” in VM, if the attacker controls hypervisor Virtual machine security Ssh private keys (if mode is not appropriately set) VM images (especially private VMs) Vulnerable Services

Application level SaaS application security In an accident, Google Docs access control failed. All users can access all documents

Data Security Data-in-transit Data-at-rest Data processing Data lineage Data provenance Data remanence

Data-at-rest & processing data Data-in-transit Confidentiality and integrity The Amazon digital signature problem Data-at-rest & processing data Possibly encrypted for static storage Cannot be encrypted for most PaaS and SaaS (such as Google Apps) – prevent indexing or searching Research on indexing/searching encrypted data Fully homomorphic encryption?

Data lineage Definition: tracking and managing data For audit or compliance purpose Data flow or data path visualization Time-consuming process even for inhouse data center Not possible for a public cloud

Data provenance Origin/ownership of data Verify the authority of data Trace the responsibility e.g., financial and medical data Difficult to prove data provenance in a cloud computing scenario

Data remanence Data left intact by a nominal delete operation In many DBMSs and file systems, data is deleted by flagging it. Lead to possible disclosure of sensitive information Department of Defense: National Industrial security program operating manual Defines data clearing and sanitization

Provider’s data and its security The provider collects a huge amount of security-related data Data possibly related to service users If not managed well, it is a big threat to users’ security

Identity and Access Management Traditional trust boundary reinforced by network control VPN, Intrusion detection, intrusion prevention Loss of network control in cloud computing Have to rely on higher-level software controls Application security User access controls - IAM

IAM components IAM processes Authentication Authorization Auditing User management Authentication management Authorization management Access management – access control Propagation of identity to resources Monitoring and auditing

IAM standards and specifications avoid duplication of identity, attributes, and credentials and provide a single sign-on user experience SAML(Security Assertion Markup Lang). automatically provision user accounts with cloud services and automate the process of provisioning and deprovisioning SPML (service provisioning markup lang). provision user accounts with appropriate privileges and manage entitlements XACML (extensible access control markup lang). authorize cloud service X to access my data in cloud service Y without disclosing credentials Oauth (open authentication).

Google Account Example: ACS: Assertion Consumer Service. SSO : single sign-on

SPML example: What happens when an account is created?

XACM Examples: How does your access is verified? PEP: policy enforcement point (app interface) PDP: policy decision point

OAuth example: Authorize the third party to Access your data/credential

IAM standards/protocols OpenID Information Cards Open Authentication (OATH)

IAM practice- Identity federation Dealing with heterogeneous, dynamic, loosely coupled trust relationships Enabling “Login once, access different systems within the trust boundary” Single sign-on (SSO) Centralized access control services Yahoo! OpenID

summary Infrastructure-level security – example in previous lecture Data security & privacy – next class Outsourced data: confidentiality, privacy, and integrity IAM – service level Actually, independent of cloud computing, more general to service computing