Cloud Security Research Based On The Internet of Things

Slides:



Advertisements
Similar presentations
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Advertisements

Lecture 1: Overview modified from slides of Lawrie Brown.
Security Issues and Challenges in Cloud Computing
Fundamentals of Computer Security Geetika Sharma Fall 2008.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1 Minggu 7, Pertemuan 13 Security Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Automated malware classification based on network behavior
SEC835 Database and Web application security Information Security Architecture.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Chapter 16 IT Controls, Asset Protection, and Security.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Towards An Open Data Set for Trace-Oriented Monitoring Jingwen Zhou 1, Zhenbang Chen 1, Ji Wang 1, Zibin Zheng 2, and Michael R. Lyu 1,2 1 National University.
Dell Connected Security Solutions Simplify & unify.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Oracle's Distributed Database Bora Yasa. Definition A Distributed Database is a set of databases stored on multiple computers at different locations and.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
A Critical Analysis on the Security of IoTs
Computer Security By Duncan Hall.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Kaspersky Small Office Security INTRODUCING New for 2014!
Security of the Internet of Things: perspectives and challenges
Despite of spending high on digital information security, organizations still remain exposed to external threats. However, data center providers are helping.
A Solution for Maintaining File Integrity within an Online Data Archive Dan Scholes PDS Geosciences Node Washington University 1.
Distributed Systems Architectures Chapter 12. Objectives  To explain the advantages and disadvantages of different distributed systems architectures.
Introduction to Machine Learning, its potential usage in network area,
CS457 Introduction to Information Security Systems
Chapter 1 Characterization of Distributed Systems
BUILD SECURE PRODUCTS AND SERVICES
Chapter 6: Securing the Cloud
INFORMATION SYSTEMS SECURITY AND CONTROL.
Grid Computing Security Mechanisms: the state-of-the-art
Design for Security Pepper.
Distributed Cache Technology in Cloud Computing and its Application in the GIS Software Wang Qi Zhu Yitong Peng Cheng
Hybrid Management and Security
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Federated IdM Across Heterogeneous Clouding Environment
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Algorithms for Big Data Delivery over the Internet of Things
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Xixu Fu,Kai jun Wu,XiZhang Gong
Cloud Testing Shilpi Chugh.
Threat Landscape for Data Security
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Home Internet Vulnerabilities
Cloud Computing and its Implementation
INFORMATION SYSTEMS SECURITY and CONTROL
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Managing IT Risk in a digital Transformation AGE
M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski
Challenges Of Network Security
IoT in Healthcare: Life or Death
Cloud Computing for Wireless Networks
Presentation transcript:

Cloud Security Research Based On The Internet of Things Group 4 FAN Junzhou 1155098542 LIN Jiao 1155101259

PART 01 The relationship between cloud computing and the Internet of Things PART 02 Security issues for the Internet of Things Catalog PART 03 Solution to cloud security problem in the IoT ------Alibaba cloud PART 04 Perspective -----Deep learning

01 The relationship between cloud computing and the IoT

The relationship between cloud and the IoT Cloud is the control center like the brain. The IoT generates behaviors The benefits of applying the cloud flexible computing services improve the reliability of information processing

02 Security issues for the Internet of Things

Perception Network Security issues for the Internet of Things Confidential information is stored and exchanged in cloud computing platform Application Information is easily to be eavesdropped and modified during the transmission. The nodes are vulnerable. The label information is simply encrypted.

4.Defenses against malicious attacks 3.Data recovery (high requirements) 1.Cloud data isolation 4.Defenses against malicious attacks ( e.g. DOS attacks ) 2.Cloud data processing (timely response &avoid data loss) The problem of cloud security

03 Solution to cloud security problem in the IoT ------Alibaba cloud

Automated monitoring system Cloud data isolation Automated monitoring system Corresponding isolation mechanism. 1.Identity authentication technology (e.g. authentication based on security credentials) 2.Access Control Mechanism (Ali cloud sets permissions for resources tenants) 3.Optimized Encryption Technology (Guarantee the confidentiality & identification ) Malicious attack Cloud data processing 1.Intrusion detection operation (Identify abnormal behaviors& minimize resource consumption) 2.Defense mechanism (Integrate the firewall, advanced defense server to form network monitoring system) 3.Data repairing mechanism (User transparent) 1.Distributed data storage & redundant storage ( ensures data reliability) 2.Fast and accurate response (handing data in batches or in partitions.) 3.Method of rewriting(residual data problem) 4.Load balancing(High availability)

Automated monitoring system Cloud data isolation Monitoring Corresponding isolation mechanism. 1.Identity authentication technology (e.g. Authentication based on security credentials) 2.Access Control Mechanism (Ali cloud sets permissions for resources tenants) 3.Optimized Encryption Technology (Guarantee the confidentiality & identification ) Automated monitoring system Malicious attack Cloud data processing 1.Intrusion detection operation (Identify abnormal behaviors& minimize resource consumption) 2.Defense mechanism (Integrate the firewall, advanced defense server to form a comprehensive defense system) 3.Data repairing mechanism (User transparent) 1.Distributed data storage & redundant storage ( Ensures data reliability) 2.Fast and accurate response (Handle data in batches or in partitions.) 3.Method of rewriting(residual data problem) 4.Load balancing(High availability)

04 Perspective -----Deep learning

01 In May 2017, the ransomware swept the world, which had caused enormous losses. 02 The ransomware occupies terminal equipment in the IoT and affects the normal operation, so the loss is even more serious. 03 More proactive defense mechanisms are needed. (Deep learning algorithm)

Combining deep learning algorithm with cloud security in the IoT 1.Intrusion detection Output the result Classification of software types Analyzing sample malware Extracting features Feature extraction Removing redundant information Data standardization Data processing Method applying deep learning algorithms Superiority Dealing with new threats Reduce the security cost Operating more accurately Traditional method Output the result Computer executes instructions based on features Manually enter sample features

e.g. tracking test higher accuracy but high requirements 2.Vulnerability mining Traditional methods e.g. tracking test higher accuracy but high requirements A story of Google Applying deep learning algorithm  Improve mining speed  Suitable for complex environment  Not flexible as manual work Combing the artificial vulnerability analysis with deep learning algorithm to further optimize the IoT cloud security system.

Reference [1] Help.aliyun.com. (2017)阿里云数据安全白皮书_信任中心-阿里云. [online] Available at: https://help.aliyun.com/knowledge_detail/42566.html [Accessed 1 Nov. 2017] [2]Security and Privacy for Cloud-Based IoT: Challenges Zhou, Jun ; Cao, Zhenfu ; Dong, Xiaolei ; Vasilakos, Athanasios V.IEEE Communications Magazine, January 2017, Vol.55(1),pp.26-33[Peer Reviewed Journal] [3] Cloud security issues and challenges: A survey Singh, Ashish ; Chatterjee, Kakali Journal of Network and Computer Applications, 1 February 2017, Vol.79, pp.88-115[Peer Reviewed Journal] [4]En.wikipedia.org. (2017). Cloud computing. [online] Available at: https://en.wikipedia.org/wiki/Cloud_computing [Accessed 13 Nov. 2017]. [5]Jiang, Z. and Liu, B. (2012). The Security Threats and Risk Analysis of Cloud Computing. Ph.D. Graduate of University. [6]Yang, J., Wang, H., Wang, J. and Yu, D. (2012). Survey on some Security Issues of Cloud Computing. Journal of Chinese Computer System, 33(3), p.8

Thank you!