Cloud Testing Shilpi Chugh.

Slides:



Advertisements
Similar presentations
Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
Advertisements

Chapter 4 Infrastructure as a Service (IaaS)
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
AUTHENTICATION IN THE CLOUD Are we really safe in the cloud?
Security Issues and Challenges in Cloud Computing
Public cloud definition Public cloud is a cloud in which Cloud infrastructure is available to the general public. Public cloud define cloud computing.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Cloud Usability Framework
Plan Introduction What is Cloud Computing?
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
MIGRATING INTO A CLOUD P. Sai Kiran. 2 Cloud Computing Definition “It is a techno-business disruptive model of using distributed large-scale data centers.
Effectively Explaining the Cloud to Your Colleagues.
Presentation to the Housing Technology Conference Tim Cowland- Senior Consultant 27 th February 2014 The Rise of the Housing Cloud.
3 Cloud Computing.
FIORANO SERVICE BUS The Cloud Enablement Platform
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
In the name of God :).
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Niagara Framework in the Clouds Scott Boehm. … what the heck does that mean??
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Security Vulnerabilities in A Virtual Environment
Chapter 8 – Cloud Computing
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
Database Laboratory Regular Seminar TaeHoon Kim Article.
Cloud Computing 3. TECHNOLOGY GUIDE 3: Cloud Computing 2 Copyright John Wiley & Sons Canada.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Clouding with Microsoft Azure
Securing Information Systems
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Chapter 6: Securing the Cloud
Understanding The Cloud
Roles and Boundaries – 1/2
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
VIRTUALIZATION & CLOUD COMPUTING
Prepared by: Assistant prof. Aslamzai
What is Cloud Computing - How cloud computing help your Business?
A10 Networks vThunder Leverages the Powerful Microsoft Azure Cloud Platform to Offer Advanced Layer 4-7 Networking, Security on a Global Scale MICROSOFT.
Cloud Computing Kelley Raines.
Cloud Computing By P.Mahesh
Chapter 21: Cloud Computing and Related Security Issues
Introduction to Cloud Computing
Cloud Computing.
Chapter 22: Cloud Computing Technology and Security
Network Services, Cloud Computing, and Virtualization
CLOUD COMPUTING Presented By:- EduTechlearners
IT INFRASTRUCTURES Business-Driven Technologies
3 Cloud Computing.
Cloud Computing and its Implementation
Brandon Hixon Jonathan Moore
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Emerging technologies-
Computers Are Your Future Twelfth Edition
Fundamental Concepts and Models
Andy Puckett – Sales Engineer
Productive + Hybrid + Intelligent + Trusted
Cloud Computing for Wireless Networks
Presentation transcript:

Cloud Testing Shilpi Chugh

What is “Cloud "and Cloud Computing? Cloud is just an analogy of Internet. Cloud Computing is a technology by means of which store and access data from remote locations with the use of internet

Features Scalability & flexibility On Demand Availability QoS OpEx instead of CapEx. (tenancy instead of occupancy)

Types of clouds Private cloud Public cloud Community cloud The cloud is managed by an organization . Public cloud The cloud infrastructure is owned and managed by a Cloud Service Provider . Community cloud The cloud is managed by several organizations and supports a specific community that has the same interest. Hybrid cloud The cloud infrastructure is composed of two or more of the above models

Different Service Models Software as a Service (SaaS): It offers renting application functionality from a service provider rather than buying, installing and running software by the user. Platform as a Service (PaaS) : It provides a platform in the cloud, upon which applications can be developed and executed. Infrastructure as a Service (IaaS) : CSP offer computing power and storage space on demand

Challenges in Cloud Testing Security Performance Integration System Crashes Lack of Standard Procedures

Security testing Security layers Physical Data Application Network

Physical Security Weakness in physical security can lead to an attack on infrastructure which in turn can shut down all the data related services Following measures can be taken for ensuring Physical security: Evaluate security controls on physical infrastructure with a physical security Surveillance cameras and an alarm system Restricted access points for employees Sensors for natural disasters Redundancy of data across locations

Data related Security Data plays an important role in cloud computing. So, security of data becomes the primary responsibility.

Data related Security cont.. Data Integrity – Gives high quality accessible data which is stored in cloud privacy environment. Data must not be changed in transit by unauthorized access. To achieve this goal monitoring mechanism must be strong. For verifying the integrity there is a framework “proof of Retrievability” is available in market to do a spot check of data which is proposed by Kevin D. Bowers.

Data related Security cont.. Encryption Distributive Storage Authentication techniques Data concealment Data Confidentiality Data confidentiality -Possess set of rules that limits access of information. Following measures as mentioned in below figure can be taken in order to maintain confidentiality

Data related Security cont.. Data Availability - Itself tells that data which is stored on cloud must be available when required. In case of any damage or network failure the data can be properly recovered. The data storage must be transparent and shared with the respective users. Different measures can be taken for the same such as: Reliable storage Agreement/Disaster Recovery plan Reliable devices used for backup such as hard drives. Data privacy: Cloud computing comes with the risk that unauthorized users might access your information. Also, it refers to the right of self -determination- “what is known about them”. To protect against this happening, cloud computing services offer PETs (Privacy Enhancing Tools) which provide encryption, anonymization etc., as well as TETs (Transparency enhancing tools) which provides information about private polices access to their data.

Network related security Earlier when organisations worked individually they had a control on their networks but now in cloud architecture data moves to and from organization and cloud which is exposed to internet and configuration modes for virtual networks are “bridged” and “routed”. Network related attacks: DNS Attacks IP Spoofing Network Sniffing etc.

Application Related Security Today the world runs on applications and applications are links between data and the user Application Level Threats : SQL injection Backdoor and debug options Hidden field manipulation Cross site scripting Man in the middle attack etc

Performance Related Issues and Crashes As everyone is moving to cloud for their services and applications, multiple users can use or hit the same application at same time, which in turn increases the traffic on internet. Now it is a concern regarding the network bandwidth offered by Cloud services. following measures can be taken to overcome performance related issues: Testing can be done with Realistic Load, testing in ideal conditions, which you will never get after deploying on production. Testing can be done with increased stress, testing beyond the boundary value which can make sure application will not crash in worst conditions. Comprehensive Testing, End-to-End testing should be performed to create complete process chain. Testing Elasticity and scalability, to test whether the performance meets the defined SLAs.

Data Migration & Integration from Existing System It is process of transferring data from one system to another while changing the storage or database. It typically happens during upgrades or transferring to new system Storage Migration Database Migration Application Migration

Lack of Standard Procedures and Practices Today more and more businesses are looking for moving to hosted solutions provided by different vendors to cut down on the cost spent having their own IT infrastructure but the problem starts when they start looking out for the solutions offered but since the field is still evolving it becomes difficult to have a comparison between 2 solutions because they all have different standards. New organizations which are thinking to migrate to Cloud are planning for their own standards during and after migration.

thanks