2 Cloud Computing Transforms the way IT is consumed and managed, bringing costs down Service delivery (NIST 2011) SaaS (Software) PaaS (Platform) IaaS.

Slides:



Advertisements
Similar presentations
Prepared for [xxxx] – Commercial in Confidence connect transform protect A Cloudy Cyberspace? Tony Roadknight – Technical Architect.
Advertisements

Cloud Computing Security Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Ӧ nen, Pasquale Puzio December 18, 2013 – Sophia-Antipolis, France.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
SPEAKER BLITZ ERIC BROWN Senior Systems Engineer NICK JAVANOVIC DoD Regional Sales Manager.
Security Issues and Challenges in Cloud Computing
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
11. 2 Cloud Computing Forensics 3 rd Annual AFCEA Student Conference Eric Oltman 26 October 2010 The Queen Elizabeth II Conference Centre London, United.
Cloud Usability Framework
SaaS, PaaS & TaaS By: Raza Usmani
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Ciphertext-Policy, Attribute-Based Encryption Brent Waters SRI International John Bethencourt CMU Amit Sahai UCLA.
THE DICOM 2013 INTERNATIONAL CONFERENCE & SEMINAR March 14-16Bangalore, India DICOM Medical Image Management the Challenges and Solutions – Cloud as a.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
CLOUD COMPUTING. IAAS / PAAS / SAAS LAYERS. Olena Matokhina Development and Consulting Team Lead 2 ABOUT PRESENTER.
NIST Information Technology Laboratory Cloud Computing Program NIST Cloud Computing Program Current Activities Robert Bohn OASIS – International Cloud.
©2012 Check Point Software Technologies Ltd. Cloud Security Tamir Zegman Architect.
Cloud Computing Cloud Security– an overview Keke Chen.
Jordan Wissel Eric Lewis Sarah Basile. Introduction This presentation will analyze: Overview/History Implementation Advantages/Disadvantages Security.
Security issues in the Cloud Presentation for CloudCamp 2012 (Lagos) Christopher Odutola FVC Inc. Dubai.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 9. Preventing and Responding to Computer Fraud IT Security Ranked #2 Preventing and Responding.
18 th Annual Canadian IT Law Association Conference Insider View from the EU Expert Group on Cloud Computing Dr Sam De Silva Partner, Head of IT & Outsourcing.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Groups 23/24.  4DYY&feature=related 4DYY&feature=related.
Cloud computing.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
COMMONWEALTH CONFERENCE November 3 rd, Cloud Computing Are you operating in the cloud? What is it? How long has it been around?
About Sally Smoczynski Background in process improvement Consultant in Information Security, Service Management and Business Continuity Strong experience.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
11 IT Expo West 2010 General Session: Cloud Computing Nigel Williams SVP Sales.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Niagara Framework in the Clouds Scott Boehm. … what the heck does that mean??
System Infrastructure Services (Iaas) Business Services Information Services Application Services (SaaS) Application Infrastructure.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
How to do Biz in China Liu Yuguo / Agile Tech Welcome to Suzhou.
Cloud Computing Presented by Alicia Wallis and Kerri Warf.
Daniel Cuschieri Information Security Distance Learning Weekend Conference August 2013.
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
PaaSport Introduction on Cloud Computing PaaSport training material.
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
What does it mean for Records and Information Management.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Service Model
Cloud Computing Security With More Than 50 Years Of Security And Enterprise Experience Cloud Raxak Automating Cloud Security. Cloud Raxak automates and.
Platform as a Service
By Hajira Fatima Safa Mohammed Zaheer Abid Ali. Cloud computing is a result of evolving and adopting existing technologies. The goal of cloud computing.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Clouding with Microsoft Azure
Protect your Digital Enterprise
Access Control in Cloud Security
Cloud adoption NECOOST Advisory | June 2017.
Cloud Security– an overview Keke Chen
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Hot Topics:Mobility in the Cloud
0_kit End to End encryption in your app
Cloud Computing Kelley Raines.
Survey on Security and Energy Efficiency in the Cloud Computing Environment Wei Wu.
Secure & Unified Identity
CompTIA Security+ Study Guide (SY0-401)
Company Overview & Strategy
CONTENTS BACKGROUND CLOUD MODELS SECURITY CONSIDERATIONS MANAGING RISK.
Cloud Computing: Concepts
Cloud Services - A Framework for Adoption in the Regulated Life Sciences Industry Status November 2018.
Computer Science and Engineering
Done by:Thikra abdullah
Presentation transcript:

2 Cloud Computing Transforms the way IT is consumed and managed, bringing costs down Service delivery (NIST 2011) SaaS (Software) PaaS (Platform) IaaS (Infrastructure) “If you have an application exposed to the Internet that will allow people to make money, it will be probed.” - Dave Cullinane, Former CISO, eBay.

Security issues in clouds 3 Security issues in clouds Cloud Security Alliance Data breach Data loss Malicious insiders Shared technology vulnerabilities … NIST Audit and compliance (e.g. cross border) Response to a breach

Data breach Some example attacks from academic Crypto literature 4 Data breach Some example attacks from academic Crypto literature Some example attacks from academic Crypto literature

5 Overall Picture

Cryptographic solutions: a glimpse 6 Cryptographic solutions: a glimpse Password security Attribute based encryption Fully homomorphic encryption Searchable encryption Format preserving encryption Functional encryption …

7 Password Security (Age-old) Password security problem

Searchable encryption 8 Searchable encryption Secure search over encrypted data Adaptive/Non-adaptive multi/single user, variable/constant # rounds …

Fully homomorphic encryption 9 Fully homomorphic encryption Enc(m1) * Enc(m2) = Enc(m1*m2) Enc(m1) + Enc(m2) = Enc(m1+m2) Extremely powerful primitive Allows working on encrypted data without revealing the plain data

Format Preserving Encryption 1010 Format Preserving Encryption Picture source: Voltage.com

Attribute based encryption 1111 Attribute based encryption Encryption based on policies Decryption can be done when some specific attributes are satisfied sales OR IT dept. manager marketing hire date < 2002 2 of 3 AND exec. level >= 5 Figure source: Brent Waters’ slides

Thank you somitra@iiitd.ac.in 1212 Thank you For more information, please contact Dr. Somitra Sanadhya somitra@iiitd.ac.in Cryptology Research Group, IIIT Delhi http://crypto.iiitd.edu.in/