Trust Management of Services in Cloud Environments:

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Thanks to Microsoft Azure’s Scalability, BA Minds Delivers a Cost-Effective CRM Solution to Small and Medium-Sized Enterprises in Latin America MICROSOFT.
1 Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair April 12, © Ravi Sandhu World-Leading.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 6 2/13/2015.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
Future Work Needed Kenneth Wade Najim Yaqubie. Outline 1.Model is simple 2.Too many assumptions 3.Conflicting internal architectures 4.Security Challenges.
Unified Logs and Reporting for Hybrid Centralized Management
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
The Cloud: Demystified Neil Cattermull Frontier Technology.
A T AXONOMY AND S URVEY OF C LOUD C OMPUTING S YSTEMS Reporter: Steven Chen Date: 2010/10/27 1.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Cloud Usability Framework
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Cloud computing Tahani aljehani.
Plan Introduction What is Cloud Computing?
Introduction to Cloud Computing
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Osama Shahid ( ) Vishal ( ) BSCS-5B
1 Introduction to Cloud Computing Jian Tang 01/19/2012.
Software to Data model Lenos Vacanas, Stelios Sotiriadis, Euripides Petrakis Technical University of Crete (TUC), Greece Workshop.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
PhD course - Milan, March /09/ Some additional words about cloud computing Lionel Brunie National Institute of Applied Science (INSA) LIRIS.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
Introduction to Cloud Computing
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Cloud Computing. Cloud Computing defined Dynamically scalable, device-independent and task-centric computing resources are provided online, with all charges.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
Introduction The network is the computer By Waseem Anwar Chaudhri.
Actualog Social PIM Helps Companies to Manage and Share Product Information Using Secure, Scalable Ease of Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Chapter 8 – Cloud Computing
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
AFACT Cloud Computing WG Zon-yin Shae Institute for Information Industry Bangkok, Thailand, Nov. 26, 2014.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware A Cloud Computing Methodology Study of.
Gain High Availability Performance and Scale of Applications Running on Windows Azure with KEMP Technologies’ Virtual LoadMaster COMPANY PROFILE: KEMP.
Cloud Architecture. SPI Model Cloud Computing Classification Model – SPI Cloud Computing Classification Model – SPI - SaaS: (Software as a Service) -
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
PRESENTED BY– IRAM KHAN ISHITA TRIPATHI GAURAV AGRAWAL GAURAV SINGH HIMANSHU AWASTHI JAISWAR VIJAY KUMAR JITENDRA KUMAR VERMA JITENDRA SINGH KAMAL KUMAR.
Cloud Computing ENG. YOUSSEF ABDELHAKIM. Agenda :  The definitions of Cloud Computing.  Examples of Cloud Computing.  Which companies are using Cloud.
4a. Aula 2o. Período de Livro texto Copyright © 2012, Elsevier Inc. All rights reserved March 5, 2012 Prof. Kai Hwang, USC Cloud Roles in.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
INTRODUCTION TO CLOUD COMPUTING. CLOUD  The expression cloud is commonly used in science to describe a large agglomeration of objects that visually appear.
Agenda  What is Cloud Computing?  Milestone of Cloud Computing  Common Attributes of Cloud Computing  Cloud Service Layers  Cloud Implementation.
Lecture 6: Cloud Computing
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Presented by Edith Ngai MPhil Term 3 Presentation
Chapter 6: Securing the Cloud
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Cloud computing-The Future Technologies
Recommendation 6: Using ‘cloud computing’ to meet the societal need ‘Faster and transparent access to public sector services’ Cloud computing Faster and.
Cloud Computing Kelley Raines.
Open source Cloud Management Platforms
CNIT131 Internet Basics & Beginning HTML
Cloud Computing Dr. Sharad Saxena.
3 Cloud Computing.
Brandon Hixon Jonathan Moore
Emerging technologies-
Cloud Computing: Concepts
Session I Cloud Introduction Session I
Views of Cloud Computing
Presentation transcript:

Trust Management of Services in Cloud Environments: Obstacles and Solutions Paper by: Talal H. Noor, Quan Z. Sheng, Sherali Zeadally, and Jian Yu Presentation by: Jeremy Tate

Outline Could Definition Types of Clouds Service Level Agreements Trust management models of Clouds Analytical Framework for Trust Management Prototypes Real-world examples

Cloud Definition Users log into the service (website) to gain access Delivering network resources (typically from a data center) to a user as a service Users log into the service (website) to gain access

Types of Cloud Infrastructure as a Service Platform as a Service Software as a Service

Infrastructure as a Service (IaaS) Provides full virtual servers/storage/networking to a user Allows user to install exact operating system, software, and architecture for a specified project Amazon Elastic Compute Cloud (EC2) and Simple Storage Service (S3)

Platform as a Service (PaaS) Provides a service container for the deployment of an application Customer deploys select software/applications but does not control infrastructure Microsoft Azure, Google Apps

Software as a Service (SaaS) Service provider provides all services and the user provides content User has no control over software or infrastructure Google Docs and Facebook

Service Level Agreements (SLAs) Private Cloud Community Cloud Public Cloud Hybrid Cloud

Private Cloud Computing resources are for the sole use of a single organization/company Could include multiple business units Interactions are B2B

Community Cloud Resources are shared among members of a community All have the same goal

Public Cloud Resources are available to everyone B2C interactions EC2, S3

Hybrid Cloud Two or more of the previous models are used together One portion could be private, another public B2B and B2C

Trust Models Service provider’s perspective (SPP) Trust from the provider POV Service requester’s perspective (SRP) Trust from the consumer POV

Techniques Policy as a Trust Management technique Recommendation as a TM technique Reputation as a TM technique Prediction as a TM technique

Policy as a TM Technique Uses a set of policies to control authorization and specify minimum trust levels Trust thresholds based on trust results or credentials A cloud service consumer x, has policies Px, credentials Cx and minimum trust threshold Tx Provider has all the same attributes (as y) Relationship is considered trusted if Tr(x,y) = 1

Recommendation as a TM Technique Use prior experiences to determine trust Can use either explicit recommendation or transitive recommendation Consumer x, trust relation with cloud z, service provider y

Reputation as a TM Technique Use consumer feedback to rate service provider Amazon, eBay, Epinions Consumer x, trust threshold Tx, service provider y, set of trusted relations Tr(y) which give trust feedback T f(y)

Prediction as a TM Technique Useful when there is no prior information Similarly minded entities are more likely to trust one another Consumer x has interests ix (as vector) and minimum trust threshold Tx (service provider is y)

Trust Management Analytical Framework Trust Feedback Sharing Layer Different parties giving trust feedback to each other Trust Assessment Layer Determining the level of trust for each party, potentially using multiple metrics Trust Results Distribution Layer Different parties requesting the trust level for other parties

Trust Management Framework

Trust Feedback Sharing Layer Credibility The quality of the information or service that makes people trust the cloud The credibility of the cloud as well as that of the feedback Privacy The degree of potential information exposure that users of the cloud could face when interacting with the cloud Personalization The degree to which people adhere to the trust management rules Users selecting their preferred feedback mechanism Integration Ability to integrate other trust management principles

Trust Assessment Layer Perspective From whose perspective is trust determined? User or provider? Technique The flexibility of a technique to being adopted Adaptability Responsiveness of the system to changes from requesting parties Security Degree of robustness to operate in the face of attack and malicious behaviour Scalability Amount the system can be scaled Applicability How useful the system is for cloud trust

Trust Results Distribution Layer Response time How long it takes trust system to respond to request Redundancy How much redundancy is used to handle load Accuracy The degree of correctness of trust results Security Protection of trust results have from being tampered with

Prototypes Security Aware Cloud Architecture Hwang 2009; Hwang and Li 2010 Compliant Cloud Computing Architecture Brandic et al. 2010 Trust Cloud Ko et al. 2011 Multifaceted Trust Management System Architecture for Cloud Computing Habib et al 2011

Prototypes CLOUD-ARMOR Dynamic Policy Management Framework Noor and Sheng 2011 Dynamic Policy Management Framework Yu and Ng (2006, 2009) Sabotage Tolerance and Trust Management in Desktop Grid Computing Domingues 2007 Grid Secure Electronic Transaction (gSET) Weishaupl 2006 Role Based Trust Chains Chen et al. 2008

Prototypes Bootstrapping and Prediction of Trust Skopik et al. 2009 Negotiation Scheme for Access Rights Establishment Koshutanski and Massacci 2007 Trust Management Framework for Service Oriented Environments (TMS) Conner et al. 2009 Reputation Assessment for Trust Establishment among Web Services (RATEWeb) Malik and Bouguettaya 2009

Assessment of Prototypes

Assessment of Prototypes

Assessment of Prototypes Evaluation of trust management prototypes across all dimensions

Trust Characteristics of Real Clouds Authentication Techniques and mechanisms used for authentication in a cloud Security Security of Communication, Data, and Physical layer Privacy Responsibility … of cloud provider and consumer Virtualization At either operating system level or application level Cloud Consumer Accessibility Tools/interface by which cloud is used

Real Clouds Microsoft Google Amazon IBM targeting mostly B2B users

Real Cloud Issues Identification Privacy Personalization Integration Of both users and providers Evaluate Credibility Protect integrity of trust management data Privacy Preventing the accidental leakage of user personal data Personalization Have control over all aspects of trust feedback system Integration Ability to use multiple trust systems together Security Protection against attacks and malicious users Scalability