Security Prospects through Cloud Computing by Adopting Multiple Clouds Meiko Jensen, Jorg Schwenk Jens-Matthias Bohli, Nils Gruschka Luigi Lo Iacono Presented.

Slides:



Advertisements
Similar presentations
Cloud computing is used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication.
Advertisements

Cloud Computing Brandon Hixon Jonathan Moore. Cloud Computing Brandon Hixon What is Cloud Computing? How does it work? Jonathan Moore What are the key.
By Adam Balla & Wachiu Siu
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 4.
Cloud Computing Will Crowley Monica Lopez Jaimie Morrison.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Cloud Usability Framework
Commonwealth of Massachusetts Statewide Strategic IT Consolidation (ITC) Initiative ITD Virtualization and Shared Services Executive Briefing Presentation.
SaaS, PaaS & TaaS By: Raza Usmani
INTRODUCTION TO CLOUD COMPUTING Cs 595 Lecture 5 2/11/2015.
Plan Introduction What is Cloud Computing?
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Introduction to Cloud Computing
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
PhD course - Milan, March /09/ Some additional words about cloud computing Lionel Brunie National Institute of Applied Science (INSA) LIRIS.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Migrating Business Apps to Windows Azure Marc Müller Principal Consultant, 4tecture GmbH
Interoperability in the Cloud By Alex Espinoza
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
Cloud Computing and its Application in Television and Broadcasting Industry 出處 : School of Information and Engineering, Communication University of ChinaBeijing,
Software Architecture
Cloud Computing. Cloud Computing defined Dynamically scalable, device-independent and task-centric computing resources are provided online, with all charges.
Cloud Computing Nathan Bosen Kelsie Cagampang MIS 424 May 29, 2013.
1 © 2009 Cisco Systems, Inc. All rights reserved.Cisco Confidential Cloud Computing – The Value Proposition Wayne Clark Architect, Intelligent Network.
Niagara Framework in the Clouds Scott Boehm. … what the heck does that mean??
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
Introduction The network is the computer By Waseem Anwar Chaudhri.
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
Forward: Preventing XML Signature Wrapping Attacks in Cloud Computing Prepared by: Abdulaziz AlShammari Professor Ramasamy Uthurusamy April10, 2014.
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Web Technologies Lecture 13 Introduction to cloud computing.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Cloud Computing Shannon McManus Michael Weihert. What is Cloud Computing?
Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE Group MemberRoll No. Abhijeet Aralgundkar03.
Cloud Computing from a Developer’s Perspective Shlomo Swidler CTO & Founder mydrifts.com 25 January 2009.
RANDY MODOWSKI COSC Cloud Computing. Road Map What is Cloud Computing? History of “The Cloud” Cloud Milestones How Cloud Computing is being used.
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
KAASHIV INFOTECH – A SOFTWARE CUM RESEARCH COMPANY IN ELECTRONICS, ELECTRICAL, CIVIL AND MECHANICAL AREAS
VYTAUTAS SIMANAITIS Cloud computing © Kaunas 2013, KTU.
Cloud Computing By Nathan Simon. Overview What is cloud computing? How is cloud Computing used? How does cloud computing work? How much does cloud computing.
Lecture XV: Review CS 4593 Cloud-Oriented Big Data and Software Engineering.
Comparison of VPS Hosting and Cloud Hosting Features.
Introduction To Cloud Computing By Diptee Chikmurge And Minakshi Vharkate Asst.Professor MIT AOE Alandi(D),Pune.
Agenda  What is Cloud Computing?  Milestone of Cloud Computing  Common Attributes of Cloud Computing  Cloud Service Layers  Cloud Implementation.
Clouding with Microsoft Azure
Lecture 6: Cloud Computing
Unit 3 Virtualization.
Roles and Boundaries – 1/2
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Platform as a Service (PaaS)
Conflict Resolution & Policy Compliance in Multi-Cloud Distributed System. Presented By:- Adarsh Pillay Deepak Begrajka Rudra gupta.
Cloud computing-The Future Technologies
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Introduction to Cloud Computing
Cloud Computing B. Ramamurthy 9/19/2018 B. Ramamurthy.
Brandon Hixon Jonathan Moore
"Cloud services" - what it is.
Emerging technologies-
Cloud Computing: Concepts
Fundamental Concepts and Models
Presentation transcript:

Security Prospects through Cloud Computing by Adopting Multiple Clouds Meiko Jensen, Jorg Schwenk Jens-Matthias Bohli, Nils Gruschka Luigi Lo Iacono Presented by : Sheekha Khetan

Agenda Cloud computing Security issues How the issues can be addressed Case studies

Introduction Cloud computing offers dynamically scalable resources provisioned as a service over the Internet.

Categories of Cloud Computing SoftwarePlatformInfrastructure

Infrastructure as a Service (IaaS)

Platform as a Service (PaaS)

Software as a Service (SaaS)

TypeCustomerUnit of Deployment OfferingPricing Structure IaaSSoftware Owner Virtual Machine Image · Runtime environment for virtual machines · Cloud storage · May have Cloud Services All charges per billing period. · Compute usage per hour · Data transfer in per GB · Data transfer out per GB · I/O requests per million · Storage per GB · Storage transfer in per GB · Storage transfer out per GB · Storage I/O requests per thousand For more details see Figure 3. PaaSSoftware Owner Application Package· Runtime environment for application code · Cloud Storage · Cloud Services All charges per billing period. · Compute usage per hour · Data transfer in per GB · Data transfer out per GB · I/O requests per million · Storage per GB · Storage transfer in per GB · Storage transfer out per GB · Storage I/O requests per thousand For more details see Figure 3. SaaSEnd UserNot Applicable The SaaS vendor does business directly with the End User · Finished applications Per user, per month

Security Issues Scope of Cloud Security All data given to the cloud provider leaves the own control and protection sphere Cloud provider gains full control on these processes Attacks on Cloud Security Risk of the own cloud system getting compromised by third parties Example: virtualization of the Amazon EC2 IaaS service The threat of Compromised Clouds If an attacker is able to infiltrate the cloud system itself, all data and all processes of all users operating on that cloud system may become subject to malicious actions in an avalanche manner

Cloud Security Prospects How does a cloud customer know whether his data was processed correctly within the cloud? Replication of Application System How can a cloud user be sure, that the data access is implemented and henceforth enforced effectively and that errors in the application logic doesn’t affect user’ data? Partition of Application System into Tiers How can a cloud user avoid the full revealing of processing logic and data to the cloud provider? Partition of Application Tiers into Fragments

Replication of Application System

Partition of Application Tiers into Fragments

Partition of Application Service into Tiers

Obfuscating Splitting data and/or application parts are distributed to different clouds in such a way, that every single cloud gains only a limited knowledge and only the final result or the combined data at the user’s side must be classified as confidential Multi-party Computation Two distinct scenarios can be imagined: an application that intrinsically requires multi-party computation is outsourced to the multi-party cloud, or a single cloud user make use of a multi- party cloud for better protection of the secrecy of his data.

Conclusion In this paper a concept is introduced, which aims at reducing the required level of trust and which provides innovative cloud security mechanisms in form of architectural patterns. Each of the three presented architectures provides a framework for implementing practicable security services not available so far. The underlying idea is to deploy and distribute the tasks to multiple distinct cloud systems. The main advantage coming out of the presented architectures are security services which still hold in the presence of malicious or compromised clouds.