Introduction Cloud characteristics Security and Privacy aspects Principal parties in the cloud Trust in the cloud 1. Trust-based privacy protection 2.Subjective.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

World Class Standards Smart Grids Roadmap for work in ETSI: introduction Emmanuel Darmois © ETSI All rights reserved Scoping Meeting, June 14 th.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
1 CLOUD AND SaaS-BASED PLATFORMS: ENSURING DATA PRIVACY May, 2011.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Cloud Usability Framework
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Key Management in Cryptography
Discussion on LI for Mobile Clouds
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Sinaia, Romania August, TH Workshop “Software Engineering Education and Reverse Engineering” Dhuratë Hyseni, Betim Çiço South East European University.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Information Security Technological Security Implementation and Privacy Protection.
Intrusion Detection MIS ALTER 0A234 Lecture 11.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
By Chris Versaci CLOUD SECURITY. WHAT IS CLOUD COMPUTING? Cloud computing is a concept that involves a large number of computers connected through a real-time.
SODA Archiving October 2013
In the name of God :).
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
Overview Privacy Management Reference Model and Methodology (PMRM) John Sabo Co-Chair, PMRM TC.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
New Cryptographic Techniques for Active Networks Sandra Murphy Trusted Information Systems March 16, 1999.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Self-service Cloud Computing Presented by: Yu Bai (ybai181) Butt, S., Lagar-Cavilla, H. A., Srivastava, A., & Ganapathy, V. (2012, October). Self-service.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Participatory Privacy: Enabling Privacy in Participatory Sensing
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Chapter 1: Explore the Network
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments presented by Toby.
Computer Science and Engineering 1 Mobile Computing and Security.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
PRESENTED BY– IRAM KHAN ISHITA TRIPATHI GAURAV AGRAWAL GAURAV SINGH HIMANSHU AWASTHI JAISWAR VIJAY KUMAR JITENDRA KUMAR VERMA JITENDRA SINGH KAMAL KUMAR.
INTRODUCTION TO GRID & CLOUD COMPUTING U. Jhashuva 1 Asst. Professor Dept. of CSE.
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
Cloud Computing Guide to Legal Caroline Nguyen
Pouya Ostovari and Jie Wu Computer & Information Sciences
BY S.S.SUDHEER VARMA (13NT1D5816)
Principles Identified - UK DfT -
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
Privacy and Confidentiality in Research
Navigating Security in the World of Emerging Technologies
Cloud Computing By P.Mahesh
Chapter 21: Cloud Computing and Related Security Issues
Chapter 22: Cloud Computing Technology and Security
Cloud Testing Shilpi Chugh.
The protection of the computing device has become the primary focus of the users. With the advancement in technology computer and its threats are also.
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
ONLINE SECURE DATA SERVICE
Basics of Cloud Computing
Done by:Thikra abdullah
Presentation transcript:

Introduction Cloud characteristics Security and Privacy aspects Principal parties in the cloud Trust in the cloud 1. Trust-based privacy protection 2.Subjective logic Privacy enhanced cloud services Summary AGENDA

Scope of the privacy is potentially the lifetime of the privacy subject Investigated trust issues and privacy aspects for cloud service users, using subjective logic as a primary tool. Subjective logic can be a useful tool for developing trust models for cloud computing. INTRODUCTION

Location Independent and Mobility as a basic premise Lifetime of security and privacy protection 1.Communications Security 2.Device Security 3.Data Storage Security 4.Archival Storage 5.Personal Storage CLOUD CHARACTERISTICS

Security aspects 1.Service aspects 2.Service execution security Right to privacy Privacy aspects Long-Term view of privacy Privacy points and counterpoints SECURITY AND PRIVACY ASPECTS

Individual users Aggregate users Cloud service providers 1.Private vs Public cloud service provider 2.Virtual cloud service provider 3.Physical cloud service provider Cloud intruders PRINCIPAL PARTIES IN TE CLOUD

Economically feasible to provide trust in a cloud service provider with encryption techniques alone To enhance privacy, investigates trust and trust relationships between the principal parties using 1.Trust-based privacy protection 2.Subjective logic TRUST IN THE CLOUD

Level of trust will vary during the lifetime and depends on various factors. Opinion in below two points by a specific client and other clients are considered as trustworthy. 1.Reputation on keeping private data protected 2.Reputation of behaving according to agreement A long term privacy can be protected by monitoring trustworthiness of service providers. TRUST-BASED PRIVACY PROTECTION

Anonymization is an approach that can be used to achieve the needed level of privacy protection. To provide privacy protection, user should be able to measure and continually monitor trustworthiness of Anonymizers. Another approach would be to split data into separate parts. ANONYMIZATION

SUBJECTIVE LOGIC

Scope of the privacy is potentially the lifetime of the privacy subject User either select trustworthy service provider Or try to reduce privacy sensitivity of data ie. r π(r) denote privacy sensitivity of r,defined by user Privacy sensitivity of r can be reduced by Encryption Anonymization Splitting data PRIVACY ENHANCED CLOUD SERVICES

Cryptographic techniques cannot always provide protection(especially in long term) This research proposed a trust-based privacy protection The approach based on subjective logic. The users have to handle their data to minimize privacy threats in the cloud SUMMARY

QUESTIONS

Thank You