This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns.

Slides:



Advertisements
Similar presentations
1 | © 2012 V-Key.com – Proprietary and Confidential Bugatti Veyron Super SportBugatti Veyron Super Sport: 267 mph (429 km/h), 0-60 in 2.4 secs.
Advertisements

Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
 Max Planck Institute for Software Systems Towards trusted cloud computing Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues MPI-SWS.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 5 03/08/2010 Security and Privacy in Cloud Computing.
Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control Richard Chow, Philippe Golle, Markus Jakobsson, Ryusuke Masuoka, Jesus.
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
Virtual Machine Security Summer 2013 Presented by: Rostislav Pogrebinsky.
Private Cloud or Dedicated Hosts Mason Mabardy & Matt Maples.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
©2012 Check Point Software Technologies Ltd. Cloud Security Tamir Zegman Architect.
Tunis, Tunisia, 28 April 2014 Security Issues for Cloud and Future Networks Noureddine Boudriga, Director CN&S, University of Carthage
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Presentation to the Housing Technology Conference Tim Cowland- Senior Consultant 27 th February 2014 The Rise of the Housing Cloud.
Jordan Wissel Eric Lewis Sarah Basile. Introduction This presentation will analyze: Overview/History Implementation Advantages/Disadvantages Security.
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Storage Security and Management: Security Framework
SECURITY IN CLOUD COMPUTING By Bina Bhaskar Anand Mukundan.
Cloud Operating System Unit 13 Cloud System Management II M. C. Chiang Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung,
Cloud Computing & Security Issues Prepared by: Hamoud Al-Shammari CS 6910 Summer, 2011 University of Colorado at Colorado Springs Engineering & Applied.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
Computer Science and Engineering 1 Cloud ComputingSecurity.
SODA Archiving October 2013
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
A semi autonomic infrastructure to manage non functional properties of a service Pierre de Leusse Panos Periorellis Paul Watson Theo Dimitrakos UK e-Science.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.
Kia Manoochehri.  Background  Threat Classification ◦ Traditional Threats ◦ Availability of cloud services ◦ Third-Party Control  The “Notorious Nine”
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
CLOUD COMPUTING-3.
LOGO Cloud Storage Oriented Cipher-text Search Protocol.
Dos and Don’ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster Presented: Jesus F. Morales.
QR Phishing Detection Aslihan Duman STM Savunma Teknolojileri Mühendislik ve Ticaret A.S. Role: S/T provider DS : Assurance and.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Trusted Virtual Machine Images the HEPiX Point of View Tony Cass October 21 st 2011.
Threat Modeling for Cloud Computing
Chapter 6: Securing the Cloud
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
CLM USE GUIDE FOR MICROSOFT TRUSTED CLOUD
Cloud Testing Shilpi Chugh.
Download Latest CompTIA CAS-002 Exam Dumps PDF Questions - CAS-002 Best Study Material - Realexamdumps.com
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Message Digest Cryptographic checksum One-way function Relevance
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
An Introduction to Cloud Computing
Computer Science and Engineering
Security in SDR & cognitive radio
Presentation transcript:

This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns.  New problem areas in security arising from the trend towards cloud computing.  Traditional security  Availability  Third-party data control

Traditional security These concerns involve computer and network intrusions or attacks that will be made possible or at least easier by moving to the cloud.  VM-level attacks. Potential vulnerabilities in the hypervisor or VM technology used by cloud vendors are a potential problem.  Cloud provider vulnerabilities. Such as cross-site scripting vulnerability.

Traditional security  Phishing cloud provider. Phishers and other social engineers have a new attack vector.  Expanded network attack surface. The cloud user must protect the infrastructure used to connect and interact with the cloud.  Authentication and Authorization. The enterprise authentication and authorization framework does not naturally extend into the cloud.

Availability  Uptime.  Single point of failure. Cloud services are thought of as providing more availability, but there are more single points of failure and attack.  Assurance of computational integrity. Can an enterprise be assured that a cloud provider is faithfully running a hosted application and giving valid results?

Third Party data control  Auditability. Audit difficulty is another side effect of the lack of control in the cloud.  Data Lock-in.  Transitive nature. Another possible concern is that the contracted cloud provider might itself use subcontractors, over whom the cloud user has even less control, and who also must be trusted.

NEW PROBLEMS New problem areas in security that arise from cloud computing. Cheap data and data analysis. The rise of cloud computing has created enormous data sets that can be monetized by applications such as advertising. Increased authentication demands. The development of cloud computing may, in the extreme, allow the use of thin clients on the client side. Mash-up authorization.

Solution Proposed Information-centric Security Tactical Vs Information-centric Security

Solution Proposed Information-centric security Data needs to be encrypted and packaged with a usage policy. When accessed, data should consult its policy and attempt to re-create a secure environment using virtualization and reveal itself only if the environment is verified as trustworthy (using Trusted Computing). High-Assurance Remote Server Attestation The lack of transparency is discouraging businesses from moving their data to the cloud. Data owners wish to audit how their data is being handled at the cloud, and in particular, ensure that their data is not being abused or leaked.

Privacy-Enhanced Business Intelligence In case of encryption, cloud data searching and indexing the data becomes problematic. Cryptographers have recently invented versatile encryption schemes that allow operation and computation on the ciphertext.

THANKS