Sam Becker. Introduction Why is it important? Security Why is it needed? Solution Schemes Questions.

Slides:



Advertisements
Similar presentations
A presentation by Kelvin Gan & Liam McMurray Web Services, University of Bath.
Advertisements

Querying Encrypted Data using Fully Homomorphic Encryption Murali Mani, UMFlint Talk given at CIDR, Jan 7,
Rohit Kugaonkar CMSC 601 Spring 2011 May 9 th 2011
CHANGING THE WAY IT WORKS Cloud Computing 4/6/2015 Presented by S.Ganesh ( )
Lecture 4: Cloud Computing Security: a first look Xiaowei Yang (Duke University)
Paper by: Craig Gentry Presented By: Daniel Henneberger.
1 Cloud Computing with Amazon and Oracle Lewis Cunningham TUSC, Sr Datawarehouse Consultant
CSC 774 Advanced Network Security
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 1 01/25/2010 Security and Privacy in Cloud Computing.
Cloud Computing Brandon Hixon Jonathan Moore. Cloud Computing Brandon Hixon What is Cloud Computing? How does it work? Jonathan Moore What are the key.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 11 04/25/2011 Security and Privacy in Cloud Computing.
Cloud Computing PRESENTED BY- Rajat Dixit (rd2392)
Trustworthy and Personalized Computing Christopher Strasburg Department of Computer Science Iowa State University November 12, 2008.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 1 01/31/2011 Security and Privacy in Cloud Computing.
COMS E Cloud Computing and Data Center Networking
Compute/Storage/Network Users On-Premises Data Center A VM A A AA A Application VM Virtual Machine.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds By Thomas Ristenpart Eran Tromer Hovav Shacham Stefan Savage.
Authors: Thomas Ristenpart, et at.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
© 2013 Association for Computing Machinery Honeywell Introduction to the ACM Digital Library January 16, 2013 Honeywell Introduction to the ACM Digital.
Peter Johnson CMG ‘11, Washington, D.C. 7 December 2011 Session 454, Paper 1033 Migrating Applications.
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
Computer Measurement Group, India CLOUD PERFORMANCE TESTING - KEY CONSIDERATIONS Abhijeet Padwal, Persistent Systems.
Homomorphic Encryption: WHAT, WHY, and HOW
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing.
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Introduction to Cloud Computing
Chapter 3 Introduction to Computing Chapter 3 Structures in Computing William Johnson Julia Benson-Slaughter
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Written by Thomas Ristenpart Eran Tromer Hovav Shacham Stehan.
Eliminating Fine Grained Timers in Xen Bhanu Vattikonda with Sambit Das and Hovav Shacham.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
Presented For Moana Co. March 1, 2013 NaluHou. Definition of standard application vs. cloud computing Pros and Cons of Microsoft Office vs. Google Apps.
Andrew Lingo INSYS 597 April 2, 2009
Cloud Computing. Cloud Computing defined Dynamically scalable, device-independent and task-centric computing resources are provided online, with all charges.
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
Cloud Computing Nathan Bosen Kelsie Cagampang MIS 424 May 29, 2013.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 4 09/10/2013 Security and Privacy in Cloud Computing.
It’s Early Days For Cloud Computing Ted Schadler Vice President & Principal Analyst Forrester Research March 22, 2010.
© Asite Solutions Ltd Cloud Computing World Forum A Global Software as a Service Platform for Supply Chain Collaboration Tony Ryan CEOwww.asite.com.
Self-service Cloud Computing Presented by: Yu Bai (ybai181) Butt, S., Lagar-Cavilla, H. A., Srivastava, A., & Ganapathy, V. (2012, October). Self-service.
SaaS Software as a Service & Cloud Computing An Introduction B.P.Sharma, Managing Director Wizard InfoSolutions Private Limited
Cloud Computing 12/7/ Traditional Computing Hardware – Computers with CPU (hardware) – Storage (hard disk or other materials) – Software packages.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
| nectar.org.au NECTAR TRAINING Module 1 Overview of cloud computing and NeCTAR services.
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
Web Technologies Lecture 13 Introduction to cloud computing.
Searching Over Encrypted Data Charalampos Papamanthou ECE and UMIACS University of Maryland, College Park Research Supported By.
References: “Hey, You, Get Off My Cloud: Exploring Information Leakage in Third-Party Compute Clouds” by Thomas Ristenpart, Eran Tromer – UC San Diego;
Hey, You, Get Off of My Cloud Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage Presented by Daniel De Graaf.
KAASHIV INFOTECH – A SOFTWARE CUM RESEARCH COMPANY IN ELECTRONICS, ELECTRICAL, CIVIL AND MECHANICAL AREAS
Fully Homomorphic Encryption (FHE) By: Matthew Eilertson.
CLOUD COMPUTING When it's smarter to rent than to buy.. Presented by D.Datta Sai Babu 4 th Information Technology Tenali Engineering College.
Cloud Computing Service Architectures V. Arun College of Computer Science University of Massachusetts Amherst 1.
Unit 3 Virtualization.
Cloud Computing for Science
The Cloud Connection Company
Cloud computing-The Future Technologies
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Written by : Thomas Ristenpart, Eran Tromer, Hovav Shacham,
Cloud Computing.
Service Oriented Architecture for Cloud Based Travel Reservation Software as a Service Comp 684 – Rayna Burgess.
Brandon Hixon Jonathan Moore
Cloud Computing: Concepts
Administrative Software in Microsoft Azure Lets Companies Increase Productivity and Control “After conducting analysis and research for the best offer.
Presentation transcript:

Sam Becker

Introduction Why is it important? Security Why is it needed? Solution Schemes Questions

What is cloud computing? Using someone else’s hardware and software Internet/Browser based Examples: Amazon’s EC 2 and S 3 IBM’s Smart Business cloud Microsoft’s Azure Google’s AppEngine Salesforce (SaaS)

Allows anyone to have extreme computing power Lets small businesses prosper Reduced costs of large companies No Google(oh noes!!) Cloud Usage

Many clients share the same hardware MIT group showed they can monitor other users VictimBombard Victim with requests

Hire VMs at the same timeMonitor victim and steal data

Pros: Doesn’t take a lot of computing power Cons: Makes assumptions that can’t all be met

Pros: Very secure Cons: Defeats purpose of cloud Have to download encrypted data and decrypt before working on it Searching requires special metadata

Pros: Very secure, allows any calculation on encrypted data Cons: Takes too much computing power Gentry’s Algorithm Uses ideal lattices to do calculations and returns encrypted answer Public key Not efficient enough for use yet

CHRISTODORESCU, M., SAILER, R., SCHALES, D. L., SGANDURRA, D., AND ZAMBONI, D Cloud security is not (just) virtualization security: a short paper. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security, GENTRY, C Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st Annual ACM Symposium on theory of Computing, GOOGLE HISTORY Google. ( MOHAMED, A A history of cloud computing. Computer Weekly.( RISTENPART, T., TROMER, E., SHACHAM, H., AND SAVAGE, S Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security, STEAM CLOUD ROLLING IN THIS WEEK Steam. ( TALBOT, D Security in the Ether. Technology Review, 113(1), Retrieved from Academic Search Premier database. WEI, J., ZHANG, X., AMMONS, G., BALA, V., AND NING, P Managing security of virtual machine images in a cloud environment. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security,