Security in Cloud Computing Presented by : Ahmed Alalawi.

Slides:



Advertisements
Similar presentations
Take your CMS to the cloud to lighten the load Brett Pollak Campus Web Office UC San Diego.
Advertisements

Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Presented by: Rajdeep Biswas Roll No.: 0104IT071082; Branch: IT (VII Sem.) R.K.D.F. Institute of Science & Technology Cloud Computing When Outsourcing.
Public cloud definition Public cloud is a cloud in which Cloud infrastructure is available to the general public. Public cloud define cloud computing.
BETA!BETA! Building a secure private cloud on Microsoft technologies Private cloud security concerns Security & compliance in a Microsoft private cloud.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
Cloud Computing (101).
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 4.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
SaaS, PaaS & TaaS By: Raza Usmani
Be Smart, Use PwrSmart What Is The Cloud?. Where Did The Cloud Come From? We get the term “Cloud” from the early days of the internet where we drew a.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Cloud computing Tahani aljehani.
THE DICOM 2013 INTERNATIONAL CONFERENCE & SEMINAR March 14-16Bangalore, India DICOM Medical Image Management the Challenges and Solutions – Cloud as a.
EA and IT Infrastructure - 1© Minder Chen, Stages in IT Infrastructure Evolution Mainframe/Mini Computers Personal Computer Client/Sever Computing.
Travis, Stephanie, Alex.  Cloud computing is a general term for anything that involves delivering hosted services over the Internet.  These services.
Plan Introduction What is Cloud Computing?
Effectively and Securely Using the Cloud Computing Paradigm.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
Clouds on IT horizon Faculty of Maritime Studies University of Rijeka Sanja Mohorovičić INFuture 2009, Zagreb, 5 November 2009.
Introduction to Cloud Computing
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Presentation to the Housing Technology Conference Tim Cowland- Senior Consultant 27 th February 2014 The Rise of the Housing Cloud.
Osama Shahid ( ) Vishal ( ) BSCS-5B
1 Introduction to Cloud Computing Jian Tang 01/19/2012.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
SUNY FARMINGDALE Computer Programming & Information Systems BCS451 – Cloud Computing Prof. Tolga Tohumcu.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
Chapter 8 – Cloud Computing
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Web Technologies Lecture 13 Introduction to cloud computing.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
Submitted to :- Neeraj Raheja Submitted by :- Ghelib A. Shuaib (Asst. Professor) Roll No : Class :- M.Tech(CSE) 2 nd Year.
Cloud Powered Rural Telecenters – A Model for Sustainable Telecenters Osman Ghazali, Baharudin Osman, Azizah Ahmad, Azizi Abas, Abdul Razak Rahmat, Mohamed.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Page 1 Cloud Computing JYOTI GARG CSE 3 RD YEAR UIET KUK.
Welcome To We have registered over 5,000 domain names and host over 1,500 cloud servers for individuals and organizations, Our fast and reliable.
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Understanding The Cloud
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
VIRTUALIZATION & CLOUD COMPUTING
Cloud computing-The Future Technologies
Federated IdM Across Heterogeneous Clouding Environment
Cloud Computing By P.Mahesh
Chapter 21: Cloud Computing and Related Security Issues
Introduction to Cloud Computing
Cloud Computing.
Chapter 22: Cloud Computing Technology and Security
CLOUD COMPUTING Presented By:- EduTechlearners
CNIT131 Internet Basics & Beginning HTML
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Emerging technologies-
Computers Are Your Future Twelfth Edition
Cloud Computing: Concepts
Computer Science and Engineering
Presentation transcript:

Security in Cloud Computing Presented by : Ahmed Alalawi

Outline Introduction Cloud Computing Components. Security Issues. Information Security requirements (ISR) Policy Based and Layered Infrastructure Security : Dynamic Infrastructure Security Model Conclusion

Why we use Cloud Computing ? -Single point of control delivered over the web lets you manage multiple layers of complex infrastructure. -Support is just a call away. Real-time human tech. assistance will help you resolve your problem. -Enterprise Grade Infrastructure-as-a –service system deliver unbeatable computing power. -On-demand Compute,Network and Storage components add storage capacity in minutes. -Pay-as-you-use gives you choice and control over paying.

Cloud Computing Components Cloud Computing is a class of the next generation highly scalable distributed computing Cloud Computing Components : Five Characteristics Three Delivery Models Three Deployment Models (Clouds Type)

Five Characteristics: 1.On – Demand self-service 2.Broad network access 3.Resource Pooling 4.Rapid elasticity 5.Measured Service

Three Delivery Models: 1. Infrastructure as a Service (IaaS). 2. Platform as a Service (PaaS). 3. Software as a Service (SaaS).

Types of Clouds: 1.Public  Available to public 2.Private  Available to particular group 3.Hybrid  is composition of two or more clouds

Types of Clouds: Public Cloud A public cloud is a model which allows users’ access to the cloud via interfaces mainstream web browsers. Typically based on a pay-per-use model. Public clouds are less secure than the other cloud models

Types of Clouds: Private Cloud A private cloud is set up within an organization’s internal enterprise datacenter. All the cloud resources and application are managed by the organization itself. More secure than the Public cloud.

Types of Clouds: Hybrid Cloud A hybrid cloud is a private cloud linked to one or more external cloud services, centrally managed, provisioned as a single unit. It provides virtual IT solutions through a mix of both public and private clouds. It Provides more secure control of the data and application and allows various parties to access information over the internet. It has an open architecture that allows interfaces with other management systems.

Cloud Computing Delivery Models: Infrastructure as a Service (IaaS) Infrastructure as a Service is a single tenant cloud layer where the Cloud computing vendor’s dedicated resources are only shared with contacted clients at a pay-per-use fee. Minimizes the need for huge investment in computing hardware such as servers, networking devices as processing power.

Cloud Computing Delivery Models: Software as a Service (SaaS) Software as a Service operates on the virtualized and pay-per-use costing model whereby software applications are leased out to contracted organization by specialized SaaS vendors. SaaS applications are accessed using web browsers over the internet, therefore web security is very important. SaaS providers may host the software in their own datacenters or may themselves be outsourced to IaaS providers.

Cloud Computing Delivery Models: Platform as a Service (PaaS) Platform as a service cloud layer works like IaaS but it provides an additional level of ‘rented’ functionality. PaaS offerings facilitate deployment of application without the cost and complexity of buying and managing underlying hardware and software and provisioning hosting capabilities.

Private Cloud Private Cloud Public Cloud SAAS (Software as a Service) IAAS (Infrastructure as a Service) PAAS (Platform as a Service) Hybrid Cloud Hybrid Cloud

Security Issues Privileged access : Who has specialized/privileged access to data? Who decides about the hiring and management of such administrators? Regulatory compliance : Is the could vender willing to undergo external audits and/or security certification? Data location : Does the cloud vender allow for any control over the location of data? Data segregation : Is encryption schemes designed and tested by experienced professionals ?

Continue Security Issues Recovery : What happens to data in the case of a disaster, and does the vendor offer complete restoration, and, if so, How long does that process take ? Investigative Support : Does the vendor have the ability to investigate any inappropriate or illegal activity? Long – term viability: What happens to data if the cloud vendor goes out of business, Is clients’ data returned and in what format? Data Availability: Can the cloud vendor move all their clients’ data onto a different environment should the existing environment become compromised or unavailable ?

Information Security Requirements (ISR) ISR Identification & Authentication AuthorizationConfidentialityIntegrity Non- repudiation Availability

ISR: Identification & Authentication This process is targeting at verifying and validating individual cloud users by employing usernames and passwords protecting their cloud profile.

ISR: Authorization Authorization is an important to ensure referential integrity is maintained. Authorization is maintained by the system administrator in a Private Cloud.

ISR: Confidentiality Confidentiality plays a major part in maintaining control over origination data situated across multiple distributed databases. It is must when employing a Public Cloud due to public clouds accessibility nature.

ISR: Integrity The Integrity requirements lies in applying the due diligence within the cloud domain mainly accessing data. The ACID ( Atomicity, Consistency, Isolation and Durability) should be applied across all Cloud Computing Deliver Models.

ISR: Non-repudiation Non-repudiation can be obtained by applying the traditional E-Commerce security protocols and token provisioning to data transmission with cloud applications.

ISR: Availability Availability is the most critical ISR,because it is a key decision factor when choosing between Public, Private or Hybrid Cloud as well as the delivery models.

Conclusion It is clear that although the use of cloud computing has rapidly increased, cloud computing security still a major issue in the cloud computing environment The area of Security on Cloud Computing still open area and there are many challenges in it.

Questions & Comments

Yildiz M, Abawajy J, Ercan T., Bernoth A., ALayered Security Approach for Cloud ComputingInfrastructure, ISPAN, pp , 10th InternationalSymposium on Pervasive Systems, Algorithms, andNetworks, 2009 Ramgovind, S. Eloff and M.M. Smith, E.,“The management of security in Cloud computing”, inInformation Security for South Asia (ISSA), 2010, pp Chen, Jianyong; Wang, Yang; Wang, Xiaomin;, "On-Demand Security Architecture for Cloud Computing," Computer, vol.45, no.7, pp.73-78, July 2012doi: /MC References