A Security Approach In The Cloud Rick Rodin Dwight Bygrave Evgeni Sadovski Maria Azua DPS Class of 2012 – Team 2 1.

Slides:



Advertisements
Similar presentations
FUTURE TECHNOLOGIES Lecture 13.  In this lecture we will discuss some of the important technologies of the future  Autonomic Computing  Cloud Computing.
Advertisements

QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
Principles of Information Security, 2nd edition1 Cryptography.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
5205 – IT Service Delivery and Support
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
CS4600/5600 Biometrics and Cryptography UTC/CSE
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Chapter 9 Elements of Systems Design
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
Gagan Deep Singh GTBIT (IT) August 29,2009.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
UI and Data Entry UI and Data Entry Front-End Business Logic Mid-Tier Data Store Back-End.
Secure Search Engine Ivan Zhou Xinyi Dong. Introduction  The Secure Search Engine project is a search engine that utilizes special modules to test the.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
Introduction The network is the computer By Waseem Anwar Chaudhri.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
1 Content IP-SECOQC – Consortium, Funding What is Quantum Cryptography? Project Goals / Project Structure Standard Related Issues: –In Quantum Key Distribution.
Nawaf M Albadia
Security Vulnerabilities in A Virtual Environment
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
MidVision Enables Clients to Rent IBM WebSphere for Development, Test, and Peak Production Workloads in the Cloud on Microsoft Azure MICROSOFT AZURE ISV.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
CSE 5810 Biomedical Informatics and Cloud Computing Zhitong Fei Computer Science & Engineering Department The University of Connecticut CSE5810: Introduction.
9 Systems Analysis and Design in a Changing World, Fifth Edition.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Organizations Are Embracing New Opportunities
COMPSCI 290.2: Computer Security
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Quantum Cryptography Quantum Computing
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
The Internet of Unsecure Things
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Cryptography Quantum Computing
Presentation transcript:

A Security Approach In The Cloud Rick Rodin Dwight Bygrave Evgeni Sadovski Maria Azua DPS Class of 2012 – Team 2 1

Decreasing cost of Information Two Key Trends Time to 60M Users Radio Internet Farmville 40 years 3 years 20 years TV 4 months! Acceleration of technology adoption * Figueres from The Social Factor by Maria Azua 2

Virtualization,Images Service CatalogProvisioning, Management/Billing System Virtual NetworkElasticity. Diagram from IBM cloud presentation What is Cloud Computing and how we got here? Clusters Grids Clouds (Physical wiring of multiple computers) High Performance clusters High Availability clusters (Peer-to-Peer architctue, No Abstraction layer) Compute Grid Data Grid Service Grid Application Grid (Virtualized, Abstraction Layer, Image standardization, Services Driven, Utility model) Public Clouds Private Cloudds Hybrid Clouds Diagram from Pankaj Deep Kaur, I.C.: ‘Unfolding the Distributed Computing Paradigms 3

Scale Unit cost Traditional Infrastructure Internal Cloud Service Provider Cloud (cost) Large enterprises can significantly reduce costs for some workloads compared with traditional IT. Diagram from IBM cloud presentation Cloud Computing enables economies of scale 4

Banks use automated teller machines to improve service and lower cost. Manufacturers use robotics to improve quality and lower cost. Telcos automate traffic through switches to assure service and lower cost. Standardization and Automation have changed many other industries become more efficient. … breakthroughs like these are enabled by service management systems. Diagram from IBM cloud presentation 5

Cloud Computing technology enables low cost IT which made possible the creation of new Social Networking “clouds” Social Networks Facebook, YouTube Informational / Services Yahoo, MSN, Google YahooMSNGoogleYouTubeFacebook % of Time Spent, Worldwide * Figuere from The Social Factor by Maria Azua 6

The World is connected…. And more vulnerable to internet security attacks than ever before… Byproduct of low cost communication and Cloud Computing * Figuere from The Social Factor by Maria Azua 7

8 Image Mangement Life Cycle Unsecure Process Secure Image management system Strict registration process. Filter for publisher’s personal information like browser log files & cookies. Verifies Signature Monitors for Trojan horse and other malware patterns Role base and ACL access control Benefits / Value * Diagram from Jinpeng Wei, Xiaolan Zhang, Vasanth Bala, and Ning, P.: ‘Managing Security of Virtual Machine Images in a Cloud Environment’

9 Quantum Computing  Traditional Computing –Computes in a linear fashion –Computation done by microprocessors one computation at a time –Push to have many tasks process at once (Parallel Computing)  Parallel Computing –Many calculations are carried out simultaneously –Major tasks are divided into smaller ones and processed at once –This would allow for enormous leaps in the world of computing  Essence of Quantum Computing –A computer must be able to store information as strings of 1’s and 0’s (Bits). –A computer must be able to manipulate the stored bits per given instructions. NOT OR and AND Gates. –The operating environment must be completely protected from radiation, magnetic and electric fields as well as noise and motion.

Quantum Key Distribution (QKD) Classical Cryptography (becoming vulnerable) – Secret or symmetric key cryptography – Public key cryptography or asymmetric cryptography Important Quantum Properties – Principle of Superposition – Heisenberg Uncertainty Principle – Quantum Entanglement 10

Quantum Key Distribution (QKD) 11  1984Charles Bennett and Gilles Brassard Protocol (BB84) – Photon polarization state to encode 0’s and 1‘s at 0 o or 90 o in the rectilinear base or 45 o and 135 o in a diagonal base.  1992 Charles Bennett (B92)  Only two of the four states mentioned are necessary for B92

12  The most basic QKD system involves: – A sender(Alice) and receiver (Bob), –A quantum channel and a – Conventional communication channel. –Then you might encounter (Eve) the eavesdropper. Quantum Key Distribution (QKD) System

ITIL Service Transition Source: ITIL Service Transition

We need a Release Management process that leverages QKD  Integrity of the modules (Cloud Images)  Track, Install, Verify and Validate deployed modules  Manage deviations  Risk: Breach in physical/information security  Security depends on VPN  Secure key exchange required Conclusion