Self-service Cloud Computing Presented by: Yu Bai (ybai181) Butt, S., Lagar-Cavilla, H. A., Srivastava, A., & Ganapathy, V. (2012, October). Self-service.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Prepared for [xxxx] – Commercial in Confidence connect transform protect A Cloudy Cyberspace? Tony Roadknight – Technical Architect.
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
Cloud Computing Brandon Hixon Jonathan Moore. Cloud Computing Brandon Hixon What is Cloud Computing? How does it work? Jonathan Moore What are the key.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
 Max Planck Institute for Software Systems Towards trusted cloud computing Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues MPI-SWS.
Security in the Cloud: Can You Trust What You Can’t Touch? Rob Johnson Security Architect, Cloud Engineering Unisys Corp.
Security Issues and Challenges in Cloud Computing
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
© 2010 VMware Inc. All rights reserved Confidential VMware Vision Jarod Martin Senior Solutions Engineer.
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 4.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Cloud Usability Framework
Be Smart, Use PwrSmart What Is The Cloud?. Where Did The Cloud Come From? We get the term “Cloud” from the early days of the internet where we drew a.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Plan Introduction What is Cloud Computing?
A Seminar on Securities In Cloud Computing Presented by Sanjib Kumar Raul Mtech(ICT) Roll-10IT61B09 IIT Kharagpur Under the supervision of Prof. Indranil.
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
Self-service Cloud Computing Shakeel Butt Department of Computer Science Rutgers University.
The Cloud Or cloud computing… or the end of executive headaches… CS1501.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing.
Cloud Computing Cloud Security– an overview Keke Chen.
Clouds on IT horizon Faculty of Maritime Studies University of Rijeka Sanja Mohorovičić INFuture 2009, Zagreb, 5 November 2009.
Introduction to Cloud Computing
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Osama Shahid ( ) Vishal ( ) BSCS-5B
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
+ CS 325: CS Hardware and Software Organization and Architecture Cloud Architectures.
UI and Data Entry UI and Data Entry Front-End Business Logic Mid-Tier Data Store Back-End.
Cloud computing.
Yaoshen Yuan Tufts University Virtual Machine Usage in Cloud Computing in Google EE-126.
In the name of God :).
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Microsoft Virtual Academy.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
Niagara Framework in the Clouds Scott Boehm. … what the heck does that mean??
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Cloud Computing Presented by Alicia Wallis and Kerri Warf.
Bart Miller – October 22 nd,  TCB & Threat Model  Xen Platform  Xoar Architecture Overview  Xoar Components  Design Goals  Results  Security.
Self-service Cloud Computing by Jack Luo Shakeel Butt (Rugtgers University) H.Andres Lagar-Cavilla (GridCentric Inc.) Abhinav Srivastava (AT&T Labs-Research)
Improving Xen Security through Disaggregation Derek MurrayGrzegorz MilosSteven Hand.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Speaker: Meng-Ting Tsai Date:2010/11/25 The Information Assurance Practices of Cloud Computing Vendors IEEE Communications Society.
Security Vulnerabilities in A Virtual Environment
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Windows Azure poDRw_Xi3Aw.
Cloud Architecture. SPI Model Cloud Computing Classification Model – SPI Cloud Computing Classification Model – SPI - SaaS: (Software as a Service) -
Microsoft Virtual Academy Module 12 Managing Services with VMM and App Controller.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
CS 6027 Advanced Networking FINAL PROJECT ​. Cloud Computing KRANTHI ​ CHENNUPATI PRANEETHA VARIGONDA ​ SANGEETHA LAXMAN ​ VARUN ​ DENDUKURI.
Clouding with Microsoft Azure
Lecture 6: Cloud Computing
Network customization
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Chapter 6: Securing the Cloud
Platform as a Service (PaaS)
Prepared by: Assistant prof. Aslamzai
Xixu Fu,Kai jun Wu,XiZhang Gong
Network Services, Cloud Computing, and Virtualization
CLOUD COMPUTING Presented By:- EduTechlearners
Brandon Hixon Jonathan Moore
Network customization
Presentation transcript:

Self-service Cloud Computing Presented by: Yu Bai (ybai181) Butt, S., Lagar-Cavilla, H. A., Srivastava, A., & Ganapathy, V. (2012, October). Self-service cloud computing. In Proceedings of the 2012 ACM conference on Computer and communications security (pp ). ACM.

What is a Self-service Cloud(SSC)? SSC is a new cloud computing model that improves client security and privacy, and gives clients the flexibility to deploy privileged services on their own VMs (Butt, 2012). A security framework of cloud that considers providers(amozon, google, ebay) and administrators(people who work at provider’s Lab or have access to it) as different roles(my point of view).

Framework of traditional cloud Virtual machine Microkernel(Fiasco.OC) HardwareHypervisorDom0VMs - Dom0, Hypervisor, and Hardware (three grey components) consist of trusted computing base(TCB). - Hypervisor directly control hardware and runs at the highest privilege level - Dom0 as a special VM used by administrators has the privileges to schedule, configure, control, monitor on other VMs.

Framework of SSC Virtual machine Microkernel(Fiasco.OC) Reducing the privilege of administrators - SDom0 can no longer spy on user domain. - SDom0 is out of TCB. SDom0(System Domain 0) SDomB(System Domain Builder) UDom0(User Domain 0) SD(Service Domain) MTSD(Mutually- trusted service Domain)

Background of Self-service Cloud(SSC) Cloud Layers -Software as a Service (SaaS) -Platform as a Service (PaaS) -Infrastructure as a Service (IaaS) Which kind of threats? -User-to-user threat -User-to-infrastructure threat -Provider-to-user threat

Reason behind SSC framework Provider-to-user threat -Clients want to protect their privacy and sensitive data, and -Providers value their reputation, but -Administrators could be malicious, driven by personal interest.

Appreciation Fine grained of analysis on roles - Recognize administrators are different from providers. - A feasible and delicate model to limit the power of administrators.

Limitation Lose the main advertised feature of cloud - administration free. -Clients need put more effort into non-functional part. -Suggested app store seems not plausible(need to trust third party software and seems no enough market requirement).

Limitation Practical security (Lampson, 2004) or shifting responsibility? -Looks like balancing the cost of protection and the risk of loss. But -Still need to trust providers, and there will still be somebody who has access to supervisor, hardware, i.e. TCB. -If providers cannot trust their administrators, should clients trust their own administrators? -Whatever clients have to trust some individuals. -Wouldn’t a Bell-La Padula confidentiality model be better ? Lampson, B. W. (2004). Computer security in the real world. Computer, 37(6),

Question If security is really important, what would clients prefer SSC or their own servers? Can we come up a way someday to finally get rid off the problem caused by people in a security system?

Thank you! Yu Bai (ybai181)