SECURITY IN CLOUD COMPUTING By Bina Bhaskar Anand Mukundan.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING.
Advertisements

Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Security Issues and Challenges in Cloud Computing
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
York Extra User survey. York Extra Origins –University Communications Audit –Plans to generalise Computing Service Message of the day for multiple providers.
Social Engineering Jero-Jewo. Case study Social engineering is the act of manipulating people into performing actions or divulging confidential information.
©2009 Justin C. Klein Keane PHP Code Auditing Session 6 Auditing Strategies & Demonstration Justin C. Klein Keane
CS 290C: Formal Models for Web Software Lecture 1: Introduction Instructor: Tevfik Bultan.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
SaaS, PaaS & TaaS By: Raza Usmani
BUILDING A SECURE STANDARD LIBRARY Information Assurance Project I MN Tajuddin hj. Tappe Supervisor Mdm. Rasimah Che Mohd Yusoff ASP.NET TECHNOLOGY.
5205 – IT Service Delivery and Support
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Presentation By Deepak Katta
©2012 Check Point Software Technologies Ltd. Cloud Security Tamir Zegman Architect.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
 Cloud computing is one of the more recent technologies that many businesses, individuals and other industry organizations believe to by one of the keys.
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
SECURITY IN CLOUD COMPUTING By Bina Bhaskar Anand Mukundan.
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
Cloud Computing & Security Issues Prepared by: Hamoud Al-Shammari CS 6910 Summer, 2011 University of Colorado at Colorado Springs Engineering & Applied.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
In the name of God :).
MIME Object Security Services (MOSS). Privacy Enhanced Mail (PEM) was the first Internet standard to address security in messages. The MOSS protocol.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
Overview Abstract Vulnerability: An Overview Cloud Computing Cloud-Specific Vulnerabilities Architectural Components and Vulnerabilities Conclusion.
High Performance Computing on Virtualized Environments Ganesh Thiagarajan Fall 2014 Instructor: Yuzhe(Richard) Tang Syracuse University.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Information Security What is Information Security?
S. A. Shonola & M. S. Joy Security Framework for Mobile Learning Environments.
Speaker: Meng-Ting Tsai Date:2010/11/25 The Information Assurance Practices of Cloud Computing Vendors IEEE Communications Society.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Minimizing the Impact of Denial of Service Attacks on a Virtualized Cloud Adel Abusitta, PhD Student (First year) Supervisors: Pr. Martine Bellaiche and.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
MIS323 – Business Telecommunications Chapter 10 Security.
Database Laboratory Regular Seminar TaeHoon Kim Article.
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
Advanced Higher Computing Science
Securing Information Systems
Securing Information Systems
Unit 3 Virtualization.
Chapter 6: Securing the Cloud
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Web Application Protection Against Hackers and Vulnerabilities
Critical Security Controls
Cloud Security– an overview Keke Chen
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Securing Information Systems
Computer-Based Processing: Developing an Audit Assessment Approach
Lecture 2 - SQL Injection
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
ONLINE SECURE DATA SERVICE
Revision PowerPoint By Nicole Davidson.
Presentation transcript:

SECURITY IN CLOUD COMPUTING By Bina Bhaskar Anand Mukundan

Introduction Cloud computing is not a new technology but rather a new delivery model for information and services using existing technologies. Along with variant advantages, cloud storage also poses new security challenges. Potential users are reluctant to move important and sensitive data to cloud unless security challenges have been well addressed.

About Security in cloud Image courtesy: Wikipedia

About Security in cloud (cont..) With so many points of failure that can be identified in a cloud, there are various levels at which security needs to be established. o VM security o Data security o Software security

Why is this essential? Potential cloud customers emphasize checks on vendor security measures in order to help them make final cloud computing purchases. According to a survey [published in the Fall of 2009 by Mimecast and reported by Hosting News online] 46 percent of all business respondents cited security as a concern in adopting cloud computing as an IT strategy.

Misconception Clouds can never be secure This is not true because cloud is like any other network we use currently. Image courtesy :

Vulnerabilities exposed in cloud (1) National Database of Vulnerabilities lists over a hundred potential hypervisor flaws for one particular virtualization technology. Image courtesy:

Vulnerabilities exposed in cloud (2) Hypervisor Holes o Ability to insert code into virtual machines, o The disclosure of unauthorized information o Potential disruption of service. Concern regarding cloud vendors that do not adequately divulge their security and reliability audits to current or potential clients.

Vulnerabilities exposed in cloud (3) Malware Injection Attack o Adversary creates own instance of virtual machine or service module o Cloud system is manipulated by the adversary in such a way that it points to the adversary's implementation of the service or instance

Vulnerabilities exposed in cloud (4) Denial of Service o Cloud provides additional computing power to cope with additional workload. o The cloud will try to work against a DOS attacker by providing more computing power. o An adversary can manage to utilize another (or the very same) Cloud Computing system for hosting his/her attack.

Vulnerabilities exposed in cloud (5) Browser Issues o Same Origin Policy o Federated Identity Management (FIM) protocols XML Signature o Manipulation of SOAP messages o Hacking a legitimate user's account Twitter/Google Apps hack raises questions about cloud security and the feasibility of storing critical information in Web-based services were being raised in the wake of a hacking incident involving Twitter and Google Apps.

Vulnerabilities exposed in cloud (6) Metadata Spoofing attack o adversary manipulates / re-engineers the metadata content of a web service so that the web service's intended operation is replaced by another operation Very recently in the last year or so some research studies have been carried out to expose the problems related to cloud storage systems but a concrete solution adaptable has not been reported yet.

Our path ahead….. We propose to continue our search for more relevant and up to date vulnerabilities in cloud and report them. Extensive literature survey. Collaborating with individuals already in the research.

Our path ahead In this process we propose to develop and assess use-cases that can be suitable to encounter these threats. Assessing already existing/tentative models to deal with the vulnerabilities (advantage and disadvantage). Our opinion and ideas. With inputs and suggestions from experts.

Thank you!