The Pros and Cons of Cloud Computing 2 Papers: The Case for Cloud Computing by Robert L. Grossman (2009) – Professor of Mathematics, Statistics and Computer.

Slides:



Advertisements
Similar presentations
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
Advertisements

EHR Privacy & Security. Missouri’s Federally-designated Regional Extension Center  University of Missouri:  Department of Health Management and Informatics.
Map/Reduce in Practice Hadoop, Hbase, MongoDB, Accumulo, and related Map/Reduce- enabled data stores.
Microsoft ® Forefront ® Unified Access Gateway Infrastructure Planning and Design Published: December 2009 Updated: July 2010.
Virtual Machine Usage in Cloud Computing for Amazon EE126: Computer Engineering Connor Cunningham Tufts University 12/1/14 “Virtual Machine Usage in Cloud.
Amazon. Cloud computing also known as on-demand computing or utility computing. Similar to other utility providers like electric, water, and natural gas,
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
GS1 Industry & Standards Event September 2011 Cologne, Germany Creating value together with global standards Cloud Computing Time of Session: 09:00.
International Conference on Cloud and Green Computing (CGC2011, SCA2011, DASC2011, PICom2011, EmbeddedCom2011) University.
1 6 - Outsourcing Outsourcing. © Robert G Parker – UW-CISA 2010 Dealing with issues when a portion or all of the provision of technology services is performed.
 Max Planck Institute for Software Systems Towards trusted cloud computing Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues MPI-SWS.
Cloud File Structures A RM Y OURSELF W ITH I NFORMATION Presented by: Russell Greenwald.
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
Boost your network security with NETASQ Vulnerability Manager.
Future Work Needed Kenneth Wade Najim Yaqubie. Outline 1.Model is simple 2.Too many assumptions 3.Conflicting internal architectures 4.Security Challenges.
Getting Started: Research and Literature Reviews An Introduction.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
E-commerce security by Asif Dalwai Introduction E-commerce applications Threats in e-commerce applications Measures to handle threats Incorporate.
Copyright © 2007 Pearson Education Canada5-1 Marketing: An Introduction Second Canadian Edition Armstrong, Kotler, Cunningham, Mitchell and Buchwitz Chapter.
1 Pertemuan 9 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
Plan Introduction What is Cloud Computing?
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Copyright © 2005 Pearson Education Inc. Managing Marketing Information Chapter 6 PowerPoint slides Express version Instructor name Course name School name.
 Cloud computing is one of the more recent technologies that many businesses, individuals and other industry organizations believe to by one of the keys.
Clouds on IT horizon Faculty of Maritime Studies University of Rijeka Sanja Mohorovičić INFuture 2009, Zagreb, 5 November 2009.
Ch 4. The Evolution of Analytic Scalability
By: Jeffrey Dean & Sanjay Ghemawat Presented by: Warunika Ranaweera Supervised by: Dr. Nalin Ranasinghe.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
MapReduce vs. Parallel DBMS Hamid Safizadeh, Otelia Buffington
Computer Science and Engineering 1 Cloud ComputingSecurity.
Working in the IT Industry.  On completion of this unit a learner should: 1. Know the characteristics that are valued by employers in the IT industry.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
1 Topic# 7 – Auditing with Technology Readings, Chapter 10 A – COMPUTERIZED AUDIT TOOLS –Electronic Spreadsheets –Automated Working Papers –Generalized.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Speaker: Meng-Ting Tsai Date:2010/11/25 The Information Assurance Practices of Cloud Computing Vendors IEEE Communications Society.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
University of Sunderland MSc HIM Computer Legislation.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Getting Started: Research and Literature Reviews An Introduction.
The NIST Special Publications for Security Management By: Waylon Coulter.
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Brittany Appleyard COSC Introduction to Cloud Computing Uses of the Cloud Apple’s new iCloud and What Is It Pros and Cons of Cloud Computing.
Agenda  What is Cloud Computing?  Milestone of Cloud Computing  Common Attributes of Cloud Computing  Cloud Service Layers  Cloud Implementation.
Unit 36: Internet Server Management
Institute of modern technology Montenegro - IMTM
MISY3321- Intro. to Information Assurance
The Legal System and Ethics in Information Security
Hot Topics:Mobility in the Cloud
Dr.S.Sridhar, Director, RVCT, RVCE, Bangalore
Cloud Computing Kelley Raines.
Andy Taylor Partner Program, RPost
Cyber Issues Facing Medical Practice Managers
Ch 4. The Evolution of Analytic Scalability
CHIPS for schools NSW Education Complaint Handling Improvement Program
Can official publishers win the trust of citizens
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Computer Science and Engineering
Revision PowerPoint By Nicole Davidson.
Gus Hunt Chief Technology Officer CIA
NTC/302 NETWORK WEB SERVICES The Latest Version // uopcourse.com
NTC/302 NTC/ 302 ntc/302 ntc/ 302 NETWORK WEB SERVICES The Latest Version // uopstudy.com
NTC/302 NETWORK WEB SERVICES The Latest Version NTC 302 Entire Course Link
Presentation transcript:

The Pros and Cons of Cloud Computing 2 Papers: The Case for Cloud Computing by Robert L. Grossman (2009) – Professor of Mathematics, Statistics and Computer Science at the University of Illinois at Chicago and managing partner at Open Data Group. Published by the IEEE Computer Society / IT Professional magazine. Cloud Computing – Overview of Information Assurance Concerns and Opportunities Produced and published by the US National Security Agency's Systems and Network Analysis Center (Version December 2009)

The Case for Cloud Computing Explains the basics of Cloud Computing Direction of the paper is largely in support of what cloud computing offers us: –Computing scaled from the use of a single PC to the computing power of a data centre - having made it a lot simpler to access and utilise the entire resources of the data centre. –“Elastic, usage-based pricing models”[1] - “this is [truly] revolutionary”[1].

Cloud Computing – Overview of Information Assurance Concerns and Opportunities Detailed introduction into cloud computing, explaining the “Cloud Service Delivery Models” [2] and detailing a number of examples. The main thrust of the paper is to give an outline of information assurance issues affecting cloud computing. Principally concentrates on Security Weakness

Cloud Service Delivery Models

Conclusion of Literature Review The arguments made for cloud computing, though dealt with sparsely in part 1 of the Literature Review are nonetheless quite sturdy. Need to be aware present weaknesses or threats that cloud computing technology faces so I will detail some of the pitfalls as detailed in the 2nd research paper, but also making reference to other sources: All these issues relate to Information / Data Assurance and the present levels of trust in the cloud computing technology.

Cloud Security Issues 1 Integrity and confidentiality of data, in the case of many organisations is vital. Internal Attack from within Cloud Provider Cloud Providers may use other providers to offer certain services. This could be termed as further stretching the “Trust Boundary” [2].

Cloud Security Issues 2 There are questions that have to be taken into account as regards both data purging and data recovery. Obviously a factor that has to be taken into account is whether data / operations are retrievable from a provider and transferable to another..

Cloud Computing Cloud computing, is already in operation as Google Docs, Facebook etc and in many industrial guises. It offers simple scalability and computational solutions, which are revolutionary in their out-workings. It has weaknesses that must be addressed and attempts are being made in this direction. There are downsides – there will always be data that people prefer to keep under their control and won’t trust to a cloud. Information and understanding of these weaknesses offers people real decisions – there are always trade-offs Need to weigh the pros vs. the cons of cloud computing and make determination which suits their situation – for company / organisation etc.

Possible Security Solution

(1)References: [1] Robert L. Grossman, “The Case for Cloud Computing”, IEEE Computer Society, [2] “Cloud Computing – Overview of Information Assurance Concerns and Opportunities” (Version 1.02), US National Security Agency's Systems and Network Analysis Center, 18 December 2009 [3] “Amazon Elastic Compute Cloud (Amazon EC2)”, published by Amazon Web Services [4] Jeffrey Dean and Sanjay Ghemawat, “MapReduce: Simplified Data Processing on Large Clusters”, published by Google Inc. (Research Publications) and appeared in OSDI'04: Sixth Symposium on Operating System Design and Implementation, San Francisco, CA, December, [5] “Survey: Cloud Computing ‘No Hype’, But Fear of Security and Control Slowing Adoption”, 2009, curity/- Article details Survey as conducted by Kelton Research curity/

(2)References: [6] Nuno Santos, Krishna P. Gummadi & Rodrigo Rodrigues, “Towards Trusted Cloud Computing”, The Max Planck Institute for Software Systems [7] “Facebook and AWS”, partners/facebook/ partners/facebook/ [8] “Facebook Needs To Improve Privacy Practices, Investigation Finds.” A look at Facebook security as compared to Canadian privacy laws c_090716_e.cfmhttp:// c_090716_e.cfm [9] “Report of Findings into the complaint filed by the Canadian Internet Policy and Public Interest Clinic (CIPPIC) against Facebook Inc. under the Personal Information Protection and Electronic Documents Act by Elizabeth Denham, Assistant Privacy Commissioner of Canada”, July 16, 2009