Presentation is loading. Please wait.

Presentation is loading. Please wait.

“Security” in cloud computing

Similar presentations


Presentation on theme: "“Security” in cloud computing"— Presentation transcript:

1 “Security” in cloud computing
Prepared & Presented By 13mca55 – Darshan Thakkar 13mca45 – Heaven Patel 13mca54 – Vijay Sonagra

2 Contents Introduction Data security Issues
Enforcing Security in a Database Cloud overview References

3 What is cloud computing:
“Cloud computing is an emerging computing technology that uses the internet and central remote servers to maintain data and applications. Cloud computing is internet based technology that enables small business and organizations to use highly sophisticated computer applications. Definition: Cloud computing refers to applications and services offered over the Internet. These services are offered from data centers all over the world, which collectively are referred to as the "cloud."

4 At the same time, cloud computing also attracts a lot attention of media and news volume still growing over the time.

5 DAIGRAM:

6 Connectivity Public Cloud Public Cloud Private Cloud Private Cloud
The Cloud Provider The Cloud Provider Hybrid Cloud Connectivity (Network Access) Basically there are three types of models. Public Cloud, Private Cloud and another type that mixes of public cloud and private cloud is hybrid cloud. Public clouds are run by third parties, and applications from different customers are likely to be mixed together on the cloud’s servers, storage systems, and networks. Public clouds are most often hosted away from customer premises, and they provide a way to reduce customer risk and cost by providing a flexible, even temporary extension to enterprise infrastructure. Private clouds are built for the exclusive use of one client, providing the utmost control over data, security, and quality of service. The company owns the infrastructure and has control over how applications are deployed on it. Private clouds may be deployed in an enterprise datacenter, and they also may be deployed at a co-location facility. Hybrid clouds combine both public and private cloud models. They can help to provide on-demand, externally provisioned scale. The ability to augment a private cloud with the resources of a public cloud can be used to maintain service levels in the face of rapid workload fluctuations. Enterprise Private Cloud Enterprise Private Cloud

7 5th Generation of Computing
1970s s s s Monolithic Client-Server Web SOA Cloud Services Look at history, we can say Cloud Computing is the 5th generation of computing, after monolithic, client-server, web, service-oriented architecture and now it’s cloud service.

8 Service models:

9 Platform as a service approach (PaaS):
The offering also includes a software execution environment. As for example, there could be a PaaS application server that enables the lone developers to deploy web-based applications Example database,webservers, development tools Characteristics of PaaS: No need of downloading and installing operating System It saves Customers money It mainly deals for delivering operating systems over Internet Software can be developed, tested and deployed

10 Infrastructure as a service (IaaS):
Refers to the sharing of hardware resources for executing services, typically using Virtualization technology. Infrastructure as a Service is an equipment which is used to support hardware, software, storage, servers and mainly used for delivering software application environments Characteristics of IaaS: Policy based Services Utility computing Services Dynamic Scaling Internet Connectivity

11 Software as a Service (SaaS) :
Software as a Service is nothing but a software distribution model which are made available to customers over a network such as server or Internet Characteristics of SaaS: Its easy to work under administration It can be globally access The software can be updated automatically All license holder user will have same version of software

12

13 To summarize, here is a diagram cover relationships among SaaS, PaaS, IaaS.

14 What is DBaaS? Database-as-a-Service (DBaaS) is a service that is managed by a cloud operator (public or private) that supports applications, without the application team assuming responsibility for traditional database administration functions.

15 Continue… With a DBaaS, the application developers should not need to be database experts, nor should they have to hire a database administrator (DBA) to maintain the database. Eg. Oracle 12c

16 DATA SECURITY IN CLOUD COMPUTING:
Data outsourcing: users are relieved from the burden of data storage and maintenance When users put their data (of large size) on the cloud, the data integrity protection is challenging Enabling public audit for cloud data storage security is important Cloud network data user External Audit party

17 Complexity Complexity is an inherent and potential threat in any computing environment. As complexity grows, so do the security risks: more components mean more attack surfaces and more interactions among components. When a system environment includes a variety of configuration and components (e.g., multiple O/S versions to maintain, multiple vendors to track, etc.), the management of the components is more difficult.

18

19 Integrity Integrity is a degree confidence that the data in the cloud is what is supposed to be there, and is protected against accidental or intentional alteration without authorization. DBA access the user data. It also extends to the hurdles of coordinating multiple databases.

20 Availability Cloud technologies can increase availability through widespread internet-enabled access, but the client is dependent on the timely and robust provision of resources. Availability is supported by capacity building and good architecture by the provider, as well as well-defined contracts and terms of agreement.

21 Enforcing Security in a Database Cloud overview
Authentication and Identity Application of Encryption for Data in Motion  Data Masking

22 Authentication and Identity:
Maintaining confidentiality, integrity, and availability for data security is a function of the correct application in the cloud infrastructure. Authentication of users takes several forms, but all are based on a combination of authentication factors: something an individual knows (such as a password), something they possess (such as a security token), or some measurable quality that is intrinsic to them (such as a fingerprint).

23 Application of Encryption for Data in Motion:
Encryption is used to assure that if there was a breach of communication integrity between the two parties that the data remains confidential. Authentication is used to assure that the parties communicating data are who they say they are. Common means of authentication themselves employ cryptography in various ways.

24 Data Masking: Data masking is a technique that is intended to remove all identifiable and distinguishing characteristics from data in order to render it anonymous and yet still be operable. This technique is aimed at reducing the risk of exposing sensitive information. Data masking has also been known by such names as data obfuscation, de-identification, or depersonalization.

25 Security problem Security handling How can I prevent the Cloud DBA from accessing and viewing my data? Database Vault using Empires should be used to protect application and schema data from unauthorized access. This will prevent access to user data from other tenants as well as DBAs. How do I provide security isolation in my consolidated configuration? Minimize access to the database server; i.e., Sql*Net Pipe only access. It is recommended to allow only Cloud DBAs have physical access to the database server. For those users who need server access, implement named user accounts for DBAs with sudo access for privileged commands. I have customer sensitive data. How can I ensure that I meet compliance regulations? A dataset isolation can be handled in different ways, depending on security SLA(Service Level Agreement ) defined or mandated by the business. Isolate customer sensitive datasets into their own set of tablespaces, and implement tablespace encryption.

26 Platforms: Amazon's Elastic Compute Cloud, or EC2, is probably the most generalized and best-known of the cloud computing service offerings. IBM Computing on Demand or Blue Cloud is a highly enterprise-focused cloud computing offering that, because it is related to and built with the same technology sold to enterprises, can cross over between public and private cloud applications. Microsoft's Azure cloud computing, based on Microsoft Vista and .NET technology, includes both cloud computing and cloud-hosted extension

27 REFERENCES Online resources : https://www.youtube.com/user/Techquickie
Offline Resources : Cloud computing - by Brain J.S. Chee and Curtis Franklin Jr. Cloud Computing: Principles, Systems and Applications - by Antonopoulos, Nick Oracle Inc. Report titled “Security in Private Database Clouds ”

28 Queries ?

29 Thank U! 


Download ppt "“Security” in cloud computing"

Similar presentations


Ads by Google