Download presentation
Presentation is loading. Please wait.
1
Principles of Computer Security
Instructor: Haibin Zhang
2
Cloud Computing and Cloud Security
3
Client-Server Architecture
4
--> Cloud Computing
5
NIST Definitions of Cloud Computing
Software as a service (SaaS) Platform as a service (PaaS) Infrastructure as a service (IaaS)
6
Software as a service (SaaS)
“The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based ), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.”
7
Platform as a Service (PaaS)
The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
8
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).
9
Go Beyond These Definitions
10
Go Beyond These Definitions
Someone could modify your cloud according to your need!
11
Go Beyond These Definitions
Someone could modify your cloud according to your need! You could own your own cloud!
12
Go Beyond These Definitions
Someone could modify your cloud according to your need! You could own your own cloud! OpenStack allows you to do that, with some (painful) price…
13
Azure and EC2 MS and Amazon’s specific IaaS
14
EC2
15
Azure Storage Questions
How does Azure prevent from disaster? Did Azure use Paxos? What’s the replication factor in Azure? Azure Storage is an append-only storage. What does it mean?
16
Azure Storage
17
OpenStack (In a Nutshell)
Nova Keystone Cinder Swift Glance Neutron
18
Deployment Scenarios
19
BTW, cloud side channel attacks
20
Nova Open-source IaaS
21
OpenStack (Slightly More Complex)
22
Visualizing OpenStack Dependency Flow
The following: Visualizing OpenStack Dependency Flow Haibin Zhang
23
Basic---Launching an Instance Creating/Running a VM without Networks (Neutron), without Persistent Storage (Cinder) Time User credentials token token; request; project Id Keystone “Success” token vrf (interactive) token vrf (interactive) Nova The common recognition is “EC is now and the future.” token; request for VM image image Glance
24
Extending Basic for Complex Settings 1) Adding persistent storage/Cinder; 2) Adding networks/Neutron
Time User credentials token token; request; project Id Keystone “Success” token vrf (interactive) token vrf (interactive) Nova token; request for VM image Cinder image “NetworkReady” Glance Neutron
25
So far we use Glance as a black-box What’s behind it
So far we use Glance as a black-box What’s behind it? How it interacts with backend storage? Time User credentials token token; request; project Id Keystone “Success” token vrf (interactive) token vrf (interactive) Nova token; request for VM image image Glance Backend Storage e.g., Swift
26
Method 1: Glance as a proxy (default; direct_URL is disabled)
Time User credentials token token; request; project Id Keystone “Success” token vrf (interactive) token vrf (interactive) Nova token; request for VM image image Glance Backend Storage e.g., Swift
27
Method 2: Glance return image/object URL; Nova contacts Swift directly
Time User credentials token token; request; project Id Keystone “Success” token vrf (interactive) token vrf (interactive) Nova token; request for VM image image Glance Backend Storage e.g., Swift
28
Note that this is for the most recent API
Time User credentials token token; request; project Id Keystone “Success” token vrf (interactive) token vrf (interactive) Nova token; request for VM image image Glance Backend Storage e.g., Swift
29
Keystone and OpenStack Token
UUID: 32 bytes PKI PKIz Fernet token
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.