Presentation is loading. Please wait.

Presentation is loading. Please wait.

Speaker: Meng-Ting Tsai Date:2011/04/26 Establishing Trust in Cloud Computing IEEE Computer Society.

Similar presentations


Presentation on theme: "Speaker: Meng-Ting Tsai Date:2011/04/26 Establishing Trust in Cloud Computing IEEE Computer Society."— Presentation transcript:

1 Speaker: Meng-Ting Tsai Date:2011/04/26 Establishing Trust in Cloud Computing IEEE Computer Society

2 Outline Introduction What Is Trust? A Cloud Computing Example The Challenges of Trust Emerging Technologies Conclusion 2015/10/29 2

3 Introduction(1/2) Cloud computing has opened up a new frontier of challenges by introducing a different type of trust scenario. The challenges of trusting cloud computing don’t lie entirely in the technology itself. A lack of transparency A loss of control over data assets Unclear security assurances 2015/10/29 3

4 Introduction(2/2) Understand the trust issues associated with cloud computing from both a technology and business perspective. 2015/10/29 4

5 Outline Introduction What Is Trust? A Cloud Computing Example The Challenges of Trust Emerging Technologies Conclusion 2015/10/29 5

6 What Is Trust? Control Ownership Prevention Security 2015/10/29 6

7 Outline Introduction What Is Trust? A Cloud Computing Example The Challenges of Trust Emerging Technologies Conclusion 2015/10/29 7

8 A Cloud Computing Example 2015/10/29 8 Paas Saas Iaas

9 Outline Introduction What Is Trust? A Cloud Computing Example The Challenges of Trust Emerging Technologies Conclusion 2015/10/29 9

10 The Challenges of Trust(1/4) Although CloudX provides SoftCom with a comprehensive SLA, two major trust-related factors are a concern in this scenario. Diminishing Control Lack of Transparency 2015/10/29 10

11 The Challenges of Trust(2/4) Diminishing Control In cloud computing, this lack of control over the data and processes triggers the risk of losing data confidentiality, integrity, and availability. Cloud computing virtually requires consumers to relinquish control of running their applications and storing their data. Lack of Transparency The physical location of the storage and processing sites. The security profiles of these sites. 2015/10/29 11

12 The Challenges of Trust(3/4) To fully trust CloudX, SoftCom needs the following assurances regarding its control of the data: CloudX will notify SoftCom when an entity accesses its images. CloudX and its other sites won’t keep unauthorized copies of SoftCom images. CloudX will destroy SoftCom’s residue (temporary data, intermediate output, or data that’s no longer needed) or outdated images at all the sites that it manages. 2015/10/29 12

13 The Challenges of Trust(4/4) SoftCom also needs three additional assurances: The software (such as iFilter or iSearch) processing the SoftCom images must be reliable and trustworthy (control of processes). SoftCom must know where the persistent data storage resides and the processing occurs (physical location). CloudX must make its service-level security properties transparent to SoftCom (security profiles). 2015/10/29 13

14 Outline Introduction What Is Trust? A Cloud Computing Example The Challenges of Trust Emerging Technologies Conclusion 2015/10/29 14

15 Emerging Technologies 2015/10/29 15

16 Outline Introduction What Is Trust? A Cloud Computing Example The Challenges of Trust Emerging Technologies Conclusion 2015/10/29 16

17 Conclusion Any new technology must gradually build its reputation for good performance and security, earning users’ trust over time. To regain consumers’ trust, cloud providers must offer better transparency and more consumer control of data and processes. 2015/10/29 17


Download ppt "Speaker: Meng-Ting Tsai Date:2011/04/26 Establishing Trust in Cloud Computing IEEE Computer Society."

Similar presentations


Ads by Google