Download presentation
Presentation is loading. Please wait.
Published byNeal Riley Modified over 9 years ago
1
IETF-77 Clouds bar BoF clouds@ietf.org clouds@ietf.org Please send comments to Bhumip Khasnabish (vumip1@gmail.com )vumip1@gmail.com Clouds bar BoF Convener Pacific B room (Ballroom level, 2nd floor) Hilton Anaheim, CA, USA 11:30 AM, Thursday, March 25, 2010
2
What is a Cloud-based System? Cloud-based systems are conveniently-connected modular blocks of resources – Both physical and virtual modularizations of resources are possible – For this discussion, the resources include computing (CPU), communications (bandwidth), memory (storage), management, database, software, applications, services, interconnectivity, etc. – The objective is to make the resources available ubiquitously for mission-specific applications and services in order to support the ultimate level of privacy/security, scalability and reliability cost- effectively and without the headache of owning and maintaining the infrastructure Clouds Discussion Archive: – http://www.ietf.org/mail-archive/web/clouds/current/maillist.html http://www.ietf.org/mail-archive/web/clouds/current/maillist.html NIST definition – http://csrc.nist.gov/groups/SNS/cloud-computing/ http://csrc.nist.gov/groups/SNS/cloud-computing/ 212/8/2015
3
Service over Cloud Utilize (stitch, weave, embroider, … ) the resources from Cloud to provision, create, deliver, and maintain an End-to-End Service Use the service only when you Need it Pay only for the time duration and type of use of service (incl. the costs for resources used) 312/8/2015
4
Problem Statement There is no Standard Reference Framework for Cloud Services – May need to develop a ref. framework Need to define – Resources Availability Announcement Protocol – Cloud Resources Reservation Protocol – Cloud Resources Authentication Mechanism – Cloud Resources Privacy and Protection Mechanism – Cloud Resources API Need Cloud Resources List/Pool Registrar (a server) Universal Resources Description Language (URDL) 412/8/2015
5
Next Step Conduct a survey of Cloud-based systems and services, and prepare a report Determine what can be, and needs to be done in IETF/IRTF – Synergize with what are being done in e.g., APP/decade, IRTF/vnrg, TSV/nfsv4, OPS/netconf,.. Define Scope and Charter, and discuss through the mailing list (clouds@ietf.org)clouds@ietf.org Report back during the IETF-78 512/8/2015
6
Q&A 612/8/2015
7
The NEED for Open Standards 7 Source: http://www.scribd.com/doc/18172802/Cloud-Computing-Use-Cases-Whitepaper 12/8/2015
8
8
9
US Federal Gov. Security NEEDs Not all cyber threats are equal. They vary in terms of intentions, technical sophistication, access methods, financing and tools and techniques. FIVE different levels of cyber threats can be considered: – Cyber Vandalism: Widespread non-targeted attacks over the Internet designed to cause disruption of services – Cyber Crime : Adversaries motivated by greed or ideology – Cyber Surveillance : Broad based general surveillance conducted via internet-based attacks designed to gain large amounts of information held by the target – Cyber Espionage: Specifically targeted espionage using a number of highly sophisticated approaches – Cyber Warfare : Multi-prong attacks to degrade or destroy an opponent’s use of its information infrastructure 9 Source: IEEE ComSoc Region 1 Presentation 12/8/2015
10
Service Providers’ Security NEEDs TWELVE (12) layers of information services defense used in a US tier-1 service provider’s Wireline networks. That company is merging the Business and Telecom carrier-class networks together to form the Wireline network. The 12 layers of security include the following.. – Physical – People – Compliance – Training – Business continuity planning – Operations – Governance – Policies – Procurement – Network communications – Software – Management 10 Source: IEEE ComSoc Region 1 Presentation 12/8/2015
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.