Download presentation
Presentation is loading. Please wait.
Published byShanna Williams Modified over 9 years ago
1
Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi
2
AGENDA Cloud Computing & Control Fear of The Cloud New Directions Conclusion
3
CLOUD COMPUTING
4
CLOUD CONTROL
5
FEAR OF THE CLOUD
6
CLOUD CHALLANGES / ISSUES
7
TRADITIONAL SECURITY VM-level Attacks Cloud Provider Vulnerabilities Phishing Cloud Provider Expanded Network Attack Surface Authentication and Authorization Forensics in the Cloud
8
AVAILABILITY Uptime Single Point of Failure Assurance of Computational Integrity
9
THIRD-PARTY DATA CONTROL Due Diligence Auditability Contractual Obligations Cloud Provider Espionage Data Lock-in Transitive Nature
10
NEW DIRECTIONS
11
INFORMATION-CENTRIC SECURITY Unprotected DataInformation Centric
12
HIGH-ASSURANCE REMOTE SERVER ATTESTATION Trusted Computing
13
PRIVACY-ENHANCED BUSINESS INTELEGENCE
14
CONCLUSION Solutions are not applicable just yet. If the data are not confidential (enough), use public cloud. If the data are confidential and tight budget, use traditional server/hybrid cloud. If the data are confidential and enough budget, use private cloud.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.