SlideShare une entreprise Scribd logo
1  sur  65
Cloud Computing:
Security and Privacy
Prepared by
Istiyak Hossain Siddiquee
2009331009

Supervised by
Dr. Mohammed Jahirul Islam
Associate Professor

Dept. of Computer Science & Engineering
Shahjalal University of Science & Technology
Sylhet, Bangladesh.
“Cloud Computing is an important transition, a paradigm shift in IT services delivery - one that
has broad impact and can present significant challenges. “
---"Cloud Computing: Considerations and Next Steps", published by Intel

“It's stupidity. It's worse than stupidity. It's a marketing hype campaign.”
---Richard Stallman, President, Free Software Foundation
An
IT
model
or
computing
environment
composed
of
IT
components
(hardware, software, networking, and services) as well as the processes around the deployment of these
elements that together enable us to develop and deliver cloud services via the Internet or a private
network.
--- Securing the Cloud, Winkler
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared
pool of configurable computing resources (e.g., networks, servers, storage, applications, and services).
--- Security Guidance for Critical Areas of Focus in Cloud Computing v3.0
By Cloud Security Alliance, CSA
Cloud computing is an evolution in which IT consumption and delivery are made available in a self–
service fashion via the Internet or internal network, with a flexible pay-as-you-go business model and
requires a highly efficient and scalable architecture.
--- Cloud Computing: Considerations and Next Steps, Intel
“Cloud Computing refers to both the applications delivered as services over
Internet and the hardware and systems software in the datacenters that
provide those services.”
Above the Clouds A Berkeley View on Cloud Computing,
University of California Berkeley

“A model for enabling ubiquitous, convenient, on-demand network access
to a shared pool of configurable computing resources (e.g.
networks, servers, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or service
provider interaction.”
National Institute of Standard and Technology (NIST)
Why Cloud
Source: IT PRO Cloud Survey By Microsoft TechNet Cloud Power
Source: The Future of Cloud Computing rd Annual Survey
by NorthBridge and Gigaom
Source:

Outlook on Technology, a survey conducted by PCConnection
Source: Leveraging the cloud for law enforcement Survey Result
IACP, SafeGov, January 31, 2013
Essential Characteristics of Cloud Computing According to NIST






On-demand Self Service
Broad network access
Resource pooling
Rapid elasticity
Measured service

• Cost containment
• Innovation speed
• Availability
• Scalability
• Efficiency
• Elasticity

Schweizerische Akademie der Technischen Wissenschaften (SATW)
So, the attractive points of cloud computing are











Efficiency
Scalability
Elasticity
Availability
Agility
Recovery
No upfront cost
Pay as you go
Innovation speed
Cloud Service Delivery Model
defined by NIST
Source: 2013 Outlook on Technology, PC Connection Survey
Source: IT PRO Cloud Survey By Microsoft TechNet Cloud Power
IaaS
The
capability
provided
to
the
consumer
is
to
provision
processing, storage, networks, and other fundamental computing resources where
the consumer is able to deploy and run arbitrary software, which can include
operating systems and applications. The consumer does not manage or control the
underlying cloud infrastructure but has control over operating systems, storage, and
deployed applications; and possibly limited control of select networking components
(e.g., host firewalls).
----According to NIST
provides virtual machines and other abstracted hardware and operating systems
which may be controlled through a service API.
----According to ENISA
delivers computer infrastructure (typically a platform virtualization environment) as
a service, along with raw storage and networking. Rather than purchasing
servers, software, data-center space, or network equipment, clients instead buy
those resources as a fully outsourced service
----According to CSA
Source: Schweizerische Akademie der Technischen Wissenschaften (SATW)
Examples of IaaS












Amazon EC2
Eucalyptus
CSC
GoGrid
IBM
OpenStack
Rackspace
Savvis
Terremark
VMWare
PaaS
The capability provided to the consumer is to deploy onto the cloud infrastructure
consumer-created or acquired applications
created
using programming
languages, libraries, services, and tools supported by the provider. The consumer does not
manage
or
control
the
underlying
cloud
infrastructure
including
network, servers, operating systems, or storage, but has control over the deployed
applications and possibly configuration settings for the application-hosting environment.
----According to NIST
allows customers to develop new applications using APIs deployed and configurable
remotely. The platforms offered include development tools, configuration
management, and deployment platforms.
----According to ENISA
the delivery of a computing platform and solution stack as a service. PaaS offerings
facilitate deployment of applications without the cost and complexity of buying and
managing the underlying hardware and software and provisioning hosting capabilities.
This provides all of the facilities required to support the complete life cycle of building and
delivering web applications and services entirely available from the Internet.
----According to CSA
Source: Schweizerische Akademie der Technischen Wissenschaften (SATW)
Examples of PaaS














Google App Engine
Windows Azure
Force.com
Engine Yard
AT&T Synaptic
Boomi
Citrix
Red Hat OpenShift
Heroku
AppFog
Amazon AWS
Caspio
SaaS
The capability provided to the consumer is to use the provider’s applications running
on a cloud infrastructure. The applications are accessible from various client devices
through either a thin client interface, such as a web browser (e.g., web-based
email), or a program interface. The consumer does not manage or control the
underlying cloud infrastructure including network, servers, operating
systems, storage, or even individual application capabilities, with the possible
exception of limited user specific application configuration settings.
----According to NIST
is software offered by a third party provider, available on demand, usually via the
Internet configurable remotely.
----According to ENISA
a software delivery model in which software and its associated data are hosted
centrally (typically in the (Internet) cloud) and are typically accessed by users using a
thin client, normally using a web browser over the Internet.
----According to CSA
Source: Schweizerische Akademie der Technischen Wissenschaften (SATW)
Examples of SaaS













Web Mail
Google Docs
Facebook
Salesforce
LinkedIn
Workday
Netsuite
ServiceNow
Athenahealth
Medidata
Cornerstone OnDemand
Cloud Deployment Models
Among these models, which one is more popular ??
Source The Future of Cloud Computing

rd Annual Survey

by NorthBridge and Gigaom
PC Connection CC Survey

Results
Public Cloud
The cloud infrastructure is provisioned for open use by the general public. It may be
owned, managed, and operated by a business, academic, or government
organization, or some combination of them.
---- According to NIST
The cloud infrastructure is made available to the general public or a large industry
group and is owned by an organization selling cloud services.
----According to ENISA
public cloud refers to solutions where resources are dynamically provisioned over the
Internet from an offsite third-party provider who shares resources and bills on a finegrained utility computing basis.
----According to Ajilitee
Examples of Public Cloud







Amazon Elastic Compute Cloud (EC2)
IBM’s Blue Cloud
SunCloud
Google AppEngine
Windows Azure Services Platform
Private Cloud

The cloud infrastructure is provisioned for exclusive use by a single
organization comprising multiple consumers (e.g. business units). It may
be owned, managed, and operated by the organization, a third party, or
some combination of them, and it may exist on or off premises.
--- According to NIST
The cloud infrastructure is operated solely for a single organization. It
may be managed by the organization or by a third party and may be
located on-premise or off-premise.
--- According to CSA
Examples of Private Cloud










Amazon Virtual Private Cloud
IBM SmartCloud Foundation
Microsoft Private Cloud
Cisco Private Cloud solutions
VMware Private Cloud Computing
Dell Cloud Solutions
Rackspace Private Cloud
Citrix CloudPlatform
Hybrid Cloud

The cloud infrastructure is a composition of two or more
distinct cloud infrastructures (private, community, or
public) that remain unique entities, but are bound together
by standardized or proprietary technology that enables
data and application portability (e.g. cloud bursting for
load balancing between clouds)
Community Cloud
The cloud infrastructure is shared by several organizations
and supports a specific community that has shared
concerns (e.g mission, security requirements, policy, or
compliance considerations). It may be managed by the
organizations or by a third party and may be located on
premise or off-premise.
--- According to CSA

This cloud overlaps to grid to some extent.
Several organizations with similar concerns
about mission, security requirements, policy,
and compliance considerations in a private
community share cloud infrastructure
Source: Luth research and Vanson Bourne, 2013
2013 Outlook on Technology Cloud Computing Survey Results by PC Connection
Are these survey
results exaggerated ?
Let’s review this survey result...

Cloud Computing Vulnerability Incidents A Statistical Overview, by CSA
American information
technology research and
advisory firm Gartner
have identified seven
cloud computing risks.
These are








Privileged user access
Regulatory compliance
Data location
Data segregation
Recovery
Investigative support
Long term viability

In
CSA released a
worth
mentioning
document with a title The
Notorious Nine: Cloud
Computing Top Threats in
Here they idenfied
nine security problem as
top threat for the year










Data Breaches
Data Loss
Account Hijacking
Insecure APIs
Denial of Service
Malicious Insiders
Abuse of Cloud Services
Insufficient Due Diligence
Shared Technology Issues
So we can classify these threats into these categories







Confidentiality and Privacy
Availability
Integrity
Auditability and Forensics
Other Issues

Let us get through these point...
Confidentiality and Privacy
While considering cloud computing security, one word that comes most often is confidentiality of data.
Privacy is also related to confidentiality as because revealation of a confidential data means the violation
of privacy Confidentiality and privacy leakages can occur in two wasys

Loosing control over data Customers often become anxious about their data
confidentiality, this is because of losing control over data. when they host their classified
information to cloud they usually lose the control over their data, though they have the
authorization to access data
Privacy and Confidentiality Compromised One of the most common threat to computing
technology as well as cloud computing technology is “compromise”. To describe this in
detail we will sub-divide this point
Threats from Insider There are two types of threat here.

Firstly from a current or former employee, contractor, or other
business partner
who has or had authorized access to an organization's network, system, or data and
intentionally exceeded or misused that access in a manner that negatively affected the
confidentiality, integrity, or availability of the organization's information or information
systems.

Secondly, from the company itself. What if the company is running a Cheap Data
Mining process on your confidential data ? Or even they can espoinage on your data.
Threats from Outsider There are the
threats that make companies
worried. There can be many types of
threat from outsider. These are










Cloud malware injection attack
Account or service hijacking
VMWare Secuirty Problem
Flooding Attacks
Data Security
Hypervisor Vulnerability
Shared Resources Issue
Compliance
Cloud malware injection attack A research paper
described this type of attack. They said, an attacker first
attempts to inject malware service implementation of
virtual machine into the cloud system. This instance then
serves several purposes ranging from eavesdropping via
subtle data modification to full functonality changes or
blockings. Attacker may also apply sql injection cross site
scripting attacks to acquire sensitive data
Account or service hijacking Account or service hijacking
is not new Attack methods such as phishing, fraud, and
exploitation of software vulnerabilities still achieve results.
Cloud solutions add a new threat to the landscape. If an
attacker gains access to your credentials, they can
eavesdrop on your activities and transactions, manipulate
data, return falsified information, and redirect your clients
to illegitimate sites. Your account or service instances may
become a new base for the attacker.
VMWare Secuirty Problem Recent researches show that it is
possible to locate a clients’ physical address on cloud precisely
So an attacker can use those algothims to locate a consumer
and gather intelligence about his classified data in cloud.
Again, another research showed that it is possible to place
attacker’s virtual machine beside the victim’s virtual
machine, physically and then create a side channel between
both the machines which can enable the attacker to steal
password information by initiating SSH keystroke timing attack
Flooding Attacks It consists of DoS (Denial of Service), DDoS, and EDoS It is
a very old problem in computer technology and hence for cloud computing
also, which basically consists in an attacker sending a huge amount of
nonsense requests. As each of these requests need to be identified as
nonsese some computation power is required to face such attacks. Thus
sometimes the server doesn’t response in time that is it Denies of Service.
Sometimes attacker attacks the cloud using botnets which we call
Distributed Denial of service. It is much harder to tackle as there are huge
amount of nonsense request at a time There is another sort of DoS, this is
called EDoS. In this, attacker attacks the billing system of a cloud service
provide with an attemp to make the CSP a bankrupt
Data Security Data can be hijacked while it is in transit.
This problem is trivial actually. We may encrypt the data or
secure the connection between browser and server
Hypervisor Vulnerability Hypervisor is a critical piece of virtualized
cloud infrastructure that provide the software layer that sits between
the hardware and VMs and allows multiple VMs to share a single
hardware platform. Not surprisingly, hypervisor vulnerabilities are a
major source of concern for IT professionals. If a hypervisor is
vulnerable to security attacks, then the integrity of the entire public or
private cloud implementation is at serious risk.
Shared Resources Issues Sharing of resources arise
some critical problems of unwanted data privacy
leakages. This is because data remanence in an multitenant hardware implementation
Another example of shared resources vulnerability is
Reputaion Fate Sharing
Compliance From the former NSA Agent Edward Snowden we
came to know that under long disputed PRISM Act, USA’s
organization, National Security Agency (NSA) had been able to
access the emails, Facebook accounts and videos of citizens across
the world. Even, it had secretly acquired the phone records of
millions of Americans and other important persons of the world like
Angela Merkel etc. Through a secret court, it has been able to bend
nine US internet companies to its demands for access to their users'
data.
Availability
Integrity
Auditability & Forensics
Other Issues
 Accidental Data Loss
 Insecure API
 Abuse of Cloud (DoS Attack Using Cloud)
Future.....
Cloud Computing Security and Privacy
Cloud Computing Security and Privacy

Contenu connexe

Tendances

Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26TT L
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Services
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityDhaval Dave
 
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelAssurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelIJMTST Journal
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCholavaram Sai
 
Hybrid cloud based firewalling
Hybrid cloud based firewallingHybrid cloud based firewalling
Hybrid cloud based firewallingJustin Cletus
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing OverviewTawanda Douglas Muringani
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditingijtsrd
 
Scientific Cloud Computing: Present & Future
Scientific Cloud Computing: Present & FutureScientific Cloud Computing: Present & Future
Scientific Cloud Computing: Present & Futurestratuslab
 

Tendances (20)

Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Outsourcing control
Outsourcing controlOutsourcing control
Outsourcing control
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelAssurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment Model
 
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi clouds
 
Hybrid cloud based firewalling
Hybrid cloud based firewallingHybrid cloud based firewalling
Hybrid cloud based firewalling
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing Overview
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Scientific Cloud Computing: Present & Future
Scientific Cloud Computing: Present & FutureScientific Cloud Computing: Present & Future
Scientific Cloud Computing: Present & Future
 

En vedette

Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewragibhasan
 
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Salam Shah
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingJohn D. Johnson
 
Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...PRISMACLOUD Project
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computingsaurabh soni
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computingragibhasan
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationVenkateswar Reddy Melachervu
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacytmather
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaPrashant Gupta
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 

En vedette (16)

Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
 
Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 

Similaire à Cloud Computing Security and Privacy

Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxraghavanp4
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingEr. Saba karim
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..manoj kumar
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAnimesh Chaturvedi
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4kongara
 
Fault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingFault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingCaner KAYA
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stackSatish Chavan
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...IJIR JOURNALS IJIRUSA
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingKelvin Lam
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised PresentationMayank Aggarwal
 
2022_2nd lecture_CoT.ppt
2022_2nd lecture_CoT.ppt2022_2nd lecture_CoT.ppt
2022_2nd lecture_CoT.pptrawdnsr
 
Cloud computing
Cloud computingCloud computing
Cloud computingJosDavid36
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 

Similaire à Cloud Computing Security and Privacy (20)

Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
H046053944
H046053944H046053944
H046053944
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
 
G0314043
G0314043G0314043
G0314043
 
Fault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingFault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud Computing
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stack
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
 
2022_2nd lecture_CoT.ppt
2022_2nd lecture_CoT.ppt2022_2nd lecture_CoT.ppt
2022_2nd lecture_CoT.ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 

Dernier

Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 

Dernier (20)

Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 

Cloud Computing Security and Privacy

  • 1.
  • 2. Cloud Computing: Security and Privacy Prepared by Istiyak Hossain Siddiquee 2009331009 Supervised by Dr. Mohammed Jahirul Islam Associate Professor Dept. of Computer Science & Engineering Shahjalal University of Science & Technology Sylhet, Bangladesh.
  • 3. “Cloud Computing is an important transition, a paradigm shift in IT services delivery - one that has broad impact and can present significant challenges. “ ---"Cloud Computing: Considerations and Next Steps", published by Intel “It's stupidity. It's worse than stupidity. It's a marketing hype campaign.” ---Richard Stallman, President, Free Software Foundation
  • 4.
  • 5. An IT model or computing environment composed of IT components (hardware, software, networking, and services) as well as the processes around the deployment of these elements that together enable us to develop and deliver cloud services via the Internet or a private network. --- Securing the Cloud, Winkler Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services). --- Security Guidance for Critical Areas of Focus in Cloud Computing v3.0 By Cloud Security Alliance, CSA Cloud computing is an evolution in which IT consumption and delivery are made available in a self– service fashion via the Internet or internal network, with a flexible pay-as-you-go business model and requires a highly efficient and scalable architecture. --- Cloud Computing: Considerations and Next Steps, Intel
  • 6. “Cloud Computing refers to both the applications delivered as services over Internet and the hardware and systems software in the datacenters that provide those services.” Above the Clouds A Berkeley View on Cloud Computing, University of California Berkeley “A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” National Institute of Standard and Technology (NIST)
  • 8. Source: IT PRO Cloud Survey By Microsoft TechNet Cloud Power
  • 9. Source: The Future of Cloud Computing rd Annual Survey by NorthBridge and Gigaom
  • 10. Source: Outlook on Technology, a survey conducted by PCConnection
  • 11. Source: Leveraging the cloud for law enforcement Survey Result IACP, SafeGov, January 31, 2013
  • 12. Essential Characteristics of Cloud Computing According to NIST      On-demand Self Service Broad network access Resource pooling Rapid elasticity Measured service • Cost containment • Innovation speed • Availability • Scalability • Efficiency • Elasticity Schweizerische Akademie der Technischen Wissenschaften (SATW)
  • 13. So, the attractive points of cloud computing are          Efficiency Scalability Elasticity Availability Agility Recovery No upfront cost Pay as you go Innovation speed
  • 16. Source: 2013 Outlook on Technology, PC Connection Survey
  • 17. Source: IT PRO Cloud Survey By Microsoft TechNet Cloud Power
  • 18.
  • 19. IaaS The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls). ----According to NIST provides virtual machines and other abstracted hardware and operating systems which may be controlled through a service API. ----According to ENISA delivers computer infrastructure (typically a platform virtualization environment) as a service, along with raw storage and networking. Rather than purchasing servers, software, data-center space, or network equipment, clients instead buy those resources as a fully outsourced service ----According to CSA
  • 20. Source: Schweizerische Akademie der Technischen Wissenschaften (SATW)
  • 21. Examples of IaaS           Amazon EC2 Eucalyptus CSC GoGrid IBM OpenStack Rackspace Savvis Terremark VMWare
  • 22. PaaS The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment. ----According to NIST allows customers to develop new applications using APIs deployed and configurable remotely. The platforms offered include development tools, configuration management, and deployment platforms. ----According to ENISA the delivery of a computing platform and solution stack as a service. PaaS offerings facilitate deployment of applications without the cost and complexity of buying and managing the underlying hardware and software and provisioning hosting capabilities. This provides all of the facilities required to support the complete life cycle of building and delivering web applications and services entirely available from the Internet. ----According to CSA
  • 23. Source: Schweizerische Akademie der Technischen Wissenschaften (SATW)
  • 24. Examples of PaaS             Google App Engine Windows Azure Force.com Engine Yard AT&T Synaptic Boomi Citrix Red Hat OpenShift Heroku AppFog Amazon AWS Caspio
  • 25. SaaS The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user specific application configuration settings. ----According to NIST is software offered by a third party provider, available on demand, usually via the Internet configurable remotely. ----According to ENISA a software delivery model in which software and its associated data are hosted centrally (typically in the (Internet) cloud) and are typically accessed by users using a thin client, normally using a web browser over the Internet. ----According to CSA
  • 26. Source: Schweizerische Akademie der Technischen Wissenschaften (SATW)
  • 27. Examples of SaaS            Web Mail Google Docs Facebook Salesforce LinkedIn Workday Netsuite ServiceNow Athenahealth Medidata Cornerstone OnDemand
  • 29.
  • 30. Among these models, which one is more popular ??
  • 31. Source The Future of Cloud Computing rd Annual Survey by NorthBridge and Gigaom
  • 32. PC Connection CC Survey Results
  • 33. Public Cloud The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. ---- According to NIST The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. ----According to ENISA public cloud refers to solutions where resources are dynamically provisioned over the Internet from an offsite third-party provider who shares resources and bills on a finegrained utility computing basis. ----According to Ajilitee
  • 34. Examples of Public Cloud      Amazon Elastic Compute Cloud (EC2) IBM’s Blue Cloud SunCloud Google AppEngine Windows Azure Services Platform
  • 35. Private Cloud The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g. business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. --- According to NIST The cloud infrastructure is operated solely for a single organization. It may be managed by the organization or by a third party and may be located on-premise or off-premise. --- According to CSA
  • 36. Examples of Private Cloud         Amazon Virtual Private Cloud IBM SmartCloud Foundation Microsoft Private Cloud Cisco Private Cloud solutions VMware Private Cloud Computing Dell Cloud Solutions Rackspace Private Cloud Citrix CloudPlatform
  • 37. Hybrid Cloud The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g. cloud bursting for load balancing between clouds)
  • 38. Community Cloud The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g mission, security requirements, policy, or compliance considerations). It may be managed by the organizations or by a third party and may be located on premise or off-premise. --- According to CSA This cloud overlaps to grid to some extent. Several organizations with similar concerns about mission, security requirements, policy, and compliance considerations in a private community share cloud infrastructure
  • 39.
  • 40. Source: Luth research and Vanson Bourne, 2013
  • 41. 2013 Outlook on Technology Cloud Computing Survey Results by PC Connection
  • 42. Are these survey results exaggerated ?
  • 43. Let’s review this survey result... Cloud Computing Vulnerability Incidents A Statistical Overview, by CSA
  • 44. American information technology research and advisory firm Gartner have identified seven cloud computing risks. These are        Privileged user access Regulatory compliance Data location Data segregation Recovery Investigative support Long term viability In CSA released a worth mentioning document with a title The Notorious Nine: Cloud Computing Top Threats in Here they idenfied nine security problem as top threat for the year          Data Breaches Data Loss Account Hijacking Insecure APIs Denial of Service Malicious Insiders Abuse of Cloud Services Insufficient Due Diligence Shared Technology Issues
  • 45. So we can classify these threats into these categories      Confidentiality and Privacy Availability Integrity Auditability and Forensics Other Issues Let us get through these point...
  • 47. While considering cloud computing security, one word that comes most often is confidentiality of data. Privacy is also related to confidentiality as because revealation of a confidential data means the violation of privacy Confidentiality and privacy leakages can occur in two wasys Loosing control over data Customers often become anxious about their data confidentiality, this is because of losing control over data. when they host their classified information to cloud they usually lose the control over their data, though they have the authorization to access data Privacy and Confidentiality Compromised One of the most common threat to computing technology as well as cloud computing technology is “compromise”. To describe this in detail we will sub-divide this point
  • 48. Threats from Insider There are two types of threat here. Firstly from a current or former employee, contractor, or other business partner who has or had authorized access to an organization's network, system, or data and intentionally exceeded or misused that access in a manner that negatively affected the confidentiality, integrity, or availability of the organization's information or information systems. Secondly, from the company itself. What if the company is running a Cheap Data Mining process on your confidential data ? Or even they can espoinage on your data.
  • 49. Threats from Outsider There are the threats that make companies worried. There can be many types of threat from outsider. These are         Cloud malware injection attack Account or service hijacking VMWare Secuirty Problem Flooding Attacks Data Security Hypervisor Vulnerability Shared Resources Issue Compliance
  • 50. Cloud malware injection attack A research paper described this type of attack. They said, an attacker first attempts to inject malware service implementation of virtual machine into the cloud system. This instance then serves several purposes ranging from eavesdropping via subtle data modification to full functonality changes or blockings. Attacker may also apply sql injection cross site scripting attacks to acquire sensitive data
  • 51. Account or service hijacking Account or service hijacking is not new Attack methods such as phishing, fraud, and exploitation of software vulnerabilities still achieve results. Cloud solutions add a new threat to the landscape. If an attacker gains access to your credentials, they can eavesdrop on your activities and transactions, manipulate data, return falsified information, and redirect your clients to illegitimate sites. Your account or service instances may become a new base for the attacker.
  • 52. VMWare Secuirty Problem Recent researches show that it is possible to locate a clients’ physical address on cloud precisely So an attacker can use those algothims to locate a consumer and gather intelligence about his classified data in cloud. Again, another research showed that it is possible to place attacker’s virtual machine beside the victim’s virtual machine, physically and then create a side channel between both the machines which can enable the attacker to steal password information by initiating SSH keystroke timing attack
  • 53. Flooding Attacks It consists of DoS (Denial of Service), DDoS, and EDoS It is a very old problem in computer technology and hence for cloud computing also, which basically consists in an attacker sending a huge amount of nonsense requests. As each of these requests need to be identified as nonsese some computation power is required to face such attacks. Thus sometimes the server doesn’t response in time that is it Denies of Service. Sometimes attacker attacks the cloud using botnets which we call Distributed Denial of service. It is much harder to tackle as there are huge amount of nonsense request at a time There is another sort of DoS, this is called EDoS. In this, attacker attacks the billing system of a cloud service provide with an attemp to make the CSP a bankrupt
  • 54. Data Security Data can be hijacked while it is in transit. This problem is trivial actually. We may encrypt the data or secure the connection between browser and server
  • 55. Hypervisor Vulnerability Hypervisor is a critical piece of virtualized cloud infrastructure that provide the software layer that sits between the hardware and VMs and allows multiple VMs to share a single hardware platform. Not surprisingly, hypervisor vulnerabilities are a major source of concern for IT professionals. If a hypervisor is vulnerable to security attacks, then the integrity of the entire public or private cloud implementation is at serious risk.
  • 56. Shared Resources Issues Sharing of resources arise some critical problems of unwanted data privacy leakages. This is because data remanence in an multitenant hardware implementation Another example of shared resources vulnerability is Reputaion Fate Sharing
  • 57. Compliance From the former NSA Agent Edward Snowden we came to know that under long disputed PRISM Act, USA’s organization, National Security Agency (NSA) had been able to access the emails, Facebook accounts and videos of citizens across the world. Even, it had secretly acquired the phone records of millions of Americans and other important persons of the world like Angela Merkel etc. Through a secret court, it has been able to bend nine US internet companies to its demands for access to their users' data.
  • 59.
  • 62. Other Issues  Accidental Data Loss  Insecure API  Abuse of Cloud (DoS Attack Using Cloud)