SlideShare une entreprise Scribd logo
1  sur  16
Current Security 
Issues for cloud computing
Contents 
• Introduction 
• Cloud models 
• Security Issues 
• Conclusion 
• References
WHAT IS CLOUD COMPUTING??? 
• Features 
– Use of internet-based services to support business process 
– Rent IT-services on a utility-like basis 
• Attributes 
– Rapid deployment 
– Low startup costs/ capital investments 
– Costs based on usage or subscription 
– Multi-tenant sharing of services/ resources 
• Essential characteristics 
– On demand self-service(just-in-time availability of resources”) 
– Ubiquitous network access 
– Location independent resource pooling 
– Rapid elasticity 
– Measured service 
Source: NIST
Cloud Models 
• Delivery Models 
– SaaS 
– PaaS 
– IaaS 
• Deployment Models 
• Public cloud: 
• multiple customers share the computing resources provided by a single service 
provider. 
• Private cloud: 
• computing resources are used and controlled by a private enterprise. 
• Hybrid cloud: 
• A third type can be hybrid cloud that is typical combination of public and private cloud. 
• Community cloud: 
• Several organizations jointly construct and share the same cloud .
Problems Associated with Cloud 
Computing 
• Most security problems stem from: 
– Loss of control 
– Lack of trust (mechanisms) 
– Multi-tenancy 
SECURITY ISSUES: 
• Network security. 
• Interfaces. 
• Data Security. 
• Virtualization. 
• Governance
1.Network security 
Problems associated with network communications and configurations 
regarding cloud computing infrastructures. 
(a)Transfer security: 
Distributed architectures,massive resource sharing and virtual machine(VM) 
instances synchronization imply more data in transit in the cloud,VPN(virtual 
private network)( mehanism.dropbox) 
(b) Firewalling: (yotta networks) 
Firewalls protect the provider’s internal cloud infrastructure against 
insiders and outsiders.
2.Data security 
Is Data Secure??? 
Protection of data in terms of confidentiality. 
(a) Cryptography:-Most employed practice to secure sensitive 
data. 
1.Keep cloud credentials safe. 
2.Keep encrypted data.(encrytion keys). 
(b) Redundancy: Essential to avoid data loss. 
(c) Disposal: 
Elementary data disposal techniques are the insufficient and commonly 
referred a deletion .
3.Virtualization 
• Virtualization is an essential technological characteristic of clouds 
which hides the technological complexity from the user and 
enables enhanced flexibility (through Aggregation, Routing and 
Translation). 
• (a) Isolation:-Although logically isolated, all VMs share the same 
hardware and consequently the same resources. 
• (b) Data leakage: Exploit hypervisor vulnerabilities and lack of 
isolation controls in order to leak data from virtualized infrastructures
. 
(c) VM identification: Lack of controls for identifying virtual machines 
that are being used for executing a specific process or for storing 
files. 
(d) Cross-VM attacks:-Includes attempts to estimate provider traffic 
rates in order to steal cryptographic keys and increase chances of 
VM placement attacks.
4.Interfaces 
Concentrates all issues related to user administrative. 
(a) API:- Programming interfaces for accessing virtualized resources. 
(b) Administrative interface: 
Enables remote control of resources in an IaaS development 
for PaaS and application tools for SaaS. 
(c) User interface:-End-user interface for exploring provided resources 
and tools(the service itself). 
(d) Authentication:-Mechanisms required to enable access to the 
Cloud.
5.Governance 
• Issues related to (losing) administrative and security cloud 
computing solutions. 
• (a) Data control:- 
• Moving data to the cloud means losing control over redundancy. 
– Data, applications, resources are located with provider 
– User identity management is handled by the cloud 
– User access control rules, security policies and enforcement are 
managed by the cloud provider 
– Consumer relies on provider to ensure 
Data security and privacy 
(b) Security control:- 
Loss of governance over security mechanisms and policies.
• (c) Lock-in: 
• User potential dependency on a particular service provider due to 
lack of well-established standards ,consequently becoming 
particularly vulnerable to migrations and service termination.
Conclusion 
• Cloud computing is sometimes viewed as a reincarnation 
of the classic mainframe client-server model 
– However, resources are ubiquitous, scalable, highly virtualized 
– Contains all the traditional threats, as well as new ones 
• The main goal is to securely store and manage data that 
is not controlled by the owner of the data
References 
1. NIST (Authors: P. Mell and T. Grance), "The NIST Definition of 
Cloud Computing (ver. 15)," National Institute of Standards and 
Technology, Information Technology Laboratory (October 7 
2009). 
2. J. McDermott, (2009) "Security Requirements for Virtualization in 
Cloud Computing," presented at the ACSAC Cloud Security 
Workshop, Honolulu, Hawaii, USA, 2009. 
3. J. Camp. (2001), “Trust and Risk in Internet Commerce,”
security Issues of cloud computing

Contenu connexe

Tendances

Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security StrategyCapgemini
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computingsaurabh soni
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing Reza Pahlava
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing FundamentalsSonia Nagpal
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 

Tendances (20)

Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud security
Cloud security Cloud security
Cloud security
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 

Similaire à security Issues of cloud computing

Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02abhisheknayak29
 
Introduction to Cloud Security.pptx
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptxssuser0fc2211
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
12-cloud-security.ppt
12-cloud-security.ppt12-cloud-security.ppt
12-cloud-security.pptchelsi33
 
Cloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concernsCloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concernsVaibhav Khanna
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization SecurityRubal Sagwal
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.pptssuser3be95f
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.pptSameer Ali
 
cloud-complete power point presentation for digital signature
cloud-complete power point presentation for digital signaturecloud-complete power point presentation for digital signature
cloud-complete power point presentation for digital signatureArunsunaiComputer
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxsarahabbas40
 
Cloud complete
Cloud completeCloud complete
Cloud completeNavriti
 
Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concernsMrinal Baowaly
 

Similaire à security Issues of cloud computing (20)

4831586.ppt
4831586.ppt4831586.ppt
4831586.ppt
 
Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02
 
Introduction to Cloud Security.pptx
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptx
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
12-cloud-security.ppt
12-cloud-security.ppt12-cloud-security.ppt
12-cloud-security.ppt
 
Cloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concernsCloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concerns
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Basics of cloud
Basics of cloudBasics of cloud
Basics of cloud
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
Cloud complete
Cloud completeCloud complete
Cloud complete
 
cloud-complete power point presentation for digital signature
cloud-complete power point presentation for digital signaturecloud-complete power point presentation for digital signature
cloud-complete power point presentation for digital signature
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cloud complete
Cloud completeCloud complete
Cloud complete
 
Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concerns
 

Dernier

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Dernier (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

security Issues of cloud computing

  • 1. Current Security Issues for cloud computing
  • 2. Contents • Introduction • Cloud models • Security Issues • Conclusion • References
  • 3. WHAT IS CLOUD COMPUTING??? • Features – Use of internet-based services to support business process – Rent IT-services on a utility-like basis • Attributes – Rapid deployment – Low startup costs/ capital investments – Costs based on usage or subscription – Multi-tenant sharing of services/ resources • Essential characteristics – On demand self-service(just-in-time availability of resources”) – Ubiquitous network access – Location independent resource pooling – Rapid elasticity – Measured service Source: NIST
  • 4. Cloud Models • Delivery Models – SaaS – PaaS – IaaS • Deployment Models • Public cloud: • multiple customers share the computing resources provided by a single service provider. • Private cloud: • computing resources are used and controlled by a private enterprise. • Hybrid cloud: • A third type can be hybrid cloud that is typical combination of public and private cloud. • Community cloud: • Several organizations jointly construct and share the same cloud .
  • 5.
  • 6. Problems Associated with Cloud Computing • Most security problems stem from: – Loss of control – Lack of trust (mechanisms) – Multi-tenancy SECURITY ISSUES: • Network security. • Interfaces. • Data Security. • Virtualization. • Governance
  • 7. 1.Network security Problems associated with network communications and configurations regarding cloud computing infrastructures. (a)Transfer security: Distributed architectures,massive resource sharing and virtual machine(VM) instances synchronization imply more data in transit in the cloud,VPN(virtual private network)( mehanism.dropbox) (b) Firewalling: (yotta networks) Firewalls protect the provider’s internal cloud infrastructure against insiders and outsiders.
  • 8. 2.Data security Is Data Secure??? Protection of data in terms of confidentiality. (a) Cryptography:-Most employed practice to secure sensitive data. 1.Keep cloud credentials safe. 2.Keep encrypted data.(encrytion keys). (b) Redundancy: Essential to avoid data loss. (c) Disposal: Elementary data disposal techniques are the insufficient and commonly referred a deletion .
  • 9. 3.Virtualization • Virtualization is an essential technological characteristic of clouds which hides the technological complexity from the user and enables enhanced flexibility (through Aggregation, Routing and Translation). • (a) Isolation:-Although logically isolated, all VMs share the same hardware and consequently the same resources. • (b) Data leakage: Exploit hypervisor vulnerabilities and lack of isolation controls in order to leak data from virtualized infrastructures
  • 10. . (c) VM identification: Lack of controls for identifying virtual machines that are being used for executing a specific process or for storing files. (d) Cross-VM attacks:-Includes attempts to estimate provider traffic rates in order to steal cryptographic keys and increase chances of VM placement attacks.
  • 11. 4.Interfaces Concentrates all issues related to user administrative. (a) API:- Programming interfaces for accessing virtualized resources. (b) Administrative interface: Enables remote control of resources in an IaaS development for PaaS and application tools for SaaS. (c) User interface:-End-user interface for exploring provided resources and tools(the service itself). (d) Authentication:-Mechanisms required to enable access to the Cloud.
  • 12. 5.Governance • Issues related to (losing) administrative and security cloud computing solutions. • (a) Data control:- • Moving data to the cloud means losing control over redundancy. – Data, applications, resources are located with provider – User identity management is handled by the cloud – User access control rules, security policies and enforcement are managed by the cloud provider – Consumer relies on provider to ensure Data security and privacy (b) Security control:- Loss of governance over security mechanisms and policies.
  • 13. • (c) Lock-in: • User potential dependency on a particular service provider due to lack of well-established standards ,consequently becoming particularly vulnerable to migrations and service termination.
  • 14. Conclusion • Cloud computing is sometimes viewed as a reincarnation of the classic mainframe client-server model – However, resources are ubiquitous, scalable, highly virtualized – Contains all the traditional threats, as well as new ones • The main goal is to securely store and manage data that is not controlled by the owner of the data
  • 15. References 1. NIST (Authors: P. Mell and T. Grance), "The NIST Definition of Cloud Computing (ver. 15)," National Institute of Standards and Technology, Information Technology Laboratory (October 7 2009). 2. J. McDermott, (2009) "Security Requirements for Virtualization in Cloud Computing," presented at the ACSAC Cloud Security Workshop, Honolulu, Hawaii, USA, 2009. 3. J. Camp. (2001), “Trust and Risk in Internet Commerce,”

Notes de l'éditeur

  1. Government and Military sectors: complicated procurement rules and stringent security requirements Cloud-based categories: Cloud-based applications (SAAS) Cloud-based development (e.g. Google App Engine) Cloud-based infrastructure (e.g. Amazon’s EC2)
  2. Trust and tenancy issues as well as loss of control related to the management model
  3. Data mobility: the abiltiy to share data between cloud services Where does data reside? - out-of-state, out-of-country issues Security Concerns for government in particular FISMA How to certify and accredit cloud computing providers under FISMA (e.g. ISO 27001)