SlideShare une entreprise Scribd logo
1  sur  7
Security in Cloud computing:
sharing more than resources

Martine Lapierre, THALES DSC, Technical Director



23-27 November 2009
Growing need of IaaS - Cloud would help:


 Smart         Environment        Smart cities   Smart transport   Smart energy
 healthcare    monitoring

Cloud computing implies
   loss of control
Choices of cloud offering                   Private
   based on:                                              Hybrid
– reputation to ensure                                                 Public
  protection and
  confidentiality
– ability of the cloud provider
  to prove that there is ‘no’
  loss of control
eHealth cloud example
         Data processing
                                    Journalisation of acts
         must satisfy
                                    (legal proof),
                            Dedicated network infra
         European data
                                    Journalisation of
         protection
Monitoring   Iaas                 Health (cyber defense Iaas
                                    access
                                    traces)                               Patients
 center                           Private
                                   cloud                 Sensitive data
                    Network
                                                         should be
                    transactions
                                                         destroyed at a Make
                    encryption,
                                                    Is available to timeavailable to
                                                         specified
       Doctors,
                  IsData storage
                     available to
        nurses      protection/ Medical
                    content        data
                                           Data should not External eHealth
                    driven
                                           leave the original service providers
                    security
                                           country of
                                           collection at any
– Satisfy strict  regulatory requirements  time

– Very sensitive to negative public perception
Customer’s view on security
Are my data secure in the Cloud ?
  Who can access the data ?
  Can I access my data at any time ? What is the SLA ?
  Can I stop my contract at any time ? (reversibility)


Can I comply with laws and regulation ?
  Where are my data ? What about if disclosure ?
  How long are my data kept if I ask for suppression ?
  How is managed the requisition process ?


Who is responsible?
  Loss of control while maintaining accountability even if operational
  responsibility falls upon 3rd parties
  In case of failure in services outsourced to the cloud, the customer cannot
  meet his duty to his own customers and is exposed to liability
Legal and regulatory challenges
  Understand the consequences of decoupling data from infrastructure.

 Regulation of cross-border data flows
      cloud providers operate datacenters in
      multiple locations and transfer data among
      them.
 Coherent regulations on privacy, data
   retention
      EU member states have divergent views as
      to whether cloud providers need to retain
      data and for how long.
 Enhance criminal enforcement of crimes
      Aggregation of data in cloud data centers
      are attractive targets for hackers.
      Incident response.
 Compliant storage certification
 Interoperability standards in cloud
Security challenges
Quality of service guaranties         Multi-tenancy issues and isolation
Certification and                     Insecure interfaces in federation
   accreditation                         context
Compliance to regulations             Data protection
ID management, RBAC                   Cloud infrastructure protection
Logging, audit                        Portability, reversibility




                                From Randy Marchany
THANK YOU!




ICSOC-ServiceWave 2009

Contenu connexe

Tendances

Veritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-ENVeritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-ENRichard Williams
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Unisys Corporation
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Khiro Mishra
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...ieeepondy
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computingAlexander Decker
 
An extensive research survey on data integrity and deduplication towards priv...
An extensive research survey on data integrity and deduplication towards priv...An extensive research survey on data integrity and deduplication towards priv...
An extensive research survey on data integrity and deduplication towards priv...IJECEIAES
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...Papitha Velumani
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...Papitha Velumani
 
Securing data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCSecuring data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCUlf Mattsson
 
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...anjuvipin
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf MattssonUlf Mattsson
 
Cloud Computing: legal issues
Cloud Computing: legal issuesCloud Computing: legal issues
Cloud Computing: legal issuesISPABelgium
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
New Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudNew Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudOnline Tech
 

Tendances (18)

Veritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-ENVeritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-EN
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
 
An extensive research survey on data integrity and deduplication towards priv...
An extensive research survey on data integrity and deduplication towards priv...An extensive research survey on data integrity and deduplication towards priv...
An extensive research survey on data integrity and deduplication towards priv...
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
 
Securing data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCSecuring data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYC
 
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
 
Cloud Computing: legal issues
Cloud Computing: legal issuesCloud Computing: legal issues
Cloud Computing: legal issues
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
New Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudNew Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the Cloud
 

En vedette

Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...ServiceWave 2010
 
Massonet Philippe Panel - Security in the clouds: An Academic Perspective
Massonet Philippe Panel - Security in the clouds: An Academic PerspectiveMassonet Philippe Panel - Security in the clouds: An Academic Perspective
Massonet Philippe Panel - Security in the clouds: An Academic PerspectiveServiceWave 2010
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...Brian Solis
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source CreativitySara Cannon
 

En vedette (7)

03 v pevtschin
03 v pevtschin03 v pevtschin
03 v pevtschin
 
Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...
 
Massonet Philippe Panel - Security in the clouds: An Academic Perspective
Massonet Philippe Panel - Security in the clouds: An Academic PerspectiveMassonet Philippe Panel - Security in the clouds: An Academic Perspective
Massonet Philippe Panel - Security in the clouds: An Academic Perspective
 
03 v pevtschin
03 v pevtschin03 v pevtschin
03 v pevtschin
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source Creativity
 

Similaire à Martine Lapierre - Security in Cloud computing: sharing more than resources

The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution ServiceAngelo Corsaro
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
High Performance Distributed Computing with DDS and Scala
High Performance Distributed Computing with DDS and ScalaHigh Performance Distributed Computing with DDS and Scala
High Performance Distributed Computing with DDS and ScalaAngelo Corsaro
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcarePeter de Bruijn
 
Vormetric data security complying with pci dss encryption rules
Vormetric data security  complying with pci dss encryption rulesVormetric data security  complying with pci dss encryption rules
Vormetric data security complying with pci dss encryption rulesVormetric Inc
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1Khazret Sapenov
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?Mario Drobics
 
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...Cloudera, Inc.
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Cloud Legal Project
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computingBharat Gupta
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityIGEEKS TECHNOLOGIES
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 

Similaire à Martine Lapierre - Security in Cloud computing: sharing more than resources (20)

The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
High Performance Distributed Computing with DDS and Scala
High Performance Distributed Computing with DDS and ScalaHigh Performance Distributed Computing with DDS and Scala
High Performance Distributed Computing with DDS and Scala
 
cloud
cloudcloud
cloud
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
 
Vormetric data security complying with pci dss encryption rules
Vormetric data security  complying with pci dss encryption rulesVormetric data security  complying with pci dss encryption rules
Vormetric data security complying with pci dss encryption rules
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?
 
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
 
234 237
234 237234 237
234 237
 
234 237
234 237234 237
234 237
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computing
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 

Plus de ServiceWave 2010

Usman Wajid: Service-based Application Development by Ordinary End Users and ...
Usman Wajid: Service-based Application Development by Ordinary End Users and ...Usman Wajid: Service-based Application Development by Ordinary End Users and ...
Usman Wajid: Service-based Application Development by Ordinary End Users and ...ServiceWave 2010
 
D. Meiländer, S. Gorlatch, C. Cappiello, V. Mazza, R. Kazhamiakin, and A. Buc...
D. Meiländer, S. Gorlatch, C. Cappiello,V. Mazza, R. Kazhamiakin, and A. Buc...D. Meiländer, S. Gorlatch, C. Cappiello,V. Mazza, R. Kazhamiakin, and A. Buc...
D. Meiländer, S. Gorlatch, C. Cappiello, V. Mazza, R. Kazhamiakin, and A. Buc...ServiceWave 2010
 
Maryam Razavian: A Frame of Reference for SOA Migration
Maryam Razavian: A Frame of Reference for SOA MigrationMaryam Razavian: A Frame of Reference for SOA Migration
Maryam Razavian: A Frame of Reference for SOA MigrationServiceWave 2010
 
Security in the Clouds Panel Chair: Mike Surridge
Security in the Clouds Panel Chair: Mike SurridgeSecurity in the Clouds Panel Chair: Mike Surridge
Security in the Clouds Panel Chair: Mike SurridgeServiceWave 2010
 
Chen Wang, Pazat, Di Napoli, Giordano: A Chemical Based Middleware for Workf...
Chen Wang, Pazat, Di Napoli, Giordano:  A Chemical Based Middleware for Workf...Chen Wang, Pazat, Di Napoli, Giordano:  A Chemical Based Middleware for Workf...
Chen Wang, Pazat, Di Napoli, Giordano: A Chemical Based Middleware for Workf...ServiceWave 2010
 
Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...
Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...
Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...ServiceWave 2010
 
Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...
Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...
Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...ServiceWave 2010
 
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...ServiceWave 2010
 
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...ServiceWave 2010
 
Scott Kirkpatrick (Hebrew University): OneLab: Federation and Testbeds
Scott Kirkpatrick (Hebrew University): OneLab: Federation and TestbedsScott Kirkpatrick (Hebrew University): OneLab: Federation and Testbeds
Scott Kirkpatrick (Hebrew University): OneLab: Federation and TestbedsServiceWave 2010
 
Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...
Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...
Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...ServiceWave 2010
 
Orestis Terzidis - Taking the Internet of Services to the Next Level
Orestis Terzidis - Taking the Internet of Services to the Next LevelOrestis Terzidis - Taking the Internet of Services to the Next Level
Orestis Terzidis - Taking the Internet of Services to the Next LevelServiceWave 2010
 
Martine Lapierre - Security & Privacy trends for Urban & transport applications
Martine Lapierre - Security & Privacy trends for Urban & transport applications Martine Lapierre - Security & Privacy trends for Urban & transport applications
Martine Lapierre - Security & Privacy trends for Urban & transport applications ServiceWave 2010
 
Mário Campolargo - Services and clouds as cornerstones of the Digital Agenda
Mário Campolargo - Services and clouds as cornerstones of the Digital AgendaMário Campolargo - Services and clouds as cornerstones of the Digital Agenda
Mário Campolargo - Services and clouds as cornerstones of the Digital AgendaServiceWave 2010
 
Demonstration Evening ServiceWave 2010, FIA and FIRE
Demonstration Evening ServiceWave 2010, FIA and FIREDemonstration Evening ServiceWave 2010, FIA and FIRE
Demonstration Evening ServiceWave 2010, FIA and FIREServiceWave 2010
 
Dr Berre - Service Modelling and Representation Techniques
Dr Berre - Service Modelling and Representation TechniquesDr Berre - Service Modelling and Representation Techniques
Dr Berre - Service Modelling and Representation TechniquesServiceWave 2010
 
Empowering Citizens in Public Service Design and Delivery: A reference model ...
Empowering Citizens in Public Service Design and Delivery: A reference model ...Empowering Citizens in Public Service Design and Delivery: A reference model ...
Empowering Citizens in Public Service Design and Delivery: A reference model ...ServiceWave 2010
 
The Hunt for Leading Indicators
The Hunt for Leading IndicatorsThe Hunt for Leading Indicators
The Hunt for Leading IndicatorsServiceWave 2010
 

Plus de ServiceWave 2010 (20)

Usman Wajid: Service-based Application Development by Ordinary End Users and ...
Usman Wajid: Service-based Application Development by Ordinary End Users and ...Usman Wajid: Service-based Application Development by Ordinary End Users and ...
Usman Wajid: Service-based Application Development by Ordinary End Users and ...
 
D. Meiländer, S. Gorlatch, C. Cappiello, V. Mazza, R. Kazhamiakin, and A. Buc...
D. Meiländer, S. Gorlatch, C. Cappiello,V. Mazza, R. Kazhamiakin, and A. Buc...D. Meiländer, S. Gorlatch, C. Cappiello,V. Mazza, R. Kazhamiakin, and A. Buc...
D. Meiländer, S. Gorlatch, C. Cappiello, V. Mazza, R. Kazhamiakin, and A. Buc...
 
Maryam Razavian: A Frame of Reference for SOA Migration
Maryam Razavian: A Frame of Reference for SOA MigrationMaryam Razavian: A Frame of Reference for SOA Migration
Maryam Razavian: A Frame of Reference for SOA Migration
 
Security in the Clouds Panel Chair: Mike Surridge
Security in the Clouds Panel Chair: Mike SurridgeSecurity in the Clouds Panel Chair: Mike Surridge
Security in the Clouds Panel Chair: Mike Surridge
 
Chen Wang, Pazat, Di Napoli, Giordano: A Chemical Based Middleware for Workf...
Chen Wang, Pazat, Di Napoli, Giordano:  A Chemical Based Middleware for Workf...Chen Wang, Pazat, Di Napoli, Giordano:  A Chemical Based Middleware for Workf...
Chen Wang, Pazat, Di Napoli, Giordano: A Chemical Based Middleware for Workf...
 
Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...
Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...
Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...
 
Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...
Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...
Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...
 
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
 
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
 
Scott Kirkpatrick (Hebrew University): OneLab: Federation and Testbeds
Scott Kirkpatrick (Hebrew University): OneLab: Federation and TestbedsScott Kirkpatrick (Hebrew University): OneLab: Federation and Testbeds
Scott Kirkpatrick (Hebrew University): OneLab: Federation and Testbeds
 
Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...
Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...
Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...
 
1 sw2010 testbeds-panel
1  sw2010 testbeds-panel1  sw2010 testbeds-panel
1 sw2010 testbeds-panel
 
Orestis Terzidis - Taking the Internet of Services to the Next Level
Orestis Terzidis - Taking the Internet of Services to the Next LevelOrestis Terzidis - Taking the Internet of Services to the Next Level
Orestis Terzidis - Taking the Internet of Services to the Next Level
 
Martine Lapierre - Security & Privacy trends for Urban & transport applications
Martine Lapierre - Security & Privacy trends for Urban & transport applications Martine Lapierre - Security & Privacy trends for Urban & transport applications
Martine Lapierre - Security & Privacy trends for Urban & transport applications
 
Mário Campolargo - Services and clouds as cornerstones of the Digital Agenda
Mário Campolargo - Services and clouds as cornerstones of the Digital AgendaMário Campolargo - Services and clouds as cornerstones of the Digital Agenda
Mário Campolargo - Services and clouds as cornerstones of the Digital Agenda
 
Fire Demos
Fire DemosFire Demos
Fire Demos
 
Demonstration Evening ServiceWave 2010, FIA and FIRE
Demonstration Evening ServiceWave 2010, FIA and FIREDemonstration Evening ServiceWave 2010, FIA and FIRE
Demonstration Evening ServiceWave 2010, FIA and FIRE
 
Dr Berre - Service Modelling and Representation Techniques
Dr Berre - Service Modelling and Representation TechniquesDr Berre - Service Modelling and Representation Techniques
Dr Berre - Service Modelling and Representation Techniques
 
Empowering Citizens in Public Service Design and Delivery: A reference model ...
Empowering Citizens in Public Service Design and Delivery: A reference model ...Empowering Citizens in Public Service Design and Delivery: A reference model ...
Empowering Citizens in Public Service Design and Delivery: A reference model ...
 
The Hunt for Leading Indicators
The Hunt for Leading IndicatorsThe Hunt for Leading Indicators
The Hunt for Leading Indicators
 

Martine Lapierre - Security in Cloud computing: sharing more than resources

  • 1. Security in Cloud computing: sharing more than resources Martine Lapierre, THALES DSC, Technical Director 23-27 November 2009
  • 2. Growing need of IaaS - Cloud would help: Smart Environment Smart cities Smart transport Smart energy healthcare monitoring Cloud computing implies loss of control Choices of cloud offering Private based on: Hybrid – reputation to ensure Public protection and confidentiality – ability of the cloud provider to prove that there is ‘no’ loss of control
  • 3. eHealth cloud example Data processing Journalisation of acts must satisfy (legal proof), Dedicated network infra European data Journalisation of protection Monitoring Iaas Health (cyber defense Iaas access traces) Patients center Private cloud Sensitive data Network should be transactions destroyed at a Make encryption, Is available to timeavailable to specified Doctors, IsData storage available to nurses protection/ Medical content data Data should not External eHealth driven leave the original service providers security country of collection at any – Satisfy strict regulatory requirements time – Very sensitive to negative public perception
  • 4. Customer’s view on security Are my data secure in the Cloud ? Who can access the data ? Can I access my data at any time ? What is the SLA ? Can I stop my contract at any time ? (reversibility) Can I comply with laws and regulation ? Where are my data ? What about if disclosure ? How long are my data kept if I ask for suppression ? How is managed the requisition process ? Who is responsible? Loss of control while maintaining accountability even if operational responsibility falls upon 3rd parties In case of failure in services outsourced to the cloud, the customer cannot meet his duty to his own customers and is exposed to liability
  • 5. Legal and regulatory challenges Understand the consequences of decoupling data from infrastructure. Regulation of cross-border data flows cloud providers operate datacenters in multiple locations and transfer data among them. Coherent regulations on privacy, data retention EU member states have divergent views as to whether cloud providers need to retain data and for how long. Enhance criminal enforcement of crimes Aggregation of data in cloud data centers are attractive targets for hackers. Incident response. Compliant storage certification Interoperability standards in cloud
  • 6. Security challenges Quality of service guaranties Multi-tenancy issues and isolation Certification and Insecure interfaces in federation accreditation context Compliance to regulations Data protection ID management, RBAC Cloud infrastructure protection Logging, audit Portability, reversibility From Randy Marchany