SlideShare une entreprise Scribd logo
1  sur  48
Module#2
Dr Neeraj Kumar Pandey
Working With
A public cloud is one based on the standard cloud
computing model, in which a service provider
makes resources, such as applications and storage,
available to the general public over the Internet.
Public cloud services may be free or offered on a
pay-per-usage model.
Public cloud services are provided in a virtualized
environment, constructed using pooled shared
physical resources, and accessible over a public
network such as the internet.
Dr. Neeraj Kumar Pandey
Advantages:
 The price is right
 Ease of accessibility
 Less work for IT
 Scaling up is simple
Limitations/Challenges:
 Security Risks
 Bandwidth
 Customization as per user
 Isolation
 Multiple Tanancy
Dr. Neeraj Kumar Pandey
 Public cloud services and infrastructure are
provided off-site over the Internet by third-party
companies to multiple clients. Some examples of
public clouds are server hosting, storage services
and webmail. You have probably heard of Dropbox
and Google Drive, which are popular public storage
services.
 Public clouds are best when your information and
data is used by lots of people and your security
standards are not high. They are also good for
collaboration projects and doing an ad-hoc software
development project using a Platform as a Service
(PaaS).
Dr. Neeraj Kumar Pandey
 When there is "limited exposure to heavy
infrastructure investments such as mainframes
and enterprise applications."
 When IT staff is more likely to have been brought
up in the days of rapid development, virtualization
automation, services on demand, or open source.
 In a smaller business, when there is greater
flexibility and agility in decision making.
 When there is a need for rapid turnaround and
faster time to marker for new application.
 When IT staff is less likely to manage a SAN or
working on servers.
Dr. Neeraj Kumar Pandey
When selecting a public cloud provider, various
factors should therefore be taken into
consideration, including:
 The nature of the provider’s platform
 Accessibility from other devices and platforms
 Built-in functionality
 Individual or organizational needs
 Cost
 Amount of storage
 Security
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
As a IAAS provider, all of the fundamental
properties and characteristics of cloud
computing should be concerned and
implemented.
Dr. Neeraj Kumar Pandey
 Infrastructure as a service (IaaS) is a model of
Cloud computing intended for companies.
 It is a low-level service that provides access to a
virtualized computer equipment.
 The company is discharged from buying and
managing the computer equipment.
 Virtual machines are provided on which the
company can run the operating system of its
choice (if available…).
Dr. Neeraj Kumar Pandey
 The company manages: Application software
(executable, parameters, databases,…).
 The Cloud provider manages : Everything else!
Servers, operating systems (versions),
virtualization layers, storage, backups,
firewall, monitoring, internal networks,
access/security model, but also…
 Power supply, inverters, air conditioned,
access control to the equipment, ...
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Platform as a Service (PaaS) is a cloud model designed for
software developers that streamlines the development process
by shifting specific aspects of systems management to the
service provider. PaaS is used to develop web and mobile
applications using components that are pre-configured and
maintained by the service provider, including programming
languages, application servers and databases.
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
It is a cloud model that delivers on-demand applications that are
hosted and managed by the service provider and typically paid
for on a subscription basis. SaaS solutions offer a number of
advantages over on-premises deployments, including minimal
administration and maintenance, anywhere access, and in
many cases improved communication and collaboration. Some
cloud-based tools will also prove to be more cost effective than
their traditional, in-house counterparts.
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Module#2
Neeraj Pandey CEA Deptt. neeraj.pandey@gla.ac.in
Cloud Security
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
 Host Hopping Attacks: This attack exploits one of the
most defining characteristics of cloud computing:
resource sharing. this attack can be launched by
hackers if cloud provider does not enforce strict
mechanism to isolate shared resources such as
memory, storage, and reputation of different customers
or hosts . Failing to separate tenants (customers) can
certainly facilitate this type of attack and thereby allow
malicious hackers to hop on other hosts to compromise
other customers’ data and gain illegal access to it. This
attack can be particularly dangerous for public clouds
and the PaaS model where multiple clients share the
same physical machine. Attackers can cause severe
damage that could range from compromising sensitive
customer data to interrupting service for cloud
providers and distorting their image and reputation.
CloudSecurity
Dr. Neeraj Kumar Pandey
 Malicious Insider and Abuse of Privileges:
The shared and multi-tenancy nature of cloud
computing creates a fertile ground for insider
threat and promotes risk of “privilege abuse” to
confidential customer information. Hosting
sensitive information from multiple clients on
the same physical machine certainly entices
users with high privilege roles such as system
administrators and information security
managers to abuse their privileged access to
clients’ sensitive data and the possibility of
leaking or selling that information to
competitors or other parties of interest.
CloudSecurity
Dr. Neeraj Kumar Pandey
Identity Theft Attacks.
Malicious hackers can easily set up
accounts with cloud providers to use
cloud resources by simply paying for the
usage without any restrictions or limits
from cloud vendors on resource
consumption or workloads. Attackers
can exploit this advantage to use and
compromise customer’s critical
information and sell it for a price.
CloudSecurity
Dr. Neeraj Kumar Pandey
 Service Engine Attacks. The service engine is a highly
customized platform that sits above the physical layer
and characterizes the underlying cloud architecture;
this service engine is normally controlled by cloud
provider to mange customer resources but it can be
rented by potential customers who wish to use and
adopt the IaaS model. Hackers can abuse this feature by
subscribing to the IaaS model and renting a virtual
machine that would be hosted and controlled by the
service engine; then they can use the VM to hack the
service engine from the inside and use the service
engine to their advantage where it may contain
sensitive business information through other VMs from
other cloud subscribers.
CloudSecurity
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
 Threats
 Including the cloud in your perimeter
 Lets attackers inside the perimeter
 Prevents mobile users from accessing the cloud
directly
 Not including the cloud in your perimeter
 Essential services aren’t trusted
 No access controls on cloud
 Countermeasures
 Drop the perimeter model!
Dr. Neeraj Kumar Pandey
CloudSecurity
 Threat
 Disconnected provider and customer security systems
 Fired employee retains access to cloud
 Misbehavior in cloud not reported to customer
 Countermeasures
 At least, integrate identity management
 Consistent access controls
 Better, integrate monitoring and notifications
 Notes
 Can use SAML(Security Assertion Markup Language), LDAP(Lightweight Directory Access
Protocol), RADIUS(Remote Authentication Dial-In User Service), XACML(eXtensible
Access Control Markup Language), IF-MAP( Interface for Metadata Access Points), etc.
Dr. Neeraj Kumar Pandey
CloudSecurity

Contenu connexe

Tendances

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
nitinw25
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Jagriti Rai
 

Tendances (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Google Cloud Networking Deep Dive
Google Cloud Networking Deep DiveGoogle Cloud Networking Deep Dive
Google Cloud Networking Deep Dive
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Collaborating Using Cloud Services
Collaborating Using Cloud ServicesCollaborating Using Cloud Services
Collaborating Using Cloud Services
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Platform as a Service (PaaS)
Platform as a Service (PaaS)Platform as a Service (PaaS)
Platform as a Service (PaaS)
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud service providers
Cloud service providersCloud service providers
Cloud service providers
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 

Similaire à Public cloud

Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptx
SURBHI SAROHA
 
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfQ.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
preetajain
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
Abhijit Kundu
 

Similaire à Public cloud (20)

Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptx
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfQ.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
Cloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptxCloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptx
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noida
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Unit-II-part 3.pdf
Unit-II-part 3.pdfUnit-II-part 3.pdf
Unit-II-part 3.pdf
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdf
 

Plus de Dr.Neeraj Kumar Pandey

Plus de Dr.Neeraj Kumar Pandey (19)

Delegates and events in C#
Delegates and events in C#Delegates and events in C#
Delegates and events in C#
 
Structure in c#
Structure in c#Structure in c#
Structure in c#
 
Strings in c#
Strings in c#Strings in c#
Strings in c#
 
Program control statements in c#
Program control statements in c#Program control statements in c#
Program control statements in c#
 
Operators and expression in c#
Operators and expression in c#Operators and expression in c#
Operators and expression in c#
 
Method parameters in c#
Method parameters in c#Method parameters in c#
Method parameters in c#
 
Enumeration in c#
Enumeration in c#Enumeration in c#
Enumeration in c#
 
C# classes objects
C#  classes objectsC#  classes objects
C# classes objects
 
Dot net assembly
Dot net assemblyDot net assembly
Dot net assembly
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
Role of cloud computing in scm
Role of cloud computing in scmRole of cloud computing in scm
Role of cloud computing in scm
 
cloud computing Multi cloud
cloud computing Multi cloudcloud computing Multi cloud
cloud computing Multi cloud
 
Ibm bluemix case study
Ibm bluemix case studyIbm bluemix case study
Ibm bluemix case study
 
Business cases for the need of cloud computing
Business cases for the need of cloud computingBusiness cases for the need of cloud computing
Business cases for the need of cloud computing
 
cloud computing: Vm migration
cloud computing: Vm migrationcloud computing: Vm migration
cloud computing: Vm migration
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 
Dot net introduction
Dot net introductionDot net introduction
Dot net introduction
 
C# lecture 2: Literals , Variables and Data Types in C#
C# lecture 2: Literals , Variables and Data Types in C#C# lecture 2: Literals , Variables and Data Types in C#
C# lecture 2: Literals , Variables and Data Types in C#
 
C# lecture 1: Introduction to Dot Net Framework
C# lecture 1: Introduction to Dot Net FrameworkC# lecture 1: Introduction to Dot Net Framework
C# lecture 1: Introduction to Dot Net Framework
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

Public cloud

  • 1. Module#2 Dr Neeraj Kumar Pandey Working With
  • 2. A public cloud is one based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model. Public cloud services are provided in a virtualized environment, constructed using pooled shared physical resources, and accessible over a public network such as the internet. Dr. Neeraj Kumar Pandey
  • 3. Advantages:  The price is right  Ease of accessibility  Less work for IT  Scaling up is simple Limitations/Challenges:  Security Risks  Bandwidth  Customization as per user  Isolation  Multiple Tanancy Dr. Neeraj Kumar Pandey
  • 4.  Public cloud services and infrastructure are provided off-site over the Internet by third-party companies to multiple clients. Some examples of public clouds are server hosting, storage services and webmail. You have probably heard of Dropbox and Google Drive, which are popular public storage services.  Public clouds are best when your information and data is used by lots of people and your security standards are not high. They are also good for collaboration projects and doing an ad-hoc software development project using a Platform as a Service (PaaS). Dr. Neeraj Kumar Pandey
  • 5.  When there is "limited exposure to heavy infrastructure investments such as mainframes and enterprise applications."  When IT staff is more likely to have been brought up in the days of rapid development, virtualization automation, services on demand, or open source.  In a smaller business, when there is greater flexibility and agility in decision making.  When there is a need for rapid turnaround and faster time to marker for new application.  When IT staff is less likely to manage a SAN or working on servers. Dr. Neeraj Kumar Pandey
  • 6. When selecting a public cloud provider, various factors should therefore be taken into consideration, including:  The nature of the provider’s platform  Accessibility from other devices and platforms  Built-in functionality  Individual or organizational needs  Cost  Amount of storage  Security Dr. Neeraj Kumar Pandey
  • 8. As a IAAS provider, all of the fundamental properties and characteristics of cloud computing should be concerned and implemented. Dr. Neeraj Kumar Pandey
  • 9.  Infrastructure as a service (IaaS) is a model of Cloud computing intended for companies.  It is a low-level service that provides access to a virtualized computer equipment.  The company is discharged from buying and managing the computer equipment.  Virtual machines are provided on which the company can run the operating system of its choice (if available…). Dr. Neeraj Kumar Pandey
  • 10.  The company manages: Application software (executable, parameters, databases,…).  The Cloud provider manages : Everything else! Servers, operating systems (versions), virtualization layers, storage, backups, firewall, monitoring, internal networks, access/security model, but also…  Power supply, inverters, air conditioned, access control to the equipment, ... Dr. Neeraj Kumar Pandey
  • 19. Platform as a Service (PaaS) is a cloud model designed for software developers that streamlines the development process by shifting specific aspects of systems management to the service provider. PaaS is used to develop web and mobile applications using components that are pre-configured and maintained by the service provider, including programming languages, application servers and databases. Dr. Neeraj Kumar Pandey
  • 26. It is a cloud model that delivers on-demand applications that are hosted and managed by the service provider and typically paid for on a subscription basis. SaaS solutions offer a number of advantages over on-premises deployments, including minimal administration and maintenance, anywhere access, and in many cases improved communication and collaboration. Some cloud-based tools will also prove to be more cost effective than their traditional, in-house counterparts. Dr. Neeraj Kumar Pandey
  • 29. Module#2 Neeraj Pandey CEA Deptt. neeraj.pandey@gla.ac.in Cloud Security
  • 41.  Host Hopping Attacks: This attack exploits one of the most defining characteristics of cloud computing: resource sharing. this attack can be launched by hackers if cloud provider does not enforce strict mechanism to isolate shared resources such as memory, storage, and reputation of different customers or hosts . Failing to separate tenants (customers) can certainly facilitate this type of attack and thereby allow malicious hackers to hop on other hosts to compromise other customers’ data and gain illegal access to it. This attack can be particularly dangerous for public clouds and the PaaS model where multiple clients share the same physical machine. Attackers can cause severe damage that could range from compromising sensitive customer data to interrupting service for cloud providers and distorting their image and reputation. CloudSecurity Dr. Neeraj Kumar Pandey
  • 42.  Malicious Insider and Abuse of Privileges: The shared and multi-tenancy nature of cloud computing creates a fertile ground for insider threat and promotes risk of “privilege abuse” to confidential customer information. Hosting sensitive information from multiple clients on the same physical machine certainly entices users with high privilege roles such as system administrators and information security managers to abuse their privileged access to clients’ sensitive data and the possibility of leaking or selling that information to competitors or other parties of interest. CloudSecurity Dr. Neeraj Kumar Pandey
  • 43. Identity Theft Attacks. Malicious hackers can easily set up accounts with cloud providers to use cloud resources by simply paying for the usage without any restrictions or limits from cloud vendors on resource consumption or workloads. Attackers can exploit this advantage to use and compromise customer’s critical information and sell it for a price. CloudSecurity Dr. Neeraj Kumar Pandey
  • 44.  Service Engine Attacks. The service engine is a highly customized platform that sits above the physical layer and characterizes the underlying cloud architecture; this service engine is normally controlled by cloud provider to mange customer resources but it can be rented by potential customers who wish to use and adopt the IaaS model. Hackers can abuse this feature by subscribing to the IaaS model and renting a virtual machine that would be hosted and controlled by the service engine; then they can use the VM to hack the service engine from the inside and use the service engine to their advantage where it may contain sensitive business information through other VMs from other cloud subscribers. CloudSecurity Dr. Neeraj Kumar Pandey
  • 45. Dr. Neeraj Kumar Pandey CloudSecurity
  • 46. Dr. Neeraj Kumar Pandey CloudSecurity
  • 47.  Threats  Including the cloud in your perimeter  Lets attackers inside the perimeter  Prevents mobile users from accessing the cloud directly  Not including the cloud in your perimeter  Essential services aren’t trusted  No access controls on cloud  Countermeasures  Drop the perimeter model! Dr. Neeraj Kumar Pandey CloudSecurity
  • 48.  Threat  Disconnected provider and customer security systems  Fired employee retains access to cloud  Misbehavior in cloud not reported to customer  Countermeasures  At least, integrate identity management  Consistent access controls  Better, integrate monitoring and notifications  Notes  Can use SAML(Security Assertion Markup Language), LDAP(Lightweight Directory Access Protocol), RADIUS(Remote Authentication Dial-In User Service), XACML(eXtensible Access Control Markup Language), IF-MAP( Interface for Metadata Access Points), etc. Dr. Neeraj Kumar Pandey CloudSecurity