security Issues of cloud computing

Current Security 
Issues for cloud computing
Contents 
• Introduction 
• Cloud models 
• Security Issues 
• Conclusion 
• References
WHAT IS CLOUD COMPUTING??? 
• Features 
– Use of internet-based services to support business process 
– Rent IT-services on a utility-like basis 
• Attributes 
– Rapid deployment 
– Low startup costs/ capital investments 
– Costs based on usage or subscription 
– Multi-tenant sharing of services/ resources 
• Essential characteristics 
– On demand self-service(just-in-time availability of resources”) 
– Ubiquitous network access 
– Location independent resource pooling 
– Rapid elasticity 
– Measured service 
Source: NIST
Cloud Models 
• Delivery Models 
– SaaS 
– PaaS 
– IaaS 
• Deployment Models 
• Public cloud: 
• multiple customers share the computing resources provided by a single service 
provider. 
• Private cloud: 
• computing resources are used and controlled by a private enterprise. 
• Hybrid cloud: 
• A third type can be hybrid cloud that is typical combination of public and private cloud. 
• Community cloud: 
• Several organizations jointly construct and share the same cloud .
security Issues of cloud computing
Problems Associated with Cloud 
Computing 
• Most security problems stem from: 
– Loss of control 
– Lack of trust (mechanisms) 
– Multi-tenancy 
SECURITY ISSUES: 
• Network security. 
• Interfaces. 
• Data Security. 
• Virtualization. 
• Governance
1.Network security 
Problems associated with network communications and configurations 
regarding cloud computing infrastructures. 
(a)Transfer security: 
Distributed architectures,massive resource sharing and virtual machine(VM) 
instances synchronization imply more data in transit in the cloud,VPN(virtual 
private network)( mehanism.dropbox) 
(b) Firewalling: (yotta networks) 
Firewalls protect the provider’s internal cloud infrastructure against 
insiders and outsiders.
2.Data security 
Is Data Secure??? 
Protection of data in terms of confidentiality. 
(a) Cryptography:-Most employed practice to secure sensitive 
data. 
1.Keep cloud credentials safe. 
2.Keep encrypted data.(encrytion keys). 
(b) Redundancy: Essential to avoid data loss. 
(c) Disposal: 
Elementary data disposal techniques are the insufficient and commonly 
referred a deletion .
3.Virtualization 
• Virtualization is an essential technological characteristic of clouds 
which hides the technological complexity from the user and 
enables enhanced flexibility (through Aggregation, Routing and 
Translation). 
• (a) Isolation:-Although logically isolated, all VMs share the same 
hardware and consequently the same resources. 
• (b) Data leakage: Exploit hypervisor vulnerabilities and lack of 
isolation controls in order to leak data from virtualized infrastructures
. 
(c) VM identification: Lack of controls for identifying virtual machines 
that are being used for executing a specific process or for storing 
files. 
(d) Cross-VM attacks:-Includes attempts to estimate provider traffic 
rates in order to steal cryptographic keys and increase chances of 
VM placement attacks.
4.Interfaces 
Concentrates all issues related to user administrative. 
(a) API:- Programming interfaces for accessing virtualized resources. 
(b) Administrative interface: 
Enables remote control of resources in an IaaS development 
for PaaS and application tools for SaaS. 
(c) User interface:-End-user interface for exploring provided resources 
and tools(the service itself). 
(d) Authentication:-Mechanisms required to enable access to the 
Cloud.
5.Governance 
• Issues related to (losing) administrative and security cloud 
computing solutions. 
• (a) Data control:- 
• Moving data to the cloud means losing control over redundancy. 
– Data, applications, resources are located with provider 
– User identity management is handled by the cloud 
– User access control rules, security policies and enforcement are 
managed by the cloud provider 
– Consumer relies on provider to ensure 
Data security and privacy 
(b) Security control:- 
Loss of governance over security mechanisms and policies.
• (c) Lock-in: 
• User potential dependency on a particular service provider due to 
lack of well-established standards ,consequently becoming 
particularly vulnerable to migrations and service termination.
Conclusion 
• Cloud computing is sometimes viewed as a reincarnation 
of the classic mainframe client-server model 
– However, resources are ubiquitous, scalable, highly virtualized 
– Contains all the traditional threats, as well as new ones 
• The main goal is to securely store and manage data that 
is not controlled by the owner of the data
References 
1. NIST (Authors: P. Mell and T. Grance), "The NIST Definition of 
Cloud Computing (ver. 15)," National Institute of Standards and 
Technology, Information Technology Laboratory (October 7 
2009). 
2. J. McDermott, (2009) "Security Requirements for Virtualization in 
Cloud Computing," presented at the ACSAC Cloud Security 
Workshop, Honolulu, Hawaii, USA, 2009. 
3. J. Camp. (2001), “Trust and Risk in Internet Commerce,”
security Issues of cloud computing
1 sur 16

Recommandé

Cloud Security par
Cloud SecurityCloud Security
Cloud SecurityAWS User Group Bengaluru
12.4K vues133 diapositives
Cloud security par
Cloud security Cloud security
Cloud security Mohamed Shalash
2.8K vues68 diapositives
Cloud Computing Security Challenges par
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
11.9K vues12 diapositives
Security Issues of Cloud Computing par
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
9K vues25 diapositives
Security Issues in Cloud Computing par
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
1.5K vues17 diapositives
Cloud Computing Security par
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
41.6K vues37 diapositives

Contenu connexe

Tendances

Cloud computing-security-issues par
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
3.9K vues40 diapositives
Cloud Security: A New Perspective par
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
1.5K vues29 diapositives
Cloud computing security issues and challenges par
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
30.3K vues22 diapositives
Zero Trust Model Presentation par
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model PresentationGowdhaman Jothilingam
12.3K vues19 diapositives
Cloud Computing - Security Benefits and Risks par
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
2K vues45 diapositives
Cloud Computing Security Issues par
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
579 vues18 diapositives

Tendances(20)

Cloud computing-security-issues par Aleem Mohammed
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
Aleem Mohammed3.9K vues
Cloud Security: A New Perspective par Wen-Pai Lu
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu1.5K vues
Cloud computing security issues and challenges par Dheeraj Negi
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi30.3K vues
Cloud security and security architecture par Vladimir Jirasek
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
Vladimir Jirasek27.8K vues
Cloud computing par student
Cloud computingCloud computing
Cloud computing
student7.1K vues
Cloud security Presentation par Ajay p
Cloud security PresentationCloud security Presentation
Cloud security Presentation
Ajay p4.9K vues
Privacy in cloud computing par Ahmed Nour
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
Ahmed Nour4.5K vues
Lecture01: Introduction to Security and Privacy in Cloud Computing par ragibhasan
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
ragibhasan2.3K vues
Cloud computing and its security issues par Jyoti Srivastava
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
Jyoti Srivastava1.5K vues

Similaire à security Issues of cloud computing

4831586.ppt par
4831586.ppt4831586.ppt
4831586.pptahmad21315
1 vue75 diapositives
Cloudcomputingoct2009 100301142544-phpapp02 par
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02abhisheknayak29
951 vues92 diapositives
Introduction to Cloud Security.pptx par
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptxssuser0fc2211
6 vues54 diapositives
CLOUD COMPUTING AND STORAGE par
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGEShalini Toluchuri
7.8K vues23 diapositives
cloud-complete.ppt par
cloud-complete.pptcloud-complete.ppt
cloud-complete.pptImpactGenshin3
7 vues204 diapositives
Cloud computing final show par
Cloud computing final   showCloud computing final   show
Cloud computing final showahmad abdelhafeez
422 vues85 diapositives

Similaire à security Issues of cloud computing(20)

Cloudcomputingoct2009 100301142544-phpapp02 par abhisheknayak29
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02
abhisheknayak29951 vues
Introduction to Cloud Security.pptx par ssuser0fc2211
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptx
ssuser0fc22116 vues
110307 cloud security requirements gourley par GovCloud Network
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
GovCloud Network976 vues
12-cloud-security.ppt par chelsi33
12-cloud-security.ppt12-cloud-security.ppt
12-cloud-security.ppt
chelsi3324 vues
Cloud computing 9 cloud deployment models and security concerns par Vaibhav Khanna
Cloud computing 9 cloud deployment models and security concernsCloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concerns
Vaibhav Khanna27 vues
Cloud and Virtualization Security par Rubal Sagwal
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
Rubal Sagwal462 vues
Introduction to Cloud Computing.pptx par sarahabbas40
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
sarahabbas4012 vues
Cloud complete par Navriti
Cloud completeCloud complete
Cloud complete
Navriti1.2K vues
Cloud security issues and concerns par Mrinal Baowaly
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concerns
Mrinal Baowaly201 vues

Dernier

Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... par
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...ShapeBlue
54 vues15 diapositives
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... par
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...ShapeBlue
77 vues12 diapositives
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... par
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
77 vues29 diapositives
20231123_Camunda Meetup Vienna.pdf par
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
46 vues73 diapositives
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... par
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
50 vues69 diapositives
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue par
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueShapeBlue
96 vues20 diapositives

Dernier(20)

Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... par ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue54 vues
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... par ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue77 vues
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... par TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc77 vues
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... par Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 vues
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue par ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue96 vues
NTGapps NTG LowCode Platform par Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu141 vues
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue par ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue50 vues
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online par ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue102 vues
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... par ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue57 vues
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... par Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... par ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue63 vues
Igniting Next Level Productivity with AI-Infused Data Integration Workflows par Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software344 vues
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... par ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue46 vues
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... par ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue88 vues
Why and How CloudStack at weSystems - Stephan Bienek - weSystems par ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue111 vues
State of the Union - Rohit Yadav - Apache CloudStack par ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue145 vues
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue par ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue46 vues

security Issues of cloud computing

  • 1. Current Security Issues for cloud computing
  • 2. Contents • Introduction • Cloud models • Security Issues • Conclusion • References
  • 3. WHAT IS CLOUD COMPUTING??? • Features – Use of internet-based services to support business process – Rent IT-services on a utility-like basis • Attributes – Rapid deployment – Low startup costs/ capital investments – Costs based on usage or subscription – Multi-tenant sharing of services/ resources • Essential characteristics – On demand self-service(just-in-time availability of resources”) – Ubiquitous network access – Location independent resource pooling – Rapid elasticity – Measured service Source: NIST
  • 4. Cloud Models • Delivery Models – SaaS – PaaS – IaaS • Deployment Models • Public cloud: • multiple customers share the computing resources provided by a single service provider. • Private cloud: • computing resources are used and controlled by a private enterprise. • Hybrid cloud: • A third type can be hybrid cloud that is typical combination of public and private cloud. • Community cloud: • Several organizations jointly construct and share the same cloud .
  • 6. Problems Associated with Cloud Computing • Most security problems stem from: – Loss of control – Lack of trust (mechanisms) – Multi-tenancy SECURITY ISSUES: • Network security. • Interfaces. • Data Security. • Virtualization. • Governance
  • 7. 1.Network security Problems associated with network communications and configurations regarding cloud computing infrastructures. (a)Transfer security: Distributed architectures,massive resource sharing and virtual machine(VM) instances synchronization imply more data in transit in the cloud,VPN(virtual private network)( mehanism.dropbox) (b) Firewalling: (yotta networks) Firewalls protect the provider’s internal cloud infrastructure against insiders and outsiders.
  • 8. 2.Data security Is Data Secure??? Protection of data in terms of confidentiality. (a) Cryptography:-Most employed practice to secure sensitive data. 1.Keep cloud credentials safe. 2.Keep encrypted data.(encrytion keys). (b) Redundancy: Essential to avoid data loss. (c) Disposal: Elementary data disposal techniques are the insufficient and commonly referred a deletion .
  • 9. 3.Virtualization • Virtualization is an essential technological characteristic of clouds which hides the technological complexity from the user and enables enhanced flexibility (through Aggregation, Routing and Translation). • (a) Isolation:-Although logically isolated, all VMs share the same hardware and consequently the same resources. • (b) Data leakage: Exploit hypervisor vulnerabilities and lack of isolation controls in order to leak data from virtualized infrastructures
  • 10. . (c) VM identification: Lack of controls for identifying virtual machines that are being used for executing a specific process or for storing files. (d) Cross-VM attacks:-Includes attempts to estimate provider traffic rates in order to steal cryptographic keys and increase chances of VM placement attacks.
  • 11. 4.Interfaces Concentrates all issues related to user administrative. (a) API:- Programming interfaces for accessing virtualized resources. (b) Administrative interface: Enables remote control of resources in an IaaS development for PaaS and application tools for SaaS. (c) User interface:-End-user interface for exploring provided resources and tools(the service itself). (d) Authentication:-Mechanisms required to enable access to the Cloud.
  • 12. 5.Governance • Issues related to (losing) administrative and security cloud computing solutions. • (a) Data control:- • Moving data to the cloud means losing control over redundancy. – Data, applications, resources are located with provider – User identity management is handled by the cloud – User access control rules, security policies and enforcement are managed by the cloud provider – Consumer relies on provider to ensure Data security and privacy (b) Security control:- Loss of governance over security mechanisms and policies.
  • 13. • (c) Lock-in: • User potential dependency on a particular service provider due to lack of well-established standards ,consequently becoming particularly vulnerable to migrations and service termination.
  • 14. Conclusion • Cloud computing is sometimes viewed as a reincarnation of the classic mainframe client-server model – However, resources are ubiquitous, scalable, highly virtualized – Contains all the traditional threats, as well as new ones • The main goal is to securely store and manage data that is not controlled by the owner of the data
  • 15. References 1. NIST (Authors: P. Mell and T. Grance), "The NIST Definition of Cloud Computing (ver. 15)," National Institute of Standards and Technology, Information Technology Laboratory (October 7 2009). 2. J. McDermott, (2009) "Security Requirements for Virtualization in Cloud Computing," presented at the ACSAC Cloud Security Workshop, Honolulu, Hawaii, USA, 2009. 3. J. Camp. (2001), “Trust and Risk in Internet Commerce,”

Notes de l'éditeur

  1. Government and Military sectors: complicated procurement rules and stringent security requirements Cloud-based categories: Cloud-based applications (SAAS) Cloud-based development (e.g. Google App Engine) Cloud-based infrastructure (e.g. Amazon’s EC2)
  2. Trust and tenancy issues as well as loss of control related to the management model
  3. Data mobility: the abiltiy to share data between cloud services Where does data reside? - out-of-state, out-of-country issues Security Concerns for government in particular FISMA How to certify and accredit cloud computing providers under FISMA (e.g. ISO 27001)