Download presentation
Presentation is loading. Please wait.
Published byLeonard Jacobs Modified over 9 years ago
1
Security in Cloud Computing Presented by : Ahmed Alalawi
2
Outline Introduction Cloud Computing Components. Security Issues. Information Security requirements (ISR) Policy Based and Layered Infrastructure Security : Dynamic Infrastructure Security Model Conclusion
3
Why we use Cloud Computing ? -Single point of control delivered over the web lets you manage multiple layers of complex infrastructure. -Support is just a call away. Real-time human tech. assistance will help you resolve your problem. -Enterprise Grade Infrastructure-as-a –service system deliver unbeatable computing power. -On-demand Compute,Network and Storage components add storage capacity in minutes. -Pay-as-you-use gives you choice and control over paying.
4
Cloud Computing Components Cloud Computing is a class of the next generation highly scalable distributed computing Cloud Computing Components : Five Characteristics Three Delivery Models Three Deployment Models (Clouds Type)
5
Five Characteristics: 1.On – Demand self-service 2.Broad network access 3.Resource Pooling 4.Rapid elasticity 5.Measured Service
6
Three Delivery Models: 1. Infrastructure as a Service (IaaS). 2. Platform as a Service (PaaS). 3. Software as a Service (SaaS).
7
Types of Clouds: 1.Public Available to public 2.Private Available to particular group 3.Hybrid is composition of two or more clouds
8
Types of Clouds: Public Cloud A public cloud is a model which allows users’ access to the cloud via interfaces mainstream web browsers. Typically based on a pay-per-use model. Public clouds are less secure than the other cloud models
9
Types of Clouds: Private Cloud A private cloud is set up within an organization’s internal enterprise datacenter. All the cloud resources and application are managed by the organization itself. More secure than the Public cloud.
10
Types of Clouds: Hybrid Cloud A hybrid cloud is a private cloud linked to one or more external cloud services, centrally managed, provisioned as a single unit. It provides virtual IT solutions through a mix of both public and private clouds. It Provides more secure control of the data and application and allows various parties to access information over the internet. It has an open architecture that allows interfaces with other management systems.
11
Cloud Computing Delivery Models: Infrastructure as a Service (IaaS) Infrastructure as a Service is a single tenant cloud layer where the Cloud computing vendor’s dedicated resources are only shared with contacted clients at a pay-per-use fee. Minimizes the need for huge investment in computing hardware such as servers, networking devices as processing power.
12
Cloud Computing Delivery Models: Software as a Service (SaaS) Software as a Service operates on the virtualized and pay-per-use costing model whereby software applications are leased out to contracted organization by specialized SaaS vendors. SaaS applications are accessed using web browsers over the internet, therefore web security is very important. SaaS providers may host the software in their own datacenters or may themselves be outsourced to IaaS providers.
13
Cloud Computing Delivery Models: Platform as a Service (PaaS) Platform as a service cloud layer works like IaaS but it provides an additional level of ‘rented’ functionality. PaaS offerings facilitate deployment of application without the cost and complexity of buying and managing underlying hardware and software and provisioning hosting capabilities.
15
Private Cloud Private Cloud Public Cloud SAAS (Software as a Service) IAAS (Infrastructure as a Service) PAAS (Platform as a Service) Hybrid Cloud Hybrid Cloud
16
Security Issues Privileged access : Who has specialized/privileged access to data? Who decides about the hiring and management of such administrators? Regulatory compliance : Is the could vender willing to undergo external audits and/or security certification? Data location : Does the cloud vender allow for any control over the location of data? Data segregation : Is encryption schemes designed and tested by experienced professionals ?
17
Continue Security Issues Recovery : What happens to data in the case of a disaster, and does the vendor offer complete restoration, and, if so, How long does that process take ? Investigative Support : Does the vendor have the ability to investigate any inappropriate or illegal activity? Long – term viability: What happens to data if the cloud vendor goes out of business, Is clients’ data returned and in what format? Data Availability: Can the cloud vendor move all their clients’ data onto a different environment should the existing environment become compromised or unavailable ?
18
Information Security Requirements (ISR) ISR Identification & Authentication AuthorizationConfidentialityIntegrity Non- repudiation Availability
19
ISR: Identification & Authentication This process is targeting at verifying and validating individual cloud users by employing usernames and passwords protecting their cloud profile.
20
ISR: Authorization Authorization is an important to ensure referential integrity is maintained. Authorization is maintained by the system administrator in a Private Cloud.
21
ISR: Confidentiality Confidentiality plays a major part in maintaining control over origination data situated across multiple distributed databases. It is must when employing a Public Cloud due to public clouds accessibility nature.
22
ISR: Integrity The Integrity requirements lies in applying the due diligence within the cloud domain mainly accessing data. The ACID ( Atomicity, Consistency, Isolation and Durability) should be applied across all Cloud Computing Deliver Models.
23
ISR: Non-repudiation Non-repudiation can be obtained by applying the traditional E-Commerce security protocols and token provisioning to data transmission with cloud applications.
24
ISR: Availability Availability is the most critical ISR,because it is a key decision factor when choosing between Public, Private or Hybrid Cloud as well as the delivery models.
26
Conclusion It is clear that although the use of cloud computing has rapidly increased, cloud computing security still a major issue in the cloud computing environment The area of Security on Cloud Computing still open area and there are many challenges in it.
27
Questions & Comments
28
Yildiz M, Abawajy J, Ercan T., Bernoth A., ALayered Security Approach for Cloud ComputingInfrastructure, ISPAN, pp.763-767, 10th InternationalSymposium on Pervasive Systems, Algorithms, andNetworks, 2009 Ramgovind, S. Eloff and M.M. Smith, E.,“The management of security in Cloud computing”, inInformation Security for South Asia (ISSA), 2010, pp. 1-7. Chen, Jianyong; Wang, Yang; Wang, Xiaomin;, "On-Demand Security Architecture for Cloud Computing," Computer, vol.45, no.7, pp.73-78, July 2012doi: 10.1109/MC.2012.120 http://www.idc.com http://www.netmagicsolutions.com http://www.salesforce.com http://www.katescomment.com/iaas-paas-saas-definition http://en.wikipedia.org/wiki/Cloud_computing http://aws.amazon.com/ec2 References
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.