By Hajira Fatima Safa Mohammed Zaheer Abid Ali. Cloud computing is a result of evolving and adopting existing technologies. The goal of cloud computing.

Slides:



Advertisements
Similar presentations
Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,
Advertisements

Secure Internet Solutions Geoff Huston Chief Scientist, Internet Telstra.
Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
Hi – 5 Marcus Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi Security of Cloud Computing.
Prepared for [xxxx] – Commercial in Confidence connect transform protect A Cloudy Cyberspace? Tony Roadknight – Technical Architect.
TechFire Conference Cloud Made Simple - Dispelling the Hype. Brian Larkin Operations Director Digital Planet Brian Larkin Operations Director Digital Planet.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
Electronic Authentication for Flexible Learning Workshop Presentation (5 August 2003) Chris Connolly, CEO, Galexia Consulting.
Department of Internal Affairs Cloud computing considerations John Roberts Director, Relationship Management CRI Records Managers 11 June 2015.
(Geneva, Switzerland, September 2014)
Connect – Mersey Care NHS Trust & SCC Knowledge Driven Health.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Plan Introduction What is Cloud Computing?
A Web 2.0 Trading experience Trading in the cloud while keeping your feet on the ground ORbyte Solutions Limited Cloud Crowd 11 November
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
Tunis, Tunisia, 28 April 2014 Security Issues for Cloud and Future Networks Noureddine Boudriga, Director CN&S, University of Carthage
MIGRATING INTO A CLOUD P. Sai Kiran. 2 Cloud Computing Definition “It is a techno-business disruptive model of using distributed large-scale data centers.
Security issues in the Cloud Presentation for CloudCamp 2012 (Lagos) Christopher Odutola FVC Inc. Dubai.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Application Provider Visualization Access Analytics Curation Collection.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
44 Montgomery Street Suite 960 San Francisco, CA USA Tel Cell
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
Security considerations for mobile devices in GoRTT
Kevin Casady Hanna Short BJ Rollinson.  Centralized and Structured collection of data stored in a computer system  An electronic filing system  Easy.
Cloud computing is a technological advancement that can be advantageous to credit unions because of potential benefits such as: cost reduction, flexibility,
Javier Salido, CIPP Sr. Program Manager Trustworthy Computing Group Microsoft Corporation SESSION CODE: SIA337.
Security in the Clouds 1 Professor Sadie Creese London Hopper 2010 May 2010.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
In the Cloud How to Address Security in the Cloud.
Godfrey Ntoele Managing Executive: Government Business Service Cloud Computing Telco perspective ICT Summit 2012 Gauteng Province.
Privacy Preserving Delegated Access Control in Public Clouds.
Cloud Security: Critical Threats and Global Initiatives Jim Reavis, Executive Director July, 2010.
Daniel Cuschieri Information Security Distance Learning Weekend Conference August 2013.
Modeling and Simulation of Cloud Computing:A Review Wei Zhao, Yong Peng, Feng Xie, Zhonghua Dai 報告者 : 饒展榕.
Security Issues in Cloud Environment Vamshi. Cloud Environment Security My project.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Transformation Provider Visualization Access Analytics Curation Collection.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
Current Security Threats and Prevention Measures Relating to Cloud Services, Hadoop Concurrent Processing, and Big Data ATHER SHARIF, SARAH COONEY, SHENGQI.
CLOUDS. Online applications What is cloud computing Common, Location-independent, Online Utility on Demand Common implies multi-tenancy, not single or.
Incident Response In the Cloud.  CEO of BH Consulting – Independent Information Security Firm  Founder & Head of IRISSCERT – Ireland’s first Computer.
Andrea Ricci - ISIS Brussels, 12 April 2012 Policy conclusions and way forward.
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.
K E Y : DATA SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Hardware (Storage, Networking, etc.) Big Data Framework Scalable.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Enabling Secure Multi-Organization Collaboration Andrew Porter IT Director, Enterprise Architecture Merck & Co., Inc.
Clouding with Microsoft Azure
Threat Modeling for Cloud Computing
Conflict Resolution & Policy Compliance in Multi-Cloud Distributed System. Presented By:- Adarsh Pillay Deepak Begrajka Rudra gupta.
Survey on Security and Energy Efficiency in the Cloud Computing Environment Wei Wu.
Data Protection & Security
CLOUD COMPUTING SECURITY
All data occupies physical space, even if we don't think of it as such.
Understanding Security Layers
Mitigation Strategy “The long-term blueprint for reducing the potential losses identified in the risk assessment. The mitigation strategy includes the.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
E-Commerce for Developing Countries (EC-DC)
Cyber Risk & Cyber Insurance - Overview
CONTENTS BACKGROUND CLOUD MODELS SECURITY CONSIDERATIONS MANAGING RISK.
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
Computer Science and Engineering
Final exam question format
Final exam question format
Requirements engineering in Cloud Computing
Title of presentation.
Presentation transcript:

By Hajira Fatima Safa Mohammed Zaheer Abid Ali

Cloud computing is a result of evolving and adopting existing technologies. The goal of cloud computing is to allow its users to benefit with existing technologies irrespective of whether they are expert or not. Characteristics: Cost effective Robust Scalable Multitenant Abstraction Flexible

Potential Security Issues: Data Residency Data Loss Data Privacy Multi tenancy / Shared Technology Service and Traffic Hijacking

Potential Security Issues: Network Security Virtualisation Security Application Security Identity Management Denial of Service Nefarious use of Cloud Malicious Insiders

Potential Solutions: Perimeter Security Network Security Data Centre Security Platform and Application Security Encryption and Management Keys Data Security

Conclusion Good cloud mitigation strategies Risk control framework Regular auditing to make data transformation secure. More refined legislations and regulations Users must be aware about the policies and agreements before they signed.