CLOUD COMPUTING SECURITY

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

BARNALI CHAKRABARTY. What is an Operating System ?
IT Industry & Cloud Computing. Trends ‘2011- The year of high salaries and immense job opportunities for IT job seekers’ (Source – Blog.Timesjobs.com)
…delivery models. “ASC-HS” - The official hosting services for ARCHIBUS, the number one Software Solution for Real Estate, Infrastructure, and Facilities.
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
1 CLOUD AND SaaS-BASED PLATFORMS: ENSURING DATA PRIVACY May, 2011.
Security Issues and Challenges in Cloud Computing
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Cloud Computing Will Crowley Monica Lopez Jaimie Morrison.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
SaaS, PaaS & TaaS By: Raza Usmani
Cloud Computing Myths and Realities Towards a policy Framework for Arab countries.
Plan Introduction What is Cloud Computing?
Identity and Access Management Business Ready Security Solutions.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Security issues in the Cloud Presentation for CloudCamp 2012 (Lagos) Christopher Odutola FVC Inc. Dubai.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Moving Towards a Local Government Private Cloud MAV Technology Conference 2014.
HCIMA Unit 3 The Internet Revolution and Electronic Tools Next slide.
In the name of God :).
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Dale Smith COSC 4010 Computer Security Authentication & Security in the.NET environment.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Free Powerpoint Templates Page 1 Free Powerpoint Templates FP7 – Secure Enterprise Remote Banking System (SERBS) Small or medium scale focused research.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
CLOUD-BASED VIDS A CIO’S PERSPECTIVE Stephen Alford, CIO WEP, Inc.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Hybrid Cloud Hosting and Its Market Value. Cloud Hosting.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Clouding with Microsoft Azure
Lecture 6: Cloud Computing
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Data and database administration
VIRTUALIZATION & CLOUD COMPUTING
Computer Communication & Networks
Cloud Computing Kelley Raines.
BY GAWARE S.R. DEPT.OF COMP.SCI
Cloud Testing Shilpi Chugh.
Enterprise Single Sign-On
Company Overview & Strategy
Data Security for Microsoft Azure
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
An Introduction to Cloud Computing
KNOWLEDGE MANAGEMENT (KM) Session # 34
CONTENTS BACKGROUND CLOUD MODELS SECURITY CONSIDERATIONS MANAGING RISK.
What is Interesting in the CCSP certification?
Presentation slide for courses, classes, lectures et al.
Computer Science and Engineering
Unit 8 Network Security.
Revision PowerPoint By Nicole Davidson.
Cloud Storage-as-a-Service and Course Reflection
Computer Services Business challenge
OU BATTLECARD: Oracle Identity Management Training
Final exam question format
OU BATTLECARD: Oracle WebCenter Training
Final exam question format
Presentation transcript:

CLOUD COMPUTING SECURITY DONE BY, VISNUBARATH NAGAMANICKAM 11561053 PRAVEENBABU SINGARAVELU 11559249

CLOUD COMPUTING AND ITS SECURITY The practice of using a network of remote servers hosted on the internet to store, manage and process data. CLASSIFICATION OF CLOUD Public Cloud-used by vendors and it is accessible by public Private Cloud-used and maintained by private users(in-house) Hybrid Cloud-comprises of two or more clouds

RESEARCH ISSUES IN CLOUD DATA BREACHES BROKEN AUTHENTICATION METHODOLOGY INSECURE APPLICATION PROGRAMMING INTERFACES ACCOUNT HIJACKING LOSS OF CLOUD DATA NETWORK SECURITY

EXISTING SOLUTION IN CLOUD COMPUTING AUTHENTICATION: Creating password, accessible security, Fingerprint. ACCESS CONTROL: Ensuring the data to protect from the hackers. Service level agreement. POLICY INTEGRATION: Customer service provider. Cloud service customer.

SERVICE MANAGEMENT: Access to customer, Necessity to coordinate the engagements of partners , vendor and customer. Multi-cloud platform for customer TRUST MANAGEMENT: Policy integration and framework is essential for cloud computing. Should concentrate to wide spread trust centered policy.

EXPERIMENTAL ANALYSIS OF CLOUD COMPUTING

RECOMMENDATIONS It is essential to provide security for the cloud computing. Legal certification must be provided to the cloud account holder. Secure cloud computing must be proclaimed in different levels such as: Internet Server Database Data privacy

CONCLUSION It is efficient advantage to the businesses in this competitive market. It works with the concept of integrity, confidentiality, integrity, authenticity and availability of varying data and communications. The solution we can suggest is a creation security mesh across federations and giving essential level of horizontal service to the cloud services. A deeper study about security issues related to cloud must be focused in the future.