Ragib Hasan Johns Hopkins University en.600.412 Spring 2011 Lecture 8 04/11/2011 Security and Privacy in Cloud Computing.

Slides:



Advertisements
Similar presentations
Summary of Cloud Computing (CC) from the paper Abovce the Clouds: A Berkeley View of Cloud Computing (Feb. 2009)
Advertisements

IT Industry & Cloud Computing. Trends ‘2011- The year of high salaries and immense job opportunities for IT job seekers’ (Source – Blog.Timesjobs.com)
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 3 02/15/2010 Security and Privacy in Cloud Computing.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 8 04/04/2011 Security and Privacy in Cloud Computing.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
By Adam Balla & Wachiu Siu
Cloud Computing to Satisfy Peak Capacity Needs Case Study.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 11 04/25/2011 Security and Privacy in Cloud Computing.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
Filippos BALASIS TANAKA LAB Catching Up With The Global Bandwidth Demand: 2023 And Beyond.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 7 03/29/2010 Security and Privacy in Cloud Computing.
8.
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 5 03/08/2010 Security and Privacy in Cloud Computing.
By: Kathleen Walters CLOUD COMPUTING Definition Cloud computing allows multiple computers to connect to one main network. Instead of installing different.
© Copyright 2011 John Wiley & Sons, Inc.
1 PUNCH PUNCH (Purdue University Network Computing Hubs) is a distributed network-computing infrastructure that allows geographically dispersed users to.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2013 Lecture 3 09/03/2013 Security and Privacy in Cloud Computing.
VPN Extension Requirements for Private Clouds draft-so-vepc-00.txt.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Open Cloud Sunil Kumar Balaganchi Thammaiah Internet and Web Systems 2, Spring 2012 Department of Computer Science University of Massachusetts Lowell.
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing.
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
Cloud Models – Iaas, Paas, SaaS, Chapter- 7 Introduction of cloud computing.
Use Case for Distributed Data Center in SUPA
CLOUD COMPUTING Corey Rutledge Spencer Peaty Group 4 – IT Seminar.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 16 10/11/2011 Security and Privacy in Cloud Computing.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 6 03/22/2010 Security and Privacy in Cloud Computing.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
Exploring the Network.
Integrating Security Design Into The Software Development Process For E-Commerce Systems By: M.T. Chan, L.F. Kwok (City University of Hong Kong)
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
Cloud Computing Nathan Bosen Kelsie Cagampang MIS 424 May 29, 2013.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 4 09/10/2013 Security and Privacy in Cloud Computing.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
Prepared By : Bhavin Tank(S.Y.B.Sc.(IT)) College of Computer Science & IT, Junagadh Cloud Computing.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 11 09/27/2011 Security and Privacy in Cloud Computing.
Niagara Framework in the Clouds Scott Boehm. … what the heck does that mean??
Vic Liu Liang Xia Zu Qiang Speaker: Vic Liu China Mobile Network as a Service Architecture draft-liu-nvo3-naas-arch-01.
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Cloud Computing ENG. YOUSSEF ABDELHAKIM. Agenda :  The definitions of Cloud Computing.  Examples of Cloud Computing.  Which companies are using Cloud.
Transform the datacenter brought to you by [insert partner name] Speaker name 00/00/0000 Insert your Logo here.
A Seminar On. What is Cloud Computing? Distributed computing on internet Or delivery of computing service over the internet. Eg: Yahoo!, GMail, Hotmail-
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
GIS IN THE CLOUD Cloud computing furnishes scalable GIS technology that is maintained off premises and delivered on demand as services via the Internet.
Clouding with Microsoft Azure
Mapping/Topology attacks on Virtual Machines
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Chapter 6: Securing the Cloud
Use Case for Distributed Data Center in SUPA
ConfigMgr and Azure – A Compelling Partnership – Part II
CLOUD ACCOUNTING SYSTEMS AND A SWOT ANALYSIS
Introduction to Cloud Computing
Cloud Testing Shilpi Chugh.
Systems Analysis and Design 5th Edition Chapter 8. Architecture Design
VPN What, where, who, why when?.
Azure Geo-Routes Incoming Traffic to Nearest Data Center for Best Mobile Database Service MINI-CASE STUDY “As a start-up company, we wanted to have a very.
Unit 36: Internet Server Management
Cloud Computing for Wireless Networks
Presentation transcript:

Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 8 04/11/2011 Security and Privacy in Cloud Computing

Cloud Network Security Goal: Examine techniques for securing cloud networking Review Assignment #8: (Due 4/18) Challenges for Cloud Network Security, HP Labs tech Report, /11/2011en Spring 2011 Lecture 9 | JHU | Ragib Hasan

Recap: Airavat (Cloud Privacy) Strengths? Weaknesses? Ideas? 4/11/2011en Spring 2011 Lecture 9 | JHU | Ragib Hasan

Today’s talk Will discuss a position paper (not an implementation or systems description paper) Will introduce the notion of cloud networking as a service, and its security implications – We will discuss what will be the issues in such a model 4/11/2011en Spring 2011 Lecture 9 | JHU | Ragib Hasan

For your review Instead of writing pros and cons of the paper, write the following: – Why security is a problem in cloud networking? (a brief paragraph) – 3 or more challenges in cloud network security – 3 or more techniques that may be used to secure cloud networks 4/11/2011en Spring 2011 Lecture 9 | JHU | Ragib Hasan

Cloud Networking Cloud computing requires – More performance from existing networks (bandwidth, quality, availability) – More flexibility Most of existing work on cloud focuses on single data centers and providers – But clouds can also be distributed (across different locations for same provider, or across different providers) 4/11/2011en Spring 2011 Lecture 9 | JHU | Ragib Hasan

Cloud Networking Cloud Networking involves – Ability to swiftly reconfigure networks according to client requirement (Network as a Service or NaaS) – Runs on top of intranet and the Internet – Uses network virtualization to connect clouds and users 4/11/2011en Spring 2011 Lecture 9 | JHU | Ragib Hasan

Cloud Networking Cloud networking extends network virtualization beyond the data centre to bring two new aspects to cloud computing: – the ability to connect the user to services in the cloud and – the ability to interconnect services that are geographically distributed across cloud infrastructures 4/11/2011en Spring 2011 Lecture 9 | JHU | Ragib Hasan

SAIL project from HP / EU Major European Union and HP project Goal is to – develop networking functions for applications with highly variable demands, – integrating these functions with computing and storage – along with the necessary tools for management and security. 4/11/2011en Spring 2011 Lecture 9 | JHU | Ragib Hasan

Threat Model Attacker: – External or Internal – Internal attacker can be disgruntled employee, or even hardware/software manufacturers embedding a trapdoor in code/firmware Threats – All traditional threats on networks (eavesdropping, DoS, Man-in-the-middle etc.) – Legal attacks (e.g., network crosses legal borders) 4/11/2011en Spring 2011 Lecture 9 | JHU | Ragib Hasan

Secure cloud Networking: Challenges Users view network as a private one, but it is built on top of public infrastructures How to implement security? – Component based: Virtual components themselves manage security – Infrastructure based: Network manages security 4/11/2011en Spring 2011 Lecture 9 | JHU | Ragib Hasan

Secure Cloud Networking: Challenges Integrity – How to ensure routing security (integrity and availability of routing information) 4/11/2011en Spring 2011 Lecture 9 | JHU | Ragib Hasan

Secure Cloud Networking: challenges How the virtual network provider guarantees a certain network capacity to a customer, How the access to this virtual network is controlled, and How the virtual network usage is accounted for (metering) 4/11/2011en Spring 2011 Lecture 9 | JHU | Ragib Hasan

Further reading 4/11/2011en Spring 2011 Lecture 9 | JHU | Ragib Hasan SAIL Project: