Security Issues and Challenges in Cloud Computing

Slides:



Advertisements
Similar presentations
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Advertisements

Cloud Computing Brandon Hixon Jonathan Moore. Cloud Computing Brandon Hixon What is Cloud Computing? How does it work? Jonathan Moore What are the key.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Mr C Johnston ICT Teacher
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Web server security Dr Jim Briggs WEBP security1.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
SaaS, PaaS & TaaS By: Raza Usmani
Cloud computing Tahani aljehani.
Plan Introduction What is Cloud Computing?
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
A Seminar on Securities In Cloud Computing Presented by Sanjib Kumar Raul Mtech(ICT) Roll-10IT61B09 IIT Kharagpur Under the supervision of Prof. Indranil.
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
Introduction to Cloud Computing
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
3 Cloud Computing.
Storage Security and Management: Security Framework
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
Cloud Computing & Security Issues Prepared by: Hamoud Al-Shammari CS 6910 Summer, 2011 University of Colorado at Colorado Springs Engineering & Applied.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
In the name of God :).
Software Security Testing Vinay Srinivasan cell:
OSI and TCP/IP Models And Some Vulnerabilities AfNOG th May 2011 – 10 th June 2011 Tanzania By Marcus K. G. Adomey.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Niagara Framework in the Clouds Scott Boehm. … what the heck does that mean??
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Kia Manoochehri.  Background  Threat Classification ◦ Traditional Threats ◦ Availability of cloud services ◦ Third-Party Control  The “Notorious Nine”
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Security Vulnerabilities in A Virtual Environment
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
A Taxonomy of Cloud Attack Consequences and Mitigation Strategies The Role of Access Control and Privileged Access Management.
Web Technologies Lecture 13 Introduction to cloud computing.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Cloud Computing 3. TECHNOLOGY GUIDE 3: Cloud Computing 2 Copyright John Wiley & Sons Canada.
Unit 3 Virtualization.
Chapter 5 Electronic Commerce | Security Threats - Solution
Chapter 6: Securing the Cloud
Chapter 7: Identifying Advanced Attacks
Cloud Computing By: Vanika Jennings.
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Prepared by: Assistant prof. Aslamzai
Chapter 5 Electronic Commerce | Security Threats - Solution
Cloud Computing Kelley Raines.
TYPES OF SERVER. TYPES OF SERVER What is a server.
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Network Services, Cloud Computing, and Virtualization
CLOUD COMPUTING Presented By:- EduTechlearners
Cloud Testing Shilpi Chugh.
Protect crypto exchange website from hackers
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
3 Cloud Computing.
Brandon Hixon Jonathan Moore
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Cloud Computing: Concepts
Designing IIS Security (IIS – Internet Information Service)
Cloud and Database Security
Presentation transcript:

Security Issues and Challenges in Cloud Computing CSC 557 Lambu Akhila Reddy

What is cloud computing? It is an internet based computing where all the shared resources ,software and information are provided to the computers and devices on demand. Users can access the information from anywhere and anytime

Features of cloud computing On demand-self service Broad Network access Resource pooling Rapid elasticity Measured service pricing

Types of clouds Private cloud --The cloud is managed by an organization and serve it solely. Public cloud --The cloud infrastructure is owned and managed by a large Cloud Service Provider (CSP). Community cloud --The cloud is managed by several organizations and supports a specific community that has the same interest. Hybrid cloud -- The cloud infrastructure is composed of two or more of the above models

Cloud service models Software as a Service (SaaS): --It offers renting application functionality from a service provider rather than buying, installing and running software by the user. Platform as a Service (PaaS) : --It provides a platform in the cloud, upon which applications can be developed and executed. Infrastructure as a Service (IaaS) : -- vendors offer computing power and storage space on demand.

Data Related Security Data Breach: 1.Confidentiality 2. Integrity Data Lock in: Users may lose data if they migrate from one vendor to another vendor. Data Remanence: It is the residual representation of data that have been nominally erased or removed in some way.

Data Related Security Data Recovery: Sometimes server may break down and cause damage or loss to users data. To avoid this, data should be backed up to be recovered in future Data Locality: In SaaS model of cloud environment, the user doesn’t know where the data is stored which may be an issue. The issue can be solved by creating secure SaaS model which can provide reliability to the customer on the location of the data of the user.

Application related security issues Cloud malware injection attack: In this attack a malicious virtual machine or a service implementation is injected into the cloud system. one solution to prevent this is to perform the integrity check to the service instance. Cookie poisoning: In this an unauthorized access is made into the application by modifying the contents of the cookie. One solution is to clean up the cookie or encrypt the cookie data.

Application related security issues Backdoor and Debug Option: Debug option is for the developers who use it to implement any changes requested at later stage in a website since these debug option provides back entry for the developers, sometimes these debug options are left enabled unnoticed, they may provide easy access to the hackers and allow them to make changes in the website. Hidden Field Manipulation: Certain fields are hidden in the web-site and is used by the developers. Hacker can easily modify on the web page.

CSP level attacks Guest hopping attack: An attacker will try get access to one virtual machine by penetrating another virtual machine hosted in the same hardware. SQL injection: It can be done by injecting the SQL commands into the database of an application to crash the database.

CSP level attacks Malicious Insider: In private cloud, its employee is granted access to the sensitive data of some or all customer administrators. Such privileges may expose information to security threats. Side channel attack: It occurs when an attacker places a malicious virtual machine on the same physical machine as the victim machine so that he can access all the confidential information on the victims machine.

Network level attacks DNS attacks: Domain hijacking: Domain hijacking is defined as changing the name of a domain without the knowledge or permission from the domain’s owner or creator. This enable the intruders to access the sensitive information. Cross site scripting: It is a type of attack in which user enters right URL of a website and hacker on the other site redirect the user to its own website and hack its credentials.

Network level attacks IP spoofing: DOS attack: When hackers overflows a network server or web server with frequent request of services to damage the network, the denial of service cannot keep up with them, server could not legitimate client regular requests.

Network level attacks Man in the middle attack: This is another issue of network security that will happen if secure socket layer (SSL) is not properly configured. Network Sniffing: Another type of attack is network sniffer, it is a more critical issue of network security in which unencrypted data are hacked through network.

Security requirements for cloud computing Identification and Authenticity: Authorization Non-repudiation Availability

Challenges in cloud computing Security Costing model Charging model Service level agreement Cloud interoperability issue

Thank you