SECURITY IN CLOUD COMPUTING By Bina Bhaskar Anand Mukundan.

Slides:



Advertisements
Similar presentations
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 6 2/13/2015.
Security Issues and Challenges in Cloud Computing
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 An Overview of Computer Security computer security.
Copyright © 2009 Juniper Networks, Inc. 1 Cloud Computing: Finding the Silver Lining Steve Hanna, Juniper Networks.
Web server security Dr Jim Briggs WEBP security1.
Authors: Thomas Ristenpart, et at.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Cloud Computing Cloud Security– an overview Keke Chen.
Chirag N. Modi and Prof. Dhiren R. Patel NIT Surat, India Ph. D Colloquium, CSI-2011 Signature Apriori based Network.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Cloud Computing & Security Issues Prepared by: Hamoud Al-Shammari CS 6910 Summer, 2011 University of Colorado at Colorado Springs Engineering & Applied.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
1 Julius Davies Architectural Technology Specialist Microsoft.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Thomas Ristenpart,Eran Tromer, Horav Shahcham and Stefan Savage
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Information Security What is Information Security?
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Module 6: Designing Security for Network Hosts
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
SECURITY IN CLOUD COMPUTING By Bina Bhaskar Anand Mukundan.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
S. A. Shonola & M. S. Joy Security Framework for Mobile Learning Environments.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Module 11: Designing Security for Network Perimeters.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Security Vulnerabilities in A Virtual Environment
MidVision Enables Clients to Rent IBM WebSphere for Development, Test, and Peak Production Workloads in the Cloud on Microsoft Azure MICROSOFT AZURE ISV.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
In Depth Introduction to Containers On Microsoft Platforms Dave Strebel Cloud Technical Specialist Microsoft.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Jeff Warnock COSC 352 Indiana University of Pennsylvania Spring 2010.
Clouding with Microsoft Azure
Network security Vlasov Illia
CS457 Introduction to Information Security Systems
Unit 3 Virtualization.
Chapter 6: Securing the Cloud
Understanding The Cloud
Scalable Web Apps Target this solution to brand leaders responsible for customer engagement and roll-out of global marketing campaigns. Implement scenarios.
VIRTUALIZATION & CLOUD COMPUTING
Written by : Thomas Ristenpart, Eran Tromer, Hovav Shacham,
The Information Protection Problem
BioCatch Fights Financial Fraud and Detects Online Threats via Behavioral Biometrics, All Powered by the Microsoft Azure Platform MICROSOFT AZURE TECH.
FICEER 2017 Docker as a Solution for Data Confidentiality Issues in Learning Management System.
Design and Implement Cloud Data Platform Solutions
Scalable Web Apps Target this solution to brand leaders responsible for customer engagement and roll-out of global marketing campaigns. Implement scenarios.
Introduction to Cloud Computing
Network Services, Cloud Computing, and Virtualization
I have many checklists: how do I get started with cyber security?
Increase and Improve your PC management with Windows Intune
Shielding applications from an untrusted cloud with Haven
PLANNING A SECURE BASELINE INSTALLATION
Chapter 1 Key Security Terms.
Presentation transcript:

SECURITY IN CLOUD COMPUTING By Bina Bhaskar Anand Mukundan

Startups & Small businesses Can use clouds for everything. SaaS, IaaS, collaboration services, online presence. Mid-Size Enterprises Can use clouds for many things. Compute cycles for R&D projects, online collaboration, partner integration, social networking, new business tools. Large Enterprises More likely to have hybrid models where they keep some things in house. On premises data for legal and risk management reasons. Courtesy : Juniper Networks Who is using Clouds today?

Problem Statement Image courtesy: Wikipedia VM SECURITY DATA SECURITY SW SECURITY

Identify Assets Which assets are we trying to protect? What properties of these assets must be maintained? Identify Threats What attacks can be mounted? What other threats are there (natural disasters, etc.)? Identify Countermeasures How can we counter those attacks? Appropriate for Organization-Independent Analysis We have no organizational context or policies Problem Statement Courtesy : Juniper Networks

Misconception Clouds can never be secure This is not true because cloud is like any other network we use currently. Image courtesy :

Cloud Service Deployment Image courtesy :

Vulnerabilities exposed in cloud (1) National Database of Vulnerabilities lists over a hundred potential hypervisor flaws for one particular virtualization technology. Image courtesy:

Vulnerabilities exposed in cloud (2) Hypervisor Holes o Ability to insert code into virtual machines. o The disclosure of unauthorized information o Potential disruption of service. o Run several varieties of guest operating systems o One could use root access to the hypervisor to commit dirty deeds such as planting rootkits into the memory of running operating system kernels

Vulnerabilities exposed in cloud (3) Securing Data Storage o The data stored in the cloud may be frequently updated by the users. o Focus on single server scenario which does not consider dynamic data operations. o Traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted due to the users’ loss of control of their data under Cloud Computing.

Vulnerabilities exposed in cloud (4) VM Placement attacks o Denial of Service o Measure cache usage (measure CPU utilization on the physical machine; or “how busy are their servers?”) o Load-based co-residence detection (aka detecting co-residence without relying on sending any network probes) o Estimating traffic rates (sounds harmless but can be used to deduce targets activity patterns, peak trading times for maximal DoS effect etc) o Keystroke timing attack (remote keystroke monitoring)

Vulnerabilities exposed in cloud (8) Metadata Spoofing attack o Adversary manipulates / re-engineers the metadata content of a web service so that the web service's intended operation is replaced by another operation. Original WSDL Modified WSDL

Vulnerabilities exposed in cloud (5) Malware Injection Attack o Adversary creates own instance of virtual machine or service module o Cloud system is manipulated by the adversary in such a way that it points to the adversary's implementation of the service or instance

Vulnerabilities exposed in cloud (7) XML Signature

Vulnerabilities exposed in cloud (6) Denial of Service o Direct DOS o Indirect DOS

Existing Cloud Security Models (1) Cloud Storage Model Multi-Party Non-Repudiation o Normal Mode o Resolve Mode

Existing Cloud Security Models (2) Three level security model Image courtesy: Data Security Model for Cloud Computing

Existing Cloud Security Models (3) Cloud Cube Model Image courtesy: Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration by Jercho Forum

Policies related to Security Application security Maintaining Integrity Authentication / Access Control

Suggested Framework USER A USER B Data Application > FOREIGNFOREIGN ATTACKSATTACKS 3LS Data APP 3LS

Thank you!