Copyright 2010 1 Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW 2nd International.

Slides:



Advertisements
Similar presentations
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW 23rd Bled eConference.
Advertisements

1/17/20141 Leveraging Cloudbursting To Drive Down IT Costs Eric Burgener Senior Vice President, Product Marketing March 9, 2010.
A Flexible Cloud-Computing Platform Focus on solving business problems
Copyright Roger Clarke Xamax Consultancy and PSARN Security, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy,
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW 25th Bled.
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW Computer Science.
Chapter 1: The Database Environment
10-1 McGraw-Hill/Irwin Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
The Managing Authority –Keystone of the Control System
Configuration management
IBM Corporate Environmental Affairs and Product Safety
EMS Checklist (ISO model)
Grow your business with your head in the cloud. What is Cloud Computing ? Internet-based computing, whereby shared resources, software and information.
Distributed Data Processing
Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
Cloud Computing for Education & Cloud Learning Minjuan Wang to BT Research Center (Abu Dhabi) Educational Technology San Diego State University
Copyright © AIIM | All rights reserved. #AIIM The Global Community of Information Professionals aiim.org Information Management and Social Media Jesse.
Strategic Financial Management 9 February 2012
CA's Management Database (MDB): The EITM Foundation -WO108SN.
Marketing Strategy and the Marketing Plan
1 Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair April 12, © Ravi Sandhu World-Leading.
CTS Strategic Roadmap Walkthrough, v1.2 Dan Mercer.
Cloud Computing - clearing the fog Rob Gear 8 th December 2009.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Cloud Computing Will Crowley Monica Lopez Jaimie Morrison.
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
SaaS, PaaS & TaaS By: Raza Usmani
© 2013 PRICE Systems, LLC All Rights Reserved | Decades of Cost Management Excellence 1 Costs of Migration and Operation in the Cloud Arlene Minkiewicz,
1. 2 New Computing Models, and What They Mean to the Small and Mid Sized Business Consumer How your business can make practical decisions between “The.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Duncan Fraiser, Adam Gambrell, Lisa Schalk, Emily Williams
Plan Introduction What is Cloud Computing?
Cloud Computing.
Presentation to the Housing Technology Conference Tim Cowland- Senior Consultant 27 th February 2014 The Rise of the Housing Cloud.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
PhD course - Milan, March /09/ Some additional words about cloud computing Lionel Brunie National Institute of Applied Science (INSA) LIRIS.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
2009 Federal IT Summit Cloud Computing Breakout October 28, 2009.
1 NETE4631 Course Wrap-up and Benefits, Challenges, Risks Lecture Notes #15.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Chapter 8 – Cloud Computing
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Cloud Computing 3. TECHNOLOGY GUIDE 3: Cloud Computing 2 Copyright John Wiley & Sons Canada.
Lecture 6: Cloud Computing
Chapter 6: Securing the Cloud
Understanding The Cloud
Introduction to Cloud Computing
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
VIRTUALIZATION & CLOUD COMPUTING
IOT Critical Impact on DC Design
Introduction to Cloud Computing
CLOUD COMPUTING Presented By:- EduTechlearners
Cloud Computing Architecture
CNIT131 Internet Basics & Beginning HTML
EIS Fast-track Revision Om Trivedi Enterprise Information Systems
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
3 Cloud Computing.
Cloud Consulting Services and Solutions
Emerging technologies-
Introduction to Cloud Computing
Cloud Computing: Concepts
Computer Science and Engineering
Cloud Computing for Wireless Networks
Presentation transcript:

Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW 2nd International Symposium on Cloud Computing Melbourne, 17 May {.html,.ppt} User Requirements for Cloud Computing Architecture

Copyright User Requirements for Cloud Computing Architecture AGENDA Precursors / Related Concepts A Working Definition An Architectural Framework User Benefits Disbenefits and Risks Operational Contingent Security Business Implications

Copyright The Gartner Hype-Cycle for Emerging Technologies "... a snapshot of the relative maturity of technologies... "They highlight overhyped areas against those that are high impact, estimate how long they will take to reach maturity, and help organizations decide when to adopt"

Copyright

Copyright

Copyright

Copyright The Gartner Hype-Cycle –

Copyright Gartner Hype Cycle for Cloud Computing July 2009 – $US 1,995 (53 pp.) On the Rise Cloud Services Governance Cloud-Driven Prof'l IT Services, Solutions Cloud Computing/SaaS Integration Cloudbursting/Overdraft Cloud Service Management Tools Tera-architectures Virtual Private Cloud Computing Application Platform as a Service Cloud Computing for the Enterprise DBMS in the Cloud Private Cloud Computing Business Process Utility Hybrid Cloud Computing Cloud Application Development Tools Cloud-Based Services Cloud-Enabled BPM Platforms Cloud Security Concerns Cloud Storage At the Peak Elasticity Enterprise Portals as a Service Cloud/Web Platforms Compute Infrastructure Services 'In the Cloud' Security Services Cloud Computing Public Cloud Computing/the Cloud Sliding Into the Trough Real-Time Infrastructure IT Infrastructure Utility SaaS Climbing the Slope SaaS Sales Force Automation Virtualization Cloud Advertising Grid Computing Integration as a Service

Copyright Predecessor Terms Related Concepts Computing as a utility / 'computer service bureaux' / 'data centres' – 1960s, 1970s Application Service Providers (ASPs) – 1980s working from home / tele-work – 1980s working on the move / 'road warrior' – 1990s docking portables to corporate networks portable-to-desktop synchronisation Internet Service Providers (ISPs) – late 1980s Web Services – 2000 Service-Oriented Architecture (SOA) – early-to-mid-2000s Software as a Service (SAAS) – late 1990s, e.g. Salesforce Cluster Computing – inter-connected stand-alone computers are managed as a single integrated computing resource Grid Computing – computational resources are assigned dynamically Peer-to-Peer (P2P) architectures Server-Virtualisation Infrastructure as a Service (IaaS) – 2006 Platform as a Service (PaaS) – 2006 Anything as a Service *aaS / AaaS

Copyright Cloud Computing Definitions "a large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically-scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the Internet" (Foster et al. 2008, at the Grid Computing Environments Workshop) five 'essential characteristics' (NIST, October 2009): on-demand self-service (i.e. automated response by servers to direct requests by clients) broad network access (i.e. from anywhere, using any device) resource pooling (i.e. the provider allocates resources according to demand, rather than assigning resources to particular clients) rapid elasticity (i.e. resources are scalable according to demand) measured service (i.e. resource usage is metered)

Copyright The User Organisation Perspective A Working Definition A service that satisfies all of the following conditions: it is delivered over a telecommunications network users place reliance on the service for data access and/or data processing the data is under the legal control of the user some of the resources on which the service depends are virtualised, i.e. the user has no technical need to be aware which server running on which host is delivering the service, nor where the hosting device is located the service is acquired under a relatively flexible contractual arrangement, at least re the quantum used

Copyright Cloud Computing is a Form of Outsourcing How is it different from earlier forms? Scalability ('there when it's needed) Flexible Contractual Arrangements ('pay per use') Opaqueness ('let someone else worry about details') which means less user control: of the application, through commoditisation of service levels, through SLA dependence (assuming there's an SLA, and it's negotiable) of host location, through resource-virtualisation

Copyright Sample Architectures CSA (2009) 'Security Guidance for Critical Areas of Focus in Cloud Computing' Cloud Security Alliance, April 2009 Youseff L., Butrico M. & Da Silva D. (2008) 'Toward a Unified Ontology of Cloud Computing' Proc. Grid Computing Environments Workshop, 2008

Copyright Buyya R., Yeo C.S., Venugopal S., Broberg J. & Brandic I. (2009) 'Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility' Future Generation Computer Systems 25 (January 2009) Fig. 3 High-level market-oriented Cloud architecture

Copyright CC Architecture – The User Organisation Perspective

Copyright A Comprehensive CC Architecture

Copyright CC's Potential Benefits Enhanced Service Accessibility Access to Services that are otherwise unavailable Access to Services from multiple desktop devices Access to Services from scaled-down devices Access to Services from multiple device-types Other Technical Benefits Professionalised backup and recovery Scalability Collaboration convenience Copyright convenience Financial Benefits Lower Investment / up-front cost Lower Operational Costs Lower IT Staff Costs

Copyright Downsides – The User Perspective Operational Disbenefits and Risks Dependability on a day-to-day basis Contingent Risks Low likelihood / Potentially highly significant Security Risks Security in the broad Business Disbenefits and Risks Beyond the merely technical

Copyright Operational Disbenefits and Risks Fit – to users' needs, and customisability Reliability – continuity of operation Availability – hosts/server/database readiness/reachability Accessibility – network readiness Robustness – frequency of un/planned unavailability (97% uptime = 5 hrs/wk offline) Resilience – speed of resumption after outages Recoverability – service readiness after resumption Integrity – sustained correctness of the service, and the data Maintainability – fit, reliability, integrity after bug-fixes, mods

Copyright Contingent Risks Major Service Interruptions Service Survival – supplier collapse or withdrawal Safeguards include software escrow; escrow inspection; proven recovery procedures; rights that are proof against actions by receivers Data Survival – data backup/mirroring and accessibility Compatibility – software, versions, protocols, data formats Flexibility Customisation Forward-compatibility (to migrate to new levels) Backward compatibility (to protect legacy systems) Lateral compatibility (to enable escape)

Copyright Security Risks Service Security Environmental, second-party and third-party threats to any aspect of reliability or integrity Data Security Environmental, second-party and third-party threats to content, both in remote storage and in transit Authentication and Authorisation How to provide clients with convenient access to data and processes in the cloud, while denying access to imposters? Susceptibility to DDOS Multiple, separate servers; but choke-points will exist

Copyright Business Disbenefits and Risks Acquisition Lack of information, non-negotiability of terms of contract and SLA Ongoing Usage Loss of corporate knowledge about apps, IT services, costs to deliver Inherent lock-in effect, because of high switching costs High-volume data transfers (large datasets, replication/synch'n) Service Levels to the Organisation's Customers Legal Compliance Data protection law, law of confidence, financial services regulations, evidence discovery law. Company Directors' obligations re asset protection, due diligence, business continuity, risk management Privacy Breach – Content Access, Use, Retention Second-Party (service-provider abuse), Third-Party ('data breach', 'unauthorised disclosure'), Storage in Data Havens (India, Arkansas)

Copyright Some Risk Management Strategies Risk Assessment Contract Terms Service Level Agreement (SLA) Multi-Sourcing Parallel in-house service Several compatible suppliers...

Copyright ITILv3 SLA Checklist – Edited Down! 1. Service name 2. Clearance information (with location and date) 1. Service Level Manager 2. Customer 3. Contract duration 1. Start and end dates 2. Rules regarding termination of the agreement 4. Description/ desired customer outcome 1. Business justification 2. Business processes/ activities oncust side supported by the service 3. Desired outcome in terms of utility 4. Desired outcome in terms of warranty 5. Service and asset criticality 1. Identification of business-critical assets connected with the service 1. Vital Business Functions (VBFs) supported by the service 2. Other critical assets used within the service 2. Estimation of the business impact caused by a loss of service or assets 6. Reference to further contracts which also apply (e.g. SLA) 7. Service times 1. Hours when the service is available 2. Exceptions (e.g. weekends, public holidays) 3. Maintenance slots 8. Required types and levels of support 1. On-site support 1. Area/ locations 2. Types of users 3. Types of infrastructure to be supported 4. Reaction and resolution times 2. Remote support 1. Area/ locations 2. Types of users (user groups granted access to the service) 3. Types of infrastructure to be supported 4. Reaction and resolution times 9. Service level requirements/ targets 1. Availability targets and commitments 1. Conditions under which the service is considered to be unavailable 2. Availability targets 3. Reliability targets (usually defined as MTBF or MTBSI ) 4. Maintainability targets (usually defined as MTRS) 5. Downtimes for maintenance 6. Restrictions on maintenance 7. Procedures for announcing interruptions to the service 8. Requirements regarding availability reporting 2. Capacity/ performance targets and commitments 1. Required capacity (lower/upper limit) for the service, e.g. 1. Numbers and types of transactions 2. Numbers and types of users 3. Business cycles (daily, weekly) and seasonal variations 2. Response times from applications 3. Requirements for scalability 4. Requirements regarding capacity and performance reporting 3. Service Continuity commitments 1. Time within which a defined level of service must be re-established 2. Time within which normal service levels must be restored 10. Mandated technical standards and spec of the technical service interface 11. Responsibilities 1. Duties of the service provider 2. Duties of the customer (contract partner for the service) 3. Responsibilities of service users (e.g. with respect to IT security) 4. IT Security aspects to be observed when using the service 12. Costs and pricing 1. Cost for the service provision 2. Rules for penalties/ charge backs 13. Change history 14. List of annexes

Copyright User Requirements Essential Features Assured Data Integrity Assured Service Integrity Assured Compliance with legal requirements within jurisdictions to which the user organisation is subject Warranties and indemnities in the contract, terms of service and SLA (if any) But who audits and certifies?

Copyright Categories of Use-Profile UP1: CC is completely inappropriate 'mission-critical systems' systems embodying the organisation's 'core competencies' applications whose failure or extended malperformance would threaten the organisation's health or survival UP2: CC is very well-suited Uses of computing that are highly price-sensitive, and adjuncts to analysis and decision-making, not essential operations Trade off loss of control, uncertain reliability, contingent risks against cost-advantages, convenience, scalability, etc. UP3: CC is applicable depending... can the risks be adequately understood and managed? trade-offs between potential benefits vs. uncontrollable risks

Copyright User Requirements for CC Infrastructure 1.Integrity Assurance Service Integrity Data Integrity 2.Compliance Assurance Service Security Service Access Controls Data Transmission Security Data Storage Security Data Use (by service-provider) Data Disclosure (by others) Jurisdictional Location(s) of Data Storage 3.Declaration, Measurement Service Reliability Levels Service Survival Protections Data Survival Protections Service and Data Compatibility Service and Data Flexibility 4.Privacy Policy Enforcement Measures, to enable: Server Privacy Policy Statement User Privacy Rqmts Statement Comparison of the two Preclusion of Usage where Requirements are not satisfied

Copyright Implications for Cloud Computing Architectures CCAs must be comprehensive, encompassing not only the server side, but also the client side and intermediating functions Security Risk Assessments and Solutions must be end-to-end rather than limited to the server side CCA designers must address the risks arising from vulnerable user devices and vulnerable clients Client authentication must be achieved through components, APIs, and externally-managed identities (Shibboleth, OpenID) Jurisdictional Locations of Hosts must be controlled These all depend on CCAs including specs and implementation of multiple special-purpose components and features Privacy management must go beyond 'privacy through policy' and 'privacy by design' to 'Privacy through Architecture'

Copyright Conclusion "Past efforts at utility computing failed, and we note that in each case one or two... critical characteristics were missing" (Armbrust et al. 2008, p. 5 – UC Berekeley) CC may be just another marketing buzz-phrase that leaves corporate wreckage in its wake CC service-providers need to invest a great deal in many aspects of architecture, infrastructure, applications, and terms of contract and SLA

Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW 2nd International Symposium on Cloud Computing Melbourne, 17 May {.html,.ppt} User Requirements for Cloud Computing Architecture