 Cloud Computing is an emerging field wherein the focus is on providing virtualized resources as service.  Also the user is almost entirely blinded.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Unified Communications Bill Palmer ADNET Technologies, Inc.
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
The Lucernex Cloud: A software-as-a-service solution delivered via the Cloud What is the Cloud? Cloud Computing is the future of all software applications,
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Database Administration and Security Transparencies 1.
Security Issues and Challenges in Cloud Computing
Chapter 1 – Introduction
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Andrew Schroeder Networking Aspects of Cloud Computing.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Plan Introduction What is Cloud Computing?
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Cloud Computing Cloud Security– an overview Keke Chen.
Osama Shahid ( ) Vishal ( ) BSCS-5B
Software to Data model Lenos Vacanas, Stelios Sotiriadis, Euripides Petrakis Technical University of Crete (TUC), Greece Workshop.
CS370 Spring 2007 CS 370 Database Systems Lecture 2 Overview of Database Systems.
Chapter 13 – Network Security
Introduction to Cloud Computing
Grid-based Sensor Network Service on Future Internet By Mohammad Mehedi Hassan Student ID:
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
By: Ashish Gohel 8 th sem ISE.. Why Cloud Computing ? Cloud Computing platforms provides easy access to a company’s high-performance computing and storage.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
A few notes. First - What is the Cloud ? * Any number of blogs / articles and definitions * Accessing information services and software over the internet.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
INTRODUCTION TO CLOUD COMPUTING ggg UNDERSTANDING CLOUD COMPUTING UNDERSTANDING CLOUD COMPUTING DEFINITION CLOUD COMPUTING.
LEGAL ISSUES IN CLOUD COMPUTING
CIS/SUSL1 Fundamentals of DBMS S.V. Priyan Head/Department of Computing & Information Systems.
Chapter 2 Securing Network Server and User Workstations.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Enveloc ®, Inc. The Importance of Data Backup Enveloc, Inc. USA Technology & Research Park 775 N. University Blvd. Suite 110 Mobile, AL
CLOUD COMPUTING. What is cloud computing ??? What is cloud computing ??? Cloud computing is a general term for anything that involves delivering hosted.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Securing Network Servers
Chapter 6: Securing the Cloud
Understanding The Cloud
Avenues International Inc.
Working at a Small-to-Medium Business or ISP – Chapter 8
Cloud Security– an overview Keke Chen
Amazon Storage- S3 and Glacier
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Use Cases and Requirements for I2NSF_
Cloud Testing Shilpi Chugh.
Unit 27: Network Operating Systems
IS4680 Security Auditing for Compliance
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Cloud Computing LegalRun Solutions Why It’s Right for You!
Cloud Computing for Wireless Networks
Presentation transcript:

 Cloud Computing is an emerging field wherein the focus is on providing virtualized resources as service.  Also the user is almost entirely blinded from the infrastructure that supports Cloud Computing.  This is why we have most of the issues in Cloud Computing Cloud Computing

Security issues and possible solutions Maintaining the privacy of the user data in the cloud (a)Users must be informed of what data is being collected and how it would be used. (b) Users must be informed about the entities having access to their data.

Dynamic data Storage (a)The user data is stored on a server that may be anywhere in the globe. (b)Different parts of the user data may be stored in different servers. (c)These servers are actually encrypted block servers. (d)The user data is usually encrypted using a strong AES encryption algorithm.

Data Recovery (a)Data can be easily lost because of a successful attack or in the event of any natural disaster. (b) As a precautionary measure cloud providers should store data in less risky areas. (c) The cloud providers should replicate cloud storage in order to have a chance of recovery data in case of a main server failure

Legal Issues (a)Both user and service provider must be updated with the local governments transfer laws and restrictions. (b)If any third party services are used by the provider then the latter must educate the user about it. (c) The user and/or service provider must be held liable for any violations of the rules and regulations.

Software as a Service (Saas) (a)The software technology that offers services in cloud computing undergoes changes more frequently than desired. (b) This can develop a doubt in the minds of the customers. (c) As the cloud computing is in its initial stage of development overly stringent rule may not be so useful.

Failure of traditional web application firewall in the cloud  The privacy settings of each cloud user could vary.  Allocation of separate web application firewall/hardware for each of these settings will lead to enormous consumption of resources.  Managing of these hardwares is tedious.  Aim of using of less resources in the cloud is hampered.

Distributed Web Application Firewall (dWAF)  It operates in a virtualized environment.  It provides firewall as a service.  The filtering is done by a combination of hardware and software and also relies on how well it integrates with the existing Firewall Technologies.  An user-friendly web based interface enables cloud users to specify their security settings.

Hyperguard SaaS provided by Amazon Web Services is one of the few DWAF’s available today to protect your cloud. It has basically two modes of operation. There are two modes of operation: 1)Detection only mode. 2)Protection only mode.

Detection only mode:  In this mode the administrator may only test new/proposed rule sets but will not enforce them.  Although the administrator may use the exisiting proven rule sets to test the new rule sets.

Protection only mode:  In this mode the administrator can enforce the rule sets that have been tested over and over again and proven.  These rule sets are authorized to block an attempted attack.  In this mode logging is performed for future analysis and documentation.

Case Study: T - Mobile Sidekick  Recently T-Mobile Sidekick cellphones which uses a cloud network to store the data present in the user’s cellphone suffered a major embarrassment.  The data was stored in a server present on the cloud.  The user could extract data from this server whenever needed because T Mobile were storing and providing data back to the users using this server.

Case Study: T – Mobile Sidekick  The server crashed and the rest is history.  There were no back up servers.  All user’s data gone in the blink of an eye.  Thus this incident points out the need to store user data even on a back up server.

References 1) 2http://communities.intel.com/community/openportit/server/blog/2008/07/03/gartner-seven- cloudcomputing-security-risks 3) 4) is-important-but-not-the-way-you.aspx 5) 6) security-issues.htm 7) 8)

THANK YOU!!!