Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Threats in cloud computing

Similar presentations


Presentation on theme: "Security Threats in cloud computing"— Presentation transcript:

1 Security Threats in cloud computing
Survey by Mahroosh Irfan, Muhammad usman, yan Zhuang, simon fong

2 Contents What is Cloud Computing? Cloud Implementation
Cloud deployment strategies Challenges in Cloud Computing environment Security threats in Cloud Computing How can Fog Computing help?

3 What is cloud computing?

4 Type of Computing which depends on “sharing computing resources” instead of having “local servers or personal devices” to handle applications. Use the internet to access any software which is actually running on someone else’s data center/hardware. “You Pay for What You Use” Dynamic, Scalable and independent computing More of Utility computing Example – , Google Wave, Microsoft Office Live, Amazon EC2.

5 Cloud implementation SaaS – Google Apps, Microsoft Office 365
PaaS – Google App Engine, Heroku IaaS – Windows Azure, Amazon EC2

6 Cloud deployment strategies

7

8 Challenges in cloud computing
Cloud & Network Security Integrity Reliability Performance Cost Data Limitations & Segregation Bug Exploitation Management of the console security

9 Prominent threats in cloud computing
Abuse & Nefarious Use of Cloud Computing Use of Botnets to spread spam and malware. Attackers can infiltrate a public cloud and find a way to upload malware to thousands of computers and exploit the cloud infrastructure to attack other machines. Insecure interfaces and APIs Especially with third party software, interfaces and APIs must have extremely secure authentication, access control, encryption and activity monitoring mechanisms. Nefarious – Botnet to spread spam and malware

10 Prominent threats in cloud computing
Malicious Insiders No transparency in the process of hiring resources and how access to assets is granted and how are their activities monitored. Transparency is vital to a secure cloud computing along with compliance reporting and breach notification. Shared Technology Issues Not all of the current infrastructures provide for shared usage. To ensure that customers don’t thread on each other’s resource, monitoring and strong compartmentalization is required.

11 Prominent threats in cloud computing
Data Loss or Leakage Be it by deletion without a backup, by loss of the encoding key or by unauthorized access, data is always in danger of being lost or stolen. This is one of the top concern for the service provider from the Business perspective. Accounts or services hijacking Attacks are of the form – man-in the-middle, phishing and spam campaigns, denial of service etc. Unknown Risk profile Vulnerabilities that occur during code updates, security practices and intrusion attempts.

12 Prominent threats in cloud computing
Abuse & Nefarious Use of Cloud Computing Insecure interfaces and APIs Malicious Insiders Shared Technology Issues Data Loss or Leakage Accounts or services hijacking Unknown Risk profile

13 Fog computing FTW! Greater business agility: With the right tools, developers can quickly develop fog applications and deploy them where needed. Machine manufacturers can offer MaaS to their customers. Fog applications program the machine to operate in the way each customer needs. Better security: Protect your fog nodes using the same policy, controls, and procedures you use in other parts of your IT environment. Use the same physical security and cybersecurity solutions. Deeper insights, with privacy control: Analyze sensitive data locally instead of sending it to the cloud for analysis. Your IT team can monitor and control the devices that collect, analyze, and store data. Lower operating expense: Conserve network bandwidth by processing selected data locally instead of sending it to the cloud for analysis

14

15

16 Questions?


Download ppt "Security Threats in cloud computing"

Similar presentations


Ads by Google