0
Cloud Computing Security<br />Budi Rahardjo<br />Sekolah Teknik ElektroInstitut Teknologi Bandung<br />October 2010<br />
Security Aspects (Dimensions)<br />Confidentiality<br />Integrity<br />Availability<br />Authentication<br />Large scale i...
message<br />Possible attack in every hop;interruption, interception, modification, fabrication<br />message<br />
Confidentiality<br />Access to data must be protected from unauthorized entity<br />Cloud computing susceptibe to<br />Int...
Confidentiality (cont.)<br />Protected by cryptography<br />End-to-end encryption<br />Encrypted pipe (difficult in cloud ...
TRUST[losing control]<br />
zrffntr = message<br />zrffntr = message<br />process?<br />Message encryptedat the origin and decryptedin the receiving e...
Integrity<br />Data must not be changed, modified, tampered by unauthorized entity<br />Must protect data byby digital sig...
message<br />78e731027d8fd50ed642340b7c9a63b3<br />message hashed & encryptedat the origin and decrypted & hashed in the r...
Availability<br />Make sure that data is available when needed<br />Possible attack<br />Interruption, Denial of Service (...
Availability (cont.)<br />Improving availability<br />(Network) redundancy<br />Backup, data recovery<br />Business contin...
Concluding Remarks<br />Security is still an issue for cloud computing<br />If cloud computing is cheaper, then people wil...
Upcoming SlideShare
Loading in...5
×

Cloud Computing Security

3,148

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
3,148
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
253
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Cloud Computing Security"

  1. 1. Cloud Computing Security<br />Budi Rahardjo<br />Sekolah Teknik ElektroInstitut Teknologi Bandung<br />October 2010<br />
  2. 2. Security Aspects (Dimensions)<br />Confidentiality<br />Integrity<br />Availability<br />Authentication<br />Large scale identity management<br />Physical<br />Personnel<br />Compliance<br />PCI DSS, HIPAA, SOX<br />Legal<br />Audit trail<br />
  3. 3. message<br />Possible attack in every hop;interruption, interception, modification, fabrication<br />message<br />
  4. 4. Confidentiality<br />Access to data must be protected from unauthorized entity<br />Cloud computing susceptibe to<br />Interception<br />Data archived in unknown places<br />Traffic analysis leading to business intelligence<br />
  5. 5. Confidentiality (cont.)<br />Protected by cryptography<br />End-to-end encryption<br />Encrypted pipe (difficult in cloud because we don’t have control over pipes)<br />Does not work if cloud needs data to process. How to distribute keys?<br />Granular encryption?<br />
  6. 6. TRUST[losing control]<br />
  7. 7. zrffntr = message<br />zrffntr = message<br />process?<br />Message encryptedat the origin and decryptedin the receiving end.<br />But, what if cloud needs data to process? Data must be decrypted in cloud.<br />zrffntr<br />
  8. 8. Integrity<br />Data must not be changed, modified, tampered by unauthorized entity<br />Must protect data byby digital signature, message authenticated code (MAC), hashing function<br />Attached as part of message(s)<br />Granularity?<br />
  9. 9. message<br />78e731027d8fd50ed642340b7c9a63b3<br />message hashed & encryptedat the origin and decrypted & hashed in the receiving end<br />zrffntr<br />78r731027q8sq50rq642340o7p9n63o3<br />
  10. 10. Availability<br />Make sure that data is available when needed<br />Possible attack<br />Interruption, Denial of Service (DoS)<br />Best effort is not good enough. Quality of Service (QoS) must be guaranteed<br />
  11. 11. Availability (cont.)<br />Improving availability<br />(Network) redundancy<br />Backup, data recovery<br />Business continuity<br />
  12. 12. Concluding Remarks<br />Security is still an issue for cloud computing<br />If cloud computing is cheaper, then people will use it (regardless of security problems)<br />Solutions (perhaps not elegant) are available<br />The devils are in details<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×