SlideShare a Scribd company logo
1 of 31
CLOUD SERVICES AND
SECURITY.
Presented by: Jaspreet Kaur
Shipra Kataria
PEC UNIVERSITY OF TECHNOLOGY
Cloud Computing
 Cloud computing involves distributed computing over
a network, where a program or application may run on
many connected computers at the same time.
 It has been considered as one of the most promising
solutions to our increasing demand for accessing and
using resources provisioned over the Internet.
 The concept of this new trend originated in 1960 was
used by telecommunication companies
 A study by Gartner considered Cloud Computing as the
first among the top 10 most important technologies.
 Cloud computing exhibits the following key
characteristics.
a. Broad Network Access
b. Rapid Elasticity
c. Measured Service
d. On demand self service
e. Resource Pooling
Service Delivery Model
 Cloud Software as a Service(SaaS): SaaS also referred as "on-
demand software" is a software delivery model in which software
and associated data are centrally hosted in the cloud.
 Cloud Platform as a Service(PaaS): PaaS is a cloud computing
service providing computing platform and solution stack s a service. It
provides capability to consumer to deploy onto the cloud
infrastructure.
 Cloud Infrastructure as a Service(IaaS): IaaS service model
provides the consumer the efficiency to provision storage, network,
processing and other computing resources
Cloud Deployed models
 Public Cloud: In this type of cloud, the cloud infrastructure is
managed by an organization selling cloud services. Various service
providers like Amazon, Microsoft, Google own all infrastructure at
their data centre. Public cloud services may be free or offered on a pay
per-usage model.
 Private Cloud: In this type of cloud the infrastructure is available
only to specific customer and placed within the internal data center of
an organization. It is managed either by an organization itself or third
party service provider.
 Community Cloud: This type of cloud infrastructure is
controlled and shared by various organizations from the same
community with common community concerns.
 Hybrid Cloud: The cloud infrastructure is a mixture of two or
more clouds either public, private or community that are
managed centrally and circumscribed by a secure network. It
allows multiple entities to access the cloud through Internet in
a secure way than public clouds.
NIST Visual Model of cloud
computing
Cloud Computing Security
Scenario
The fame of cloud computing is due to the fact that many enterprise
applications and data are moving towards cloud platforms but lack of
security is the major obstacle for cloud adoption.
According to a recent survey by International Data Corporation (IDC)
87.5 % of the masses belonging to varied levels starting from IT
executives to CEOs have said that security is the top most challenge to
be dealt with in every cloud service. Security is the primary concern
and the greatest inhibitor in cloud computing.
VARIOUS THREATS
Threat is a potential cause of an incident, that may result in harm of
systems and organization. Following are the threats that illustrate
possibility of compromising an entire cloud network.
1.Abuse of cloud computing: This threat is related to shortcomings of
registration process associated with cloud. Examples includes
Info Stealer Trojan horses and downloads for Microsoft Office and
Adobe PDF exploits.
2. Insecure interfaces and API: Sometimes in cloud the information
that is not deleted could reside in insecure locations which may cause
inconsistency. Examples including flexible access controls ad improper
authorizations, limited monitoring and logging capabilities
Continued….
3. Data Loss or Leakage: Threats related to data loss or
leakage depends upon how data is organized or structured.
Following terms that should keep in mind while protecting
data from any loss or leakage.
 The data of organizations should reside in servers of other
nations.
 Unauthorized parties must be prevented from gaining access
to sensitive data.
 The data retained on Cloud provider should reside on
provider's server for the same duration even after it has been
deleted by client.
Examples are insufficient client authentication, authorization
and audit controls (AAA)
Continued..
4. Malevolence: This threat originates due to lack of transparency into
provider's process and procedures. If the factors affecting hiring of new
employee are not considered it may provide opportunity to adversary to
harvest confidential data or gain complete control over the cloud services
with little or no risk of detection.
5. Virtualization threats: It introduces some kind of risks to its applications:
 Dependency on Secure Hypervisor: The security can be
breached here as all the information is stored with a common storage
system. By gaining access to this information, adversary can launch
many attacks like VM Hijack attack.
RISKS INVOLVED
 Risk is an expose to danger, harm, or loss. Their are
certain risks in residing data at providers
infrastructure which are as follows:
 Shared Access
 Vulnerabilities
 Virtual Exploits
 Authentication, Authorization & Access Control
 Availability
 Ownership
Service & Security Offerings and
Compliance
 Google apps & Google Engine
 Amazon Web Services
Google Apps & Google
Engine
 Google Apps is a service from Google that
provides independently customizable versions
of several Google products using a domain
name provided by the customer.
 Features several Web applications with similar
functionality including Gmail, Google Calendar,
Docs, Drive, Groups, News, Play, Sites, Talk.
 Google Apps has passed FISMA certification
meaning that they are compliant with federal law
for holding data for government agencies.
Google Apps controls &
Protocols
 Logical security
 Privacy
 Data center physical security
 Incident management and availability
 Change management
 Organization and administration
Two factor authentication
 First Step: login using the username and
password. This is an application of the
knowledge factor.
 Implementation of second step:
 Phone's IMEI International Mobile Station
Equipement Identity
 Access to their services is HTTPS enabled so
data can be protected in transit.
Continued…
 Data stored on Google’s servers is replicated
to several data centers so even a major outage
to a data center does not destroy the data.
 Google also performs internal audits of their
application code, as well as having external
audits.
 Physical access to data centers is restricted to
an as-needed basis and the data centers
themselves have network and power
redundancies.
Geographical Location
Control Environment
 Amazon Web Services abbreviated as AWS is
a collection of remote computing services that
together make up a cloud computing platform.
 Amazon Elastic compute cloud is meant for
providing a complete rented computer that can
be used by users for its computer utility.
 Goal is to protect data against unauthorized
systems or users and to provide Amazon EC2
instances
Amazon Elastic Compute Cloud
Multiple levels of security
 Host Operating system
 Guest Operating system
 Firewall
Services
 Well known services are Amazon EC2, S3 and
Amazon SimpleDB
 Elastic Compute Cloud(EC2): It provides a virtual
rented computer with the help of Xen.
 Simple Storage Service: It provides storage to
various applications so that users can do
computations and developments onto that space
and store them for further use.
 Amazon Virtual Private Cloud: It creates a
logically isolated set of Amazon EC2 instances
which can be connected to an existing network
using a VPN connection.
Hypervisor
 It is conceptually one level higher than a
supervisory program.
 The hypervisor presents to the guest operating
systems a virtual operating platform and manages
the execution of the guest operating systems.
 Multiple instances of a variety of operating
systems may share the virtualized hardware
resources
 Amazon EC2 currently utilizes a highly
customized version of the Xen hypervisor, taking
advantage of paravirtualization
Instance Isolation
 Different instances running on the same
physical machine are isolated from each other
via the Xen hypervisor.
 AWS firewall resides within the hypervisor
layer, between the physical network interface
and the instance's virtual interface
 All packets must pass through this layer, thus
an instances neighbors have no more access
to that instance
Instance Isolation
Countermeasures
 Authentications and ID
Management
 Workload analysis and allocation
 Use of Data Encryption
 Better Enterprise Infrastructure
Conclusion & Future Scope
 The classification of various threats discussed
in this paper helps the cloud users to make out
proper choice and also help cloud providers to
handle such threats efficiently.
 Various Cloud Providers like Amazon, Google
& Windows Azure are liable to users in their
services.
 The future work done by authors would
comprise developing a model to detect and
prevent the most common Virtualization
related threats various risks.
Please Ask…
Cloud security and services

More Related Content

What's hot

Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Cloud computing & IAAS The Dual Edged Sword of New Technology
Cloud computing & IAAS  The Dual Edged Sword of New Technology Cloud computing & IAAS  The Dual Edged Sword of New Technology
Cloud computing & IAAS The Dual Edged Sword of New Technology Mekhi Da ‘Quay Daniels
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10Rugby7277
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Services
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and managementShamsundar Machale (CISSP, CEH)
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingAnkit Singh
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)ClubHack
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responsesshafzonly
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwaribhanu krishna
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationVenkateswar Reddy Melachervu
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
 

What's hot (20)

Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud computing & IAAS The Dual Edged Sword of New Technology
Cloud computing & IAAS  The Dual Edged Sword of New Technology Cloud computing & IAAS  The Dual Edged Sword of New Technology
Cloud computing & IAAS The Dual Edged Sword of New Technology
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and management
 
Cloud security
Cloud security Cloud security
Cloud security
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
 

Viewers also liked

World Aquaculture Adelaide 2014
World Aquaculture Adelaide 2014World Aquaculture Adelaide 2014
World Aquaculture Adelaide 2014progressive01
 
Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)
Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)
Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)Luca Parasiliti
 
Petar michev-2014.eng-1
Petar michev-2014.eng-1Petar michev-2014.eng-1
Petar michev-2014.eng-1Sim Aleksiev
 
PyATL Meetup, Oct 8, 2015
PyATL Meetup, Oct 8, 2015PyATL Meetup, Oct 8, 2015
PyATL Meetup, Oct 8, 2015Roy Russo
 
CLASS NO.1 DARVIN D. ARANDA
CLASS NO.1 DARVIN D. ARANDACLASS NO.1 DARVIN D. ARANDA
CLASS NO.1 DARVIN D. ARANDAasesor2013
 
Weather forecast
Weather forecastWeather forecast
Weather forecastsanjoel
 
Databaseadminppt3663
Databaseadminppt3663Databaseadminppt3663
Databaseadminppt3663Sonam Sharma
 
Ролевой коучинг в ситуации кризиса и санкций.
Ролевой коучинг в ситуации кризиса и санкций.Ролевой коучинг в ситуации кризиса и санкций.
Ролевой коучинг в ситуации кризиса и санкций.Елена Виль-Вильямс
 
Как я провел каникулы
Как я провел каникулыКак я провел каникулы
Как я провел каникулыIvan Borisov
 
Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2
Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2
Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2progressive01
 
Renault can clip v131 installation manual
Renault can clip v131 installation manualRenault can clip v131 installation manual
Renault can clip v131 installation manualDavid Wu
 
แนวข้อสอบภาษาต่างประเทศ นสต ม6
แนวข้อสอบภาษาต่างประเทศ นสต ม6แนวข้อสอบภาษาต่างประเทศ นสต ม6
แนวข้อสอบภาษาต่างประเทศ นสต ม6Marr Ps
 

Viewers also liked (20)

Ktchen 1
Ktchen 1Ktchen 1
Ktchen 1
 
World Aquaculture Adelaide 2014
World Aquaculture Adelaide 2014World Aquaculture Adelaide 2014
World Aquaculture Adelaide 2014
 
Séptima semana
Séptima semanaSéptima semana
Séptima semana
 
Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)
Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)
Powerpoint spiegazione del_prodotto_e_opportunità_syntek_ita (1)
 
Petar michev-2014.eng-1
Petar michev-2014.eng-1Petar michev-2014.eng-1
Petar michev-2014.eng-1
 
PyATL Meetup, Oct 8, 2015
PyATL Meetup, Oct 8, 2015PyATL Meetup, Oct 8, 2015
PyATL Meetup, Oct 8, 2015
 
CLASS NO.1 DARVIN D. ARANDA
CLASS NO.1 DARVIN D. ARANDACLASS NO.1 DARVIN D. ARANDA
CLASS NO.1 DARVIN D. ARANDA
 
INFORME SOBRE ESTRUCURAS
INFORME SOBRE ESTRUCURASINFORME SOBRE ESTRUCURAS
INFORME SOBRE ESTRUCURAS
 
Purelea
PureleaPurelea
Purelea
 
Weather forecast
Weather forecastWeather forecast
Weather forecast
 
Databaseadminppt3663
Databaseadminppt3663Databaseadminppt3663
Databaseadminppt3663
 
Productes area assegurances
Productes area assegurancesProductes area assegurances
Productes area assegurances
 
Bg 14-q-&-a
Bg 14-q-&-aBg 14-q-&-a
Bg 14-q-&-a
 
dissertationforum.org
dissertationforum.orgdissertationforum.org
dissertationforum.org
 
001
001001
001
 
Ролевой коучинг в ситуации кризиса и санкций.
Ролевой коучинг в ситуации кризиса и санкций.Ролевой коучинг в ситуации кризиса и санкций.
Ролевой коучинг в ситуации кризиса и санкций.
 
Как я провел каникулы
Как я провел каникулыКак я провел каникулы
Как я провел каникулы
 
Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2
Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2
Kube et-al-os hv-1-genetic-variation-shellfish-futures-aug-2012-2
 
Renault can clip v131 installation manual
Renault can clip v131 installation manualRenault can clip v131 installation manual
Renault can clip v131 installation manual
 
แนวข้อสอบภาษาต่างประเทศ นสต ม6
แนวข้อสอบภาษาต่างประเทศ นสต ม6แนวข้อสอบภาษาต่างประเทศ นสต ม6
แนวข้อสอบภาษาต่างประเทศ นสต ม6
 

Similar to Cloud security and services

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computingSuranga Nisiwasala
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesTechsparks
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computingPuneet Arora
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
 

Similar to Cloud security and services (20)

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
cloud1_aggy.pdf
cloud1_aggy.pdfcloud1_aggy.pdf
cloud1_aggy.pdf
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 

Cloud security and services

  • 1. CLOUD SERVICES AND SECURITY. Presented by: Jaspreet Kaur Shipra Kataria PEC UNIVERSITY OF TECHNOLOGY
  • 2. Cloud Computing  Cloud computing involves distributed computing over a network, where a program or application may run on many connected computers at the same time.  It has been considered as one of the most promising solutions to our increasing demand for accessing and using resources provisioned over the Internet.  The concept of this new trend originated in 1960 was used by telecommunication companies
  • 3.  A study by Gartner considered Cloud Computing as the first among the top 10 most important technologies.  Cloud computing exhibits the following key characteristics. a. Broad Network Access b. Rapid Elasticity c. Measured Service d. On demand self service e. Resource Pooling
  • 4. Service Delivery Model  Cloud Software as a Service(SaaS): SaaS also referred as "on- demand software" is a software delivery model in which software and associated data are centrally hosted in the cloud.  Cloud Platform as a Service(PaaS): PaaS is a cloud computing service providing computing platform and solution stack s a service. It provides capability to consumer to deploy onto the cloud infrastructure.  Cloud Infrastructure as a Service(IaaS): IaaS service model provides the consumer the efficiency to provision storage, network, processing and other computing resources
  • 5. Cloud Deployed models  Public Cloud: In this type of cloud, the cloud infrastructure is managed by an organization selling cloud services. Various service providers like Amazon, Microsoft, Google own all infrastructure at their data centre. Public cloud services may be free or offered on a pay per-usage model.  Private Cloud: In this type of cloud the infrastructure is available only to specific customer and placed within the internal data center of an organization. It is managed either by an organization itself or third party service provider.
  • 6.  Community Cloud: This type of cloud infrastructure is controlled and shared by various organizations from the same community with common community concerns.  Hybrid Cloud: The cloud infrastructure is a mixture of two or more clouds either public, private or community that are managed centrally and circumscribed by a secure network. It allows multiple entities to access the cloud through Internet in a secure way than public clouds.
  • 7. NIST Visual Model of cloud computing
  • 8. Cloud Computing Security Scenario The fame of cloud computing is due to the fact that many enterprise applications and data are moving towards cloud platforms but lack of security is the major obstacle for cloud adoption. According to a recent survey by International Data Corporation (IDC) 87.5 % of the masses belonging to varied levels starting from IT executives to CEOs have said that security is the top most challenge to be dealt with in every cloud service. Security is the primary concern and the greatest inhibitor in cloud computing.
  • 9. VARIOUS THREATS Threat is a potential cause of an incident, that may result in harm of systems and organization. Following are the threats that illustrate possibility of compromising an entire cloud network. 1.Abuse of cloud computing: This threat is related to shortcomings of registration process associated with cloud. Examples includes Info Stealer Trojan horses and downloads for Microsoft Office and Adobe PDF exploits. 2. Insecure interfaces and API: Sometimes in cloud the information that is not deleted could reside in insecure locations which may cause inconsistency. Examples including flexible access controls ad improper authorizations, limited monitoring and logging capabilities
  • 10. Continued…. 3. Data Loss or Leakage: Threats related to data loss or leakage depends upon how data is organized or structured. Following terms that should keep in mind while protecting data from any loss or leakage.  The data of organizations should reside in servers of other nations.  Unauthorized parties must be prevented from gaining access to sensitive data.  The data retained on Cloud provider should reside on provider's server for the same duration even after it has been deleted by client. Examples are insufficient client authentication, authorization and audit controls (AAA)
  • 11. Continued.. 4. Malevolence: This threat originates due to lack of transparency into provider's process and procedures. If the factors affecting hiring of new employee are not considered it may provide opportunity to adversary to harvest confidential data or gain complete control over the cloud services with little or no risk of detection. 5. Virtualization threats: It introduces some kind of risks to its applications:  Dependency on Secure Hypervisor: The security can be breached here as all the information is stored with a common storage system. By gaining access to this information, adversary can launch many attacks like VM Hijack attack.
  • 12. RISKS INVOLVED  Risk is an expose to danger, harm, or loss. Their are certain risks in residing data at providers infrastructure which are as follows:  Shared Access  Vulnerabilities  Virtual Exploits  Authentication, Authorization & Access Control  Availability  Ownership
  • 13. Service & Security Offerings and Compliance  Google apps & Google Engine  Amazon Web Services
  • 14.
  • 15. Google Apps & Google Engine  Google Apps is a service from Google that provides independently customizable versions of several Google products using a domain name provided by the customer.  Features several Web applications with similar functionality including Gmail, Google Calendar, Docs, Drive, Groups, News, Play, Sites, Talk.  Google Apps has passed FISMA certification meaning that they are compliant with federal law for holding data for government agencies.
  • 16. Google Apps controls & Protocols  Logical security  Privacy  Data center physical security  Incident management and availability  Change management  Organization and administration
  • 17. Two factor authentication  First Step: login using the username and password. This is an application of the knowledge factor.  Implementation of second step:  Phone's IMEI International Mobile Station Equipement Identity  Access to their services is HTTPS enabled so data can be protected in transit.
  • 18. Continued…  Data stored on Google’s servers is replicated to several data centers so even a major outage to a data center does not destroy the data.  Google also performs internal audits of their application code, as well as having external audits.  Physical access to data centers is restricted to an as-needed basis and the data centers themselves have network and power redundancies.
  • 19.
  • 21. Control Environment  Amazon Web Services abbreviated as AWS is a collection of remote computing services that together make up a cloud computing platform.  Amazon Elastic compute cloud is meant for providing a complete rented computer that can be used by users for its computer utility.  Goal is to protect data against unauthorized systems or users and to provide Amazon EC2 instances
  • 23. Multiple levels of security  Host Operating system  Guest Operating system  Firewall
  • 24. Services  Well known services are Amazon EC2, S3 and Amazon SimpleDB  Elastic Compute Cloud(EC2): It provides a virtual rented computer with the help of Xen.  Simple Storage Service: It provides storage to various applications so that users can do computations and developments onto that space and store them for further use.  Amazon Virtual Private Cloud: It creates a logically isolated set of Amazon EC2 instances which can be connected to an existing network using a VPN connection.
  • 25. Hypervisor  It is conceptually one level higher than a supervisory program.  The hypervisor presents to the guest operating systems a virtual operating platform and manages the execution of the guest operating systems.  Multiple instances of a variety of operating systems may share the virtualized hardware resources  Amazon EC2 currently utilizes a highly customized version of the Xen hypervisor, taking advantage of paravirtualization
  • 26. Instance Isolation  Different instances running on the same physical machine are isolated from each other via the Xen hypervisor.  AWS firewall resides within the hypervisor layer, between the physical network interface and the instance's virtual interface  All packets must pass through this layer, thus an instances neighbors have no more access to that instance
  • 28. Countermeasures  Authentications and ID Management  Workload analysis and allocation  Use of Data Encryption  Better Enterprise Infrastructure
  • 29. Conclusion & Future Scope  The classification of various threats discussed in this paper helps the cloud users to make out proper choice and also help cloud providers to handle such threats efficiently.  Various Cloud Providers like Amazon, Google & Windows Azure are liable to users in their services.  The future work done by authors would comprise developing a model to detect and prevent the most common Virtualization related threats various risks.