SlideShare a Scribd company logo
1 of 28
Download to read offline
TURKISH(PETROLEUM(CORPORATION(
Informa7on(Technologies(Department(
•  Currently working as an iOS Developer
•  Admin of Mobile Device Management System
•  Admin of On-premise Private Cloud Storage and File
Sharing System
Cloud Computing : A model of provision and marketing IT
services that meet certain characteristics
•  The infrastructure is shared.
•  The services are accessed on demand in
units that vary by service
•  Services are scalable
•  The pricing model is by consumption.
•  Services can be accessed from anywhere in the world by
multiple devices.
Offer IT Services
to any customer
over the internet
Offer IT Services
to a predefined
group of
customers, with
access through
internet or
private networks
The cloud IT service are grouped into three categories:
•  Infrastructure as a Service (IaaS): Provides the processing
environment.
•  Platform as a Service (PaaS): Provides an environment for
developing and running applications.
•  Software as a Service (SaaS): The software service provide
functionalities that solve user problems. Cloud storage
and share services, Office automation are SaaS examples.
Cloud file sharing services is
a type of SaaS and enables
users securely share data
with other designated users.
Cloud storage means the
storage of data online in
cloud in which a company’s
data is stored in and
accessible from distributed
connected resources.
Four types of cloud storage
exist; Personal, Public,
Private and Hybrid
Personal Cloud Storage: (Mobile Cloud Storage)
subset of public. Stores individual’s data and
provide access from anywhere. Enables data sync
and share across multiple devices.
Public Cloud Storage: Enterprise and cloud service
provider are separate. Cloud provider fully manages
Private Cloud Storage: Cloud provider has infrastructure in
the enterprise data center managed by Cloud provider.
Another form is On premise Private clouds in which
•  Cloud storage is totally installed in enterprise data center
•  Gives an option to managed it by enterprise
Hybrid Cloud Storage: Combination of public and private.
Critical data resides in enterprise. Other data is stored in
public storage
•  A tool named “iDict”
can bypass two factor
authentication
•  The only requirement
is iCloud username
(i.e. email address)
•  Apple fixed the security flow
after two days.
•  Again advising users to change
simple passwords
•  Someone’s iCloud data
probably leaked again.
The Files are stored in the cloud
You need to have Office 365 business subscription
Have some problems with data integrity
•  What gets synced to the cloud
generally not the same as what gets
synced back from the cloud
•  8 KB sized file extensions added
after sync.
•  Date modified attribute left
unchanged although file size
changed.
•  Same test done on other provider
(like BittorrentSync). It is found that
Data integrity is preserved in other
provider.
•  The exchange account credentials (username
and password) is stored in the cloud without
notice.
•  The test done by us shows that after changing
email password, the application can receive and
send emails for duration of 8 hours.
•  If you have a policy stating that credentials must
only reside in company servers, then the app
breaks your security policy without notice.
•  Means that files are encrypted so that they can only
accessed by those with the keys
•  The files are stored in the cloud are “locked vaults”
•  The content in the locked vaults is only accessible to those
who locked them.
•  Encryption : The process of encoding messages in a way that
only authorized can read it
•  Encryption key : The key used to transfer the plain text file to
encrypted file and vice versa
•  Encrypt in transit : The act of encrypting data when it is
uploaded to a Cloud service
•  Encrypt at rest : The act of encrypting data once it is stored
on the servers of a Cloud service
Encrypt at
transit
Encrypt at
rest
Who holds
the key
Zero Knowledge
Policy
Cloud( Cloud( Cloud(
User(
•  At Zero knowledge cloud
services, the files encrypted
locally and then synced to
the cloud.
•  Users keep the keys and
cloud vendors cannot
access the actual content.
•  Files are encrypted end to
end
Duane Wilson
•  If data is sent via the cloud
service without user
downloading it on to their
system (i.e. using a web
browser), the vendors have
an opportunity to view it.
•  The research examines
Zero knowledge vendors
(Spider Oak, Wuala and
Tresorit)
Recent study shows that;
Some of the cloud providers (Tresorit, Wuala and
SpiderOak) that examined in the paper agree some
aspects and encourages customers to use the desktop
application to transfer files instead of doing so through
the cloud’s web portal.
Cloud Application
Cloud Web Portal
IF YOU SHARE
Assessing
Security Risk
Searching Solution
Provider
Deployment
& Test
Education Cut off data
leakage
resources
Consider(
User(
Experience(
As(we(live(in(
a(mobile(
world(
•  Look for public
cloud storage apps
through MDM
system
•  Check also for
iCloud like device
embedded cloud
storage services
•  Observe how user’s
consume such apps
and understand the
purpose.
In terms of cloud storage, we believe that the solution
should;
•  Be deployed on premise
•  not need a vpn for secure connection
•  Take backup of various devices such as mobile, laptop
•  Allow monitoring all sharing and backup activities
•  Have mobile apps at least good as the free one in
terms of mobile user interface design and utilize
touchID like security features
We assume that the on-premise deployment offering is
chosen
•  Data and management modules should be
separated
•  Data account size limits should be determined
carefully
•  Testing the solution’s mobile apps and web portal
security is crucial
•  The newly deployed cloud system probably will have
different interface than usual free cloud offerings.
•  The cloud thing is still new to many enterprise users.
Online education if needed onside training
Education of the end user is critical as;
•  Block apps having security flaws in mobile devices using
MDM from end to end
•  Prevent usage of embedded cloud storage in mobile
devices.
•  Block the communication of the services in the firewall side.
You can assess the success of the mobile strategy in these
phase :
If enterprise users able to use newly deployed secure cloud
storage without hassle, then the strategy works flawlessly.
tr.linkedin.com/pub/mehmet-akif-acar
acar@tp.gov.tr
mehmetakifacar@gmail.com

All knowledge is connected
to all other knowledge
The fun is in making the
connections

More Related Content

What's hot

Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitymaheralgamdi
 
cloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutioncloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutionMajid Hajibaba
 
Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computingeShikshak
 
Introduction of cloud computing
Introduction of cloud computingIntroduction of cloud computing
Introduction of cloud computingSuman Sharma
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
Topic 2: Cloud Computing Paradigms
Topic 2: Cloud Computing ParadigmsTopic 2: Cloud Computing Paradigms
Topic 2: Cloud Computing ParadigmsZubair Nabi
 
Lecture 2 introduction to cloud computing
Lecture 2   introduction to cloud computingLecture 2   introduction to cloud computing
Lecture 2 introduction to cloud computingdralaa7
 
Cloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsCloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsDarshan Rajagopal
 
Cloud computing 1
Cloud computing  1Cloud computing  1
Cloud computing 1Ashok Kumar
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...EuroCloud
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud ComputingPooja Sharma
 
J.Torpey IPBC Presentation
J.Torpey IPBC PresentationJ.Torpey IPBC Presentation
J.Torpey IPBC PresentationInsynQ-inc
 
Citrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackneyCitrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackneyGreythornAU
 
Cloud computing Dill
Cloud computing DillCloud computing Dill
Cloud computing DillRaul Panjiyar
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaPrashant Gupta
 
Mahika cloud services
Mahika cloud servicesMahika cloud services
Mahika cloud servicesSomnath Sen
 

What's hot (20)

Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
cloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutioncloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdution
 
Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computing
 
Introduction of cloud computing
Introduction of cloud computingIntroduction of cloud computing
Introduction of cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Topic 2: Cloud Computing Paradigms
Topic 2: Cloud Computing ParadigmsTopic 2: Cloud Computing Paradigms
Topic 2: Cloud Computing Paradigms
 
Lecture 2 introduction to cloud computing
Lecture 2   introduction to cloud computingLecture 2   introduction to cloud computing
Lecture 2 introduction to cloud computing
 
Cloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsCloud Computing for Mobile Robots
Cloud Computing for Mobile Robots
 
Understanding "the Cloud"
Understanding "the Cloud"Understanding "the Cloud"
Understanding "the Cloud"
 
Cloud computing 1
Cloud computing  1Cloud computing  1
Cloud computing 1
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 
J.Torpey IPBC Presentation
J.Torpey IPBC PresentationJ.Torpey IPBC Presentation
J.Torpey IPBC Presentation
 
Sunil
SunilSunil
Sunil
 
Citrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackneyCitrix enterprise mobility presentation bede hackney
Citrix enterprise mobility presentation bede hackney
 
Cloud computing Dill
Cloud computing DillCloud computing Dill
Cloud computing Dill
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 
Mahika cloud services
Mahika cloud servicesMahika cloud services
Mahika cloud services
 

Viewers also liked

Information System USAF
Information System USAFInformation System USAF
Information System USAFKevin Parrish
 
Establishing a Cyberspace Situational Awareness
Establishing a Cyberspace Situational AwarenessEstablishing a Cyberspace Situational Awareness
Establishing a Cyberspace Situational AwarenessKevin Parrish
 
CV-Mr.Mohommad Atee (Eng.Contracts Specialist) 2Dec2012
CV-Mr.Mohommad Atee (Eng.Contracts Specialist) 2Dec2012CV-Mr.Mohommad Atee (Eng.Contracts Specialist) 2Dec2012
CV-Mr.Mohommad Atee (Eng.Contracts Specialist) 2Dec2012Mohammed Atee
 
Communication Skills Classes
Communication Skills ClassesCommunication Skills Classes
Communication Skills ClassesKevin Parrish
 
CAPT 116 General ES September 2009
CAPT 116 General ES September 2009CAPT 116 General ES September 2009
CAPT 116 General ES September 2009Kevin Parrish
 
USASOM Hot loading MSTs for Helicopter
USASOM Hot loading MSTs for HelicopterUSASOM Hot loading MSTs for Helicopter
USASOM Hot loading MSTs for HelicopterKevin Parrish
 
縣市區域計畫參與經驗分享【高雄市】蔡卉荀
縣市區域計畫參與經驗分享【高雄市】蔡卉荀縣市區域計畫參與經驗分享【高雄市】蔡卉荀
縣市區域計畫參與經驗分享【高雄市】蔡卉荀cettw
 
Advanced Certificate
Advanced CertificateAdvanced Certificate
Advanced CertificateBryn Logan
 
Joint Operation Planning and Execution System (JOPES) - Global
Joint Operation Planning and Execution System (JOPES) - GlobalJoint Operation Planning and Execution System (JOPES) - Global
Joint Operation Planning and Execution System (JOPES) - GlobalKevin Parrish
 
平地國土議題盤點【違章工廠】吳其融
平地國土議題盤點【違章工廠】吳其融平地國土議題盤點【違章工廠】吳其融
平地國土議題盤點【違章工廠】吳其融cettw
 
Curriculum vitae Ivica Pavela
Curriculum vitae Ivica PavelaCurriculum vitae Ivica Pavela
Curriculum vitae Ivica PavelaIvica Pavela
 
Los 50 alumnos más brillantes de España consiguen una beca para recorrer Europa
Los 50 alumnos más brillantes de España consiguen una beca para recorrer EuropaLos 50 alumnos más brillantes de España consiguen una beca para recorrer Europa
Los 50 alumnos más brillantes de España consiguen una beca para recorrer EuropaBANCO SANTANDER
 

Viewers also liked (14)

Information System USAF
Information System USAFInformation System USAF
Information System USAF
 
Establishing a Cyberspace Situational Awareness
Establishing a Cyberspace Situational AwarenessEstablishing a Cyberspace Situational Awareness
Establishing a Cyberspace Situational Awareness
 
CV-Mr.Mohommad Atee (Eng.Contracts Specialist) 2Dec2012
CV-Mr.Mohommad Atee (Eng.Contracts Specialist) 2Dec2012CV-Mr.Mohommad Atee (Eng.Contracts Specialist) 2Dec2012
CV-Mr.Mohommad Atee (Eng.Contracts Specialist) 2Dec2012
 
NDT CROSS CERTS
NDT CROSS CERTSNDT CROSS CERTS
NDT CROSS CERTS
 
Communication Skills Classes
Communication Skills ClassesCommunication Skills Classes
Communication Skills Classes
 
CAPT 116 General ES September 2009
CAPT 116 General ES September 2009CAPT 116 General ES September 2009
CAPT 116 General ES September 2009
 
Portfolio
PortfolioPortfolio
Portfolio
 
USASOM Hot loading MSTs for Helicopter
USASOM Hot loading MSTs for HelicopterUSASOM Hot loading MSTs for Helicopter
USASOM Hot loading MSTs for Helicopter
 
縣市區域計畫參與經驗分享【高雄市】蔡卉荀
縣市區域計畫參與經驗分享【高雄市】蔡卉荀縣市區域計畫參與經驗分享【高雄市】蔡卉荀
縣市區域計畫參與經驗分享【高雄市】蔡卉荀
 
Advanced Certificate
Advanced CertificateAdvanced Certificate
Advanced Certificate
 
Joint Operation Planning and Execution System (JOPES) - Global
Joint Operation Planning and Execution System (JOPES) - GlobalJoint Operation Planning and Execution System (JOPES) - Global
Joint Operation Planning and Execution System (JOPES) - Global
 
平地國土議題盤點【違章工廠】吳其融
平地國土議題盤點【違章工廠】吳其融平地國土議題盤點【違章工廠】吳其融
平地國土議題盤點【違章工廠】吳其融
 
Curriculum vitae Ivica Pavela
Curriculum vitae Ivica PavelaCurriculum vitae Ivica Pavela
Curriculum vitae Ivica Pavela
 
Los 50 alumnos más brillantes de España consiguen una beca para recorrer Europa
Los 50 alumnos más brillantes de España consiguen una beca para recorrer EuropaLos 50 alumnos más brillantes de España consiguen una beca para recorrer Europa
Los 50 alumnos más brillantes de España consiguen una beca para recorrer Europa
 

Similar to CloudStorage_M.A.Acar

Cloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMEDCloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMEDNA000000
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud ComputingHarpreetKaur1382
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud ComputingOshin Kandpal
 
The wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptxThe wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptxOmSatpathy
 
Presentation on Cloud Computing (CE).pptx
Presentation on Cloud Computing (CE).pptxPresentation on Cloud Computing (CE).pptx
Presentation on Cloud Computing (CE).pptxHarpreetKaur1382
 
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Fabrizio Volpe
 
Cloud computing
Cloud computingCloud computing
Cloud computingRaj K
 
Cloud Computing PPT.pptx
Cloud Computing PPT.pptxCloud Computing PPT.pptx
Cloud Computing PPT.pptxHetKhandol
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptxJeetThacker7
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing NASIMTAHIR2
 
Bca6thSemesterPresentationOnCloudComputing.pptx
Bca6thSemesterPresentationOnCloudComputing.pptxBca6thSemesterPresentationOnCloudComputing.pptx
Bca6thSemesterPresentationOnCloudComputing.pptxitsmekunaljha
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing CloudSyntrix
 
presentationoncloudcomputing-170312082947.pptx
presentationoncloudcomputing-170312082947.pptxpresentationoncloudcomputing-170312082947.pptx
presentationoncloudcomputing-170312082947.pptxmnewg218
 

Similar to CloudStorage_M.A.Acar (20)

Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMEDCloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMED
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud Computing
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud Computing
 
The wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptxThe wonders of Cloud Computing.pptx
The wonders of Cloud Computing.pptx
 
Presentation on Cloud Computing (CE).pptx
Presentation on Cloud Computing (CE).pptxPresentation on Cloud Computing (CE).pptx
Presentation on Cloud Computing (CE).pptx
 
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
 
Cloud slide
Cloud slideCloud slide
Cloud slide
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing PPT.pptx
Cloud Computing PPT.pptxCloud Computing PPT.pptx
Cloud Computing PPT.pptx
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Bca6thSemesterPresentationOnCloudComputing.pptx
Bca6thSemesterPresentationOnCloudComputing.pptxBca6thSemesterPresentationOnCloudComputing.pptx
Bca6thSemesterPresentationOnCloudComputing.pptx
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing
 
Presentation on Cloud computing
Presentation on Cloud computingPresentation on Cloud computing
Presentation on Cloud computing
 
presentationoncloudcomputing-170312082947.pptx
presentationoncloudcomputing-170312082947.pptxpresentationoncloudcomputing-170312082947.pptx
presentationoncloudcomputing-170312082947.pptx
 

CloudStorage_M.A.Acar

  • 2. •  Currently working as an iOS Developer •  Admin of Mobile Device Management System •  Admin of On-premise Private Cloud Storage and File Sharing System
  • 3. Cloud Computing : A model of provision and marketing IT services that meet certain characteristics •  The infrastructure is shared. •  The services are accessed on demand in units that vary by service •  Services are scalable •  The pricing model is by consumption. •  Services can be accessed from anywhere in the world by multiple devices.
  • 4. Offer IT Services to any customer over the internet Offer IT Services to a predefined group of customers, with access through internet or private networks
  • 5. The cloud IT service are grouped into three categories: •  Infrastructure as a Service (IaaS): Provides the processing environment. •  Platform as a Service (PaaS): Provides an environment for developing and running applications. •  Software as a Service (SaaS): The software service provide functionalities that solve user problems. Cloud storage and share services, Office automation are SaaS examples.
  • 6. Cloud file sharing services is a type of SaaS and enables users securely share data with other designated users. Cloud storage means the storage of data online in cloud in which a company’s data is stored in and accessible from distributed connected resources. Four types of cloud storage exist; Personal, Public, Private and Hybrid
  • 7. Personal Cloud Storage: (Mobile Cloud Storage) subset of public. Stores individual’s data and provide access from anywhere. Enables data sync and share across multiple devices. Public Cloud Storage: Enterprise and cloud service provider are separate. Cloud provider fully manages Private Cloud Storage: Cloud provider has infrastructure in the enterprise data center managed by Cloud provider. Another form is On premise Private clouds in which •  Cloud storage is totally installed in enterprise data center •  Gives an option to managed it by enterprise Hybrid Cloud Storage: Combination of public and private. Critical data resides in enterprise. Other data is stored in public storage
  • 8.
  • 9.
  • 10. •  A tool named “iDict” can bypass two factor authentication •  The only requirement is iCloud username (i.e. email address)
  • 11. •  Apple fixed the security flow after two days. •  Again advising users to change simple passwords •  Someone’s iCloud data probably leaked again.
  • 12. The Files are stored in the cloud You need to have Office 365 business subscription Have some problems with data integrity
  • 13. •  What gets synced to the cloud generally not the same as what gets synced back from the cloud •  8 KB sized file extensions added after sync. •  Date modified attribute left unchanged although file size changed. •  Same test done on other provider (like BittorrentSync). It is found that Data integrity is preserved in other provider.
  • 14. •  The exchange account credentials (username and password) is stored in the cloud without notice. •  The test done by us shows that after changing email password, the application can receive and send emails for duration of 8 hours. •  If you have a policy stating that credentials must only reside in company servers, then the app breaks your security policy without notice.
  • 15. •  Means that files are encrypted so that they can only accessed by those with the keys •  The files are stored in the cloud are “locked vaults” •  The content in the locked vaults is only accessible to those who locked them.
  • 16. •  Encryption : The process of encoding messages in a way that only authorized can read it •  Encryption key : The key used to transfer the plain text file to encrypted file and vice versa •  Encrypt in transit : The act of encrypting data when it is uploaded to a Cloud service •  Encrypt at rest : The act of encrypting data once it is stored on the servers of a Cloud service
  • 17. Encrypt at transit Encrypt at rest Who holds the key Zero Knowledge Policy Cloud( Cloud( Cloud( User(
  • 18. •  At Zero knowledge cloud services, the files encrypted locally and then synced to the cloud. •  Users keep the keys and cloud vendors cannot access the actual content. •  Files are encrypted end to end
  • 19. Duane Wilson •  If data is sent via the cloud service without user downloading it on to their system (i.e. using a web browser), the vendors have an opportunity to view it. •  The research examines Zero knowledge vendors (Spider Oak, Wuala and Tresorit) Recent study shows that;
  • 20. Some of the cloud providers (Tresorit, Wuala and SpiderOak) that examined in the paper agree some aspects and encourages customers to use the desktop application to transfer files instead of doing so through the cloud’s web portal. Cloud Application Cloud Web Portal IF YOU SHARE
  • 21.
  • 22. Assessing Security Risk Searching Solution Provider Deployment & Test Education Cut off data leakage resources Consider( User( Experience( As(we(live(in( a(mobile( world(
  • 23. •  Look for public cloud storage apps through MDM system •  Check also for iCloud like device embedded cloud storage services •  Observe how user’s consume such apps and understand the purpose.
  • 24. In terms of cloud storage, we believe that the solution should; •  Be deployed on premise •  not need a vpn for secure connection •  Take backup of various devices such as mobile, laptop •  Allow monitoring all sharing and backup activities •  Have mobile apps at least good as the free one in terms of mobile user interface design and utilize touchID like security features
  • 25. We assume that the on-premise deployment offering is chosen •  Data and management modules should be separated •  Data account size limits should be determined carefully •  Testing the solution’s mobile apps and web portal security is crucial
  • 26. •  The newly deployed cloud system probably will have different interface than usual free cloud offerings. •  The cloud thing is still new to many enterprise users. Online education if needed onside training Education of the end user is critical as;
  • 27. •  Block apps having security flaws in mobile devices using MDM from end to end •  Prevent usage of embedded cloud storage in mobile devices. •  Block the communication of the services in the firewall side. You can assess the success of the mobile strategy in these phase : If enterprise users able to use newly deployed secure cloud storage without hassle, then the strategy works flawlessly.
  • 28. tr.linkedin.com/pub/mehmet-akif-acar acar@tp.gov.tr mehmetakifacar@gmail.com All knowledge is connected to all other knowledge The fun is in making the connections