SlideShare a Scribd company logo
1 of 16
CLOUD
COMPUTING
Lecture
Dr. Alshaimaa Abo-alian
a_alian@cis.asu.edu.eg
Lecture Outline
■ Overview
■ Main Security Factors
Overview
■ Cloud is a target-rich environment for malicious individuals and
criminal organizations.
■ Outsourcing to a cloud generates new security and privacy
concerns.
■ Many issues related to privacy, security, and trust in cloud
computing are far from being settled.
■ Service Level Agreements (SLAs) do not provide adequate legal
protection for cloud computer users
 Remote data security refers to the protection process for the
outsourced data from malicious access or modifications by
unauthorized users.
Main Security Factors
■ Confidentiality, integrity and availability (CIA) are the main
security factors
■ Confidentiality means ensuring that only authorized users
with the appropriate privileges can access the data.
■ Remote data integrity is ensuring the completeness, accuracy
and consistency of the outsourced data.
■ Availability refers to ensuring that the stored data/service is
always available to be delivered to the users.
What is Privacy?
■ Assuring that users control what information related to them
may be collected and stored and by whom and to whom that
information may be disclosed.
Major Cloud User’s Security
Concerns
■ Multi-tenancy (The shared infrastructure) is the root cause of
many user concerns
■ Users no longer physically possess the storage of their data
 The unauthorized access to confidential information and the
data theft
 A dishonest CSP may sell the confidential information to the
competitors
 the CSP might reclaim storage for monetary reasons by
discarding data that has not been or is rarely accessed or even
hide data loss incidents to maintain a reputation
Major Cloud User’s Security
Concerns
■ The user control over the lifecycle of data: It is virtually
impossible for a user to determine if data that should have
been deleted was actually deleted or the next user can recover
confidential data
■ Lack of standardization: there are no inter-operability
standards.What can be done when service provided by the
CSP is interrupted?
■ The legal framework for enforcing cloud security:The data
centers of a CSP may be located in several countries and it is
unclear what laws apply, the laws of the country where
information is stored and processed, the laws of the countries
the information crossed when sent by the user, or the laws of
the user’s country.
Cloud Security Risks
There are three broad classes:
1. Traditional security threats,
2. Threats related to system availability
3. Threats related to third-party data control.
Traditional SecurityThreats
■ Impact amplified due to:
– The vast amount of cloud resources
– The large user population that can be affected.
– The fuzzy bounds of responsibility between the providers of
cloud services and users
– The difficulties to accurately identify the cause.
■ The traditional threats begin at the user site.
 The user must protect the infrastructure used to connect to the
cloud
 This task is more difficult because some components of this
infrastructure are outside the firewall protecting the user.
Traditional SecurityThreats
■ Authentication and authorization:
– User authentication is the process of verifying the
identity of a user.
– Authorization: Granting access to specific
services and/or resources based on the
authentication.
– Different individuals should be assigned distinct
levels of privilege based on their role in the
organization.
– It is also nontrivial to merge or adapt the internal
policies and security metrics of an organization
with the ones of the cloud.
Traditional SecurityThreats
Most common attacks
■ Distributed Denial of Service (DDoS): prevents
legitimate users to access cloud services
■ SQL injection: An SQL command entered in a web form
causes the contents of a database used by the web site to
be either dumped to the attacker or altered
■ Cross-site scripting: permits the attacker to insert client-
scripts into the web pages and thus, bypass the access
controls at the web site.
■ Phishing aims to gain information from a database by
masquerading as a trustworthy entity. Such information
could be SSN and credit card numbers.
New Cloud SecurityThreats
■ Cloud servers host multipleVMs
■ Multiple applications may run under eachVM.
■ Multi-tenancy and vm vulnerabilities open new attack
channels for malicious users.
■ Identifying the path followed by an attacker is more
difficult in a cloud environment
Availability of cloud services
■ System failures, power outages, and other catastrophic
events could shutdown services for extended periods of
time.
■ Data lock-in and lack of interoperability could prevent a
large organization whose business model depends on
these data to function properly,
Third-party control
■ It generates a spectrum of concerns caused by the lack of
transparency and limited user control.
■ For example, a cloud provider may subcontract some
resources from a third party whose level of trust is
questionable.
Top threats to cloud computing
■ Identified by a 2016 Cloud Security Alliance (CSA) report
1. Data breaches.
2. Compromised credentials and broken authentication.
3. Hacked interfaces and APIs.
4. Exploited system vulnerabilities.
5. Account hijacking
6. Malicious insiders
7. advanced persistent threats (APTs)
8. permanent data loss
9. inadequate diligence,
10. cloud service abuse,
11. DoS attacks
Top threats to cloud
computing
■ Identified by a 2022 Cloud SecurityAlliance (CSA) report
1. Insufficient identity, credential, access and key management (#4)
2. Insecure interfaces and APIs (#7)
3. Misconfiguration and inadequate change control (#2)
4. Lack of cloud security architecture and strategy (#3)
5. Insecure software development
6. Unsecure third-party resources
7. System vulnerabilities
8. Accidental cloud data disclosure/disclosure
9. Misconfiguration and exploitation of serverless and container
workloads
10. Organized crime/hackers/APT
11. Cloud storage data exfiltration
Legal protection of cloud users
The contract between the user and the Cloud Service
Provider (CSP) should spell out explicitly:
■ CSP obligations to handle securely sensitive information
and its obligation to comply to privacy laws.
■ CSP liabilities for mishandling sensitive information.
■ CSP liabilities for data loss.
■ The rules governing ownership of the data.
■ The geographical regions where information and backups
can be stored.

More Related Content

Similar to Lecture Cloud Security.pptx

The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security IssuesHTS Hosting
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxGhofraneFerchichi2
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationTejaswi Agarwal
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxyasirkhokhar7
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfProtelion
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfProtelion
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNithin Raj
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4sophiabelthome
 
12-cloud-security.ppt
12-cloud-security.ppt12-cloud-security.ppt
12-cloud-security.pptchelsi33
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureAbdul Khan
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxGauravWankar2
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingredpel dot com
 

Similar to Lecture Cloud Security.pptx (20)

The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Network security
Network securityNetwork security
Network security
 
Cloud security
Cloud securityCloud security
Cloud security
 
FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 
12-cloud-security.ppt
12-cloud-security.ppt12-cloud-security.ppt
12-cloud-security.ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 

More from ShimoFcis

Motif Finding.pdf
Motif Finding.pdfMotif Finding.pdf
Motif Finding.pdfShimoFcis
 
05_SQA_Overview.ppt
05_SQA_Overview.ppt05_SQA_Overview.ppt
05_SQA_Overview.pptShimoFcis
 
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptxTopic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptxShimoFcis
 
lab-8 (1).pptx
lab-8 (1).pptxlab-8 (1).pptx
lab-8 (1).pptxShimoFcis
 
Lab-11-C-Problems.pptx
Lab-11-C-Problems.pptxLab-11-C-Problems.pptx
Lab-11-C-Problems.pptxShimoFcis
 
Mid-Term Problem Solving Part.pptx
Mid-Term Problem Solving Part.pptxMid-Term Problem Solving Part.pptx
Mid-Term Problem Solving Part.pptxShimoFcis
 
Lecture 6.pptx
Lecture 6.pptxLecture 6.pptx
Lecture 6.pptxShimoFcis
 
mapreduce.pptx
mapreduce.pptxmapreduce.pptx
mapreduce.pptxShimoFcis
 
storage-systems.pptx
storage-systems.pptxstorage-systems.pptx
storage-systems.pptxShimoFcis
 
mapreduce-advanced.pptx
mapreduce-advanced.pptxmapreduce-advanced.pptx
mapreduce-advanced.pptxShimoFcis
 

More from ShimoFcis (11)

Motif Finding.pdf
Motif Finding.pdfMotif Finding.pdf
Motif Finding.pdf
 
05_SQA_Overview.ppt
05_SQA_Overview.ppt05_SQA_Overview.ppt
05_SQA_Overview.ppt
 
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptxTopic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
 
4-DES.pdf
4-DES.pdf4-DES.pdf
4-DES.pdf
 
lab-8 (1).pptx
lab-8 (1).pptxlab-8 (1).pptx
lab-8 (1).pptx
 
Lab-11-C-Problems.pptx
Lab-11-C-Problems.pptxLab-11-C-Problems.pptx
Lab-11-C-Problems.pptx
 
Mid-Term Problem Solving Part.pptx
Mid-Term Problem Solving Part.pptxMid-Term Problem Solving Part.pptx
Mid-Term Problem Solving Part.pptx
 
Lecture 6.pptx
Lecture 6.pptxLecture 6.pptx
Lecture 6.pptx
 
mapreduce.pptx
mapreduce.pptxmapreduce.pptx
mapreduce.pptx
 
storage-systems.pptx
storage-systems.pptxstorage-systems.pptx
storage-systems.pptx
 
mapreduce-advanced.pptx
mapreduce-advanced.pptxmapreduce-advanced.pptx
mapreduce-advanced.pptx
 

Recently uploaded

➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...amitlee9823
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...karishmasinghjnh
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Pooja Nehwal
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...amitlee9823
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteedamy56318795
 
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...amitlee9823
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Detecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachDetecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachBoston Institute of Analytics
 
hybrid Seed Production In Chilli & Capsicum.pptx
hybrid Seed Production In Chilli & Capsicum.pptxhybrid Seed Production In Chilli & Capsicum.pptx
hybrid Seed Production In Chilli & Capsicum.pptx9to5mart
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramMoniSankarHazra
 

Recently uploaded (20)

➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Detecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachDetecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning Approach
 
hybrid Seed Production In Chilli & Capsicum.pptx
hybrid Seed Production In Chilli & Capsicum.pptxhybrid Seed Production In Chilli & Capsicum.pptx
hybrid Seed Production In Chilli & Capsicum.pptx
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics Program
 

Lecture Cloud Security.pptx

  • 2. Lecture Outline ■ Overview ■ Main Security Factors
  • 3. Overview ■ Cloud is a target-rich environment for malicious individuals and criminal organizations. ■ Outsourcing to a cloud generates new security and privacy concerns. ■ Many issues related to privacy, security, and trust in cloud computing are far from being settled. ■ Service Level Agreements (SLAs) do not provide adequate legal protection for cloud computer users  Remote data security refers to the protection process for the outsourced data from malicious access or modifications by unauthorized users.
  • 4. Main Security Factors ■ Confidentiality, integrity and availability (CIA) are the main security factors ■ Confidentiality means ensuring that only authorized users with the appropriate privileges can access the data. ■ Remote data integrity is ensuring the completeness, accuracy and consistency of the outsourced data. ■ Availability refers to ensuring that the stored data/service is always available to be delivered to the users. What is Privacy? ■ Assuring that users control what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
  • 5. Major Cloud User’s Security Concerns ■ Multi-tenancy (The shared infrastructure) is the root cause of many user concerns ■ Users no longer physically possess the storage of their data  The unauthorized access to confidential information and the data theft  A dishonest CSP may sell the confidential information to the competitors  the CSP might reclaim storage for monetary reasons by discarding data that has not been or is rarely accessed or even hide data loss incidents to maintain a reputation
  • 6. Major Cloud User’s Security Concerns ■ The user control over the lifecycle of data: It is virtually impossible for a user to determine if data that should have been deleted was actually deleted or the next user can recover confidential data ■ Lack of standardization: there are no inter-operability standards.What can be done when service provided by the CSP is interrupted? ■ The legal framework for enforcing cloud security:The data centers of a CSP may be located in several countries and it is unclear what laws apply, the laws of the country where information is stored and processed, the laws of the countries the information crossed when sent by the user, or the laws of the user’s country.
  • 7. Cloud Security Risks There are three broad classes: 1. Traditional security threats, 2. Threats related to system availability 3. Threats related to third-party data control.
  • 8. Traditional SecurityThreats ■ Impact amplified due to: – The vast amount of cloud resources – The large user population that can be affected. – The fuzzy bounds of responsibility between the providers of cloud services and users – The difficulties to accurately identify the cause. ■ The traditional threats begin at the user site.  The user must protect the infrastructure used to connect to the cloud  This task is more difficult because some components of this infrastructure are outside the firewall protecting the user.
  • 9. Traditional SecurityThreats ■ Authentication and authorization: – User authentication is the process of verifying the identity of a user. – Authorization: Granting access to specific services and/or resources based on the authentication. – Different individuals should be assigned distinct levels of privilege based on their role in the organization. – It is also nontrivial to merge or adapt the internal policies and security metrics of an organization with the ones of the cloud.
  • 10. Traditional SecurityThreats Most common attacks ■ Distributed Denial of Service (DDoS): prevents legitimate users to access cloud services ■ SQL injection: An SQL command entered in a web form causes the contents of a database used by the web site to be either dumped to the attacker or altered ■ Cross-site scripting: permits the attacker to insert client- scripts into the web pages and thus, bypass the access controls at the web site. ■ Phishing aims to gain information from a database by masquerading as a trustworthy entity. Such information could be SSN and credit card numbers.
  • 11. New Cloud SecurityThreats ■ Cloud servers host multipleVMs ■ Multiple applications may run under eachVM. ■ Multi-tenancy and vm vulnerabilities open new attack channels for malicious users. ■ Identifying the path followed by an attacker is more difficult in a cloud environment
  • 12. Availability of cloud services ■ System failures, power outages, and other catastrophic events could shutdown services for extended periods of time. ■ Data lock-in and lack of interoperability could prevent a large organization whose business model depends on these data to function properly,
  • 13. Third-party control ■ It generates a spectrum of concerns caused by the lack of transparency and limited user control. ■ For example, a cloud provider may subcontract some resources from a third party whose level of trust is questionable.
  • 14. Top threats to cloud computing ■ Identified by a 2016 Cloud Security Alliance (CSA) report 1. Data breaches. 2. Compromised credentials and broken authentication. 3. Hacked interfaces and APIs. 4. Exploited system vulnerabilities. 5. Account hijacking 6. Malicious insiders 7. advanced persistent threats (APTs) 8. permanent data loss 9. inadequate diligence, 10. cloud service abuse, 11. DoS attacks
  • 15. Top threats to cloud computing ■ Identified by a 2022 Cloud SecurityAlliance (CSA) report 1. Insufficient identity, credential, access and key management (#4) 2. Insecure interfaces and APIs (#7) 3. Misconfiguration and inadequate change control (#2) 4. Lack of cloud security architecture and strategy (#3) 5. Insecure software development 6. Unsecure third-party resources 7. System vulnerabilities 8. Accidental cloud data disclosure/disclosure 9. Misconfiguration and exploitation of serverless and container workloads 10. Organized crime/hackers/APT 11. Cloud storage data exfiltration
  • 16. Legal protection of cloud users The contract between the user and the Cloud Service Provider (CSP) should spell out explicitly: ■ CSP obligations to handle securely sensitive information and its obligation to comply to privacy laws. ■ CSP liabilities for mishandling sensitive information. ■ CSP liabilities for data loss. ■ The rules governing ownership of the data. ■ The geographical regions where information and backups can be stored.

Editor's Notes

  1. Security has been a concern since the early days of computing when a computer was isolated Once computers were able to communicate with one another the Pandora box of threats was wide opened.
  2. Cloud users are concerned about insider attacks (Employees of the CSP)
  3. Cloud users are concerned about insider attacks (Employees of the CSP)
  4. Users cannot properly transmit his data to another CSP/vendor