SlideShare a Scribd company logo
SECURITY THREATS AND
COUNTERMEASURES
ABSTRACT
•Internet Based Computing
-Shared Resources
-Software
-Information
•Perfect System
•Uses Advanced Business Model
•Introduces the background, serv
deployment models and se
INTRODUCTION
How does Cloud Computing
work?
•Metaphor for the Internet
•Dynamically scalable
shared resources accessed
over a network
•Subscription based Service
•Examples: Google, Amazon,
Characteristics
•On Demand Self Service
•Broad Network Access
•Resource Pooling
•Cost
•Location Independence
•Maintenance
•Virtualization
•Reliabilty
Benefits
•Cost Effective
•Almost Unlimited Storage
•Backup and Recovery
•Automatic Software
Integration
•Easy Access to Information
•Quick Deployment
ARCHITECTURE
•Multiple Cloud Components
•Clients, Data Centre,
Distributed Servers
•Front End and Back End
•Three Network Entities
-User
-CSP
-TPA
Cloud Data Storage
Architecture
•SaaS(Software as a Service)
•PaaS(Platform as a Service)
•IaaS(Infrastructure as a
Service)
SERVICE MODELS
SaaS(Software as a Service)
•Application hosted as
Service
•Network Based Access
•Customer free of worries
•Provider does all Updates
•Example: Gmail,
salesforce.com
PaaS(Platform as a Service)
•Application delivery model
•Supplies Resources
•Application
design, development
environment, testing
•Application
Developers, testers
•Lack of Portability
IaaS(Infrastructure as a
Service)
•Provides Resources
•Server space, Storage space,
CPU cycles
•Scaled up and down based
on need
•Charged by resources
consumed
Architecture for Service
Models
•Public Cloud
•Private Cloud
•Hybrid Cloud
•Community Cloud
DEPLOYMENT MODELS
Public Cloud
•Provide Disk Space and
Computing Power
•Customer has no visibility
about the
infrastructure
•Shared among organizations
•Example: Amazon
Private Cloud
•Solely for single
organizations
•Not shared
•Managed by an organization
or third
party
•Expensive and Secure
•Example: Microsoft Private
Hybrid Cloud
•Composition of at least two
Clouds
•Private, Public or
Community
•Benefits of Multiple
Deployment Models
•Critical, secure applications
in Private
Community Cloud
•Shared between
organizations in the
same community
•Similar Cloud requirements
•All Government Agencies in
a
City
•Example: G-Cloud
SECURITY ISSUES
Security Threats:
Insecure API
-Customers use API to access
the Cloud
-Must be highly secure
Remedy:
-Analyze the Security Model
-Ensure strong Authentication
•Data Loss/Leakage
-Unauthorized Access, Deletion
-Top concerns for business
Remedy:
-Strong API Access Control
-Encrypt and Protect Integrity of
Data
-Implement strong key
generation, storage
•Network Sniffing
-Data monitored in a network
-Attacker hacking passwords
Remedy:
-Encryption methods
Security Issues
•Data Protection
-Data remains private
-SSO technology, Encryption
•Physical and Personnel Security
-Security of Physical Machines
-Customer data not only restric
but also documented
•Availability
-Data available whenever user
needs it
•Application Data
-Applications are secure
•Privacy
-All critical data masked
-Only authorized users have
access
•Infinite Computing Capability
•Provides service on demand
•Pay per use basis
•Offers many benefits
•It is vulnerable to security threats
be
lessened by taking some measu
CONCLUSION
REFERENCE1) Lewis, Grace, Basics About Cloud Computin
2) Chunye Gong, “The Characteristics
Computing”, 39th
international conference on parallel
workshops, 2010.
3) Lianfeng yang “Cloud Computing Research
Issues”,
IEEE 3rd international conference on cloud
2010.
4) en.wikipedia.org/wiki/Cloud_computing
5) http://thecloudcomputing.org/2009/
6) http://www.cloudsecurityalliance.org/topthrea
THANK YOU
Cloud computing

More Related Content

What's hot

Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing Overview
Shylaja Balaji
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ali Ben Messaoud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shailaja Patil
 
Cloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMEDCloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMED
NA000000
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Zeeshan Ahmad
 
1. introduction to cloud computing
1. introduction to cloud computing1. introduction to cloud computing
1. introduction to cloud computing
Lokesh Ramaswamy
 
Why Cloud Computing?
Why Cloud Computing?Why Cloud Computing?
Why Cloud Computing?
Eric Frick
 
Protecting Your Big Data on the Cloud
Protecting Your Big Data on the CloudProtecting Your Big Data on the Cloud
Protecting Your Big Data on the Cloud
Alibaba Cloud
 
CloudCast
CloudCastCloudCast
CloudCast
GeneXus
 
Cloud computing by G.SASHIDHAR
Cloud computing by G.SASHIDHARCloud computing by G.SASHIDHAR
Cloud computing by G.SASHIDHAR
sashi29
 
Unit 5 -MOVING APPLICATION TO CLOUD
Unit 5 -MOVING APPLICATION TO CLOUDUnit 5 -MOVING APPLICATION TO CLOUD
Unit 5 -MOVING APPLICATION TO CLOUD
MonishaNehkal
 
Cloud
CloudCloud
Cloud computing
Cloud computingCloud computing
Cloud computing
Manikanta Pulavarty
 
Cloud computing power point presentation
Cloud computing power point presentationCloud computing power point presentation
Cloud computing power point presentation
Rituraj Azad
 
Citrix systems ppt
Citrix systems pptCitrix systems ppt
Citrix systems ppt
AmirKhan817
 
The Evolution Towards Cloud Computing
The Evolution Towards Cloud ComputingThe Evolution Towards Cloud Computing
The Evolution Towards Cloud Computing
Anne Starr
 
Understanding the Cloud Stack
Understanding the Cloud StackUnderstanding the Cloud Stack
Understanding the Cloud Stack
RapidScale
 
Cloud
CloudCloud
ZStack architecture overview
ZStack architecture overviewZStack architecture overview
ZStack architecture overview
Frank Zhang
 
Unit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and securityUnit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and security
MonishaNehkal
 

What's hot (20)

Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing Overview
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMEDCloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMED
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
1. introduction to cloud computing
1. introduction to cloud computing1. introduction to cloud computing
1. introduction to cloud computing
 
Why Cloud Computing?
Why Cloud Computing?Why Cloud Computing?
Why Cloud Computing?
 
Protecting Your Big Data on the Cloud
Protecting Your Big Data on the CloudProtecting Your Big Data on the Cloud
Protecting Your Big Data on the Cloud
 
CloudCast
CloudCastCloudCast
CloudCast
 
Cloud computing by G.SASHIDHAR
Cloud computing by G.SASHIDHARCloud computing by G.SASHIDHAR
Cloud computing by G.SASHIDHAR
 
Unit 5 -MOVING APPLICATION TO CLOUD
Unit 5 -MOVING APPLICATION TO CLOUDUnit 5 -MOVING APPLICATION TO CLOUD
Unit 5 -MOVING APPLICATION TO CLOUD
 
Cloud
CloudCloud
Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing power point presentation
Cloud computing power point presentationCloud computing power point presentation
Cloud computing power point presentation
 
Citrix systems ppt
Citrix systems pptCitrix systems ppt
Citrix systems ppt
 
The Evolution Towards Cloud Computing
The Evolution Towards Cloud ComputingThe Evolution Towards Cloud Computing
The Evolution Towards Cloud Computing
 
Understanding the Cloud Stack
Understanding the Cloud StackUnderstanding the Cloud Stack
Understanding the Cloud Stack
 
Cloud
CloudCloud
Cloud
 
ZStack architecture overview
ZStack architecture overviewZStack architecture overview
ZStack architecture overview
 
Unit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and securityUnit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and security
 

Viewers also liked

Cantina content based approach to detect phishing websites
Cantina  content based approach to detect phishing websitesCantina  content based approach to detect phishing websites
Cantina content based approach to detect phishing websites
thestarlight92
 
cloud computin
cloud computincloud computin
cloud computin
Suchithra Suriya
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
Sagar Sane
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
Prashant Gupta
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Datta Dharanikota
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
Agarwaljay
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
Rkrishna Mishra
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
himanshuawasthi2109
 

Viewers also liked (8)

Cantina content based approach to detect phishing websites
Cantina  content based approach to detect phishing websitesCantina  content based approach to detect phishing websites
Cantina content based approach to detect phishing websites
 
cloud computin
cloud computincloud computin
cloud computin
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similar to Cloud computing

Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
Amritpal Singh Bedi
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
 
Cloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantagesCloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantages
Abhishek kyal
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
Dss
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak
 
Cloud Computing Basics
Cloud Computing BasicsCloud Computing Basics
Cloud Computing Basics
DataNext Solutions
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
Rajagopal Nagarajan
 
Cloud Computing Fundamental
Cloud Computing FundamentalCloud Computing Fundamental
Cloud Computing Fundamental
Dony Riyanto
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
arun nalam
 
Data Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcData Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtc
DataTactics
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Hamza Sajjad
 
Cloud Storage and Cloud Computing.pptx
Cloud Storage and  Cloud Computing.pptxCloud Storage and  Cloud Computing.pptx
Cloud Storage and Cloud Computing.pptx
ANALEESUAREZ2
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
Sripati Mahapatra
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
ananyaakk
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
Akash Tripathi
 
cloud_ch1.pptx
cloud_ch1.pptxcloud_ch1.pptx
cloud_ch1.pptx
AdarshaDhakal
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
Hentsū
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Yogitha Cool
 
Pros and Cons of Moving to Cloud and Managed Services
Pros and Cons of Moving to Cloud and Managed ServicesPros and Cons of Moving to Cloud and Managed Services
Pros and Cons of Moving to Cloud and Managed Services
Eagle Technologies
 

Similar to Cloud computing (20)

Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantagesCloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantages
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
Cloud Computing Basics
Cloud Computing BasicsCloud Computing Basics
Cloud Computing Basics
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
 
Cloud Computing Fundamental
Cloud Computing FundamentalCloud Computing Fundamental
Cloud Computing Fundamental
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Data Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtcData Tactics dhs introduction to cloud technologies wtc
Data Tactics dhs introduction to cloud technologies wtc
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Storage and Cloud Computing.pptx
Cloud Storage and  Cloud Computing.pptxCloud Storage and  Cloud Computing.pptx
Cloud Storage and Cloud Computing.pptx
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
cloud_ch1.pptx
cloud_ch1.pptxcloud_ch1.pptx
cloud_ch1.pptx
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Pros and Cons of Moving to Cloud and Managed Services
Pros and Cons of Moving to Cloud and Managed ServicesPros and Cons of Moving to Cloud and Managed Services
Pros and Cons of Moving to Cloud and Managed Services
 

Cloud computing