SlideShare a Scribd company logo
Cloud Computing Security and Privacy to gain Trust SMARTEVENT 2010 September 23 Sophia Antipolis Christian GOIRE
Cloud Computing Definition(s) 06/01/11 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The NIST Cloud Definition Framework 06/01/11 Deployment Models Service Models Essential Character-istics Common  Character-istics Homogeneity Massive Scale Resilient Computing Geographic Distribution Community Cloud Private Cloud Public Cloud Hybrid Clouds Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Resource Pooling Broad Network Access Rapid Elasticity Measured Service On Demand Self-Service Low Cost Software Virtualization Service Orientation Advanced Security
3 main  Services Models 06/01/11
Cloud Providers – A Birds Eye View 06/01/11 Infrastructure  as a Service Platform  as a Service Software  as a Service
Main aspects forming a cloud system 06/01/11
Expert group report (Excerpts) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11
Continued (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11
Continued (3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11
Research time line (in year) of the individual topics  06/01/11
Security and Privacy Challenges ,[object Object],[object Object],06/01/11
Technical risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11
Policy and organizational risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11
Legal risk ,[object Object],[object Object],[object Object],[object Object],06/01/11
Research recommendations ,[object Object],06/01/11
Research recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11
Legal recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11

More Related Content

What's hot

ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE .
 
Addressing and routing services
Addressing and routing servicesAddressing and routing services
Addressing and routing services
mbasti2
 
2016 02-04-gingell-iot
2016 02-04-gingell-iot2016 02-04-gingell-iot
2016 02-04-gingell-iot
gingell
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shiv Ram Choudhury
 
CSA v4 Topology
CSA v4 TopologyCSA v4 Topology
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
fcleary
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1
fcleary
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
Papitha Velumani
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges
PaaSword EU Project
 
Kaseya Connect 2013: Kaseya Keynote
Kaseya Connect 2013: Kaseya KeynoteKaseya Connect 2013: Kaseya Keynote
Kaseya Connect 2013: Kaseya Keynote
Kaseya
 
Cloud security
Cloud securityCloud security
Cloud security
Alexandra Instituttet
 
eChallenges_e2011_JS
eChallenges_e2011_JSeChallenges_e2011_JS
eChallenges_e2011_JS
Jonathan Sinclair
 
Design and operation of secure cyber physical systems
Design and operation of secure cyber physical systemsDesign and operation of secure cyber physical systems
Design and operation of secure cyber physical systems
I3E Technologies
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Mohd Masood
 
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud SystemsICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
Hong-Linh Truong
 
6
66
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
sang yoo
 
Cloud Solutions Collateral
Cloud Solutions CollateralCloud Solutions Collateral
Cloud Solutions Collateral
Steve Clem
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Infosys
 

What's hot (20)

ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
 
Addressing and routing services
Addressing and routing servicesAddressing and routing services
Addressing and routing services
 
2016 02-04-gingell-iot
2016 02-04-gingell-iot2016 02-04-gingell-iot
2016 02-04-gingell-iot
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CSA v4 Topology
CSA v4 TopologyCSA v4 Topology
CSA v4 Topology
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges
 
Kaseya Connect 2013: Kaseya Keynote
Kaseya Connect 2013: Kaseya KeynoteKaseya Connect 2013: Kaseya Keynote
Kaseya Connect 2013: Kaseya Keynote
 
Cloud security
Cloud securityCloud security
Cloud security
 
eChallenges_e2011_JS
eChallenges_e2011_JSeChallenges_e2011_JS
eChallenges_e2011_JS
 
Design and operation of secure cyber physical systems
Design and operation of secure cyber physical systemsDesign and operation of secure cyber physical systems
Design and operation of secure cyber physical systems
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud SystemsICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
 
6
66
6
 
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
 
Cloud Solutions Collateral
Cloud Solutions CollateralCloud Solutions Collateral
Cloud Solutions Collateral
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Viewers also liked

EduFester
EduFester EduFester
EduFester
Arjun Subburaj
 
Supporting clinicians and helping to feed the beast
Supporting clinicians and helping to feed the beastSupporting clinicians and helping to feed the beast
Supporting clinicians and helping to feed the beast
thorley1
 
Cloud congress 2012_herbert_wanner_cisco_v3
Cloud congress 2012_herbert_wanner_cisco_v3Cloud congress 2012_herbert_wanner_cisco_v3
Cloud congress 2012_herbert_wanner_cisco_v3
Herbert Wanner
 
Assistive technology webquest
Assistive technology webquestAssistive technology webquest
Assistive technology webquest
Lana1522
 
Using web technologies for the lactation professional
Using web technologies for the lactation professionalUsing web technologies for the lactation professional
Using web technologies for the lactation professional
Denise Breheny
 
LIBROS
LIBROSLIBROS
LIBROS
cristhian
 
pengenalan Tapak Suci
pengenalan Tapak Sucipengenalan Tapak Suci
pengenalan Tapak Sucifarhan89
 

Viewers also liked (7)

EduFester
EduFester EduFester
EduFester
 
Supporting clinicians and helping to feed the beast
Supporting clinicians and helping to feed the beastSupporting clinicians and helping to feed the beast
Supporting clinicians and helping to feed the beast
 
Cloud congress 2012_herbert_wanner_cisco_v3
Cloud congress 2012_herbert_wanner_cisco_v3Cloud congress 2012_herbert_wanner_cisco_v3
Cloud congress 2012_herbert_wanner_cisco_v3
 
Assistive technology webquest
Assistive technology webquestAssistive technology webquest
Assistive technology webquest
 
Using web technologies for the lactation professional
Using web technologies for the lactation professionalUsing web technologies for the lactation professional
Using web technologies for the lactation professional
 
LIBROS
LIBROSLIBROS
LIBROS
 
pengenalan Tapak Suci
pengenalan Tapak Sucipengenalan Tapak Suci
pengenalan Tapak Suci
 

Similar to Cloud computing security and privacy christian goire

Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
TT L
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Bill Annibell
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
Editor Jacotech
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
Editor Jacotech
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
Editor Jacotech
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
fanc1985
 
Exploring Cloud Computing Technologies For GIS (Location Based) Applications
Exploring Cloud Computing Technologies For GIS (Location Based) ApplicationsExploring Cloud Computing Technologies For GIS (Location Based) Applications
Exploring Cloud Computing Technologies For GIS (Location Based) Applications
Christopher Blough
 
Software Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing PresentationSoftware Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing Presentation
ddcarr
 
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings
STO STRATEGY
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
Zac Darcy
 
Cloud Computing - A Primer
Cloud Computing - A PrimerCloud Computing - A Primer
Cloud Computing - A Primer
brownmestizo
 
Ahearn Cloud Presentation
Ahearn Cloud PresentationAhearn Cloud Presentation
Ahearn Cloud Presentation
johnjamesahearn
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
jmcdaniel650
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
infosec train
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
University of San Francisco
 
08 message and_queues_dieter_gawlick
08 message and_queues_dieter_gawlick08 message and_queues_dieter_gawlick
08 message and_queues_dieter_gawlick
ashish61_scs
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
 
cloud
cloudcloud
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
IJERA Editor
 

Similar to Cloud computing security and privacy christian goire (20)

Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Exploring Cloud Computing Technologies For GIS (Location Based) Applications
Exploring Cloud Computing Technologies For GIS (Location Based) ApplicationsExploring Cloud Computing Technologies For GIS (Location Based) Applications
Exploring Cloud Computing Technologies For GIS (Location Based) Applications
 
Software Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing PresentationSoftware Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing Presentation
 
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
Cloud Computing - A Primer
Cloud Computing - A PrimerCloud Computing - A Primer
Cloud Computing - A Primer
 
Ahearn Cloud Presentation
Ahearn Cloud PresentationAhearn Cloud Presentation
Ahearn Cloud Presentation
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
08 message and_queues_dieter_gawlick
08 message and_queues_dieter_gawlick08 message and_queues_dieter_gawlick
08 message and_queues_dieter_gawlick
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
cloud
cloudcloud
cloud
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 

Cloud computing security and privacy christian goire

  • 1. Cloud Computing Security and Privacy to gain Trust SMARTEVENT 2010 September 23 Sophia Antipolis Christian GOIRE
  • 2.
  • 3. The NIST Cloud Definition Framework 06/01/11 Deployment Models Service Models Essential Character-istics Common Character-istics Homogeneity Massive Scale Resilient Computing Geographic Distribution Community Cloud Private Cloud Public Cloud Hybrid Clouds Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Resource Pooling Broad Network Access Rapid Elasticity Measured Service On Demand Self-Service Low Cost Software Virtualization Service Orientation Advanced Security
  • 4. 3 main Services Models 06/01/11
  • 5. Cloud Providers – A Birds Eye View 06/01/11 Infrastructure as a Service Platform as a Service Software as a Service
  • 6. Main aspects forming a cloud system 06/01/11
  • 7.
  • 8.
  • 9.
  • 10. Research time line (in year) of the individual topics 06/01/11
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.