Cloud Security:
challenges and perspectives
João J. C. Gondim, Priscila A. Solis Barreto, Luis Alberto B. Pacheco
Computer Science Dept.
Universidade de Brasília
Workshop on Cloud Networks
CSBC 2016
06/07/2016 WCN 2016
Agenda
• Introduction
• Cloud Computing
• Security Issues
• Government Use
• Conclusion
06/07/2016 WCN 2016
Introduction
• Emerging technology
• IT services as commodity
• Elasticity
• Possibility of entirely transfering the burden of IT
operations
• Infrastructure and services at affordable cost
• Small, medium businesses
• Inherent risk in transfer
• Some security issues
• How governments are addressing
06/07/2016 WCN 2016
Cloud Computing
• Main characteristics:
• On demand self service
• Wide network access
• Resourses pooling
• Rapid elasticity
• Measured servisse:
• Per per use
06/07/2016 WCN 2016
Cloud Computing
• Models:
• Private
• Public
• Community
• Hybrid
06/07/2016 WCN 2016
Cloud Computing
• Supporting technologies:
• Virtualization
• SOA
• Provisioning model
• Minimum roll out
06/07/2016 WCN 2016
Security Issues
• Trust
• Multi Tenancy
• Privacy and Identity
• Use of Cryptography
• Compliance
06/07/2016 WCN 2016
Security Issues:
Trust
• As a basis for controlling interactions in the cloud
• Still a research issue
• Risk transfer :
• User -> provider
• SLAs
06/07/2016 WCN 2016
Security Issues:
Multi Tenancy
• Contention
• Failure
• Incidents
• Forensics
• Storage may give clues on how to treat properly
• Resource management and allocation
06/07/2016 WCN 2016
Security Issues:
Privacy and Identity
• Complementary issues
• Legal issues
• Transnationality
• Identity systems should be able to cope with:
• Easy id management
• On line collaborative work
• Device independent/agnostic
• Federation
• Transparent
• Auditable
06/07/2016 WCN 2016
Security Issues:
Use of Cryptography
• Overhead
• Processing
• Space
• Fully Homomorphic Encryption
• Privacy Preserving Operations
06/07/2016 WCN 2016
Security Issues:
Compliance
• Current standards have been adapted and applied
to cloud environments
• Not fully satisfatory
• Solutions that work outside the cloud may not be
applied straightforward
06/07/2016 WCN 2016
Government use: Brazil
• Early stage of regulation
• Follows the Law of Information
• Cloud first policy
• Data sensitivity and cloud usage:
• Public data: hybrid clouds (private sector)
• Sensitive data: federal clouds
• Information location: only in national territory
06/07/2016 WCN 2016
Government use: United Kingdom
(G-Cloud)
• Mature: since 2012
• Allows storage of sensitive information (only first
level)
• Companies pre-register (sign a SLA)
• Ease hiring by government agencies
• Government agencies responsible for data security
• Guindance provided by federal government
06/07/2016 WCN 2016
Government use: United States
(FedRAMP)
• Mature: since 2012
• Companies pre-register
• Includes accreditation by third party organizations
• Military data can also be stored in the cloud
• Extra accreditation process
• Examples:
• Amazon GovCloud (entire datacenter accredited)
• Azure (entire datacenter accredited)
06/07/2016 WCN 2016
Thank you!
06/07/2016 WCN 2016

Cloud Security: challenges and perspectives.

  • 1.
    Cloud Security: challenges andperspectives João J. C. Gondim, Priscila A. Solis Barreto, Luis Alberto B. Pacheco Computer Science Dept. Universidade de Brasília Workshop on Cloud Networks CSBC 2016 06/07/2016 WCN 2016
  • 2.
    Agenda • Introduction • CloudComputing • Security Issues • Government Use • Conclusion 06/07/2016 WCN 2016
  • 3.
    Introduction • Emerging technology •IT services as commodity • Elasticity • Possibility of entirely transfering the burden of IT operations • Infrastructure and services at affordable cost • Small, medium businesses • Inherent risk in transfer • Some security issues • How governments are addressing 06/07/2016 WCN 2016
  • 4.
    Cloud Computing • Maincharacteristics: • On demand self service • Wide network access • Resourses pooling • Rapid elasticity • Measured servisse: • Per per use 06/07/2016 WCN 2016
  • 5.
    Cloud Computing • Models: •Private • Public • Community • Hybrid 06/07/2016 WCN 2016
  • 6.
    Cloud Computing • Supportingtechnologies: • Virtualization • SOA • Provisioning model • Minimum roll out 06/07/2016 WCN 2016
  • 7.
    Security Issues • Trust •Multi Tenancy • Privacy and Identity • Use of Cryptography • Compliance 06/07/2016 WCN 2016
  • 8.
    Security Issues: Trust • Asa basis for controlling interactions in the cloud • Still a research issue • Risk transfer : • User -> provider • SLAs 06/07/2016 WCN 2016
  • 9.
    Security Issues: Multi Tenancy •Contention • Failure • Incidents • Forensics • Storage may give clues on how to treat properly • Resource management and allocation 06/07/2016 WCN 2016
  • 10.
    Security Issues: Privacy andIdentity • Complementary issues • Legal issues • Transnationality • Identity systems should be able to cope with: • Easy id management • On line collaborative work • Device independent/agnostic • Federation • Transparent • Auditable 06/07/2016 WCN 2016
  • 11.
    Security Issues: Use ofCryptography • Overhead • Processing • Space • Fully Homomorphic Encryption • Privacy Preserving Operations 06/07/2016 WCN 2016
  • 12.
    Security Issues: Compliance • Currentstandards have been adapted and applied to cloud environments • Not fully satisfatory • Solutions that work outside the cloud may not be applied straightforward 06/07/2016 WCN 2016
  • 13.
    Government use: Brazil •Early stage of regulation • Follows the Law of Information • Cloud first policy • Data sensitivity and cloud usage: • Public data: hybrid clouds (private sector) • Sensitive data: federal clouds • Information location: only in national territory 06/07/2016 WCN 2016
  • 14.
    Government use: UnitedKingdom (G-Cloud) • Mature: since 2012 • Allows storage of sensitive information (only first level) • Companies pre-register (sign a SLA) • Ease hiring by government agencies • Government agencies responsible for data security • Guindance provided by federal government 06/07/2016 WCN 2016
  • 15.
    Government use: UnitedStates (FedRAMP) • Mature: since 2012 • Companies pre-register • Includes accreditation by third party organizations • Military data can also be stored in the cloud • Extra accreditation process • Examples: • Amazon GovCloud (entire datacenter accredited) • Azure (entire datacenter accredited) 06/07/2016 WCN 2016
  • 16.