SlideShare a Scribd company logo
1 of 91
Cloud Security,
Vulnerabilities and Integrity
Dr. Rajesh P Barnwal
Principal Scientist
AI & IoT Lab,
Information Technology Group
CSIR-Central Mechanical Engineering Research Institute, Durgapur
Invited Lecture at Faculty Development Program
SCMS School of Engineering and Technology,
Vidya Nagar, Karukutty-683576, Kerala
21st July’ 2021
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Cloud Security?
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Cloud Evolution
 Understanding Cloud Evolution is needed to know
about its Security, Integrity and Vulnerability
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Evolution of Cloud Model
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Evolution of Cloud Model
Bare Metal
PaaS Container Orchestrators
IaaS
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Mention 3 reasons for adopting Cloud
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Why shift to Cloud?
 Cost Savings
 Security
 Flexibility
 Mobility
 Insight
 Increased Collaboration
 Quality Control
 Disaster Recovery
 Loss Prevention
 Automatic Software Updates Source: SalesForce
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
What we exactly do?
 Hire Infrastructure and host our applications
 Hire applications and host our data
 Hire full services to use the hosted application and
gathered data
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Main Concern about Cloud?
 The main security issues arises due to:
 Multi-tenant infrastructure
 Multi-application infrastructure
 Out of control infrastructure
 Third party handling of data
 Loosing control over physical security
 Loosing control over hired part of services
 In cloud environment, all the above depends upon
Cloud Service Providers (CSP)
 And the CSP becomes the main compute manager
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Major Challenges
Source: IDC Report
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
 We will discover during this talk,
whether "Cloud Computing Security"
is different than "Regular IT Security"
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Let us know the IT Security
 How the world looks without IT Security?
 https://youtu.be/TLxdOi5JDjc
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Security domain in Cloud
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
"C-I-A" Objectives of Security
 Computer and network security is fundamentally
about three goals/objectives:
 Confidentiality (C) ,
 Integrity (I), and
 Availability (A)
 Out of the above three, Availability is the KEY issue
in the case of Cloud Security
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Cloud Security becomes a New Challenge
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Nothing is sufficient
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Cloud Workloads increases security incidents
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Cloud Security is not a single handed job
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Cost of Missing Cloud Security
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Security Challenges in Multi-Cloud Environment
Source: Tripwire Research
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Market share of Popular Public Cloud
Source: Tripwire Research
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Giants acquiring Cloud Security Businesses
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Cyber Attacks increased in last one year
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Cloud Security is Still Hard
 Even after so much progress in security technologies, Cloud security is still
so hard.
 Identity access management (IAM) are in place for more than a decade,
however not sufficient for cloud security.
 But now paradigm is shifting towards deep encryption services, key
management, and most recently, zero trust and secure access service
edge (SASE).
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Classical Methods: Network Segmentation
 Network segmentation was another important strategy in the
fight against hackers and increase cloud security.
 It is an architectural approach that divides a network into
multiple segments or subnets, each acting as its own small
network.
 This allows network administrators to control the flow of traffic
between subnets based on granular policies.
 Ultimately, this improves monitoring, helps in boosting
performance, and most importantly in enhancing security.
 But it also gets failed in modern cloud system and work from
home environment.
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
New Network Infrastructure
 Cloud computing is redefining the network infrastructure and thus
requires totally different approach towards achieving security
 The old model of network infrastructure — centralized corporate
data centres secured by an on-premise network perimeter —
doesn’t work for today’s modern enterprises.
 Data that used to live in data centres now lives in the cloud and
SaaS applications.
 With the rise of distributed workforces, users need to be able to
connect to resources from anywhere in the world.
 This is challenging enterprises to provide network access and a
secure, straight-line path to the Internet without adopting complex
workarounds or increasing latency.
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Old Security Tools Fail
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Why old security tools fail in modern Cloud environment?
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Security challenges in modern Enterprises?
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Main Security Requirements
 The security requirements that should be considered when out-sourcing
the services to the cloud are as follows:
 Confidentiality: Data must be encrypted before it is outsourced, to protect it from
malicious internal or external attacks
 Integrity: Protect the data from the unauthorized insert, update, or delete. The
data owner and authorized users should be able to recognize if the data is
corrupted or incomplete, and receive the most recent updated version of the data,
which guarantees accuracy and consistency of data.
 Availability: The data in the cloud servers should be accessible to its users.
Major threats to availability are denial of service(DOS) attacks, natural disasters,
and equipment failures at the service provider’s end
 Access control: The outsourced data should be accessed only by authorized
users.
 Firewall: The CSP must be safeguarded against false accusations that may be
claimed by dishonest owners or users
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Modern Cloud Security Requirements
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Modern Industry standard Cloud Security Measures?
 Identity and Access Management (IAM)
 Secure Access Service Edge (SASE)
 Firewall as a Service (FWaaS)
 Cloud access security brokers (CASB)
 Zero-trust network access (ZNTA)
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Identity and Access Management (IAM)
AWS Example:
Source: https://www2.deloitte.c
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Identity and Access Management (IAM)
AWS Example:
Source: https://www2.deloitte.com/
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Secure Access Service Edge (SASE)
 SASE is a relatively new framework
 SASE distributes critical network and security
functions from the cloud, close to the user and
applications
 SASE builds on software-defined WAN (SD-WAN)
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Secure Access Service Edge (SASE)
 Cloud-native network infrastructure: SASE
simplifies network infrastructure by merging
networking and security services into a unified
architecture.
 Network security at the edge: SASE delivers
network security services — cloud access security
brokers (CASB), secure web gateways (SWG),
Firewall-as-a-Service (FWaaS), and more.
 Identity-based network access: SASE's network
access is determined by a Zero Trust, policy-based
model that verifies based on user identity &
contextual factors.
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Network Security as a Service
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
SASE Features
 SASE features a combination of these network and
security functions:
 Firewall as a service
 Malware protection;
 Data loss prevention;
 Intrusion detection and intrusion prevention;
 Software as a service;
 Secure web gateways;
 Cloud access security brokers (CASBs); and
 Zero-trust network access.
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
How SASE Works?
SDP-Software Defined Perimeter
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Good video resource on SASE
https://youtu.be/Opy9D-8eyVg
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Another innovation in Cloud Security
CASB (Cloud Access Security Broker)
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
How CASB Works?
Source: Farnandez et al., 2015
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
CASB Working Example:
SDP: Software Defined Perimeter
SWG: Secure Web Gateway
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Workflow of Software Defined Perimeter in CASB
Source: www.cloudflare.com
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Workflow of Software Defined Perimeter
Source: www.cloudflare.com
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Possible Security Policies Enforcement using CASB
 Authentication
 Single sign on
 Authorization
 Alerting
 Ability to see authorized and unauthorized cloud usage
 Credential mapping
 Device profiling
 Encryption
 Tokenization
 Logging
 Malware detection/prevention
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
CASB Features
 Policy-based services--consumers can define security policies,
e.g., RBAC, to apply to the services they use in order to restrict the
access of their employees and customers to cloud data.
 Secure channel—the channel to access cloud services can be
encrypted.
 Data encryption—CASBs can let consumers encrypt their data
using their own keys.
 Compliance—consumers can demonstrate compliance with
specific regulations because CASBs normally include security
loggers/auditors.
 Discovery—users at the company are able to find out what
services they have available through the CASB.
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
CASB Features
 Transparency—security is transparent to the application consumers when
they use the CASB, they would only know about the CASB if an attempted
access is rejected.
 Access unification—Consumers do not need to deal with a variety of
credential types and protocols.
 Heterogeneity—access to the cloud can be made from any type of device.
 Malware detection—access to the cloud application through a CASB can
guarantee that no malware will be found in the accessed service.
 Logging/auditing—the CASB keeps logs for security and compliance
reasons; these can be later audited.
 Identity—the CASB can provide identification services.
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Another Paradigm Shift: Zero Trust
Shall discuss after the break
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Zero Trust Principles
Source: Forester
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Zero Trust Principles
Image source: https://www.centrify.com/blog/best-practices-zero-trust-security/
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Strategic Plan for Zero Trust
Image source: https://www.centrify.com/blog/best-practices-zero-trust-security/
TRUSTED
ACCESS
RESILIENT
SERVICES
PROTECTED
ASSETS
SECURE AND TRUSTED
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Deep Encryption Services
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Shared model of Security
Source: SANS Cloud Security Summit 2019
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
In Legacy Cloud Environment
Source: SANS Cloud Security Summit 2019
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Case Study: Cloud Key Management Service
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Evolution of Cloud Model
Bare Metal
PaaS Container Orchestrators
IaaS
Serverless
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Serverless Computing: Future IoT Cloud
 Serverless computing is a method of providing
backend services on an as-used basis.
 A serverless provider allows users to write and
deploy code without the hassle of worrying about the
underlying infrastructure.
 Also called as -
 Function as a Service
 Platform to develop, run, and manage application
 Without the complexity of building and maintaining
the infrastructure
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
What is Serverless Computing?
 Serverless computing is a cloud-native
platform for -
 short-running, stateless computation and
 event-driven applications which
 scales up and down instantly and automatically
and
 charges for actual usage at a millisecond
granularity
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Earlier Trend for Cloud Developer
 Develop Cloud Applications as a Monolithic
Architecture
 Hire a VM on cloud and deploy it
 Issues
 Difficult to scale after certain limit
 Involves high capital expenditure and
operating expenditure
 Overhead for internal system
administration processes;
 High development and deployment
costs and timeframes (delay to
market);
 Fault prone design.
Image Source: Amazon
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Service Oriented Architecture
 Hire cloud software as a services from service
providers
 Pay per usage of services
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Serverless Oriented Architecture
 Develop cloud application layer using hired
microservices
 Pay only per usage of microservices
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Achieving Serverless Architecture
Monolithic Application
Break-down into
microservices
Make each micro service
HA
Protect against regional
outages
Region A Region B
Explosion in
number of
containers /
processes:
Increase of
infrastructure cost
footprint
Increase of
operational
management cost
and
complexity
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Advantages of Serverless Architecture
 It transforms capital expenditure into operating
expenditure, and generally reduces operational
costs;
 One do not have to think about internal system
administration processes;
 It reduces the development and deployment costs
and timeframes (faster time to market);
 It’s scalable and fault tolerant by design.
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Whether Serverless is Always Good?
Microservices
Mobile Backends
IoT
Modest Stream Processing
Bots, ML Inferencing
Serverless is good for
short-running
stateless
event-driven
Serverless is not good for
long-running
stateful
number crunching
Databases
Deep Learning Training
Heavy-Duty Stream Analytics
Numerical Simulation
f(x)
Service integration
Video Streaming
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
66
SAGITA Testbed
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
67
SAGITA Testbed Setup
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
68
SAGITA Cloud Architecture
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
69
SAGITA Communication Architecture
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
70
SAGITA Data Acquisition Module
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
71
SAGITA Data Bucket
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
72
Simplified ER Diagram
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
SAGITA Cloud Interface
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
SAGITA Cloud Interface: Tenant Login
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
SAGITA Cloud Interface: Farm Creation
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
SAGITA Cloud Interface: Farm Listing
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
SAGITA Cloud Interface: Device Registration
Device Button
Register Device
MAP BUTTON
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
SAGITA Cloud Interface: Data Logging
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
SAGITA Cloud Interface: Data Visualization
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Attacks in Serverless Platform
Source: SANS Cloud Security Summit 2019
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Attacks in Serverless Platform
Source: SANS Cloud Security Summit 2019
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Top Risks in Serverless Environment
Source: SANS Cloud Security Summit 2019
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Traditional Security measures fails
Source: SANS Cloud Security Summit 2019
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Traditional Security measures
Source: SANS Cloud Security Summit 2019
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Serverless- No Infrastructure, Only Fn
Source: SANS Cloud Security Summit 2019
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
DevOps to DevSecOps
 Security must also be embedded by design and must be a strong
consideration during software development.
 DevSecOps could be a good consideration for enterprises that want
to move in this direction.
 This integrates security into all stages of the software delivery
process, ensuring that developers think about security when they
write code.
 DevSecOps effectively shifts security inspection closer to when
software is being developed and ensures that software is tested for
security problems before it is deployed.
 Moreover, it helps IT teams to address security issues quickly if
they appear after deployment.
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Future of Cloud Security Skills
Your Questions Please?
r_barnwal@cmeri.res.in
For now, Let’s have a break!
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
Q&A Time
AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur
References
 Rady, Mai, Tamer Abdelkader, and Rasha Ismail. "Integrity and confidentiality in cloud outsourced data." Ain Shams Engineering Journal 10.2 (2019): 275-285.
 Fernandez, Edurardo, Nobukazu Yoshioka, and Hironori Washizaki. "Cloud Access Security Broker (CASB): A pattern for secure access to cloud services." 4th Asian
Conference on Pattern Languages of Programs, Asian PLoP. Vol. 15. 2015.
 Barnwal, Rajesh P., N. Ghosh, and Soumya K. Ghosh. "Data and Application Security in Cloud." Bio-inspiring Cyber Security and Cloud Services: Trends and
Innovations (2014): 479-495.
 Rady, Mai, Tamer Abdelkader, and Rasha Ismail. "Integrity and confidentiality in cloud outsourced data." Ain Shams Engineering Journal 10.2 (2019):
275-285.
 Kritikos, Kyriakos, et al. "A survey on vulnerability assessment tools and databases for cloud-based web applications." Array 3 (2019): 100011.
 Chen, Chao, Nima Khakzad, and Genserik Reniers. "Dynamic vulnerability assessment of process plants with respect to vapor cloud
explosions." Reliability Engineering & System Safety 200 (2020): 106934.
 https://www.talend.com/resources/reduce-data-integrity-risk/
 https://sectigostore.com/
 Applying Zero Trust to Cloud Environments (paloaltonetworks.com)
 https://vuldb.com
 https://nvd.nist.gov
 https://www.talend.com/resources/reduce-data-integrity-risk/
Dr. Rajesh P Barnwal, r_barnwal@cmeri.res.in
AI & IoT Lab, Information Technology Group,
CSIR-Central Mechanical Engineering Research Institute
MG Avenue, Durgapur 713 209, West Bengal [India]
https://www.cmeri.res.in

More Related Content

What's hot

Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to SecurityPriyanka Aash
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMElasticsearch
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseAdi Saputra
 
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
INFOGRAPHIC▶  Protecting Corporate Information In the CloudINFOGRAPHIC▶  Protecting Corporate Information In the Cloud
INFOGRAPHIC▶ Protecting Corporate Information In the CloudSymantec
 
Security Starts at the Endpoint
Security Starts at the EndpointSecurity Starts at the Endpoint
Security Starts at the EndpointElasticsearch
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityRobert Herjavec
 
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...EC-Council
 
Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?centralohioissa
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud securityDavid De Vos
 
Data Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud eraData Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud eraDavid De Vos
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrZYMR, INC.
 
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudCloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudTom Janetscheck
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 

What's hot (20)

Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to Security
 
Secure Software Engineering
Secure Software EngineeringSecure Software Engineering
Secure Software Engineering
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat Defense
 
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
INFOGRAPHIC▶  Protecting Corporate Information In the CloudINFOGRAPHIC▶  Protecting Corporate Information In the Cloud
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
 
Security Starts at the Endpoint
Security Starts at the EndpointSecurity Starts at the Endpoint
Security Starts at the Endpoint
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming Security
 
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
 
Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
 
Data Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud eraData Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud era
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
 
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudCloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Microsoft Azure Sentinel
Microsoft Azure SentinelMicrosoft Azure Sentinel
Microsoft Azure Sentinel
 

Similar to Cloud security: Industry Trends and Research Challenges

IRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private NetworkIRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private NetworkIRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...IRJET Journal
 
Secure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersSecure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersIRJET Journal
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistancePhD Assistance
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
 
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...ijtsrd
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...IRJET Journal
 
Atm local 2017 General Session
Atm local 2017 General SessionAtm local 2017 General Session
Atm local 2017 General Sessioneaze_50
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Atm local 2017 General Session*
Atm local 2017 General Session*Atm local 2017 General Session*
Atm local 2017 General Session*eaze_50
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DESIRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
Oracle Sparc Cloud
Oracle Sparc CloudOracle Sparc Cloud
Oracle Sparc CloudErnest Jones
 
Cloud Monitoring System Using Internet of Things
Cloud Monitoring System Using Internet of ThingsCloud Monitoring System Using Internet of Things
Cloud Monitoring System Using Internet of ThingsIRJET Journal
 
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdfjames yoo
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 

Similar to Cloud security: Industry Trends and Research Challenges (20)

IoT_Frameworks_.pdf
IoT_Frameworks_.pdfIoT_Frameworks_.pdf
IoT_Frameworks_.pdf
 
IRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private NetworkIRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private Network
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
 
Secure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersSecure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and Computers
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
 
Atm local 2017 General Session
Atm local 2017 General SessionAtm local 2017 General Session
Atm local 2017 General Session
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Atm local 2017 General Session*
Atm local 2017 General Session*Atm local 2017 General Session*
Atm local 2017 General Session*
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
Oracle Sparc Cloud
Oracle Sparc CloudOracle Sparc Cloud
Oracle Sparc Cloud
 
Cloud Monitoring System Using Internet of Things
Cloud Monitoring System Using Internet of ThingsCloud Monitoring System Using Internet of Things
Cloud Monitoring System Using Internet of Things
 
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
[배포용_최종] CISSP협회 제72회 정보보호리더십세미나_Cybersecurity Mesh, Identity First_v1.0.pdf
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 

More from Dr. Rajesh P Barnwal

More from Dr. Rajesh P Barnwal (11)

wekapresentation-130107115704-phpapp02.pdf
wekapresentation-130107115704-phpapp02.pdfwekapresentation-130107115704-phpapp02.pdf
wekapresentation-130107115704-phpapp02.pdf
 
Signage Format.pptx
Signage Format.pptxSignage Format.pptx
Signage Format.pptx
 
Machine-to-Machine Communications
Machine-to-Machine CommunicationsMachine-to-Machine Communications
Machine-to-Machine Communications
 
Application of Ground Penetrating Radar in Subsurface mapping
Application of Ground Penetrating Radar in Subsurface mapping Application of Ground Penetrating Radar in Subsurface mapping
Application of Ground Penetrating Radar in Subsurface mapping
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
10 lovely words
10 lovely words10 lovely words
10 lovely words
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
 
Good e mail practices
Good e mail practicesGood e mail practices
Good e mail practices
 
Mine fire gallery modelling
Mine fire gallery modellingMine fire gallery modelling
Mine fire gallery modelling
 
Microprocessor based autonomous control system
Microprocessor based autonomous control systemMicroprocessor based autonomous control system
Microprocessor based autonomous control system
 
Multimodal man machine interaction
Multimodal man machine interactionMultimodal man machine interaction
Multimodal man machine interaction
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 

Cloud security: Industry Trends and Research Challenges

  • 1. Cloud Security, Vulnerabilities and Integrity Dr. Rajesh P Barnwal Principal Scientist AI & IoT Lab, Information Technology Group CSIR-Central Mechanical Engineering Research Institute, Durgapur Invited Lecture at Faculty Development Program SCMS School of Engineering and Technology, Vidya Nagar, Karukutty-683576, Kerala 21st July’ 2021
  • 2. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Cloud Security?
  • 3. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Cloud Evolution  Understanding Cloud Evolution is needed to know about its Security, Integrity and Vulnerability
  • 4. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Evolution of Cloud Model
  • 5. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Evolution of Cloud Model Bare Metal PaaS Container Orchestrators IaaS
  • 6. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Mention 3 reasons for adopting Cloud
  • 7. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Why shift to Cloud?  Cost Savings  Security  Flexibility  Mobility  Insight  Increased Collaboration  Quality Control  Disaster Recovery  Loss Prevention  Automatic Software Updates Source: SalesForce
  • 8. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur What we exactly do?  Hire Infrastructure and host our applications  Hire applications and host our data  Hire full services to use the hosted application and gathered data
  • 9. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Main Concern about Cloud?  The main security issues arises due to:  Multi-tenant infrastructure  Multi-application infrastructure  Out of control infrastructure  Third party handling of data  Loosing control over physical security  Loosing control over hired part of services  In cloud environment, all the above depends upon Cloud Service Providers (CSP)  And the CSP becomes the main compute manager
  • 10. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Major Challenges Source: IDC Report
  • 11. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur  We will discover during this talk, whether "Cloud Computing Security" is different than "Regular IT Security"
  • 12. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Let us know the IT Security  How the world looks without IT Security?  https://youtu.be/TLxdOi5JDjc
  • 13. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Security domain in Cloud
  • 14. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur "C-I-A" Objectives of Security  Computer and network security is fundamentally about three goals/objectives:  Confidentiality (C) ,  Integrity (I), and  Availability (A)  Out of the above three, Availability is the KEY issue in the case of Cloud Security
  • 15. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Cloud Security becomes a New Challenge
  • 16. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Nothing is sufficient
  • 17. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Cloud Workloads increases security incidents
  • 18. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Cloud Security is not a single handed job
  • 19. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Cost of Missing Cloud Security
  • 20. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Security Challenges in Multi-Cloud Environment Source: Tripwire Research
  • 21. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Market share of Popular Public Cloud Source: Tripwire Research
  • 22. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Giants acquiring Cloud Security Businesses
  • 23. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Cyber Attacks increased in last one year
  • 24. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Cloud Security is Still Hard  Even after so much progress in security technologies, Cloud security is still so hard.  Identity access management (IAM) are in place for more than a decade, however not sufficient for cloud security.  But now paradigm is shifting towards deep encryption services, key management, and most recently, zero trust and secure access service edge (SASE).
  • 25. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Classical Methods: Network Segmentation  Network segmentation was another important strategy in the fight against hackers and increase cloud security.  It is an architectural approach that divides a network into multiple segments or subnets, each acting as its own small network.  This allows network administrators to control the flow of traffic between subnets based on granular policies.  Ultimately, this improves monitoring, helps in boosting performance, and most importantly in enhancing security.  But it also gets failed in modern cloud system and work from home environment.
  • 26. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur New Network Infrastructure  Cloud computing is redefining the network infrastructure and thus requires totally different approach towards achieving security  The old model of network infrastructure — centralized corporate data centres secured by an on-premise network perimeter — doesn’t work for today’s modern enterprises.  Data that used to live in data centres now lives in the cloud and SaaS applications.  With the rise of distributed workforces, users need to be able to connect to resources from anywhere in the world.  This is challenging enterprises to provide network access and a secure, straight-line path to the Internet without adopting complex workarounds or increasing latency.
  • 27. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Old Security Tools Fail
  • 28. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Why old security tools fail in modern Cloud environment?
  • 29. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Security challenges in modern Enterprises?
  • 30. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Main Security Requirements  The security requirements that should be considered when out-sourcing the services to the cloud are as follows:  Confidentiality: Data must be encrypted before it is outsourced, to protect it from malicious internal or external attacks  Integrity: Protect the data from the unauthorized insert, update, or delete. The data owner and authorized users should be able to recognize if the data is corrupted or incomplete, and receive the most recent updated version of the data, which guarantees accuracy and consistency of data.  Availability: The data in the cloud servers should be accessible to its users. Major threats to availability are denial of service(DOS) attacks, natural disasters, and equipment failures at the service provider’s end  Access control: The outsourced data should be accessed only by authorized users.  Firewall: The CSP must be safeguarded against false accusations that may be claimed by dishonest owners or users
  • 31. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Modern Cloud Security Requirements
  • 32. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Modern Industry standard Cloud Security Measures?  Identity and Access Management (IAM)  Secure Access Service Edge (SASE)  Firewall as a Service (FWaaS)  Cloud access security brokers (CASB)  Zero-trust network access (ZNTA)
  • 33. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Identity and Access Management (IAM) AWS Example: Source: https://www2.deloitte.c
  • 34. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Identity and Access Management (IAM) AWS Example: Source: https://www2.deloitte.com/
  • 35. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Secure Access Service Edge (SASE)  SASE is a relatively new framework  SASE distributes critical network and security functions from the cloud, close to the user and applications  SASE builds on software-defined WAN (SD-WAN)
  • 36. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Secure Access Service Edge (SASE)  Cloud-native network infrastructure: SASE simplifies network infrastructure by merging networking and security services into a unified architecture.  Network security at the edge: SASE delivers network security services — cloud access security brokers (CASB), secure web gateways (SWG), Firewall-as-a-Service (FWaaS), and more.  Identity-based network access: SASE's network access is determined by a Zero Trust, policy-based model that verifies based on user identity & contextual factors.
  • 37. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Network Security as a Service
  • 38. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur SASE Features  SASE features a combination of these network and security functions:  Firewall as a service  Malware protection;  Data loss prevention;  Intrusion detection and intrusion prevention;  Software as a service;  Secure web gateways;  Cloud access security brokers (CASBs); and  Zero-trust network access.
  • 39. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur How SASE Works? SDP-Software Defined Perimeter
  • 40. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Good video resource on SASE https://youtu.be/Opy9D-8eyVg
  • 41. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Another innovation in Cloud Security CASB (Cloud Access Security Broker)
  • 42. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur How CASB Works? Source: Farnandez et al., 2015
  • 43. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur CASB Working Example: SDP: Software Defined Perimeter SWG: Secure Web Gateway
  • 44. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Workflow of Software Defined Perimeter in CASB Source: www.cloudflare.com
  • 45. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Workflow of Software Defined Perimeter Source: www.cloudflare.com
  • 46. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Possible Security Policies Enforcement using CASB  Authentication  Single sign on  Authorization  Alerting  Ability to see authorized and unauthorized cloud usage  Credential mapping  Device profiling  Encryption  Tokenization  Logging  Malware detection/prevention
  • 47. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur CASB Features  Policy-based services--consumers can define security policies, e.g., RBAC, to apply to the services they use in order to restrict the access of their employees and customers to cloud data.  Secure channel—the channel to access cloud services can be encrypted.  Data encryption—CASBs can let consumers encrypt their data using their own keys.  Compliance—consumers can demonstrate compliance with specific regulations because CASBs normally include security loggers/auditors.  Discovery—users at the company are able to find out what services they have available through the CASB.
  • 48. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur CASB Features  Transparency—security is transparent to the application consumers when they use the CASB, they would only know about the CASB if an attempted access is rejected.  Access unification—Consumers do not need to deal with a variety of credential types and protocols.  Heterogeneity—access to the cloud can be made from any type of device.  Malware detection—access to the cloud application through a CASB can guarantee that no malware will be found in the accessed service.  Logging/auditing—the CASB keeps logs for security and compliance reasons; these can be later audited.  Identity—the CASB can provide identification services.
  • 49. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Another Paradigm Shift: Zero Trust Shall discuss after the break
  • 50. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Zero Trust Principles Source: Forester
  • 51. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Zero Trust Principles Image source: https://www.centrify.com/blog/best-practices-zero-trust-security/
  • 52. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Strategic Plan for Zero Trust Image source: https://www.centrify.com/blog/best-practices-zero-trust-security/ TRUSTED ACCESS RESILIENT SERVICES PROTECTED ASSETS SECURE AND TRUSTED
  • 53. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Deep Encryption Services
  • 54. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Shared model of Security Source: SANS Cloud Security Summit 2019
  • 55. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur In Legacy Cloud Environment Source: SANS Cloud Security Summit 2019
  • 56. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Case Study: Cloud Key Management Service
  • 57. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Evolution of Cloud Model Bare Metal PaaS Container Orchestrators IaaS Serverless
  • 58. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Serverless Computing: Future IoT Cloud  Serverless computing is a method of providing backend services on an as-used basis.  A serverless provider allows users to write and deploy code without the hassle of worrying about the underlying infrastructure.  Also called as -  Function as a Service  Platform to develop, run, and manage application  Without the complexity of building and maintaining the infrastructure
  • 59. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur What is Serverless Computing?  Serverless computing is a cloud-native platform for -  short-running, stateless computation and  event-driven applications which  scales up and down instantly and automatically and  charges for actual usage at a millisecond granularity
  • 60. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Earlier Trend for Cloud Developer  Develop Cloud Applications as a Monolithic Architecture  Hire a VM on cloud and deploy it  Issues  Difficult to scale after certain limit  Involves high capital expenditure and operating expenditure  Overhead for internal system administration processes;  High development and deployment costs and timeframes (delay to market);  Fault prone design. Image Source: Amazon
  • 61. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Service Oriented Architecture  Hire cloud software as a services from service providers  Pay per usage of services
  • 62. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Serverless Oriented Architecture  Develop cloud application layer using hired microservices  Pay only per usage of microservices
  • 63. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Achieving Serverless Architecture Monolithic Application Break-down into microservices Make each micro service HA Protect against regional outages Region A Region B Explosion in number of containers / processes: Increase of infrastructure cost footprint Increase of operational management cost and complexity
  • 64. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Advantages of Serverless Architecture  It transforms capital expenditure into operating expenditure, and generally reduces operational costs;  One do not have to think about internal system administration processes;  It reduces the development and deployment costs and timeframes (faster time to market);  It’s scalable and fault tolerant by design.
  • 65. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Whether Serverless is Always Good? Microservices Mobile Backends IoT Modest Stream Processing Bots, ML Inferencing Serverless is good for short-running stateless event-driven Serverless is not good for long-running stateful number crunching Databases Deep Learning Training Heavy-Duty Stream Analytics Numerical Simulation f(x) Service integration Video Streaming
  • 66. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur 66 SAGITA Testbed
  • 67. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur 67 SAGITA Testbed Setup
  • 68. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur 68 SAGITA Cloud Architecture
  • 69. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur 69 SAGITA Communication Architecture
  • 70. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur 70 SAGITA Data Acquisition Module
  • 71. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur 71 SAGITA Data Bucket
  • 72. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur 72 Simplified ER Diagram
  • 73. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur SAGITA Cloud Interface
  • 74. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur SAGITA Cloud Interface: Tenant Login
  • 75. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur SAGITA Cloud Interface: Farm Creation
  • 76. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur SAGITA Cloud Interface: Farm Listing
  • 77. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur SAGITA Cloud Interface: Device Registration Device Button Register Device MAP BUTTON
  • 78. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur SAGITA Cloud Interface: Data Logging
  • 79. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur SAGITA Cloud Interface: Data Visualization
  • 80. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Attacks in Serverless Platform Source: SANS Cloud Security Summit 2019
  • 81. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Attacks in Serverless Platform Source: SANS Cloud Security Summit 2019
  • 82. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Top Risks in Serverless Environment Source: SANS Cloud Security Summit 2019
  • 83. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Traditional Security measures fails Source: SANS Cloud Security Summit 2019
  • 84. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Traditional Security measures Source: SANS Cloud Security Summit 2019
  • 85. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Serverless- No Infrastructure, Only Fn Source: SANS Cloud Security Summit 2019
  • 86. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur DevOps to DevSecOps  Security must also be embedded by design and must be a strong consideration during software development.  DevSecOps could be a good consideration for enterprises that want to move in this direction.  This integrates security into all stages of the software delivery process, ensuring that developers think about security when they write code.  DevSecOps effectively shifts security inspection closer to when software is being developed and ensures that software is tested for security problems before it is deployed.  Moreover, it helps IT teams to address security issues quickly if they appear after deployment.
  • 87. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Future of Cloud Security Skills
  • 89. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur Q&A Time
  • 90. AI & IoT Lab, CSIR-Central Mechanical Engineering Research Institute, Durgapur References  Rady, Mai, Tamer Abdelkader, and Rasha Ismail. "Integrity and confidentiality in cloud outsourced data." Ain Shams Engineering Journal 10.2 (2019): 275-285.  Fernandez, Edurardo, Nobukazu Yoshioka, and Hironori Washizaki. "Cloud Access Security Broker (CASB): A pattern for secure access to cloud services." 4th Asian Conference on Pattern Languages of Programs, Asian PLoP. Vol. 15. 2015.  Barnwal, Rajesh P., N. Ghosh, and Soumya K. Ghosh. "Data and Application Security in Cloud." Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations (2014): 479-495.  Rady, Mai, Tamer Abdelkader, and Rasha Ismail. "Integrity and confidentiality in cloud outsourced data." Ain Shams Engineering Journal 10.2 (2019): 275-285.  Kritikos, Kyriakos, et al. "A survey on vulnerability assessment tools and databases for cloud-based web applications." Array 3 (2019): 100011.  Chen, Chao, Nima Khakzad, and Genserik Reniers. "Dynamic vulnerability assessment of process plants with respect to vapor cloud explosions." Reliability Engineering & System Safety 200 (2020): 106934.  https://www.talend.com/resources/reduce-data-integrity-risk/  https://sectigostore.com/  Applying Zero Trust to Cloud Environments (paloaltonetworks.com)  https://vuldb.com  https://nvd.nist.gov  https://www.talend.com/resources/reduce-data-integrity-risk/
  • 91. Dr. Rajesh P Barnwal, r_barnwal@cmeri.res.in AI & IoT Lab, Information Technology Group, CSIR-Central Mechanical Engineering Research Institute MG Avenue, Durgapur 713 209, West Bengal [India] https://www.cmeri.res.in