SlideShare a Scribd company logo
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service
(IaaS) Clouds
Abstract:
The vulnerability of Cloud Computing Systems (CCSs) to Advanced
Persistent Threats (APTs) is a significant concern to government and industry.
System present a cloud architecture reference model that incorporates a wide range
of security controls and best practices, and a cloud security assessment model –
Cloud-Trust – that estimates high level security metrics to quantify the degree of
confidentiality and integrity offered by a CCS or cloud service provider (CSP).
Cloud-Trust is used to assess the security level of four multi-tenant IaaS cloud
architectures equipped with alternative cloud security controls and to show the
probability of CCS penetration (high value data compromise) is high if a minimal
set of security controls are implemented. CCS penetration probability drops
substantially if a cloud defense in depth security architecture is adopted that
protects virtual machine (VM) images at rest, strengthens CSP and cloud tenant
system administrator access controls, and which employs other network security
controls to minimize cloud network surveillance and discovery of live VMs.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Existing System:
The security of TZ implementations depend on correctly configuring domain
controllers, firewalls, routers, and switches that are used in segmenting and
restricting access to portions of the cloud network and on “locking down” secure
communications between users and domain controllers to prevent SOAP interface
or signature wrapping attacks. Misconfiguration of IAM servers, domain
controllers and other network devices can introduce vulnerabilities in the cloud
network and let attackers enter restricted TZs. Careful configuration management
is a key factor that must be taken into account in assessing cloud security status. To
ensure such vulnerabilities are not inadvertently created in a CCS well trained
system administrators (system admins) are needed to set up, maintain, and
correctly patch this infrastructure.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Disadvantages:
 Existing system protocol, which does not provides guarantee for end-to-end
encryption.
 Cloud Computing Systems affected by third parties while transmit their data
from transmission channel.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Proposed System:
The main objective of the cloud computing system implementation for
developing CCS reference architecture and a cloud security assessment model
called as Cloud-Trust that provides quantitative high level security assessments of
IaaS CCSs and CSPs.
Cloud-Trust is based on CCS unique attack paths that cover the essential
elements of IaaS cloud architecture. It is based on a Bayesian network model of the
CCS, the class of APT attack paths spanning the CCS attack space, and the APT
attack steps required to implement each attack path.
A trust zone (TZ) as a combination of network segmentation and identity
and access management (IAM) controls. These define physical, logical, or virtual
boundaries around network resources. Cloud TZs can be implemented using
physical devices, virtually using virtual firewall and switching applications, or
using both physical and virtual appliances. The security of TZ implementations
depend on correctly configuring domain controllers, firewalls, routers, and
switches that are used in segmenting and restricting access to portions of the cloud
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
network and on secure communications between users and domain
controllers to prevent SOAP interface or signature wrapping attacks.
Advantages:
 Cyber security systems provide full security for cloud computing systems.
 System implements multiple access control boundaries to prevent external
cloud user.
 The entire communication is monitored by firewalls to maintains cloud
computing security.

More Related Content

What's hot

Can Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network SecurityCan Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network Security
EC-Council
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
IJNSA Journal
 
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Ecway Technologies
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls Security
Hari Kumar
 
Data Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud eraData Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud era
David De Vos
 
How much can I trust my cloud services?
How much can I trust my cloud services?How much can I trust my cloud services?
How much can I trust my cloud services?
ATMOSPHERE .
 
Malware detection in cloud computing infrastructures
Malware detection in cloud computing infrastructuresMalware detection in cloud computing infrastructures
Malware detection in cloud computing infrastructures
ieeepondy
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
IJNSA Journal
 
McAfee - Portfolio Overview
McAfee - Portfolio OverviewMcAfee - Portfolio Overview
McAfee - Portfolio Overview
Iftikhar Ali Iqbal
 
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
EC-Council
 
CSA v4 Topology
CSA v4 TopologyCSA v4 Topology
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architecture
ijsrd.com
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
Maganathin Veeraragaloo
 
TEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEsTEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEs
LEGATO project
 
secureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow FrameworksecureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow Framework
LEGATO project
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public Cloud
Insight
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
David De Vos
 
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Project
 
Introduction to Azure Sentinel
Introduction to Azure SentinelIntroduction to Azure Sentinel
Introduction to Azure Sentinel
arnaudlh
 
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesCloud Security for U.S. Military Agencies
Cloud Security for U.S. Military Agencies
NJVC, LLC
 

What's hot (20)

Can Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network SecurityCan Cloud Solutions Transform Network Security
Can Cloud Solutions Transform Network Security
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls Security
 
Data Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud eraData Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud era
 
How much can I trust my cloud services?
How much can I trust my cloud services?How much can I trust my cloud services?
How much can I trust my cloud services?
 
Malware detection in cloud computing infrastructures
Malware detection in cloud computing infrastructuresMalware detection in cloud computing infrastructures
Malware detection in cloud computing infrastructures
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
McAfee - Portfolio Overview
McAfee - Portfolio OverviewMcAfee - Portfolio Overview
McAfee - Portfolio Overview
 
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
 
CSA v4 Topology
CSA v4 TopologyCSA v4 Topology
CSA v4 Topology
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architecture
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
 
TEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEsTEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEs
 
secureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow FrameworksecureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow Framework
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public Cloud
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
 
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by Design
 
Introduction to Azure Sentinel
Introduction to Azure SentinelIntroduction to Azure Sentinel
Introduction to Azure Sentinel
 
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesCloud Security for U.S. Military Agencies
Cloud Security for U.S. Military Agencies
 

Viewers also liked

ijazahmadCv
ijazahmadCvijazahmadCv
ijazahmadCv
ijaz ahmad
 
портфоліо школа
портфоліо школапортфоліо школа
портфоліо школа
Oksana Hrehorashchuk
 
Pm0011 project planning and scheduling
Pm0011 project planning and schedulingPm0011 project planning and scheduling
Pm0011 project planning and scheduling
consult4solutions
 
Thomas cv
Thomas cvThomas cv
Seann william scott
Seann william scottSeann william scott
Seann william scott
Allison Reed
 
Taller 3 11 6
Taller 3 11 6Taller 3 11 6
Taller 3 11 6
99081406037
 
Pm0016 project risk management
Pm0016 project risk managementPm0016 project risk management
Pm0016 project risk management
consult4solutions
 
Android Basic Training - Performing network operation
Android Basic Training - Performing network operationAndroid Basic Training - Performing network operation
Android Basic Training - Performing network operation
Shen Lin
 
Marie Quillen Resume
Marie Quillen ResumeMarie Quillen Resume
Marie Quillen Resume
Marie Quillen
 
Fisica general
Fisica general Fisica general
Fisica general
antoniomartinezlunalopez
 
projekt_praktikum
projekt_praktikumprojekt_praktikum
projekt_praktikum
Dominik Maszczyk
 
QS KAMRAN UPDATE CV.
QS KAMRAN UPDATE CV.QS KAMRAN UPDATE CV.
QS KAMRAN UPDATE CV.
Engr Kamran
 
Flase Image Shootingscript
 Flase Image Shootingscript Flase Image Shootingscript
Flase Image Shootingscript
Methembedarikwa5
 
Integrated Treatment for ARLD: making it happen, 2nd February 2017 Presentat...
Integrated Treatment for ARLD:  making it happen, 2nd February 2017 Presentat...Integrated Treatment for ARLD:  making it happen, 2nd February 2017 Presentat...
Integrated Treatment for ARLD: making it happen, 2nd February 2017 Presentat...
Health Innovation Wessex
 
SHPE Journey to success
SHPE Journey to successSHPE Journey to success
SHPE Journey to success
Andres Vargas, MBA
 
rajesh (1) (1)
rajesh (1) (1)rajesh (1) (1)
rajesh (1) (1)
Rajesh Kumar Singh
 
IceFire Presentation for Aos Canada tour
IceFire Presentation for Aos Canada tourIceFire Presentation for Aos Canada tour
IceFire Presentation for Aos Canada tour
Martin Laplante
 
Lumate 091116 partanen
Lumate 091116 partanenLumate 091116 partanen
Lumate 091116 partanen
Leena Partanen
 
Mu0012–employee relations management
Mu0012–employee relations managementMu0012–employee relations management
Mu0012–employee relations management
consult4solutions
 
Progressive Web Apps w kontekście proximity marketingu
Progressive Web Apps w kontekście proximity marketinguProgressive Web Apps w kontekście proximity marketingu
Progressive Web Apps w kontekście proximity marketingu
Piotr Rytel
 

Viewers also liked (20)

ijazahmadCv
ijazahmadCvijazahmadCv
ijazahmadCv
 
портфоліо школа
портфоліо школапортфоліо школа
портфоліо школа
 
Pm0011 project planning and scheduling
Pm0011 project planning and schedulingPm0011 project planning and scheduling
Pm0011 project planning and scheduling
 
Thomas cv
Thomas cvThomas cv
Thomas cv
 
Seann william scott
Seann william scottSeann william scott
Seann william scott
 
Taller 3 11 6
Taller 3 11 6Taller 3 11 6
Taller 3 11 6
 
Pm0016 project risk management
Pm0016 project risk managementPm0016 project risk management
Pm0016 project risk management
 
Android Basic Training - Performing network operation
Android Basic Training - Performing network operationAndroid Basic Training - Performing network operation
Android Basic Training - Performing network operation
 
Marie Quillen Resume
Marie Quillen ResumeMarie Quillen Resume
Marie Quillen Resume
 
Fisica general
Fisica general Fisica general
Fisica general
 
projekt_praktikum
projekt_praktikumprojekt_praktikum
projekt_praktikum
 
QS KAMRAN UPDATE CV.
QS KAMRAN UPDATE CV.QS KAMRAN UPDATE CV.
QS KAMRAN UPDATE CV.
 
Flase Image Shootingscript
 Flase Image Shootingscript Flase Image Shootingscript
Flase Image Shootingscript
 
Integrated Treatment for ARLD: making it happen, 2nd February 2017 Presentat...
Integrated Treatment for ARLD:  making it happen, 2nd February 2017 Presentat...Integrated Treatment for ARLD:  making it happen, 2nd February 2017 Presentat...
Integrated Treatment for ARLD: making it happen, 2nd February 2017 Presentat...
 
SHPE Journey to success
SHPE Journey to successSHPE Journey to success
SHPE Journey to success
 
rajesh (1) (1)
rajesh (1) (1)rajesh (1) (1)
rajesh (1) (1)
 
IceFire Presentation for Aos Canada tour
IceFire Presentation for Aos Canada tourIceFire Presentation for Aos Canada tour
IceFire Presentation for Aos Canada tour
 
Lumate 091116 partanen
Lumate 091116 partanenLumate 091116 partanen
Lumate 091116 partanen
 
Mu0012–employee relations management
Mu0012–employee relations managementMu0012–employee relations management
Mu0012–employee relations management
 
Progressive Web Apps w kontekście proximity marketingu
Progressive Web Apps w kontekście proximity marketinguProgressive Web Apps w kontekście proximity marketingu
Progressive Web Apps w kontekście proximity marketingu
 

Similar to Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds

Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithms
kitechsolutions
 
Identity based encryption
Identity based encryptionIdentity based encryption
Identity based encryption
kitechsolutions
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
kitechsolutions
 
BDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware MonitoringBDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware Monitoring
kitechsolutions
 
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
kitechsolutions
 
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio NetworksToward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
kitechsolutions
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
kitechsolutions
 
Assurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment modelAssurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment model
Finalyearprojects Toall
 
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
kitechsolutions
 
Qiang Yu Resume
Qiang Yu Resume Qiang Yu Resume
Qiang Yu Resume
Qiang Yu
 
Ahmad Arbaz CV updated
Ahmad Arbaz CV updatedAhmad Arbaz CV updated
Ahmad Arbaz CV updated
Ahmed Arbaz
 
N C C T Embedded Projects Intro & Presentation
N C C T    Embedded  Projects  Intro &  PresentationN C C T    Embedded  Projects  Intro &  Presentation
N C C T Embedded Projects Intro & Presentation
ncct
 
Wasib Resume(Information Security)
Wasib Resume(Information Security)Wasib Resume(Information Security)
Wasib Resume(Information Security)
Wasib Ahmed
 
Srayan guhathakurta resume
Srayan guhathakurta resumeSrayan guhathakurta resume
Srayan guhathakurta resume
Srayan Guhathakurta
 
RICKY F DAGUM
RICKY F DAGUMRICKY F DAGUM
RICKY F DAGUM
Ricky Dagum
 
Amit Dixit Resume 1
Amit Dixit Resume 1Amit Dixit Resume 1
Amit Dixit Resume 1
amit dixit
 
Ahmed cv
Ahmed cvAhmed cv
MohamedMustafa
MohamedMustafaMohamedMustafa
MohamedMustafa
Mohamed Mustafa
 
CAPITOL PROFEESSIONAL ACCADEMY
CAPITOL PROFEESSIONAL ACCADEMYCAPITOL PROFEESSIONAL ACCADEMY
CAPITOL PROFEESSIONAL ACCADEMY
Sofia Simon
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
Networking Training
 

Similar to Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds (20)

Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithms
 
Identity based encryption
Identity based encryptionIdentity based encryption
Identity based encryption
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
 
BDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware MonitoringBDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware Monitoring
 
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
 
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio NetworksToward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
 
Assurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment modelAssurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment model
 
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
 
Qiang Yu Resume
Qiang Yu Resume Qiang Yu Resume
Qiang Yu Resume
 
Ahmad Arbaz CV updated
Ahmad Arbaz CV updatedAhmad Arbaz CV updated
Ahmad Arbaz CV updated
 
N C C T Embedded Projects Intro & Presentation
N C C T    Embedded  Projects  Intro &  PresentationN C C T    Embedded  Projects  Intro &  Presentation
N C C T Embedded Projects Intro & Presentation
 
Wasib Resume(Information Security)
Wasib Resume(Information Security)Wasib Resume(Information Security)
Wasib Resume(Information Security)
 
Srayan guhathakurta resume
Srayan guhathakurta resumeSrayan guhathakurta resume
Srayan guhathakurta resume
 
RICKY F DAGUM
RICKY F DAGUMRICKY F DAGUM
RICKY F DAGUM
 
Amit Dixit Resume 1
Amit Dixit Resume 1Amit Dixit Resume 1
Amit Dixit Resume 1
 
Ahmed cv
Ahmed cvAhmed cv
Ahmed cv
 
MohamedMustafa
MohamedMustafaMohamedMustafa
MohamedMustafa
 
CAPITOL PROFEESSIONAL ACCADEMY
CAPITOL PROFEESSIONAL ACCADEMYCAPITOL PROFEESSIONAL ACCADEMY
CAPITOL PROFEESSIONAL ACCADEMY
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
 

Recently uploaded

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 

Recently uploaded (20)

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 

Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds

  • 1. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds Abstract: The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats (APTs) is a significant concern to government and industry. System present a cloud architecture reference model that incorporates a wide range of security controls and best practices, and a cloud security assessment model – Cloud-Trust – that estimates high level security metrics to quantify the degree of confidentiality and integrity offered by a CCS or cloud service provider (CSP). Cloud-Trust is used to assess the security level of four multi-tenant IaaS cloud architectures equipped with alternative cloud security controls and to show the probability of CCS penetration (high value data compromise) is high if a minimal set of security controls are implemented. CCS penetration probability drops substantially if a cloud defense in depth security architecture is adopted that protects virtual machine (VM) images at rest, strengthens CSP and cloud tenant system administrator access controls, and which employs other network security controls to minimize cloud network surveillance and discovery of live VMs.
  • 2. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Existing System: The security of TZ implementations depend on correctly configuring domain controllers, firewalls, routers, and switches that are used in segmenting and restricting access to portions of the cloud network and on “locking down” secure communications between users and domain controllers to prevent SOAP interface or signature wrapping attacks. Misconfiguration of IAM servers, domain controllers and other network devices can introduce vulnerabilities in the cloud network and let attackers enter restricted TZs. Careful configuration management is a key factor that must be taken into account in assessing cloud security status. To ensure such vulnerabilities are not inadvertently created in a CCS well trained system administrators (system admins) are needed to set up, maintain, and correctly patch this infrastructure.
  • 3. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Disadvantages:  Existing system protocol, which does not provides guarantee for end-to-end encryption.  Cloud Computing Systems affected by third parties while transmit their data from transmission channel.
  • 4. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Proposed System: The main objective of the cloud computing system implementation for developing CCS reference architecture and a cloud security assessment model called as Cloud-Trust that provides quantitative high level security assessments of IaaS CCSs and CSPs. Cloud-Trust is based on CCS unique attack paths that cover the essential elements of IaaS cloud architecture. It is based on a Bayesian network model of the CCS, the class of APT attack paths spanning the CCS attack space, and the APT attack steps required to implement each attack path. A trust zone (TZ) as a combination of network segmentation and identity and access management (IAM) controls. These define physical, logical, or virtual boundaries around network resources. Cloud TZs can be implemented using physical devices, virtually using virtual firewall and switching applications, or using both physical and virtual appliances. The security of TZ implementations depend on correctly configuring domain controllers, firewalls, routers, and switches that are used in segmenting and restricting access to portions of the cloud
  • 5. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com network and on secure communications between users and domain controllers to prevent SOAP interface or signature wrapping attacks. Advantages:  Cyber security systems provide full security for cloud computing systems.  System implements multiple access control boundaries to prevent external cloud user.  The entire communication is monitored by firewalls to maintains cloud computing security.