SlideShare a Scribd company logo
Module#2
Dr Neeraj Kumar Pandey
Working With
A public cloud is one based on the standard cloud
computing model, in which a service provider
makes resources, such as applications and storage,
available to the general public over the Internet.
Public cloud services may be free or offered on a
pay-per-usage model.
Public cloud services are provided in a virtualized
environment, constructed using pooled shared
physical resources, and accessible over a public
network such as the internet.
Dr. Neeraj Kumar Pandey
Advantages:
 The price is right
 Ease of accessibility
 Less work for IT
 Scaling up is simple
Limitations/Challenges:
 Security Risks
 Bandwidth
 Customization as per user
 Isolation
 Multiple Tanancy
Dr. Neeraj Kumar Pandey
 Public cloud services and infrastructure are
provided off-site over the Internet by third-party
companies to multiple clients. Some examples of
public clouds are server hosting, storage services
and webmail. You have probably heard of Dropbox
and Google Drive, which are popular public storage
services.
 Public clouds are best when your information and
data is used by lots of people and your security
standards are not high. They are also good for
collaboration projects and doing an ad-hoc software
development project using a Platform as a Service
(PaaS).
Dr. Neeraj Kumar Pandey
 When there is "limited exposure to heavy
infrastructure investments such as mainframes
and enterprise applications."
 When IT staff is more likely to have been brought
up in the days of rapid development, virtualization
automation, services on demand, or open source.
 In a smaller business, when there is greater
flexibility and agility in decision making.
 When there is a need for rapid turnaround and
faster time to marker for new application.
 When IT staff is less likely to manage a SAN or
working on servers.
Dr. Neeraj Kumar Pandey
When selecting a public cloud provider, various
factors should therefore be taken into
consideration, including:
 The nature of the provider’s platform
 Accessibility from other devices and platforms
 Built-in functionality
 Individual or organizational needs
 Cost
 Amount of storage
 Security
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
As a IAAS provider, all of the fundamental
properties and characteristics of cloud
computing should be concerned and
implemented.
Dr. Neeraj Kumar Pandey
 Infrastructure as a service (IaaS) is a model of
Cloud computing intended for companies.
 It is a low-level service that provides access to a
virtualized computer equipment.
 The company is discharged from buying and
managing the computer equipment.
 Virtual machines are provided on which the
company can run the operating system of its
choice (if available…).
Dr. Neeraj Kumar Pandey
 The company manages: Application software
(executable, parameters, databases,…).
 The Cloud provider manages : Everything else!
Servers, operating systems (versions),
virtualization layers, storage, backups,
firewall, monitoring, internal networks,
access/security model, but also…
 Power supply, inverters, air conditioned,
access control to the equipment, ...
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Platform as a Service (PaaS) is a cloud model designed for
software developers that streamlines the development process
by shifting specific aspects of systems management to the
service provider. PaaS is used to develop web and mobile
applications using components that are pre-configured and
maintained by the service provider, including programming
languages, application servers and databases.
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
It is a cloud model that delivers on-demand applications that are
hosted and managed by the service provider and typically paid
for on a subscription basis. SaaS solutions offer a number of
advantages over on-premises deployments, including minimal
administration and maintenance, anywhere access, and in
many cases improved communication and collaboration. Some
cloud-based tools will also prove to be more cost effective than
their traditional, in-house counterparts.
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
Module#2
Neeraj Pandey CEA Deptt. neeraj.pandey@gla.ac.in
Cloud Security
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
 Host Hopping Attacks: This attack exploits one of the
most defining characteristics of cloud computing:
resource sharing. this attack can be launched by
hackers if cloud provider does not enforce strict
mechanism to isolate shared resources such as
memory, storage, and reputation of different customers
or hosts . Failing to separate tenants (customers) can
certainly facilitate this type of attack and thereby allow
malicious hackers to hop on other hosts to compromise
other customers’ data and gain illegal access to it. This
attack can be particularly dangerous for public clouds
and the PaaS model where multiple clients share the
same physical machine. Attackers can cause severe
damage that could range from compromising sensitive
customer data to interrupting service for cloud
providers and distorting their image and reputation.
CloudSecurity
Dr. Neeraj Kumar Pandey
 Malicious Insider and Abuse of Privileges:
The shared and multi-tenancy nature of cloud
computing creates a fertile ground for insider
threat and promotes risk of “privilege abuse” to
confidential customer information. Hosting
sensitive information from multiple clients on
the same physical machine certainly entices
users with high privilege roles such as system
administrators and information security
managers to abuse their privileged access to
clients’ sensitive data and the possibility of
leaking or selling that information to
competitors or other parties of interest.
CloudSecurity
Dr. Neeraj Kumar Pandey
Identity Theft Attacks.
Malicious hackers can easily set up
accounts with cloud providers to use
cloud resources by simply paying for the
usage without any restrictions or limits
from cloud vendors on resource
consumption or workloads. Attackers
can exploit this advantage to use and
compromise customer’s critical
information and sell it for a price.
CloudSecurity
Dr. Neeraj Kumar Pandey
 Service Engine Attacks. The service engine is a highly
customized platform that sits above the physical layer
and characterizes the underlying cloud architecture;
this service engine is normally controlled by cloud
provider to mange customer resources but it can be
rented by potential customers who wish to use and
adopt the IaaS model. Hackers can abuse this feature by
subscribing to the IaaS model and renting a virtual
machine that would be hosted and controlled by the
service engine; then they can use the VM to hack the
service engine from the inside and use the service
engine to their advantage where it may contain
sensitive business information through other VMs from
other cloud subscribers.
CloudSecurity
Dr. Neeraj Kumar Pandey
Dr. Neeraj Kumar Pandey
CloudSecurity
Dr. Neeraj Kumar Pandey
CloudSecurity
 Threats
 Including the cloud in your perimeter
 Lets attackers inside the perimeter
 Prevents mobile users from accessing the cloud
directly
 Not including the cloud in your perimeter
 Essential services aren’t trusted
 No access controls on cloud
 Countermeasures
 Drop the perimeter model!
Dr. Neeraj Kumar Pandey
CloudSecurity
 Threat
 Disconnected provider and customer security systems
 Fired employee retains access to cloud
 Misbehavior in cloud not reported to customer
 Countermeasures
 At least, integrate identity management
 Consistent access controls
 Better, integrate monitoring and notifications
 Notes
 Can use SAML(Security Assertion Markup Language), LDAP(Lightweight Directory Access
Protocol), RADIUS(Remote Authentication Dial-In User Service), XACML(eXtensible
Access Control Markup Language), IF-MAP( Interface for Metadata Access Points), etc.
Dr. Neeraj Kumar Pandey
CloudSecurity

More Related Content

What's hot

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Naveed Farooq
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Siddiq Abu Bakkar
 
Cloud computing
Cloud computingCloud computing
Cloud computing
pgayatrinaidu
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shiva Prasad
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
Mehul Patel
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
Ashok Kumar
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Identacor
 
Cloud computing
Cloud computingCloud computing
Cloud computing
compherals
 
Introduction to public cloud
Introduction to public cloudIntroduction to public cloud
Introduction to public cloud
gangal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
DebrajKarmakar
 
A brief history of cloud computing
A brief history of cloud computingA brief history of cloud computing
A brief history of cloud computing
Oneserve
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
Aidy Tificate
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
Capgemini
 
Cloud service models
Cloud service modelsCloud service models
Cloud service models
Prem Sanil
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
hari krishnan.n
 
Cloud computing
Cloud computingCloud computing
Cloud computing
حيدر نافع nafaa
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Syam Lal
 

What's hot (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to public cloud
Introduction to public cloudIntroduction to public cloud
Introduction to public cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A brief history of cloud computing
A brief history of cloud computingA brief history of cloud computing
A brief history of cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Cloud service models
Cloud service modelsCloud service models
Cloud service models
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Similar to Public cloud

Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptx
SURBHI SAROHA
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
Kumayl Rajani
 
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfQ.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
preetajain
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
Ajay844
 
Cloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptxCloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptx
boti39263
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
Techsparks
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Suryavamsi51
 
Cloud computing
Cloud computingCloud computing
Cloud computing
neha kamboj
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center ProjectAbhijit Kundu
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
Gopal Jogdand
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noida
taramandal
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
swamipise14
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
Balkees Shereek
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
Lakshika Rasanjali
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
ronak patel
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
MerisCon ARTDesign
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdf
manoharparakh
 

Similar to Public cloud (20)

Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptx
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfQ.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
Cloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptxCloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptx
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Best cloud computing training institute in noida
Best cloud computing training institute in noidaBest cloud computing training institute in noida
Best cloud computing training institute in noida
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Unit-II-part 3.pdf
Unit-II-part 3.pdfUnit-II-part 3.pdf
Unit-II-part 3.pdf
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdf
 

More from Dr.Neeraj Kumar Pandey

Delegates and events in C#
Delegates and events in C#Delegates and events in C#
Delegates and events in C#
Dr.Neeraj Kumar Pandey
 
Structure in c#
Structure in c#Structure in c#
Structure in c#
Dr.Neeraj Kumar Pandey
 
Strings in c#
Strings in c#Strings in c#
Strings in c#
Dr.Neeraj Kumar Pandey
 
Program control statements in c#
Program control statements in c#Program control statements in c#
Program control statements in c#
Dr.Neeraj Kumar Pandey
 
Operators and expression in c#
Operators and expression in c#Operators and expression in c#
Operators and expression in c#
Dr.Neeraj Kumar Pandey
 
Method parameters in c#
Method parameters in c#Method parameters in c#
Method parameters in c#
Dr.Neeraj Kumar Pandey
 
Enumeration in c#
Enumeration in c#Enumeration in c#
Enumeration in c#
Dr.Neeraj Kumar Pandey
 
C# classes objects
C#  classes objectsC#  classes objects
C# classes objects
Dr.Neeraj Kumar Pandey
 
Dot net assembly
Dot net assemblyDot net assembly
Dot net assembly
Dr.Neeraj Kumar Pandey
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
Dr.Neeraj Kumar Pandey
 
Role of cloud computing in scm
Role of cloud computing in scmRole of cloud computing in scm
Role of cloud computing in scm
Dr.Neeraj Kumar Pandey
 
cloud computing Multi cloud
cloud computing Multi cloudcloud computing Multi cloud
cloud computing Multi cloud
Dr.Neeraj Kumar Pandey
 
Ibm bluemix case study
Ibm bluemix case studyIbm bluemix case study
Ibm bluemix case study
Dr.Neeraj Kumar Pandey
 
Business cases for the need of cloud computing
Business cases for the need of cloud computingBusiness cases for the need of cloud computing
Business cases for the need of cloud computing
Dr.Neeraj Kumar Pandey
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
Dr.Neeraj Kumar Pandey
 
cloud computing: Vm migration
cloud computing: Vm migrationcloud computing: Vm migration
cloud computing: Vm migration
Dr.Neeraj Kumar Pandey
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
Dr.Neeraj Kumar Pandey
 
Dot net introduction
Dot net introductionDot net introduction
Dot net introduction
Dr.Neeraj Kumar Pandey
 
C# lecture 2: Literals , Variables and Data Types in C#
C# lecture 2: Literals , Variables and Data Types in C#C# lecture 2: Literals , Variables and Data Types in C#
C# lecture 2: Literals , Variables and Data Types in C#
Dr.Neeraj Kumar Pandey
 
C# lecture 1: Introduction to Dot Net Framework
C# lecture 1: Introduction to Dot Net FrameworkC# lecture 1: Introduction to Dot Net Framework
C# lecture 1: Introduction to Dot Net Framework
Dr.Neeraj Kumar Pandey
 

More from Dr.Neeraj Kumar Pandey (20)

Delegates and events in C#
Delegates and events in C#Delegates and events in C#
Delegates and events in C#
 
Structure in c#
Structure in c#Structure in c#
Structure in c#
 
Strings in c#
Strings in c#Strings in c#
Strings in c#
 
Program control statements in c#
Program control statements in c#Program control statements in c#
Program control statements in c#
 
Operators and expression in c#
Operators and expression in c#Operators and expression in c#
Operators and expression in c#
 
Method parameters in c#
Method parameters in c#Method parameters in c#
Method parameters in c#
 
Enumeration in c#
Enumeration in c#Enumeration in c#
Enumeration in c#
 
C# classes objects
C#  classes objectsC#  classes objects
C# classes objects
 
Dot net assembly
Dot net assemblyDot net assembly
Dot net assembly
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
Role of cloud computing in scm
Role of cloud computing in scmRole of cloud computing in scm
Role of cloud computing in scm
 
cloud computing Multi cloud
cloud computing Multi cloudcloud computing Multi cloud
cloud computing Multi cloud
 
Ibm bluemix case study
Ibm bluemix case studyIbm bluemix case study
Ibm bluemix case study
 
Business cases for the need of cloud computing
Business cases for the need of cloud computingBusiness cases for the need of cloud computing
Business cases for the need of cloud computing
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
cloud computing: Vm migration
cloud computing: Vm migrationcloud computing: Vm migration
cloud computing: Vm migration
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 
Dot net introduction
Dot net introductionDot net introduction
Dot net introduction
 
C# lecture 2: Literals , Variables and Data Types in C#
C# lecture 2: Literals , Variables and Data Types in C#C# lecture 2: Literals , Variables and Data Types in C#
C# lecture 2: Literals , Variables and Data Types in C#
 
C# lecture 1: Introduction to Dot Net Framework
C# lecture 1: Introduction to Dot Net FrameworkC# lecture 1: Introduction to Dot Net Framework
C# lecture 1: Introduction to Dot Net Framework
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Public cloud

  • 1. Module#2 Dr Neeraj Kumar Pandey Working With
  • 2. A public cloud is one based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model. Public cloud services are provided in a virtualized environment, constructed using pooled shared physical resources, and accessible over a public network such as the internet. Dr. Neeraj Kumar Pandey
  • 3. Advantages:  The price is right  Ease of accessibility  Less work for IT  Scaling up is simple Limitations/Challenges:  Security Risks  Bandwidth  Customization as per user  Isolation  Multiple Tanancy Dr. Neeraj Kumar Pandey
  • 4.  Public cloud services and infrastructure are provided off-site over the Internet by third-party companies to multiple clients. Some examples of public clouds are server hosting, storage services and webmail. You have probably heard of Dropbox and Google Drive, which are popular public storage services.  Public clouds are best when your information and data is used by lots of people and your security standards are not high. They are also good for collaboration projects and doing an ad-hoc software development project using a Platform as a Service (PaaS). Dr. Neeraj Kumar Pandey
  • 5.  When there is "limited exposure to heavy infrastructure investments such as mainframes and enterprise applications."  When IT staff is more likely to have been brought up in the days of rapid development, virtualization automation, services on demand, or open source.  In a smaller business, when there is greater flexibility and agility in decision making.  When there is a need for rapid turnaround and faster time to marker for new application.  When IT staff is less likely to manage a SAN or working on servers. Dr. Neeraj Kumar Pandey
  • 6. When selecting a public cloud provider, various factors should therefore be taken into consideration, including:  The nature of the provider’s platform  Accessibility from other devices and platforms  Built-in functionality  Individual or organizational needs  Cost  Amount of storage  Security Dr. Neeraj Kumar Pandey
  • 8. As a IAAS provider, all of the fundamental properties and characteristics of cloud computing should be concerned and implemented. Dr. Neeraj Kumar Pandey
  • 9.  Infrastructure as a service (IaaS) is a model of Cloud computing intended for companies.  It is a low-level service that provides access to a virtualized computer equipment.  The company is discharged from buying and managing the computer equipment.  Virtual machines are provided on which the company can run the operating system of its choice (if available…). Dr. Neeraj Kumar Pandey
  • 10.  The company manages: Application software (executable, parameters, databases,…).  The Cloud provider manages : Everything else! Servers, operating systems (versions), virtualization layers, storage, backups, firewall, monitoring, internal networks, access/security model, but also…  Power supply, inverters, air conditioned, access control to the equipment, ... Dr. Neeraj Kumar Pandey
  • 19. Platform as a Service (PaaS) is a cloud model designed for software developers that streamlines the development process by shifting specific aspects of systems management to the service provider. PaaS is used to develop web and mobile applications using components that are pre-configured and maintained by the service provider, including programming languages, application servers and databases. Dr. Neeraj Kumar Pandey
  • 26. It is a cloud model that delivers on-demand applications that are hosted and managed by the service provider and typically paid for on a subscription basis. SaaS solutions offer a number of advantages over on-premises deployments, including minimal administration and maintenance, anywhere access, and in many cases improved communication and collaboration. Some cloud-based tools will also prove to be more cost effective than their traditional, in-house counterparts. Dr. Neeraj Kumar Pandey
  • 29. Module#2 Neeraj Pandey CEA Deptt. neeraj.pandey@gla.ac.in Cloud Security
  • 41.  Host Hopping Attacks: This attack exploits one of the most defining characteristics of cloud computing: resource sharing. this attack can be launched by hackers if cloud provider does not enforce strict mechanism to isolate shared resources such as memory, storage, and reputation of different customers or hosts . Failing to separate tenants (customers) can certainly facilitate this type of attack and thereby allow malicious hackers to hop on other hosts to compromise other customers’ data and gain illegal access to it. This attack can be particularly dangerous for public clouds and the PaaS model where multiple clients share the same physical machine. Attackers can cause severe damage that could range from compromising sensitive customer data to interrupting service for cloud providers and distorting their image and reputation. CloudSecurity Dr. Neeraj Kumar Pandey
  • 42.  Malicious Insider and Abuse of Privileges: The shared and multi-tenancy nature of cloud computing creates a fertile ground for insider threat and promotes risk of “privilege abuse” to confidential customer information. Hosting sensitive information from multiple clients on the same physical machine certainly entices users with high privilege roles such as system administrators and information security managers to abuse their privileged access to clients’ sensitive data and the possibility of leaking or selling that information to competitors or other parties of interest. CloudSecurity Dr. Neeraj Kumar Pandey
  • 43. Identity Theft Attacks. Malicious hackers can easily set up accounts with cloud providers to use cloud resources by simply paying for the usage without any restrictions or limits from cloud vendors on resource consumption or workloads. Attackers can exploit this advantage to use and compromise customer’s critical information and sell it for a price. CloudSecurity Dr. Neeraj Kumar Pandey
  • 44.  Service Engine Attacks. The service engine is a highly customized platform that sits above the physical layer and characterizes the underlying cloud architecture; this service engine is normally controlled by cloud provider to mange customer resources but it can be rented by potential customers who wish to use and adopt the IaaS model. Hackers can abuse this feature by subscribing to the IaaS model and renting a virtual machine that would be hosted and controlled by the service engine; then they can use the VM to hack the service engine from the inside and use the service engine to their advantage where it may contain sensitive business information through other VMs from other cloud subscribers. CloudSecurity Dr. Neeraj Kumar Pandey
  • 45. Dr. Neeraj Kumar Pandey CloudSecurity
  • 46. Dr. Neeraj Kumar Pandey CloudSecurity
  • 47.  Threats  Including the cloud in your perimeter  Lets attackers inside the perimeter  Prevents mobile users from accessing the cloud directly  Not including the cloud in your perimeter  Essential services aren’t trusted  No access controls on cloud  Countermeasures  Drop the perimeter model! Dr. Neeraj Kumar Pandey CloudSecurity
  • 48.  Threat  Disconnected provider and customer security systems  Fired employee retains access to cloud  Misbehavior in cloud not reported to customer  Countermeasures  At least, integrate identity management  Consistent access controls  Better, integrate monitoring and notifications  Notes  Can use SAML(Security Assertion Markup Language), LDAP(Lightweight Directory Access Protocol), RADIUS(Remote Authentication Dial-In User Service), XACML(eXtensible Access Control Markup Language), IF-MAP( Interface for Metadata Access Points), etc. Dr. Neeraj Kumar Pandey CloudSecurity