SlideShare a Scribd company logo
Security in Cloud Computing
Presented by: B.Rohith Kumar
K.Dhana Lakshmi
Visvodaya Institute of Technology and Science
Introduction
• A large-scale distributed computing paradigm that is driven by economies of
scale, in which a pool of abstracted, virtualized, dynamically scalable, managed
computing power, storage, platforms, and services are delivered on demand to
external customers over the Internet.
• Cloud computing is an internet-based computing technology, where shared
resources such as software, platform, storage and information are provided to
customers on demand.
• Current cloud computing systems pose serious limitation to protecting users data
condentiality.
• With the rise of the era of cloud computing, concerns about Internet Security
continue to increase.
Evolution of Cloud Computing
• Cloud computing began to get both awareness and popularity in the early 2000s.
• Cloud computing can refer to Business Intelligence (BI), Complex Event Processing
(CEP),Service-Oriented Architecture (SOA), Software as a Service (SaaS), Web-Oriented
Architecture (WOA), and even Enterprise 2.0.
• To meet this need Google has brought on-line more than a million servers in over 30
data centers across its global network.
• Microsoft is also investing billions to grow its own cloud infrastructure. Microsoft is
currently adding an estimated 20,000 servers a month.
Cloud Architecture
Cloud Infrastructure
IaaS
PaaS
SaaS
Infrastructure as a Service (IaaS)
Architectures
Platform as a Service (PaaS)
Architectures
Software as a Service
(SaaS)
Architectures
Cloud Infrastructure
SaaS
Cloud Infrastructure
PaaS
SaaS
Cloud Infrastructure
IaaS
PaaS
Cloud Infrastructure
PaaS
Cloud Infrastructure
IaaS
Fig: Cloud Deployment Model
Characteristics of Cloud Computing
1. On-demand self-service
2. Broad network access
3. Resource pooling
4. Rapid elasticity
5. Measured service
Security Challenges
1. Outsourcing
oData service outsourcing security
oComputation outsourcing security
2. Multi-tenancy
3. Massive data and intense computation
Need for security in cloud
• Data Security
-It focuses on protecting the software and hardware associated
with the cloud.
• Network Security
-Protecting the network over which cloud is running from various
attacks DOS, DDOS, IP Spoofing, ARP Spoofing and any novel
attacks that intruders may device.
Security and Privacy Attributes
• Cloud Confidentiality
-Condentiality is defined as the assurance that sensitive information
is not disclosed to unauthorized persons, processes, or Devices.
• Cloud Integrity
-Similar to confidentiality, the notion of integrity in cloud computing
concerns both data integrity and computation integrity.
• Cloud Availability
-Availability is crucial since the core function of cloud computing is to
provide on-demand service of different levels.
Security and Privacy Attributes
• Cloud Accountability
-Accountability implies that the capability of identifying a party,
with undeniable evidence, is responsible for specific events.
• Cloud Privacy-Preservability
-Privacy is yet another critical concern with regards to cloud
computing due to the fact that customers data and business logic
reside among distrusted cloud servers, which are owned and
maintained by the cloud provider.
Fig: Security and Privacy Attributes
Advantages of Security
• Protection against DDoS
• Data security
• Regulatory compliance
• Flexibility
• High availability and support
Conclusions
• There are several issues related to storing and managing data, that is not controlled
by owner of the data.
• These issues include cloud integrity, cloud condentiality, cloud availability, cloud
privacy.
• There are several threats to cloud condentiality including Cross-VM attack and
Malicious sysadmin.
• Integrity of cloud is compromised due to data loss and dishonest computation in
remote servers. Denial of Service(Dos) attack is the most common attack which is
also possible in cloud computing network.
• The last issue is cloud privacy and it is similar to cloud condentiality. if cloud
condentiality is at risk, cloud privacy will also be at risk.
Thank You
Any Queries..?

More Related Content

What's hot

Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
Allen Brokken
 
Cloud security
Cloud securityCloud security
Cloud security
BikashPokharel3
 
Cloud computing
Cloud computingCloud computing
Cloud computing
MOHIT PANDEY
 
Cloud computing ppt by Binesh
Cloud computing ppt by BineshCloud computing ppt by Binesh
Cloud computing ppt by Binesh
Binesh
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
prachupanchal
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
hari krishnan.n
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and management
Shamsundar Machale (CISSP, CEH)
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architecture
Mohammad Ilyas Malik
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
 
Cloud security
Cloud security Cloud security
Cloud security
Mohamed Shalash
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Waseem Ahmed
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
Sonali Jain
 
basics of cloud computing
basics of cloud computingbasics of cloud computing
basics of cloud computing
Prof. Jacques Folon (Ph.D)
 
Introduction of microsoft azure
Introduction of microsoft azureIntroduction of microsoft azure
Introduction of microsoft azure
Karthik Perugupalli
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 

What's hot (20)

Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing ppt by Binesh
Cloud computing ppt by BineshCloud computing ppt by Binesh
Cloud computing ppt by Binesh
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and management
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architecture
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Cloud security
Cloud security Cloud security
Cloud security
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
basics of cloud computing
basics of cloud computingbasics of cloud computing
basics of cloud computing
 
Introduction of microsoft azure
Introduction of microsoft azureIntroduction of microsoft azure
Introduction of microsoft azure
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 

Viewers also liked

Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Basil Jacob
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
Discover Cloud Computing
 
Surface Computing
Surface ComputingSurface Computing
Surface Computing
Rohit Buddabathina
 
What Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud SecurityWhat Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud Security
craigbalding
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Cloud computing Brief
Cloud computing BriefCloud computing Brief
Cloud computing Brief
Justin Lee
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multiple
Kiran Kumar
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
Agarwaljay
 
OLED Technology
OLED TechnologyOLED Technology
OLED Technology
Rohit Buddabathina
 
The Complete HTML
The Complete HTMLThe Complete HTML
The Complete HTML
Rohit Buddabathina
 
Walking in the Cloud: A New Paradigm in Geospatial World
Walking in the Cloud: A New Paradigm in Geospatial WorldWalking in the Cloud: A New Paradigm in Geospatial World
Walking in the Cloud: A New Paradigm in Geospatial World
ICIMOD
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
Dan Morrill
 
Web Application Firewall intro
Web Application Firewall introWeb Application Firewall intro
Web Application Firewall introRich Helton
 
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
2009: Securing Applications With Web Application Firewalls and Vulnerability ...2009: Securing Applications With Web Application Firewalls and Vulnerability ...
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
Neil Matatall
 
Cloud computing
Cloud computingCloud computing
Cloud computing
ujjal ahmed
 
Redbullppt
RedbullpptRedbullppt
Redbullppt
Zhou Lingyang
 
0610 m16 qp_42
0610 m16 qp_420610 m16 qp_42
0610 m16 qp_42
Omniya Jay
 

Viewers also liked (19)

Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Surface Computing
Surface ComputingSurface Computing
Surface Computing
 
What Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud SecurityWhat Everyone Ought To Know About Cloud Security
What Everyone Ought To Know About Cloud Security
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud computing Brief
Cloud computing BriefCloud computing Brief
Cloud computing Brief
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multiple
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
OLED Technology
OLED TechnologyOLED Technology
OLED Technology
 
The Complete HTML
The Complete HTMLThe Complete HTML
The Complete HTML
 
Walking in the Cloud: A New Paradigm in Geospatial World
Walking in the Cloud: A New Paradigm in Geospatial WorldWalking in the Cloud: A New Paradigm in Geospatial World
Walking in the Cloud: A New Paradigm in Geospatial World
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
 
Web Application Firewall intro
Web Application Firewall introWeb Application Firewall intro
Web Application Firewall intro
 
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
2009: Securing Applications With Web Application Firewalls and Vulnerability ...2009: Securing Applications With Web Application Firewalls and Vulnerability ...
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Redbullppt
RedbullpptRedbullppt
Redbullppt
 
0610 m16 qp_42
0610 m16 qp_420610 m16 qp_42
0610 m16 qp_42
 

Similar to Security in Cloud Computing

Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
Md Nazrul Islam Roxy
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
MuhammadArslan799356
 
Introduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptxIntroduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptx
sampleid978
 
Scope-of-Cloud-Computing.pptx
Scope-of-Cloud-Computing.pptxScope-of-Cloud-Computing.pptx
Scope-of-Cloud-Computing.pptx
VaibhavYadav297587
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
Cloud security
Cloud securityCloud security
Cloud security
Niharika Varshney
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
GhofraneFerchichi2
 
Cloud Training
Cloud TrainingCloud Training
Cloud Training
softcrayons3
 
Cloud_Ch_01_Handouts(1).pdf
Cloud_Ch_01_Handouts(1).pdfCloud_Ch_01_Handouts(1).pdf
Cloud_Ch_01_Handouts(1).pdf
MeymunaMohammed1
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
BhuvneshYadav13
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
Jahangeer Qadiree
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
BHASKAR CHAUDHURY
 
benefits of cloud computing course
benefits   of   cloud  computing  coursebenefits   of   cloud  computing  course
benefits of cloud computing course
sndshkgowda
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
Ciente
 
Cloud Computing in the Real-World 1.pptx
Cloud Computing in the Real-World 1.pptxCloud Computing in the Real-World 1.pptx
Cloud Computing in the Real-World 1.pptx
ArifKhursheedAcademi
 
cloud computing architecture.pptx
cloud computing architecture.pptxcloud computing architecture.pptx
cloud computing architecture.pptx
SourodeepChakraborty3
 

Similar to Security in Cloud Computing (20)

Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
Introduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptxIntroduction-to-basics of Cloud-Computing.pptx
Introduction-to-basics of Cloud-Computing.pptx
 
Scope-of-Cloud-Computing.pptx
Scope-of-Cloud-Computing.pptxScope-of-Cloud-Computing.pptx
Scope-of-Cloud-Computing.pptx
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Cloud security
Cloud securityCloud security
Cloud security
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
 
Cloud Training
Cloud TrainingCloud Training
Cloud Training
 
Cloud_Ch_01_Handouts(1).pdf
Cloud_Ch_01_Handouts(1).pdfCloud_Ch_01_Handouts(1).pdf
Cloud_Ch_01_Handouts(1).pdf
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
benefits of cloud computing course
benefits   of   cloud  computing  coursebenefits   of   cloud  computing  course
benefits of cloud computing course
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Cloud Computing in the Real-World 1.pptx
Cloud Computing in the Real-World 1.pptxCloud Computing in the Real-World 1.pptx
Cloud Computing in the Real-World 1.pptx
 
cloud computing architecture.pptx
cloud computing architecture.pptxcloud computing architecture.pptx
cloud computing architecture.pptx
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Security in Cloud Computing

  • 1. Security in Cloud Computing Presented by: B.Rohith Kumar K.Dhana Lakshmi Visvodaya Institute of Technology and Science
  • 2. Introduction • A large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the Internet. • Cloud computing is an internet-based computing technology, where shared resources such as software, platform, storage and information are provided to customers on demand. • Current cloud computing systems pose serious limitation to protecting users data condentiality. • With the rise of the era of cloud computing, concerns about Internet Security continue to increase.
  • 3. Evolution of Cloud Computing • Cloud computing began to get both awareness and popularity in the early 2000s. • Cloud computing can refer to Business Intelligence (BI), Complex Event Processing (CEP),Service-Oriented Architecture (SOA), Software as a Service (SaaS), Web-Oriented Architecture (WOA), and even Enterprise 2.0. • To meet this need Google has brought on-line more than a million servers in over 30 data centers across its global network. • Microsoft is also investing billions to grow its own cloud infrastructure. Microsoft is currently adding an estimated 20,000 servers a month.
  • 4. Cloud Architecture Cloud Infrastructure IaaS PaaS SaaS Infrastructure as a Service (IaaS) Architectures Platform as a Service (PaaS) Architectures Software as a Service (SaaS) Architectures Cloud Infrastructure SaaS Cloud Infrastructure PaaS SaaS Cloud Infrastructure IaaS PaaS Cloud Infrastructure PaaS Cloud Infrastructure IaaS
  • 6. Characteristics of Cloud Computing 1. On-demand self-service 2. Broad network access 3. Resource pooling 4. Rapid elasticity 5. Measured service
  • 7. Security Challenges 1. Outsourcing oData service outsourcing security oComputation outsourcing security 2. Multi-tenancy 3. Massive data and intense computation
  • 8. Need for security in cloud • Data Security -It focuses on protecting the software and hardware associated with the cloud. • Network Security -Protecting the network over which cloud is running from various attacks DOS, DDOS, IP Spoofing, ARP Spoofing and any novel attacks that intruders may device.
  • 9. Security and Privacy Attributes • Cloud Confidentiality -Condentiality is defined as the assurance that sensitive information is not disclosed to unauthorized persons, processes, or Devices. • Cloud Integrity -Similar to confidentiality, the notion of integrity in cloud computing concerns both data integrity and computation integrity. • Cloud Availability -Availability is crucial since the core function of cloud computing is to provide on-demand service of different levels.
  • 10. Security and Privacy Attributes • Cloud Accountability -Accountability implies that the capability of identifying a party, with undeniable evidence, is responsible for specific events. • Cloud Privacy-Preservability -Privacy is yet another critical concern with regards to cloud computing due to the fact that customers data and business logic reside among distrusted cloud servers, which are owned and maintained by the cloud provider.
  • 11. Fig: Security and Privacy Attributes
  • 12. Advantages of Security • Protection against DDoS • Data security • Regulatory compliance • Flexibility • High availability and support
  • 13. Conclusions • There are several issues related to storing and managing data, that is not controlled by owner of the data. • These issues include cloud integrity, cloud condentiality, cloud availability, cloud privacy. • There are several threats to cloud condentiality including Cross-VM attack and Malicious sysadmin. • Integrity of cloud is compromised due to data loss and dishonest computation in remote servers. Denial of Service(Dos) attack is the most common attack which is also possible in cloud computing network. • The last issue is cloud privacy and it is similar to cloud condentiality. if cloud condentiality is at risk, cloud privacy will also be at risk.