SlideShare a Scribd company logo
1 of 24
BY:-
VIPUL GUPTA
0702913116BY:
VIPUL GUPTA
 What is CLOUD?
 Advantages of Cloud
 Major concerns in Cloud Security
 Foundations to understand Threats
 Understanding Threats
 Government’s role
 SERVICE LEVEL AGREEMENT
 Conclusion & Future Work
In June 2009, a study conducted by VersionOne found
that 41% of senior IT professionals actually don't know
what cloud computing is and two-thirds of senior finance
professionals are confused by the concept, highlighting the
young nature of the technology
…the idea of relying on
Web-based application and
storing data in the
“CLOUD” of the internet.
The cloud is a smart,
complex, powerful
computing system in
the sky that people can
just plug into.
It starts with the
premise that the data
services and
architecture should be
on the servers. We call
it Cloud Computing –
they should be in a
“CLOUD” somewhere
Cloud computing is Web-based
processing, whereby shared
resources, software, and information
are provided to computers and other
devices (such as smartphones) on
demand over the Internet.
 “Cloud” is simply a
metaphor for the internet
 Users do not have or need
knowledge, control,
ownership in the computer
infrastructure
 Users simply rent or access
the software, paying only for
what they use
Authentication
Trust on vendor
data privacy
 Defines how to provide integrity, confidentiality andintegrity, confidentiality and
authenticationauthentication for SOAP messages
 Defines a SOAP header (Security) that carries the WS-
Security extensions
 Defines how existing XML security standards like XML
Signature and XML Encryption are applied to SOAP
messages
 XML Encryption allows XML fragments to be encrypted to
ensure data confidentiality
 The encrypted fragment is replaced by an EncryptedData
element containing the ciphertext of the encrypted fragment as
content
 XML Encryption defines an Encrypted- Key element for
key transportation purposes
 WS-Security defines security tokens suitable for
transportation of digital identities
 Example: X.509 certificates
 Also known by the name “ SECURE SOCKET
LAYER(SSL)”
 Consist of two parts:
 The Record Layer encrypts/decrypts TCP data streams using
the algorithms and keys negotiated in the TLS Handshake
 TLS Handshake :used to authenticate the server and
optionally the client
 Most important cryptographic protocol worldwide,
implemented in every web browser
TLS configuration
FAILS for
PHISHING
Attacks
 A well known type of attacks called:
• XML Signature Element Wrapping
 Discovered by McIntosh and Austel in 2005
Until 2008, this attacks remained theoretical and no
real-life wrapping attack became public
 In 2008 it was discovered that Amazon’s EC2 services
was vulnerable to wrapping attacks
 Web browsers can not directly make use of XML
Signature or XML Encryption: data can only be
encrypted through TLS, and signatures are only used
within the TLS handshake
 The Legacy Same Origin Policy:The Legacy Same Origin Policy:
 Concerned if scripts be allowed/disallowed to runConcerned if scripts be allowed/disallowed to run
 Attacks on Browser-based Cloud Authentication:
 Federated Identity Management (FIM) protocols
• Authentication by THIRD PARTY
 National Institute of Standards and Technology (NIST),
an agency of the Commerce Department’s
Technology Administration created a cloud computing
security group
 It promotes “the effective and secure use of the technology
within government and industry by providing
technical guidance and promoting standards”
 NIST has recently released its draft “Guide to Adopting and
Using the Security Content Automation Protocol(SCAP)”
 A service level agreement is a document which defines
the relationship between two parties: the provider and
the recipient
 Vendors have to provide some assurance in service level
agreements (SLA) to convince the customer
on security issues
 If used properly it should:
• Identify and define the customer’s needs
• Provide a framework for understanding
• Simplify complex issues
• Reduce areas of conflict
 We investigated on going issues with application of
XML Signature and the Web Services security
frameworks
 Discussed the importance and capabilities of browser
security in the Cloud Computing context
 The threats to Cloud Computing security are
numerous, and each of them requires an in-depth
analysis on their potential impact and relevance to real-
world Cloud Computing scenarios
 Future aspect includes strengthening the security
capabilities of both Web browsers and Web Service
frameworks, at best integrating the latter into the first
 To achieve a recognized and actionable security policy,
SCAP recommends that organizations demonstrate
compliance with security requirements in mandates
such as the US Federal Information Security
Management Act (FISMA)
 On Technical Security Issues in Cloud Computing, Meiko
Jensen, J¨org SchwenkHorst (G¨ortz Institute for IT Security,
Ruhr University Bochum, Germany) and Nils Gruschka,
Luigi Lo Iacono(NEC Laboratories Europe,NEC Europe
Ltd)-IEEE-2009
 Lori M. Kaufman, BAE Systems, IEEE-2009
 Cloud Security Issue ,Balachandra Reddy Kandukuri,
Ramakrishna Paturi V, Dr. Atanu Rakshit, IEEE-2009
 http://csrc.nist.gov/groups/SNS/cloudcomputing/
index.html
QUERIES???QUERIES???
Cloud Computing Security Challenges and Solutions

More Related Content

What's hot

Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for CloudMphasis
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with FogAchu Anna
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityPratik Sharma
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingIOSR Journals
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingAnkit Singh
 
Risk Management in the Cloud
Risk Management in the CloudRisk Management in the Cloud
Risk Management in the CloudDavid X Martin
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Shakas Technologies
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issuesAdv Prashant Mali
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareBitglass
 
Cryptography in Blockchain
Cryptography in BlockchainCryptography in Blockchain
Cryptography in BlockchainEC-Council
 

What's hot (15)

Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud Computing
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
Week12 b
Week12 bWeek12 b
Week12 b
 
Risk Management in the Cloud
Risk Management in the CloudRisk Management in the Cloud
Risk Management in the Cloud
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
 
Cryptography in Blockchain
Cryptography in BlockchainCryptography in Blockchain
Cryptography in Blockchain
 

Viewers also liked

Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concernsMrinal Baowaly
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10Rugby7277
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
We ride and HomeTown Glory
We ride and HomeTown GloryWe ride and HomeTown Glory
We ride and HomeTown GloryAdella1
 
kjnliugfdrtgyuhijuyrdexfcghbjkl.
kjnliugfdrtgyuhijuyrdexfcghbjkl.kjnliugfdrtgyuhijuyrdexfcghbjkl.
kjnliugfdrtgyuhijuyrdexfcghbjkl.Adella1
 
Chapter 3 section 1 power point
Chapter 3 section 1 power pointChapter 3 section 1 power point
Chapter 3 section 1 power pointsherrymariani
 
Mòdul de prescripció electrònica. Casos d'excepció en pediatria
Mòdul de prescripció electrònica. Casos d'excepció en pediatriaMòdul de prescripció electrònica. Casos d'excepció en pediatria
Mòdul de prescripció electrònica. Casos d'excepció en pediatriaInstitut Català de la Salut
 
Roland Harwood: Collaboration not Competition
Roland Harwood: Collaboration not CompetitionRoland Harwood: Collaboration not Competition
Roland Harwood: Collaboration not CompetitionPartner to Succeed
 
Владислав Пучич. «Социальные медиа при организации уличных акций»
Владислав Пучич. «Социальные медиа при организации уличных акций»Владислав Пучич. «Социальные медиа при организации уличных акций»
Владислав Пучич. «Социальные медиа при организации уличных акций»OdessaCamp — баркемп в Одессе
 
Collaborate Cornwall Conference (Morning Session
Collaborate Cornwall Conference (Morning SessionCollaborate Cornwall Conference (Morning Session
Collaborate Cornwall Conference (Morning SessionPartner to Succeed
 
Music DVD Cover Construction
Music DVD Cover Construction Music DVD Cover Construction
Music DVD Cover Construction benjichandra
 
10 thắng cảnh du lịch campuchia
10 thắng cảnh du lịch campuchia10 thắng cảnh du lịch campuchia
10 thắng cảnh du lịch campuchiaCao Hoai Huong
 

Viewers also liked (20)

Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concerns
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Research notes
Research notesResearch notes
Research notes
 
We ride and HomeTown Glory
We ride and HomeTown GloryWe ride and HomeTown Glory
We ride and HomeTown Glory
 
kjnliugfdrtgyuhijuyrdexfcghbjkl.
kjnliugfdrtgyuhijuyrdexfcghbjkl.kjnliugfdrtgyuhijuyrdexfcghbjkl.
kjnliugfdrtgyuhijuyrdexfcghbjkl.
 
HBellvitge. 7PMassatge Infantil CAP Llibertat.pdf
HBellvitge. 7PMassatge Infantil CAP Llibertat.pdfHBellvitge. 7PMassatge Infantil CAP Llibertat.pdf
HBellvitge. 7PMassatge Infantil CAP Llibertat.pdf
 
Una eina bàsica: les TIC
Una eina bàsica: les TICUna eina bàsica: les TIC
Una eina bàsica: les TIC
 
Chapter 3 section 1 power point
Chapter 3 section 1 power pointChapter 3 section 1 power point
Chapter 3 section 1 power point
 
Schizophrenia
SchizophreniaSchizophrenia
Schizophrenia
 
Mòdul de prescripció electrònica. Casos d'excepció en pediatria
Mòdul de prescripció electrònica. Casos d'excepció en pediatriaMòdul de prescripció electrònica. Casos d'excepció en pediatria
Mòdul de prescripció electrònica. Casos d'excepció en pediatria
 
Roland Harwood: Collaboration not Competition
Roland Harwood: Collaboration not CompetitionRoland Harwood: Collaboration not Competition
Roland Harwood: Collaboration not Competition
 
Владислав Пучич. «Социальные медиа при организации уличных акций»
Владислав Пучич. «Социальные медиа при организации уличных акций»Владислав Пучич. «Социальные медиа при организации уличных акций»
Владислав Пучич. «Социальные медиа при организации уличных акций»
 
Collaborate Cornwall Conference (Morning Session
Collaborate Cornwall Conference (Morning SessionCollaborate Cornwall Conference (Morning Session
Collaborate Cornwall Conference (Morning Session
 
Musica en la edad media
Musica en la edad mediaMusica en la edad media
Musica en la edad media
 
Music DVD Cover Construction
Music DVD Cover Construction Music DVD Cover Construction
Music DVD Cover Construction
 
Lenguaje2 tomo2
Lenguaje2 tomo2Lenguaje2 tomo2
Lenguaje2 tomo2
 
10 thắng cảnh du lịch campuchia
10 thắng cảnh du lịch campuchia10 thắng cảnh du lịch campuchia
10 thắng cảnh du lịch campuchia
 

Similar to Cloud Computing Security Challenges and Solutions

Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms IJECEIAES
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Jayanth Dwijesh H P
 
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...csandit
 
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...cscpconf
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Trusted computing for infrastructure
Trusted computing for infrastructureTrusted computing for infrastructure
Trusted computing for infrastructureEricsson
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computingsashi799
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
 

Similar to Cloud Computing Security Challenges and Solutions (20)

Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
 
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Trusted computing for infrastructure
Trusted computing for infrastructureTrusted computing for infrastructure
Trusted computing for infrastructure
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 

More from Wipro

The Big Idea Business Plan Contest by V-GUARD
The Big Idea Business Plan Contest by V-GUARDThe Big Idea Business Plan Contest by V-GUARD
The Big Idea Business Plan Contest by V-GUARDWipro
 
V Create Anarchy_HUL LIME Season 7_IIM Kozhikode
V Create Anarchy_HUL LIME Season 7_IIM KozhikodeV Create Anarchy_HUL LIME Season 7_IIM Kozhikode
V Create Anarchy_HUL LIME Season 7_IIM KozhikodeWipro
 
Mahindra War room Season 8 | Aaj K Vijeta | IIM Kozhikode | Club Mahindra
Mahindra War room Season 8 | Aaj K Vijeta | IIM Kozhikode | Club MahindraMahindra War room Season 8 | Aaj K Vijeta | IIM Kozhikode | Club Mahindra
Mahindra War room Season 8 | Aaj K Vijeta | IIM Kozhikode | Club MahindraWipro
 
Renault duster vs ford ecosport
Renault duster vs ford ecosportRenault duster vs ford ecosport
Renault duster vs ford ecosportWipro
 
Different forms of capital punishment
Different forms of capital punishmentDifferent forms of capital punishment
Different forms of capital punishmentWipro
 
Grid computing
Grid computingGrid computing
Grid computingWipro
 
Competitive Strategy Analysis of Amazon, Deloitte & HUL
Competitive Strategy Analysis of Amazon, Deloitte & HULCompetitive Strategy Analysis of Amazon, Deloitte & HUL
Competitive Strategy Analysis of Amazon, Deloitte & HULWipro
 
Lan chat system
Lan chat systemLan chat system
Lan chat systemWipro
 

More from Wipro (9)

The Big Idea Business Plan Contest by V-GUARD
The Big Idea Business Plan Contest by V-GUARDThe Big Idea Business Plan Contest by V-GUARD
The Big Idea Business Plan Contest by V-GUARD
 
V Create Anarchy_HUL LIME Season 7_IIM Kozhikode
V Create Anarchy_HUL LIME Season 7_IIM KozhikodeV Create Anarchy_HUL LIME Season 7_IIM Kozhikode
V Create Anarchy_HUL LIME Season 7_IIM Kozhikode
 
Mahindra War room Season 8 | Aaj K Vijeta | IIM Kozhikode | Club Mahindra
Mahindra War room Season 8 | Aaj K Vijeta | IIM Kozhikode | Club MahindraMahindra War room Season 8 | Aaj K Vijeta | IIM Kozhikode | Club Mahindra
Mahindra War room Season 8 | Aaj K Vijeta | IIM Kozhikode | Club Mahindra
 
Renault duster vs ford ecosport
Renault duster vs ford ecosportRenault duster vs ford ecosport
Renault duster vs ford ecosport
 
Different forms of capital punishment
Different forms of capital punishmentDifferent forms of capital punishment
Different forms of capital punishment
 
Grid computing
Grid computingGrid computing
Grid computing
 
Competitive Strategy Analysis of Amazon, Deloitte & HUL
Competitive Strategy Analysis of Amazon, Deloitte & HULCompetitive Strategy Analysis of Amazon, Deloitte & HUL
Competitive Strategy Analysis of Amazon, Deloitte & HUL
 
Lan chat system
Lan chat systemLan chat system
Lan chat system
 
YOU
YOUYOU
YOU
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Cloud Computing Security Challenges and Solutions

  • 2.  What is CLOUD?  Advantages of Cloud  Major concerns in Cloud Security  Foundations to understand Threats  Understanding Threats  Government’s role  SERVICE LEVEL AGREEMENT  Conclusion & Future Work
  • 3. In June 2009, a study conducted by VersionOne found that 41% of senior IT professionals actually don't know what cloud computing is and two-thirds of senior finance professionals are confused by the concept, highlighting the young nature of the technology
  • 4. …the idea of relying on Web-based application and storing data in the “CLOUD” of the internet. The cloud is a smart, complex, powerful computing system in the sky that people can just plug into. It starts with the premise that the data services and architecture should be on the servers. We call it Cloud Computing – they should be in a “CLOUD” somewhere Cloud computing is Web-based processing, whereby shared resources, software, and information are provided to computers and other devices (such as smartphones) on demand over the Internet.
  • 5.  “Cloud” is simply a metaphor for the internet  Users do not have or need knowledge, control, ownership in the computer infrastructure  Users simply rent or access the software, paying only for what they use
  • 6.
  • 8.
  • 9.  Defines how to provide integrity, confidentiality andintegrity, confidentiality and authenticationauthentication for SOAP messages  Defines a SOAP header (Security) that carries the WS- Security extensions  Defines how existing XML security standards like XML Signature and XML Encryption are applied to SOAP messages
  • 10.
  • 11.  XML Encryption allows XML fragments to be encrypted to ensure data confidentiality  The encrypted fragment is replaced by an EncryptedData element containing the ciphertext of the encrypted fragment as content  XML Encryption defines an Encrypted- Key element for key transportation purposes  WS-Security defines security tokens suitable for transportation of digital identities  Example: X.509 certificates
  • 12.  Also known by the name “ SECURE SOCKET LAYER(SSL)”  Consist of two parts:  The Record Layer encrypts/decrypts TCP data streams using the algorithms and keys negotiated in the TLS Handshake  TLS Handshake :used to authenticate the server and optionally the client  Most important cryptographic protocol worldwide, implemented in every web browser
  • 13.
  • 15.  A well known type of attacks called: • XML Signature Element Wrapping  Discovered by McIntosh and Austel in 2005 Until 2008, this attacks remained theoretical and no real-life wrapping attack became public  In 2008 it was discovered that Amazon’s EC2 services was vulnerable to wrapping attacks
  • 16.
  • 17.  Web browsers can not directly make use of XML Signature or XML Encryption: data can only be encrypted through TLS, and signatures are only used within the TLS handshake  The Legacy Same Origin Policy:The Legacy Same Origin Policy:  Concerned if scripts be allowed/disallowed to runConcerned if scripts be allowed/disallowed to run  Attacks on Browser-based Cloud Authentication:  Federated Identity Management (FIM) protocols • Authentication by THIRD PARTY
  • 18.  National Institute of Standards and Technology (NIST), an agency of the Commerce Department’s Technology Administration created a cloud computing security group  It promotes “the effective and secure use of the technology within government and industry by providing technical guidance and promoting standards”  NIST has recently released its draft “Guide to Adopting and Using the Security Content Automation Protocol(SCAP)”
  • 19.  A service level agreement is a document which defines the relationship between two parties: the provider and the recipient  Vendors have to provide some assurance in service level agreements (SLA) to convince the customer on security issues  If used properly it should: • Identify and define the customer’s needs • Provide a framework for understanding • Simplify complex issues • Reduce areas of conflict
  • 20.  We investigated on going issues with application of XML Signature and the Web Services security frameworks  Discussed the importance and capabilities of browser security in the Cloud Computing context  The threats to Cloud Computing security are numerous, and each of them requires an in-depth analysis on their potential impact and relevance to real- world Cloud Computing scenarios
  • 21.  Future aspect includes strengthening the security capabilities of both Web browsers and Web Service frameworks, at best integrating the latter into the first  To achieve a recognized and actionable security policy, SCAP recommends that organizations demonstrate compliance with security requirements in mandates such as the US Federal Information Security Management Act (FISMA)
  • 22.  On Technical Security Issues in Cloud Computing, Meiko Jensen, J¨org SchwenkHorst (G¨ortz Institute for IT Security, Ruhr University Bochum, Germany) and Nils Gruschka, Luigi Lo Iacono(NEC Laboratories Europe,NEC Europe Ltd)-IEEE-2009  Lori M. Kaufman, BAE Systems, IEEE-2009  Cloud Security Issue ,Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Dr. Atanu Rakshit, IEEE-2009  http://csrc.nist.gov/groups/SNS/cloudcomputing/ index.html

Editor's Notes

  1. 2. MIT Technology Review 3.Web browser pioneer Marc Andreessen 4. Eric schmidt( Chairman/CEO of Google Inc )
  2. The cloud metaphor is actually a good one. A cloud is a huge collection of tiny droplets of water. Some of those droplets will fall on my yard, providing the trees and bushes with water. Some will fall onto land where it will run off into the reservoir which my drinking water comes from. Clouds grow from evaporated water, which comes from all over the place. When it comes to clouds, what I care about is that enough water falls on my yard to keep the plants alive, and that enough water winds up in my reservoir so that I have enough to drink. I don't care which cloud drops water on my yard. I don't care where on earth that water came from. To me, it's all just water - every droplet is pretty much exactly the same, and I can't tell the difference. So long as I get enough, I'm happy.
  3. List goes on!!
  4. Ws=web service
  5. The signing process works as follows: For every message part to be signed a Reference element is created and this message part is canonicalized and hashed . The resulting digest is added into the DigestValue element and a reference to the signed message part is entered into the URI attribute. Finally the SignedInfo element is canonicalized and signed. The result of the signing operation is placed in the SignatureValue element and the Signature element is added to the security header
  6. 2 nd point-> The most common application for an encrypted key is a hybrid encryption : an XML fragment is encrypted with a randomly generated symmetric key, which itself is encrypted using the public key of the message recipient. In SOAP messages, the EncryptedKey element must appear inside the security header
  7. Figures 2 and 3 show a simple example for a wrapping attack to illustrate the concept of this attack. The first figure presents a SOAP message sent by a legitimate client. The SOAP body contains a request for the file “me.jpg” and was signed by the sender. The signature is enclosed in the SOAP header and refers to the signed message fragment using an XPointer to 1. Interestingly, these attacks have been described as early as 1996, but these descriptions were ignored both by the bad and the good guys outside academia. the Id attribute with the value “body”. If an attacker eavesdrops such a message, he can perform the following attack. The original body is moved to a newly inserted wrapping element (giving the attack its name) inside the SOAP header, and a new body is created. This body contains the operation the attacker wants to perform with the original sender’s authorization, here the request for the file “cv.doc”. The resulting message still contains a valid signature of a legitimate user, thus the service executes the modified request.