SlideShare a Scribd company logo
Current Security 
Issues for cloud computing
Contents 
• Introduction 
• Cloud models 
• Security Issues 
• Conclusion 
• References
WHAT IS CLOUD COMPUTING??? 
• Features 
– Use of internet-based services to support business process 
– Rent IT-services on a utility-like basis 
• Attributes 
– Rapid deployment 
– Low startup costs/ capital investments 
– Costs based on usage or subscription 
– Multi-tenant sharing of services/ resources 
• Essential characteristics 
– On demand self-service(just-in-time availability of resources”) 
– Ubiquitous network access 
– Location independent resource pooling 
– Rapid elasticity 
– Measured service 
Source: NIST
Cloud Models 
• Delivery Models 
– SaaS 
– PaaS 
– IaaS 
• Deployment Models 
• Public cloud: 
• multiple customers share the computing resources provided by a single service 
provider. 
• Private cloud: 
• computing resources are used and controlled by a private enterprise. 
• Hybrid cloud: 
• A third type can be hybrid cloud that is typical combination of public and private cloud. 
• Community cloud: 
• Several organizations jointly construct and share the same cloud .
Problems Associated with Cloud 
Computing 
• Most security problems stem from: 
– Loss of control 
– Lack of trust (mechanisms) 
– Multi-tenancy 
SECURITY ISSUES: 
• Network security. 
• Interfaces. 
• Data Security. 
• Virtualization. 
• Governance
1.Network security 
Problems associated with network communications and configurations 
regarding cloud computing infrastructures. 
(a)Transfer security: 
Distributed architectures,massive resource sharing and virtual machine(VM) 
instances synchronization imply more data in transit in the cloud,VPN(virtual 
private network)( mehanism.dropbox) 
(b) Firewalling: (yotta networks) 
Firewalls protect the provider’s internal cloud infrastructure against 
insiders and outsiders.
2.Data security 
Is Data Secure??? 
Protection of data in terms of confidentiality. 
(a) Cryptography:-Most employed practice to secure sensitive 
data. 
1.Keep cloud credentials safe. 
2.Keep encrypted data.(encrytion keys). 
(b) Redundancy: Essential to avoid data loss. 
(c) Disposal: 
Elementary data disposal techniques are the insufficient and commonly 
referred a deletion .
3.Virtualization 
• Virtualization is an essential technological characteristic of clouds 
which hides the technological complexity from the user and 
enables enhanced flexibility (through Aggregation, Routing and 
Translation). 
• (a) Isolation:-Although logically isolated, all VMs share the same 
hardware and consequently the same resources. 
• (b) Data leakage: Exploit hypervisor vulnerabilities and lack of 
isolation controls in order to leak data from virtualized infrastructures
. 
(c) VM identification: Lack of controls for identifying virtual machines 
that are being used for executing a specific process or for storing 
files. 
(d) Cross-VM attacks:-Includes attempts to estimate provider traffic 
rates in order to steal cryptographic keys and increase chances of 
VM placement attacks.
4.Interfaces 
Concentrates all issues related to user administrative. 
(a) API:- Programming interfaces for accessing virtualized resources. 
(b) Administrative interface: 
Enables remote control of resources in an IaaS development 
for PaaS and application tools for SaaS. 
(c) User interface:-End-user interface for exploring provided resources 
and tools(the service itself). 
(d) Authentication:-Mechanisms required to enable access to the 
Cloud.
5.Governance 
• Issues related to (losing) administrative and security cloud 
computing solutions. 
• (a) Data control:- 
• Moving data to the cloud means losing control over redundancy. 
– Data, applications, resources are located with provider 
– User identity management is handled by the cloud 
– User access control rules, security policies and enforcement are 
managed by the cloud provider 
– Consumer relies on provider to ensure 
Data security and privacy 
(b) Security control:- 
Loss of governance over security mechanisms and policies.
• (c) Lock-in: 
• User potential dependency on a particular service provider due to 
lack of well-established standards ,consequently becoming 
particularly vulnerable to migrations and service termination.
Conclusion 
• Cloud computing is sometimes viewed as a reincarnation 
of the classic mainframe client-server model 
– However, resources are ubiquitous, scalable, highly virtualized 
– Contains all the traditional threats, as well as new ones 
• The main goal is to securely store and manage data that 
is not controlled by the owner of the data
References 
1. NIST (Authors: P. Mell and T. Grance), "The NIST Definition of 
Cloud Computing (ver. 15)," National Institute of Standards and 
Technology, Information Technology Laboratory (October 7 
2009). 
2. J. McDermott, (2009) "Security Requirements for Virtualization in 
Cloud Computing," presented at the ACSAC Cloud Security 
Workshop, Honolulu, Hawaii, USA, 2009. 
3. J. Camp. (2001), “Trust and Risk in Internet Commerce,”
security Issues of cloud computing

More Related Content

What's hot

Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
Akhila Param
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
Animesh Chaturvedi
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
Stelios Krasadakis
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
veena venugopal
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
Devyani Vaidya
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
krprashant94
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
tmather
 
Cloud security
Cloud securityCloud security
Cloud security
Niharika Varshney
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Fundamental Cloud Security
Fundamental Cloud SecurityFundamental Cloud Security
Fundamental Cloud Security
Mohammed Sajjad Ali
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
Antonio Sanz Alcober
 
Cloud security
Cloud securityCloud security
Cloud security
Tushar Kayande
 
Cloud security
Cloud securityCloud security
Cloud security
BikashPokharel3
 
Cloud computing
Cloud computingCloud computing
Cloud computing
DebrajKarmakar
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
 
Privacy issues in the cloud
Privacy issues in the cloudPrivacy issues in the cloud
Privacy issues in the cloud
Constantine Karbaliotis
 

What's hot (20)

Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
 
Cloud security
Cloud securityCloud security
Cloud security
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Fundamental Cloud Security
Fundamental Cloud SecurityFundamental Cloud Security
Fundamental Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Privacy issues in the cloud
Privacy issues in the cloudPrivacy issues in the cloud
Privacy issues in the cloud
 

Similar to security Issues of cloud computing

4831586.ppt
4831586.ppt4831586.ppt
4831586.ppt
ahmad21315
 
Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02
abhisheknayak29
 
Introduction to Cloud Security.pptx
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptx
ssuser0fc2211
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
Shalini Toluchuri
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
ImpactGenshin3
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
ahmad abdelhafeez
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
GovCloud Network
 
12-cloud-security.ppt
12-cloud-security.ppt12-cloud-security.ppt
12-cloud-security.ppt
chelsi33
 
Cloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concernsCloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concerns
Vaibhav Khanna
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
Rubal Sagwal
 
Basics of cloud
Basics of cloudBasics of cloud
Basics of cloud
Syborg Services
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
ARJUNMUKHERJEE27
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
ssuser3be95f
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
NaradaDilshan
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
Sameer Ali
 
Cloud complete
Cloud completeCloud complete
Cloud complete
Muhammad Rehan
 
cloud-complete power point presentation for digital signature
cloud-complete power point presentation for digital signaturecloud-complete power point presentation for digital signature
cloud-complete power point presentation for digital signature
ArunsunaiComputer
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
sarahabbas40
 
Cloud complete
Cloud completeCloud complete
Cloud complete
Navriti
 
Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concerns
Mrinal Baowaly
 

Similar to security Issues of cloud computing (20)

4831586.ppt
4831586.ppt4831586.ppt
4831586.ppt
 
Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02
 
Introduction to Cloud Security.pptx
Introduction to Cloud Security.pptxIntroduction to Cloud Security.pptx
Introduction to Cloud Security.pptx
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
12-cloud-security.ppt
12-cloud-security.ppt12-cloud-security.ppt
12-cloud-security.ppt
 
Cloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concernsCloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concerns
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Basics of cloud
Basics of cloudBasics of cloud
Basics of cloud
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
Cloud complete
Cloud completeCloud complete
Cloud complete
 
cloud-complete power point presentation for digital signature
cloud-complete power point presentation for digital signaturecloud-complete power point presentation for digital signature
cloud-complete power point presentation for digital signature
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cloud complete
Cloud completeCloud complete
Cloud complete
 
Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concerns
 

Recently uploaded

Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

security Issues of cloud computing

  • 1. Current Security Issues for cloud computing
  • 2. Contents • Introduction • Cloud models • Security Issues • Conclusion • References
  • 3. WHAT IS CLOUD COMPUTING??? • Features – Use of internet-based services to support business process – Rent IT-services on a utility-like basis • Attributes – Rapid deployment – Low startup costs/ capital investments – Costs based on usage or subscription – Multi-tenant sharing of services/ resources • Essential characteristics – On demand self-service(just-in-time availability of resources”) – Ubiquitous network access – Location independent resource pooling – Rapid elasticity – Measured service Source: NIST
  • 4. Cloud Models • Delivery Models – SaaS – PaaS – IaaS • Deployment Models • Public cloud: • multiple customers share the computing resources provided by a single service provider. • Private cloud: • computing resources are used and controlled by a private enterprise. • Hybrid cloud: • A third type can be hybrid cloud that is typical combination of public and private cloud. • Community cloud: • Several organizations jointly construct and share the same cloud .
  • 5.
  • 6. Problems Associated with Cloud Computing • Most security problems stem from: – Loss of control – Lack of trust (mechanisms) – Multi-tenancy SECURITY ISSUES: • Network security. • Interfaces. • Data Security. • Virtualization. • Governance
  • 7. 1.Network security Problems associated with network communications and configurations regarding cloud computing infrastructures. (a)Transfer security: Distributed architectures,massive resource sharing and virtual machine(VM) instances synchronization imply more data in transit in the cloud,VPN(virtual private network)( mehanism.dropbox) (b) Firewalling: (yotta networks) Firewalls protect the provider’s internal cloud infrastructure against insiders and outsiders.
  • 8. 2.Data security Is Data Secure??? Protection of data in terms of confidentiality. (a) Cryptography:-Most employed practice to secure sensitive data. 1.Keep cloud credentials safe. 2.Keep encrypted data.(encrytion keys). (b) Redundancy: Essential to avoid data loss. (c) Disposal: Elementary data disposal techniques are the insufficient and commonly referred a deletion .
  • 9. 3.Virtualization • Virtualization is an essential technological characteristic of clouds which hides the technological complexity from the user and enables enhanced flexibility (through Aggregation, Routing and Translation). • (a) Isolation:-Although logically isolated, all VMs share the same hardware and consequently the same resources. • (b) Data leakage: Exploit hypervisor vulnerabilities and lack of isolation controls in order to leak data from virtualized infrastructures
  • 10. . (c) VM identification: Lack of controls for identifying virtual machines that are being used for executing a specific process or for storing files. (d) Cross-VM attacks:-Includes attempts to estimate provider traffic rates in order to steal cryptographic keys and increase chances of VM placement attacks.
  • 11. 4.Interfaces Concentrates all issues related to user administrative. (a) API:- Programming interfaces for accessing virtualized resources. (b) Administrative interface: Enables remote control of resources in an IaaS development for PaaS and application tools for SaaS. (c) User interface:-End-user interface for exploring provided resources and tools(the service itself). (d) Authentication:-Mechanisms required to enable access to the Cloud.
  • 12. 5.Governance • Issues related to (losing) administrative and security cloud computing solutions. • (a) Data control:- • Moving data to the cloud means losing control over redundancy. – Data, applications, resources are located with provider – User identity management is handled by the cloud – User access control rules, security policies and enforcement are managed by the cloud provider – Consumer relies on provider to ensure Data security and privacy (b) Security control:- Loss of governance over security mechanisms and policies.
  • 13. • (c) Lock-in: • User potential dependency on a particular service provider due to lack of well-established standards ,consequently becoming particularly vulnerable to migrations and service termination.
  • 14. Conclusion • Cloud computing is sometimes viewed as a reincarnation of the classic mainframe client-server model – However, resources are ubiquitous, scalable, highly virtualized – Contains all the traditional threats, as well as new ones • The main goal is to securely store and manage data that is not controlled by the owner of the data
  • 15. References 1. NIST (Authors: P. Mell and T. Grance), "The NIST Definition of Cloud Computing (ver. 15)," National Institute of Standards and Technology, Information Technology Laboratory (October 7 2009). 2. J. McDermott, (2009) "Security Requirements for Virtualization in Cloud Computing," presented at the ACSAC Cloud Security Workshop, Honolulu, Hawaii, USA, 2009. 3. J. Camp. (2001), “Trust and Risk in Internet Commerce,”

Editor's Notes

  1. Government and Military sectors: complicated procurement rules and stringent security requirements Cloud-based categories: Cloud-based applications (SAAS) Cloud-based development (e.g. Google App Engine) Cloud-based infrastructure (e.g. Amazon’s EC2)
  2. Trust and tenancy issues as well as loss of control related to the management model
  3. Data mobility: the abiltiy to share data between cloud services Where does data reside? - out-of-state, out-of-country issues Security Concerns for government in particular FISMA How to certify and accredit cloud computing providers under FISMA (e.g. ISO 27001)