Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cloud Computing Security

43,106 views

Published on

Cloud Computing with Encryption & Key Management.

Published in: Technology
  • See how I make over $7,293 a month from home doing REAL online jobs! ♣♣♣ http://ishbv.com/ezpayjobs/pdf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Dating direct: ❶❶❶ http://bit.ly/2ZDZFYj ❶❶❶
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Follow the link, new dating source: ❶❶❶ http://bit.ly/2ZDZFYj ❶❶❶
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • STOP GETTING RIPPED OFF! LEARN THE SHOCKING TRUTH ABOUT Uterine Fibroids, DRUGS AND SURGERIES... To get the FACTS on exactly how to eliminate your Uterine Fibroids from the root 100% naturally and Permanently and achieve LASTING freedom from PCOS related symptoms without spending your hard-earned money on drugs and over the counters... ★★★ http://t.cn/Aig7c6mX
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Very Nice, If you want more good Presentations Please visit www.ThesisScientist.com, Its a wonderful website for latest Presentations and Research
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Cloud Computing Security

  1. 1. Ninh V. Nguyen<br />ninh.nv@gmail.com<br />
  2. 2. The Hype<br />Cluster Computing<br />Cloud Computing<br />Grid Computing <br />
  3. 3.
  4. 4. “What the hell is Cloud Computing?”<br />- Larry Ellison<br />
  5. 5. 5th Generation of Computing<br /> 1970s 1980s 1990s 2000s 2009+<br />Monolithic Client-Server Web SOA Cloud Services<br />
  6. 6. Wikipedia’s Definitions<br />Cloud computing is a computing paradigm shift where computing is moved away<br />from personal computers or an individual server to a “cloud” of computers. <br />– 12/2007<br />Cloud computing is Internet-based (&quot;cloud&quot;) development and use of computer<br />Technology (&quot;computing&quot;). The cloud is a metaphor for the Internet, based on how<br />it is depicted in computer network diagrams, and is an abstraction for the complex<br />infrastructure it conceals. <br />– 12/2008<br />Cloud computing is a style of computing in which dynamically scalable and often<br />virtualized resources are provided as a service over the Internet. <br />– 6/2009<br />Cloud computing is an example of computing in which dynamically scalable and<br />often virtualized resources are provided as a service over the Internet. <br />- Now<br />
  7. 7. Common implies multi-tenancy, not single or isolated tenancy <br />Location-independent<br />Online<br />Utility implies pay-for-use pricing<br />Demand implies ~infinite, ~immediate, ~invisible scalability<br />
  8. 8. Cloud Computing Infrastructure Models<br />
  9. 9. Public Cloud<br />Public Cloud<br />The Cloud Provider<br />The Cloud Provider<br />SME<br />Hybrid Cloud<br />Connectivity<br />(Network Access)<br />SME<br />Enterprise<br />Private Cloud<br />Enterprise<br />SME<br />Private Cloud<br />
  10. 10. Architectural Layers of Cloud Computing<br />
  11. 11. Software as a Service (SaaS)<br />
  12. 12. Platform as a Service (PaaS)<br />
  13. 13. Infrastructure as a Service (IaaS)<br />
  14. 14.
  15. 15. Cloud Computing Characteristics<br />
  16. 16. Comparisons<br />
  17. 17. Cloud Computing Economics<br />Traditional IT<br />Variable Costs<br />(OpEx)<br />Cloud Computing<br />Fixed Costs<br />(CapEx)<br />Costs<br />Variable Costs<br />(OpEx)<br />Users<br />
  18. 18. Pros and Cons<br />
  19. 19. Cloud Computing Security<br />
  20. 20. A Cloud Technology Reference Model<br />Your Application<br />Testing, Monitoring, Diagnostics and Verification<br />Governance<br />Architectural Views<br />Your<br />Problem<br />Life Cycle<br />(Birth, Growth, Failure, Recovery, Death)<br />Web of Metadata<br />Categories, Capabilities, Configuration and Dependencies<br />Resource Management<br />Basic Monitoring<br />Facilities & Logistics<br />Element Management<br />(Split Responsibility)<br />Their<br />Problem<br />Software & Hardware Infrastructure<br />
  21. 21. Software as a Service<br />Application<br />Application<br />Server<br />Middleware<br />Database<br />Operating System<br />Hypervisor<br />CPU<br />Networking<br />Storage<br />YOUR DATA<br />Backup<br />Datacenter (Power, Cooling, Physical Security)<br />Your Problem<br />Their Problem<br />
  22. 22. Platform as a Service<br />Your Application<br />Application<br />Server<br />Middleware<br />Database<br />Operating System<br />Hypervisor<br />CPU<br />Networking<br />Storage<br />Backup<br />Datacenter (Power, Cooling, Physical Security)<br />Your Problem<br />Their Problem<br />
  23. 23. Infrastructure as a Service<br />Your Application<br />Your<br />Application<br />Server<br />Your<br />Middleware<br />Your<br />Database<br />Your Operating System<br />Hypervisor<br />CPU<br />Networking<br />Storage<br />Backup<br />Datacenter (Power, Cooling, Physical Security)<br />Your Problem<br />Their Problem<br />
  24. 24. Security Issues<br />
  25. 25. Overview<br />
  26. 26. Selected Issues<br />
  27. 27. Encryption & Key Management<br />Encryption on Storage<br />Storage<br />Encryption on Transmission<br />Key Management<br />Internet<br />
  28. 28. Case Study<br />Amazon Web Services (AWS)<br />
  29. 29. AWS Registration and Security<br />
  30. 30. X.509 Certificate<br />
  31. 31. Multi-Factor Authentication<br />AWS Multi-Factor Authentication (AWS MFA)<br />
  32. 32. Request Authentication<br />with HMAC-SHA1 (1)<br />
  33. 33. Request Authentication<br />with HMAC-SHA1 (2)<br />
  34. 34. HMAC-SHA1<br />
  35. 35. Summary & Predictions<br />.. We think everyone on the planet deserves to have their own<br />virtual data center in the cloud ..<br />- Lew Tucker<br />..Cloud Computing Will Be As Influential As E-business.. <br />- Gartner<br />.. one of the most important transformations the federal<br />government will go through in the next decade ..<br />- Obama’s TIGR Team<br />.. Who knew that the concept of security in cloud computing was<br />even possible to imagine?..<br />- Scott Bradner<br />
  36. 36.
  37. 37. Thank You<br />

×