Cloud Security and Performance Dr Lee Gillam Department of Computing University of Surrey
|
|
- Norah Gray
- 8 years ago
- Views:
Transcription
1 Cloud Security and Performance Dr Lee Gillam Department of Computing University of Surrey
2 Motivation 1 Security and performance (resilience) are key Cloud issues... and price. See, for example, the Cloud Circle report:
3 Motivation 2 Deperimeterization of any kind presents risks, not least to Intellectual Property 9.2bn for UK OCSIA/Detica report notion of insider assistance vs $300bn recently mooted in US study The National Bureau of Asian Research - literally copy patents from any country and have them filed and granted in China as a utility model patent
4 Motivation 2 Deperimeterization is inherent in Supply Chains and in Cloud. So, who is an insider? (How) Do we control them? How do we detect leaks?
5 Structure Part 1: When perimeters down, information can leak. Policing (monitoring) versus command and control But can you search for what you don t want to expose? Part 2: Are all Clouds (infrastructures) made the same. What can you expect in performance So why should prices be static?
6 PART 1: CLOUD SECURITY
7 General Cloud Security Protect data in transit - Protect data at rest - Design for privacy Protect Cloud credentials (e.g. AWS keys / certificates / login ) Secure your application, O/S etc. Secure the wetware? Adapted from:
8 From /var/log/auth.log (ssh open ) Apr 22 21:10:09 ip sshd[14681]: Failed password for invalid user harvey from port ssh2 Apr 22 21:14:54 ip sshd[14683]: Failed password for invalid user hasok from port ssh2 Apr 22 21:19:41 ip sshd[14688]: Failed password for invalid user hassan from port ssh2 Apr 22 22:21:39 ip sshd[14717]: Failed password for invalid user helen from port ssh2 Apr 22 22:26:25 ip sshd[14719]: Failed password for invalid user helena from port ssh2
9 Cloud Security Privacy Design Strict separation of sensitive data from nonsensitive; encryption of sensitive. See: Reese, p80 et seq. And heterogeneous systems good! Organisation-centric consideration: - customer data? (77m users of the PlayStation) Addresses without names? Credit card numbers without names / CCV?
10 Cloud Security - Tokenization Systematic data substitution generate randomly Credit Card Number: Tokenized Card Number Secure the lookup, use tokenized value everywhere. Cannot derive data from token. Credit Card Number: Encrypted Card Number Azk92l1f#*xz&#Ynv#*. Hashed Card Number 6cba83a85a32ac45be69bb23cee7d06b
11 All well and good.. But what about when you have to share real stuff for people to read?
12 IPCRESS IP Protecting Cloud Services in Supply Chains (IPCRESS) R&D project involving Jaguar Land Rover, GeoLang, Surrey, co-funded by TSB, Innovating in the Cloud see 2pm, Andrew Tyrer People need to see stuff in order to do stuff. Especially relevant in new supply chains. Can you build parts for a car without knowing shape, etc.? Tracking of IP
13 IPCRESS - Analogies X is a secure system. Y is not; Wetware/meatware bridge: X compromised. And we don t want to connect Y to X to detect leaks The superinjunction (??) problem: How to find out if data in X has been exposed without suggesting the identity of the [Manchester United and Wales footballer / Downton Abbey actor] private search without revealing (or encrypting / hashing) the query
14 IPCRESS Doc. never leaves.
15 IPCRESS Can it work? Research prototype evaluated for plagiarism detection (PAN*), first run on AWS Latest precision figure (April 2013): On data that cannot be seen * plagiarism, authorship, and social software misuse
16
17 IPCRESS - How IPCRESS patterns difficult to reverse engineer hash-like, but highly ambiguous or lossy hash: make patterns public.. and seriously scare the data security specialists! Compact representation efficient Patents filed - US and PCT A kind of search engine (document [passages] [passages] documents), in a federation-like supply chain interaction;
18 IPCRESS and beyond Applicability to other kinds of data new research questions video/audio? And, how fast it can run will depend on the performance of the Cloud systems it runs on
19 PART 2: CLOUD PERFORMANCE
20 Clouds fail Everything fails, all the time. We lose whole datacenters! Those things happen. Vogels, CTO Amazon.com But, failure to meet expectations is very different.
21 Cloud Performance We used micro-benchmarks as a means to an end. Performance of applications predicated on performance of underlying (virtualized) resources We know what the label on the box says, but what kind of present do we actually get? Probability of good/bad performance? Scaling? What measurements are important for whom?
22 Cloud Performance Tested AWS (several regions), Rackspace (UK, US), IBM SmartCloud, OpenStack at Surrey. Different machine types (flavours), and 2 Linux distros Using Bonnie++ and IOZone for disk, LINPACK for CPU flops, STREAM for memory bandwidth, iperf for network bandwidth, MPPTEST for MPI, and a bzip2 application benchmark We want simplicity so the results are understandable, following Gray non-optimized: out of the box Gray, J. (ed.) (1993), The Benchmark Handbook For Database and Transaction Processing Systems. Morgan Kaufmann.
23
24 Cloud Performance
25
26
27 Cloud Performance Quality of Service (QoS) for Service Level Agreements (SLAs) SLAs for Brokers (provider agreements may remain unchanged or barely worth the RoI of even reading) A Cloud Broker has no resources of its own
28 Cloud Broker(s) Opportunity value overall: Gartner, $100bn by 2014 Types [Gartner / NIST] Aggregation: multiples of similar stuff Arbitrage: dynamic pricing (credit scoring cloud providers?) Customization/Intermediation: better view / value add for extant services Integration: simplified view of multiples of different stuff NIST Special Publication types, underlined
29 Cloud Broker(s) As a means to an end? AWS CloudWatch, alarms for various metrics. But, how do predict what to scale up/down to? Cost management QoS parameters in SLAs allows for Cloud Brokers: quality (performance) as differentiator. Fixed price not a dynamic market; performance-based part way there? Probability of, and penalty for, failure. And, so, a market in insurance?
30 An inspiration: Collateralized Debt Obligations (CDOs) Underlying assets CDS, a spread indicates level of risk Potential for default Default correlations important Lower order tranches take losses first Financial CDO Li, B., Gillam, L., and O'Loughlin, J. (2010) Towards Application-Specific Service Level Agreements: Experiments in Clouds and Grids, In Antonopoulos and Gillam (Eds.), Cloud Computing: Principles, Systems and Applications. Springer-Verlag. Li, B., and Gillam, L. (2009), Towards Job-specific Service Level Agreements in the Cloud, Cloud-based Services and Applications, in 5th IEEE e-science International Conference, Oxford, UK.
31 PART 3: CLOSING REMARKS
32 Take away messages Part 1: When perimeters down, information leaks. Protect that which is truly high value Expect it to leak, and think about how to monitor for leaks Part 2: All Clouds (infrastructures) are not the same. Performance can be known after purchase Need performance guarantees, monitoring, and brokers
33 Take away messages The Cloud-qualified are out there: 79 MSc students over 4 years on a module about Cloud Computing Principles, definitions, etc. Relatives in Grids, HPC, P2P, Mainframes Management, Security, Governance AWS, Google App Engine, MapReduce, OpenStack Gillam, L., Li, B. and O Loughlin, J. (2012). Teaching Clouds: Lessons Taught and Lessons Learnt. In Cloud Computing for Teaching and Learning: Strategies for Design and Implementation, IGI.
34 Take away messages Literature is available JoCCASA, articles free to everyone, for ever. A financial brokerage model for cloud computing A constraints-based resource discovery model for multi-provider cloud environments A multi-level security model for partitioning workflows over federated clouds
35 Contact: Qs? The work presented here has been supported in part by the TSB (IPCRESS) and in the recent past by EPSRC, JISC, TSB (KTP), amongst others.
ADDING CLOUD PERFORMANCE TO SERVICE LEVEL AGREEMENTS
ADDING CLOUD PERFORMANCE TO SERVICE LEVEL AGREEMENTS Lee Gillam, Bin Li, and John O'Loughlin Department of Computing, University of Surrey, Guildford, United Kingdom { L.Gillam, B.Li, J.O'Loughlin}@surrey.ac.uk
More informationTeaching cloud computing: a software engineering perspective
Teaching cloud computing: a software engineering perspective Ian Sommerville, School of Computer Science, St Andrews University, Scotland. When a new area of a discipline emerges, university teachers are
More informationBenchmarking cloud performance for service level agreement parameters. Lee Gillam*, Bin Li and John O Loughlin
Int. J. Cloud Computing, Vol. 3, No. 1, 2014 3 Benchmarking cloud performance for service level agreement parameters Lee Gillam*, Bin Li and John O Loughlin Department of Computing, University of Surrey,
More informationSecurity Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of
More informationAmazon EC2 Product Details Page 1 of 5
Amazon EC2 Product Details Page 1 of 5 Amazon EC2 Functionality Amazon EC2 presents a true virtual computing environment, allowing you to use web service interfaces to launch instances with a variety of
More informationIBM Power Systems This is Power on a Smarter Planet
IBM Power Systems This is Power on a Smarter Planet Red Hat Enterprise Linux for IBM Power Systems! Filipe Miranda Global Lead for Linux on IBM System z and Power Systems!, #powerlinux, #bigdata, #IBMWatson,
More informationGood Performance Metrics for Cloud Service Brokers
Good Performance Metrics for Cloud Service Brokers John O Loughlin and Lee Gillam Department of Computer Science University of Surrey Guildford, England {John.oloughlin,l.gillam}@surrey.ac.uk Abstract
More informationIBM Platform Computing Cloud Service Ready to use Platform LSF & Symphony clusters in the SoftLayer cloud
IBM Platform Computing Cloud Service Ready to use Platform LSF & Symphony clusters in the SoftLayer cloud February 25, 2014 1 Agenda v Mapping clients needs to cloud technologies v Addressing your pain
More informationFair Benchmarking for Cloud Computing systems
Gillam et al. Journal of Cloud Computing: Advances, Systems and Applications 2013, 2:6 RESEARCH Open Access Fair Benchmarking for Cloud Computing systems Lee Gillam *, Bin Li, John O Loughlin and Anuz
More informationCloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
More informationData-Centric security and HP NonStop-centric ecosystems. Andrew Price, XYPRO Technology Corporation Mark Bower, Voltage Security
Title Data-Centric security and HP NonStop-centric ecosystems A breakthrough strategy for neutralizing sensitive data against advanced threats and attacks Andrew Price, XYPRO Technology Corporation Mark
More informationDimension Data Enabling the Journey to the Cloud
Dimension Data Enabling the Journey to the Cloud Grant Morgan General Manager: Cloud 14 August 2013 Client adoption: What our clients were telling us The move to cloud services is a journey over time and
More informationAutomating Big Data Benchmarking for Different Architectures with ALOJA
www.bsc.es Jan 2016 Automating Big Data Benchmarking for Different Architectures with ALOJA Nicolas Poggi, Postdoc Researcher Agenda 1. Intro on Hadoop performance 1. Current scenario and problematic 2.
More informationFair Benchmarking for Cloud Computing Systems
Fair Benchmarking for Cloud Computing Systems Authors: Lee Gillam Bin Li John O Loughlin Anuz Pranap Singh Tomar March 2012 Contents 1 Introduction... 3 2 Background... 4 3 Previous work... 5 3.1 Literature...
More informationCloud Infrastructure Planning. Chapter Six
Cloud Infrastructure Planning Chapter Six Topics Key to successful cloud service adoption is an understanding of underlying infrastructure. Topics Understanding cloud networks Leveraging automation and
More informationEncrypt-FS: A Versatile Cryptographic File System for Linux
Encrypt-FS: A Versatile Cryptographic File System for Linux Abstract Recently, personal sensitive information faces the possibility of unauthorized access or loss of storage devices. Cryptographic technique
More informationCloud Computing Deja Vu
Cloud Computing Deja Vu Hengming Zou, Ph.D. Shanghai Jiao Tong University Time Is Late An auto company need to know the price of front bumper And want it right now So it reconfigures some server to run
More informationCloudCenter Full Lifecycle Management. An application-defined approach to deploying and managing applications in any datacenter or cloud environment
CloudCenter Full Lifecycle Management An application-defined approach to deploying and managing applications in any datacenter or cloud environment CloudCenter Full Lifecycle Management Page 2 Table of
More informationCLOUDSPECS PERFORMANCE REPORT LUNACLOUD, AMAZON EC2, RACKSPACE CLOUD AUTHOR: KENNY LI NOVEMBER 2012
CLOUDSPECS PERFORMANCE REPORT LUNACLOUD, AMAZON EC2, RACKSPACE CLOUD AUTHOR: KENNY LI NOVEMBER 2012 EXECUTIVE SUMMARY This publication of the CloudSpecs Performance Report compares cloud servers of Amazon
More informationCloud Design and Implementation. Cheng Li MPI-SWS Nov 9 th, 2010
Cloud Design and Implementation Cheng Li MPI-SWS Nov 9 th, 2010 1 Modern Computing CPU, Mem, Disk Academic computation Chemistry, Biology Large Data Set Analysis Online service Shopping Website Collaborative
More informationMobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
More informationThe Hidden Extras. The Pricing Scheme of Cloud Computing. Stephane Rufer
The Hidden Extras The Pricing Scheme of Cloud Computing Stephane Rufer Cloud Computing Hype Cycle Definition Types Architecture Deployment Pricing/Charging in IT Economics of Cloud Computing Pricing Schemes
More informationArchitecture Overview
Qubell Adaptive Platform-as-a-Service, Enterprise Edition Architecture Overview 4600 Bohannon Drive, Menlo Park, CA 94025 T 888 855-8940 http://qubell.com Introduction Introduction Qubell Adaptive Platform-as-a-Service
More informationIntroduction to Cloud computing. Viet Tran
Introduction to Cloud computing Viet Tran Type of Cloud computing Infrastructure as a Service IaaS: offer full virtual machines via hardware virtualization tech. Amazon EC2, AbiCloud, ElasticHosts, Platform
More informationAssessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
More informationA BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD
CONTINUOUS MONITORING A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD Healthcare companies utilizing cloud infrastructure require continuous security monitoring. Learn how to prevent
More informationWhite Paper. Managing Risk to Sensitive Data with SecureSphere
Managing Risk to Sensitive Data with SecureSphere White Paper Sensitive information is typically scattered across heterogeneous systems throughout various physical locations around the globe. The rate
More information15-319 / 15-619 Cloud Computing. Recitation 5 September 29 th & October 1 st 2015
15-319 / 15-619 Cloud Computing Recitation 5 September 29 th & October 1 st 2015 1 Overview Administrative Stuff Last Week s Reflection Project 2.1, OLI Modules 5 & 6, Quiz 3 New concepts This week s schedule
More informationSecurity Testing. How security testing is different Types of security attacks Threat modelling
Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making
More informationCompanies are moving more and more IT services and
Adding High Availability to the Cloud Paul J. Holenstein Executive Vice President Gravic, Inc. Companies are moving more and more IT services and utility applications to public clouds to take advantage
More informationEnhancing Operational Capacities and Capabilities through Cloud Technologies
Enhancing Operational Capacities and Capabilities through Cloud Technologies How freight forwarders and other logistics stakeholders can benefit from cloud-based solutions 2013 vcargo Cloud Pte Ltd All
More informationHow To Choose Cloud Computing
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 09, 2014 ISSN (online): 2321-0613 Comparison of Several IaaS Cloud Computing Platforms Amar Deep Gorai 1 Dr. Birendra Goswami
More informationSEAIP 2009 Presentation
SEAIP 2009 Presentation By David Tan Chair of Yahoo! Hadoop SIG, 2008-2009,Singapore EXCO Member of SGF SIG Imperial College (UK), Institute of Fluid Science (Japan) & Chicago BOOTH GSB (USA) Alumni Email:
More informationWrite a technical report Present your results Write a workshop/conference paper (optional) Could be a real system, simulation and/or theoretical
Identify a problem Review approaches to the problem Propose a novel approach to the problem Define, design, prototype an implementation to evaluate your approach Could be a real system, simulation and/or
More informationAssignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationPutchong Uthayopas, Kasetsart University
Putchong Uthayopas, Kasetsart University Introduction Cloud Computing Explained Cloud Application and Services Moving to the Cloud Trends and Technology Legend: Cluster computing, Grid computing, Cloud
More informationBuilding Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.
Building Trust in a Digital World Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. 2 Global incidents Equivalent of 117,339 incoming attacks per day, everyday Total number
More informationA Comparison of Clouds: Amazon Web Services, Windows Azure, Google Cloud Platform, VMWare and Others (Fall 2012)
1. Computation Amazon Web Services Amazon Elastic Compute Cloud (Amazon EC2) provides basic computation service in AWS. It presents a virtual computing environment and enables resizable compute capacity.
More informationDISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
More informationDesktop Virtualization. The back-end
Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers
More informationMark Bennett. Search and the Virtual Machine
Mark Bennett Search and the Virtual Machine Agenda Intro / Business Drivers What to do with Search + Virtual What Makes Search Fast (or Slow!) Virtual Platforms Test Results Trends / Wrap Up / Q & A Business
More informationMirantis OpenStack Express: Security White Paper
Mirantis OpenStack Express: Security White Paper Version 1.0 2005 2014 All Rights Reserved www.mirantis.com 1 Introduction While the vast majority IT professionals are now familiar with the cost-saving
More informationCHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
More informationFigure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 shinji10343@hotmail.com, kwang@cs.nctu.edu.tw Abstract One of the most important issues
More informationSecuring Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely
Securing Your Enterprise in the Cloud IT executives must be ready to move to the cloud safely The technology pendulum is always swinging. And chief information security officers must be prepared to swing
More informationDatacenters and Cloud Computing. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/cs5540/spring2014/index.html
Datacenters and Cloud Computing Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/cs5540/spring2014/index.html What is Cloud Computing? A model for enabling ubiquitous, convenient, ondemand network
More informationOffice 365 Migration Performance & Server Requirements
Solutions for the Modern Workforce Office 365 Migration Performance & Server Requirements Understanding Migration Performance There are many factors that can affect performance when migrating to Office
More informationAvamar. Technology Overview
1 Technology Overview 2 Growth of Remote Offices Remote offices are growing rapidly Over 4 million remote offices in the US No standard remote office size, data, staff, network, etc. The average branch
More informationMoving to the Cloud: What Every CIO Should Know
Moving to the Cloud: What Every CIO Should Know CONTACT SALES US: 1.877.734.6983 UK: +44 (0)845.528.0588 www.egnyte.com WHITEPAPER Overview Enterprise data storage needs are growing exponentially, doubling
More informationMobile Computing and Virtual Desktops
Mobile Computing and Virtual Desktops buzzetti@us.ibm.com The IBM Worldwide Design Centers comprise certified IT architects and specialists using state-of-the-art methodologies and technologies in the
More informationProviding Secure Representative Data Sets
Test Data Protection Providing Secure Representative Data Sets By Dr. Ron Indeck VelociData Inc. - www.velocidata.com World Headquarters 321 North Clark Street, Suite 740 Chicago, IL 60654 Telephone: 312-600-4422
More informationAn Introduction to Cloud Computing Concepts
Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC ahmed.gamal.eldin@itida.gov.eg
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationProduct Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES
Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential
More informationSecure Cloud Computing
Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for
More informationIntel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches
Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches February, 2009 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
More informationSecuring Platform as a Service: A Technical Whitepaper on Security Practices at CloudBees
Securing Platform as a Service: A Technical Whitepaper on Security Practices at CloudBees As a consumer of cloud services, you are relying on your cloud service provider in ways that were previously limited
More informationHow Solace Message Routers Reduce the Cost of IT Infrastructure
How Message Routers Reduce the Cost of IT Infrastructure This paper explains how s innovative solution can significantly reduce the total cost of ownership of your messaging middleware platform and IT
More informationwww.basho.com Technical Overview Simple, Scalable, Object Storage Software
www.basho.com Technical Overview Simple, Scalable, Object Storage Software Table of Contents Table of Contents... 1 Introduction & Overview... 1 Architecture... 2 How it Works... 2 APIs and Interfaces...
More informationWeb Conferencing Version 8.3 Troubleshooting Guide
System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which
More informationREQUIREMENTS LIVEBOX. http://www.liveboxcloud.com
2015 REQUIREMENTS LIVEBOX http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantees about this documentation and its use and decline any expressed or implied commercial or suitability
More informationWHOLESALE CLOUD WHITE LABEL
WHOLESALE CLOUD WHITE LABEL It is to computing what power stations were to electricity Factories no longer have coal-fired steam generators in their basements to run their cotton looms. They plug into
More informationSoftware Define Storage (SDs) and its application to an Openstack Software Defined Infrastructure (SDi) implementation
Software Define Storage (SDs) and its application to an Openstack Software Defined Infrastructure (SDi) implementation This paper discusses how data centers, offering a cloud computing service, can deal
More informationManaging Traditional Workloads Together with Cloud Computing Workloads
Managing Traditional Workloads Together with Cloud Computing Workloads Table of Contents Introduction... 3 Cloud Management Challenges... 3 Re-thinking of Cloud Management Solution... 4 Teraproc Cloud
More informationbigdata Managing Scale in Ontological Systems
Managing Scale in Ontological Systems 1 This presentation offers a brief look scale in ontological (semantic) systems, tradeoffs in expressivity and data scale, and both information and systems architectural
More informationInformation Processing, Big Data, and the Cloud
Information Processing, Big Data, and the Cloud James Horey Computational Sciences & Engineering Oak Ridge National Laboratory Fall Creek Falls 2010 Information Processing Systems Model Parameters Data-intensive
More informationXtreemOS and Cloud Computing Alvaro Arenas E-Science Centre Science and Technologies Facilities Council, UK XtreemOS in a Nutshell An open source Linux-based Grid Operating System with native VO support
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationBackup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
More informationRED HAT INFRASTRUCTURE AS A SERVICE OVERVIEW AND ROADMAP. Andrew Cathrow Red Hat, Inc. Wednesday, June 12, 2013
RED HAT INFRASTRUCTURE AS A SERVICE OVERVIEW AND ROADMAP Andrew Cathrow Red Hat, Inc. Wednesday, June 12, 2013 SERVICE MODELS / WORKLOADS TRADITIONAL WORKLOADS Stateful VMs: Application defined in VM Application
More informationCloud 101. Mike Gangl, Caltech/JPL, michael.e.gangl@jpl.nasa.gov 2015 California Institute of Technology. Government sponsorship acknowledged
Cloud 101 Mike Gangl, Caltech/JPL, michael.e.gangl@jpl.nasa.gov 2015 California Institute of Technology. Government sponsorship acknowledged Outline What is cloud computing? Cloud service models Deployment
More informationBefore we can talk about virtualization security, we need to delineate the differences between the
1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via
More informationManagement of VMware ESXi. on HP ProLiant Servers
Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................
More informationCloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013
Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud
More informationChapter 19 Cloud Computing for Multimedia Services
Chapter 19 Cloud Computing for Multimedia Services 19.1 Cloud Computing Overview 19.2 Multimedia Cloud Computing 19.3 Cloud-Assisted Media Sharing 19.4 Computation Offloading for Multimedia Services 19.5
More informationRemoteApp Publishing on AWS
RemoteApp Publishing on AWS WWW.CORPINFO.COM Kevin Epstein & Stephen Garden Santa Monica, California November 2014 TABLE OF CONTENTS TABLE OF CONTENTS... 2 ABSTRACT... 3 INTRODUCTION... 3 WHAT WE LL COVER...
More informationHow To Use Cmk On An Ipa (Intralinks) On A Pc Or Mac Mac (Apple) On An Iphone Or Ipa On A Mac Or Ipad (Apple Mac) On Pc Or Ipat (Apple
Intralinks Customer Managed Keys Technical Overview Version 2.0 October 2014 Copyright 2014 Intralinks, Inc. 1 Intralinks Customer Managed Keys, Technical Overview January 5, 2015 About This Document...
More informationXpoLog Center Suite Log Management & Analysis platform
XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -
More informationFacebook Smart Card FB 121211_1800
Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any
More informationActive Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
More informationCloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad
Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer
More informationDiscovery of Electronically Stored Information ECBA conference Tallinn October 2012
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation
More informationHow To Image A Single Vm For Forensic Analysis On Vmwarehouse.Com
MCP+I, MCSE, CCSA, CCSE, CISSP-ISSAP, CISM, CISA, CIFI, CCE, ACE, GCFE, GCFA, GSEC, VCP4/5, vexpert Senior SANS Instructor - phenry@sans.org 1 A Lot To Cover In ½ An Hour We simply can not cover all cloud
More informationCloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More informationSLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu
More informationA Study of Data Management Technology for Handling Big Data
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationSoftware Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David
More informationThe Next Generation Data Centers: SPECS and The 3 rd Platform.
The Next Generation Data Centers: SPECS and The 3 rd Platform. Dr. Silvio La Porta Senior Research Scientist EMC Research Europe Dr. Said Tabet Senior Technology Strategist Corporate CTO Office, EMC 1
More informationLuncheon Webinar Series May 13, 2013
Luncheon Webinar Series May 13, 2013 InfoSphere DataStage is Big Data Integration Sponsored By: Presented by : Tony Curcio, InfoSphere Product Management 0 InfoSphere DataStage is Big Data Integration
More informationCloud Computing: The Next Computing Paradigm
Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea rdcaytiles@gmail.com,
More informationOperating Systems Virtualization mechanisms
Operating Systems Virtualization mechanisms René Serral-Gracià Xavier Martorell-Bofill 1 1 Universitat Politècnica de Catalunya (UPC) May 26, 2014 Contents 1 Introduction 2 Hardware Virtualization mechanisms
More informationVirtualization Performance on SGI UV 2000 using Red Hat Enterprise Linux 6.3 KVM
White Paper Virtualization Performance on SGI UV 2000 using Red Hat Enterprise Linux 6.3 KVM September, 2013 Author Sanhita Sarkar, Director of Engineering, SGI Abstract This paper describes how to implement
More informationHow to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
More informationOpenStack Introduction. November 4, 2015
OpenStack Introduction November 4, 2015 Application Platforms Undergoing A Major Shift What is OpenStack Open Source Cloud Software Launched by NASA and Rackspace in 2010 Massively scalable Managed by
More informationCloud Federations in Contrail
Cloud Federations in Contrail Emanuele Carlini 1,3, Massimo Coppola 1, Patrizio Dazzi 1, Laura Ricci 1,2, GiacomoRighetti 1,2 " 1 - CNR - ISTI, Pisa, Italy" 2 - University of Pisa, C.S. Dept" 3 - IMT Lucca,
More informationStudy concluded that success rate for penetration from outside threats higher in corporate data centers
Auditing in the cloud Ownership of data Historically, with the company Company responsible to secure data Firewall, infrastructure hardening, database security Auditing Performed on site by inspecting
More informationSecurity Best Practices Overview
Software Version, page 1 Cisco Modeling Labs Client, page 1 Cisco Modeling Labs Server, page 2 Linux-based Operating System, page 2 OpenStack Security Overview, page 3 Software Version The recommendations
More information