FlexCloud: Reliable and Secure Cloud Overlay Infrastructures
|
|
- Melvin Greene
- 8 years ago
- Views:
Transcription
1 Department of Computer Science Institute of Systems Architecture Chair of Computer Networks FlexCloud: Reliable and Secure Cloud Overlay Infrastructures Prof. Dr. Alexander Schill 2013
2 Who we are Internet Information Retrieval Mobile & Ubiquitous Computing Network Planning and Security EU-funded research group Real-Time Collaboration Energy Lab Service & Cloud Computing Dr.-Ing. Josef Spillner Dipl.-Medieninf. Marc Mosch Dr.-Ing. Stephan Groß Dipl.-Medieninf. Yvonne Thoß Dr.-Ing. Anja Strunk (from left to right) Exploring Cyber Physical Systems # 2
3 Outline Cloud Computing What is it all about? Problems π-box: Building your personal secure cloud π-data Controller: Secure Cloud Storage Conclusion & Future Work # 3
4 The shape of a cloud is in the eye of the beholder. IaaS/PaaS * Cloud Operating System, part of Azure Platform SaaS * Customized applications for business and home user, based on Google App Engine, e.g. collaboration IaaS * tools Migration of virtual machines between private and public clouds * SaaS = Software as a Service PaaS = Platform as a Service IaaS = Infrastructure as a Service SaaS/PaaS * Business cloud services focussing on customer relationship management PaaS * Development and hosting of web applications # 4
5 Cloud Computing Characteristics Cloud Computing is On-demand self service Rapid elasticity Broadband network access Resource pooling the on-demand and pay-per-use application of virtualised IT services over the Internet. Measured and optimized service Adopted from the NIST Definition of Cloud Computing [MeGr2011] # 5
6 Service & Deployment Models Cloud Architecture Stack Cloud Organization User/Clients User Interface Machine Interface Applications Applications Services Software Services (SaaS) Components Services Programming Environment Execution Environment Platform Services (PaaS) Compute Network Storage Virtual Resource Set (VRS) Infrastructure Services (IaaS) Convenience Public Hybrid Community Private User Control Adopted from [MeGr2011] and [BKNT2010] Physical Resource Set (PRS) # 6
7 Cloud Computing What is it all about? Problems π-box: Building your personal secure cloud π-data Controller: Secure Cloud Storage Conclusion & Future Work # 7
8 Problems of Cloud Computing Reliability and security when giving up physical possession > Failure of monocultures > Cloud providers trustworthiness > Staying in control # 8
9 FlexCloud Objectives π-cloud: Establishing a secure cloud computing life cycle Hybrid cloud platform to integrate a user s (cloud) resources, services and data. > Unified Cloud Prevent Vendor-Lock-in + Integration of existing IT > Secure Cloud Ensure data privacy and security > Managed Cloud Keep the user in command > Efficient Cloud Adapt to user preferences and cloud's vital signs # 9
10 Cloud Computing What is it all about? Problems π-box: Building your personal secure cloud π-data Controller: Secure Cloud Storage Conclusion & Future Work # 10
11 FlexCloud's Approach Subsume all end devices within a Personal Secure Cloud (π-cloud) controlled by the π-box. π-cloud π-box # 11
12 FlexCloud's Approach π-box distinguishes between public and sensitive data and enforces security mechanisms for the latter. π-cloud π-box # 12
13 Transparent Encryption Analysis of structured, unstructured data and context information Document classification concerning security requirements. Addressee identification and derivation of respective keys. π-cloud PKI? # 13
14 π-box Architecture Conceptual User-controlled Organization design of a reliable user s of a user-centric service data cloud storage resources execution cloud in the management in cloud the cloud solution Categorization Automatic Description composition assurance of cloud of user resources of groups and availability, deployment concerning and their integrity of (non-)functional technical services and confidentiality skills with respect and properties organizational to security and interests other non-functional Guidelines System Easy integration architecture for constructing properties of existing for a reliable adaptable IT environments and graphical scalable cloud user interfaces resource directory Refinement Easy Protocols Adaptable integration for and of automatic user optimizable of existing profiles (de-)registration storage according IT environments with to respect individual of cloud to resources preferences user preferences within the π-cloud Service execution with respect to security and other nonfunctional requirements. π-box π-service Controller π-cockpit π-data Controller User Interface / GUI Data storage & distribution with respect to security and other nonfunctional requirements. Infrastructure management π-resource Manager Peer-to-Peer Network public resources (not necessarily trustworthy) private resources (trustworthy) # 14
15 Cloud Computing What is it all about? Problems? π-box: Building your personal secure cloud π-data Controller: Secure Cloud Storage Conclusion & Future Work # 15
16 Increasing Availability: from RAID to RAIC RAID: Redundant Array of Independent Disks RAIC: Redundant Array of Independent Clouds Integration Layer Logical partition Integration Layer Distributed Web file system access Versioning Preprocessing Layer Preprocessing Layer File level transformation (e.g. compression) RAID level redundancy routine (mirror, stripe, ) Transport Layer Block resources Reliable Unreliable, disk low storage quality hard disk Unreliable, Reliable, proprietary universal and insecure cloud storage Dispersal routine Fragment level transformation (e.g. encryption) Transport Layer Caching Local persistence Provider Storage API adapter # 16
17 Secure Cloud Storage Integrator for Enterprises (System Architecture) π-cloud = Company Intranet Meta Data CIFS Shared Folder File Dispersion Cryptography Cloud Storage Protocol Adapter API FTP π-data Controller # 17
18 Storing Files (1/5) π-cloud = Company Intranet Meta Data Shared Folder File Dispersion Cryptography Cloud Storage Protocol Adapter π-data Controller # 18
19 Implementation of the Shared Folder User space Kernel ls - /tmp/fuse glibc VFS./xmp /tmp/fuse libfuse glibc FUSE NFS Ext3 Technology: FUSE (Filesystem in Userspace) CIFS/SMB network share on proxy file server Unified user interface for arbitrary cloud storage services Utilizing CIFS access control mechanisms CIFS = Common Internet File System Ext3 = Third Extended File System FUSE = Filesystem in Userspace glibc = GNU C library NFS = Network File System SMB = Server Message Block VFS = Virtual File System # 19
20 Storing Files (2/5) π-cloud = Company Intranet Meta Data Shared Folder File Dispersion Cryptography Cloud Storage Protocol Adapter π-data Controller # 20
21 File Dispersion Ensure availability despite of unreliable cloud storage providers k threshold, i.e. # of necessary shares to reconstruct n total # of shares a file is split into E.g. k=6, n=8 If k < n, we need redundant information. # 21
22 Secret Sharing aka Threshold Schemes Objective: Divide a secret s S in n shares s 1,, s n with 1. Knowledge of any k or more s i shares makes s easily computable. 2. Knowledge of any k 1 or fewer s i shares leave s completely undetermined (in the sense that all its possible values are equally likely). Sharing Reconstruction Dealer Input: s Share holders s i 1 s i 2 s i k Share holders store s 1 s 2 s n Output: s Reconstructor # 22
23 Secret Sharing: An informal example with 2 shares Visual Cryptography [NaSh1994] Simplification: n = k = 2 Secret cannot be determined independently! [Source: revealed! # 23
24 Secret Sharing: More formalism Blakley's scheme [Blakley1979] Idea: Any n nonparallel n-dimensional hyper-planes intersect at a specific point. Sharing: Encode the secret as any single coordinate of the point of intersection. Recovering: 1. Calculating the planes' point of intersection. 2. Take a specified coordinate of that intersection. 1 share available 2 shares available 3 shares available Example: n 3, k=3 Graphics taken from Wikipedia. Shamir's scheme [Shamir1979] Idea: It takes k points to define a polynomial of degree k-1. Sharing: Be a 0 :=s є S the secret to be shared where S is an infinite field known to all share holders. Randomly choose (k-1) coefficients a 1,a 2, a k-1 є S to build f(x):=σa i x i. Calculate shares s j :=[j,f(j)] with j є N n. Recovering: Use Lagrange interpolation to find coefficients of the polynomial including constant term a 0. s 1 s s 3 s 2 # 24
25 Information Dispersal: Computationally secure secret sharing Rabin's scheme [Rabin1989] Guarantees only availability but no secrecy. Construction Be a i s S where i=1,, k, i.e. f(x) i=1 k s x i. Rest as with Shamir's secret sharing. Properties With a polynomial and shares of the same size as before, we can now share a value k times as long as before. Length of each share is only 1/k -th of the length of the secret, and if k shares must be sufficient for reconstruction, one can obviously not get shorter. Space optimal However, one might gain some information if he gets access to several shares. Computationally secure More efficient information dispersal schemes Need to be maximum distance separable to use k arbitrary shares for reconstruction. Examples: Cauchy-Reed-Solomon, Liberation, Blaum-Roth [PSS2008] # 25
26 Storing Files (3/5) π-cloud = Company Intranet Meta Data Shared Folder File Dispersion Cryptography Cloud Storage Protocol Adapter π-data Controller # 26
27 Cryptography: Confidentiality & Integrity AES-CBC AES-CBC AES-CBC AES-CBC + SHA256 + SHA256 + SHA256 + SHA256 # 27
28 Storing Files (4/5) π-cloud = Company Intranet Meta Data Shared Folder File Dispersion Cryptography Cloud Storage Protocol Adapter π-data Controller # 28
29 Storing Files (5/5) Stored Meta Data per component Shared Folder: General file system information, e.g. file size, access rights File Dispersion: Used dispersion algorithm/parameters (n, k), shares locations Cryptography: Used cryptographic keys and calculated checksums per share Cloud Storage Protocol Adapter: Storage protocol parameters and provider login data π-cloud = Company Intranet Meta Data Shared Folder File Dispersion Cryptography Cloud Storage Protocol Adapter π-data Controller # 29
30 Retrieving Files (1/3) Dispersion parameters: n=6 π-cloud = Company Intranet Meta Data Shared Folder File Dispersion Cryptography Cloud Storage Protocol Adapter π-data Controller # 30
31 Retrieving Files (2/3) Dispersion parameters: n=6, k=3 π-cloud = Company Intranet Meta Data Shared Folder File Dispersion Cryptography Cloud Storage Protocol Adapter π-data Controller # 31
32 Retrieving Files (3/3) π-cloud = Company Intranet Meta Data Shared Folder File Dispersion Cryptography Cloud Storage Protocol Adapter π-data Controller # 32
33 Prototype Implementation [SGS11] web interface for π-cockpit [SBM + 11] π-cockpit desktop application ResUbic Cloud Storage Allocator for Cyber Physical Systems # 33
34 Performance Evaluation Upload Test case π-box used # local storage # cloud storage # encrypted shares 1 No Yes Yes Yes Yes File size: 24 MB; Dispersion parameters: n=8, k=6; Cryptography parameters: Towards AES (256 User bit, Centric 14 iterations), Data Governance SHA256; and Control in the Cloud Network Up/Downlink: 10/20 Mbit/s # 34
35 Performance Evaluation Download Test case π-box used # local storage # cloud storage # encrypted shares 1 No Yes Yes Yes Yes File size: 24 MB; Dispersion parameters: n=8, k=6; Cryptography parameters: Towards AES (256 User bit, Centric 14 iterations), Data Governance SHA256; and Control in the Cloud Network Up/Downlink: 10/20 Mbit/s # 35
36 π-box Scalability Embedded systems π-box Virtual Machine AVM FRITZ!OS plugin Enterprise Server SOHO Home Server Enterprise SOHO: Small Office and Home Office # 36
37 Cloud Computing What is it all about? Problems? π-box: Building your personal secure cloud π-data Controller: Secure Cloud Storage Conclusion & Future Work # 37
38 Results so far & future work (π-data Controller) Integration of existing cloud storage services (Cloud-of-Clouds) Proxy server for transparent mediation easy to use for end-user, common scheme for enterprises Good performance, high security & data control for the user Data store for database system (block-based dispersion) Collaboration scenarios, file sharing, access by external entities Securing the meta data database Automatic classification of data Improving performance, e.g. scheduling algorithms, caching/ prefetching, parallelization Optimized cloud storage # 38
39 Building a cloud of clouds by connecting several π-clouds and propagating data and services within one π-cloud and to others. Simplified approach: assuming public, i.e. insecure π-clouds Advanced approach: Trust relationships between π-clouds π-cloud π-box # 39
40 Towards a secure cloud life cycle Cloud Adaption and Optimization Strategies for the compensation of SLA violations Strategies for minimization of energy consumption Mechanisms for the visualization of complex Cloud Monitoring data Fine-grained Service Level Agreements Methods to determine fine-grained nonfunctional properties of Cloud Services Identification of assets and corresponding requirements Deduction of monitoring targets from SLAs Cloud Surveillance and Incident Detection Specification of monitoring targets and SLA violations Models for the proactive recognition of SLA violations and the evaluation of a Cloud s energy efficiency Mechanisms for reliable distributed Monitoring Dynamic Provider Selection and Cloud Setup Flexible distribution mechanisms for Cloud Platforms Strategies for the performance optimization of Cloud Applications Reputation consideration to improve reliability and trustworthiness # 40
41 Tomorrow's forecast: still cloudy but sunny spots Contact: # 41
42 References [BKNT2010] C. Baun, M. Kunze, J. Nimis and S. Tai: Cloud Computing. Web-basierte dynamische IT-Services. Springer Verlag, [Blakley1979] G. R. Blakley: Safeguarding cryptographic keys; AFIPS Conference Proceedings Vol. 48, National Computer Conference (NCC) 1979, [MeGr2011] P. Mell and T. Grace: The NIST Definition of Cloud Computing. NIST Special Publication , September [NaSh1994] M. Naor and A. Shamir, Visual Cryptography, Eurocrypt 94. [PSS2008] J. S. Plank, S. Simmerman, C. D. Schuman: Jerasure: A Library in C/C++ Facilitating Erasure Coding for Storage Applications Version 1.2. Technical Report CS , University of Tennessee, [Rabin1989] M. O. Rabin: Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance; Journal of the ACM 36/2 (1989) [SBM ] J. Spillner, G. Bombach, S. Matthischke, R. Tzschicholz, and A. Schill: Information Dispersion over Redundant Arrays of Optimal Cloud Storage for Desktop Users. In: IEEE International Conference on Utility and Cloud Computing. Melbourne, Australien, December [SGS2011] R. Seiger, S. Groß, and A. Schill: A Secure Cloud Storage Integrator for Enterprises. In: International Workshop on Clouds for Enterprises. Luxemburg, September [Shamir1979] A. Shamir: How to Share a Secret; Communications of the ACM 22/11 (1979) # 42
Secure Cloud Computing with FlexCloud
Department of Computer Science Institute of Systems Architecture Chair of Computer Networks Secure Cloud Computing with FlexCloud Dr.-Ing. Anja Strunk DAAD Summer School CTDS 2012 Sousse, Tunisia 07.09.2012
More informationE-Business Technology
E-Business Technology Presented to: Prof. Dr. Eduard Heindl By: Bhupesh Sardana BCM WS 2010-11 Date: 21-Jan-2011 Business Case Your business is growing exponentially. Your computing need & usage is getting
More informationTopics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
More informationCloud Computing An Introduction
Cloud Computing An Introduction Distributed Systems Sistemi Distribuiti Andrea Omicini andrea.omicini@unibo.it Dipartimento di Informatica Scienza e Ingegneria (DISI) Alma Mater Studiorum Università di
More informationA Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
More informationSafe File Storage and Databases
Department of Computer Science Institute of Systems Architecture Chair of Computer Networks Safe File Storage and Databases From Research To Transfer: User-Controllable Cloud Storage Josef Spillner mailto:josef.spillner@tu-dresden.de
More informationDISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
More informationHow To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationKeyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
More informationCHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationSHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
More informationAn Intelligent Approach for Data Fortification in Cloud Computing
An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,
More informationSecure Framework for Data Storage from Single to Multi clouds in Cloud Networking
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking B.Sujana 1, P.Tejaswini 2, G.Srinivasulu 3, Sk.Karimulla 4 1,2,3,4 QUBA COLLEGE OF ENGINEERING & TECH, NELLORE Abstract:
More informationCloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
More informationCloud 101. Mike Gangl, Caltech/JPL, michael.e.gangl@jpl.nasa.gov 2015 California Institute of Technology. Government sponsorship acknowledged
Cloud 101 Mike Gangl, Caltech/JPL, michael.e.gangl@jpl.nasa.gov 2015 California Institute of Technology. Government sponsorship acknowledged Outline What is cloud computing? Cloud service models Deployment
More informationCLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
More informationOWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
More informationBuilding Storage Service in a Private Cloud
Building Storage Service in a Private Cloud Sateesh Potturu & Deepak Vasudevan Wipro Technologies Abstract Storage in a private cloud is the storage that sits within a particular enterprise security domain
More informationCurrent Research- Cloud Computing and E-Government
AK IT-Security 1 Current Research- Cloud Computing and E-Government Graz, 12.11.2014 Das E-Government Innovationszentrum ist eine gemeinsame Einrichtung des Bundeskanzleramtes und der TU Graz Overview»
More informationRapid Application Development
Rapid Application Development Chapter 7: Development RAD with CASE tool: App Inventor And Cloud computing Technology Cr: appinventor.org Dr.Orawit Thinnukool College of Arts, Media and Technology, Chiang
More informationPerspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory
Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Caveats and Disclaimers This presentation provides education on cloud technology and its benefits
More informationOVERVIEW Cloud Deployment Services
OVERVIEW Cloud Deployment Services Audience This document is intended for those involved in planning, defining, designing, and providing cloud services to consumers. The intended audience includes the
More informationCloudFTP: A free Storage Cloud
CloudFTP: A free Storage Cloud ABSTRACT: The cloud computing is growing rapidly for it offers on-demand computing power and capacity. The power of cloud enables dynamic scalability of applications facing
More informationSee Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
More informationSYMMETRIC CRYPTOGRAPHIC KEY MANAGEMENT IN CLOUD PARADIGM
SYMMETRIC CRYPTOGRAPHIC KEY MANAGEMENT IN CLOUD PARADIGM Supervisor: Dr. Muhammad Awais Shibli Presented By: Faiza Fakhar Reg. No.: 2010-NUST-MS PhD-IT-27 Date: 12 th February, 2014 AGENDA Overview of
More informationDeutsche Börse Cloud Exchange AG First vendor-neutral platform for IaaS cloud computing products. October 2013
Deutsche Börse Cloud Exchange AG First vendor-neutral platform for IaaS cloud computing products October 2013 Deutsche Börse Cloud Exchange AG 1 Deutsche Börse Cloud Exchange AG What if Deutsche Börse
More informationKeywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
More informationCluster, Grid, Cloud Concepts
Cluster, Grid, Cloud Concepts Kalaiselvan.K Contents Section 1: Cluster Section 2: Grid Section 3: Cloud Cluster An Overview Need for a Cluster Cluster categorizations A computer cluster is a group of
More informationCloud Computing For Distributed University Campus: A Prototype Suggestion
Cloud Computing For Distributed University Campus: A Prototype Suggestion Mehmet Fatih Erkoç, Serhat Bahadir Kert mferkoc@yildiz.edu.tr, sbkert@yildiz.edu.tr Yildiz Technical University (Turkey) Abstract
More informationTowards User Centric Data Governance and Control in the Cloud
Towards User Centric Data Governance and Control in the Cloud Stephan Groß and Alexander Schill Technische Universität Dresden Fakultät Informatik D-01062 Dresden, Germany {Stephan.Gross, Alexander.Schill}@tu-dresden.de
More informationCloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University
Cloud computing: the state of the art and challenges Jānis Kampars Riga Technical University Presentation structure Enabling technologies Cloud computing defined Dealing with load in cloud computing Service
More informationCloud Computing mit mathematischen Anwendungen
Cloud Computing mit mathematischen Anwendungen Dr. habil. Marcel Kunze Engineering Mathematics and Computing Lab (EMCL) Institut für Angewandte und Numerische Mathematik IV Karlsruhe Institute of Technology
More informationA Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud
More informationA Distributed Storage Architecture based on a Hybrid Cloud Deployment Model
A Distributed Storage Architecture based on a Hybrid Cloud Deployment Model Emigdio M. Hernandez-Ramirez, Victor J. Sosa-Sosa, Ivan Lopez-Arevalo Information Technology Laboratory Center of Research and
More informationIntroduction to Gluster. Versions 3.0.x
Introduction to Gluster Versions 3.0.x Table of Contents Table of Contents... 2 Overview... 3 Gluster File System... 3 Gluster Storage Platform... 3 No metadata with the Elastic Hash Algorithm... 4 A Gluster
More informationCloud Computing: An Introduction
Cloud Computing: An Introduction Distributed Systems Sistemi Distribuiti Andrea Omicini andrea.omicini@unibo.it Dipartimento di Informatica Scienza e Ingegneria (DISI) Alma Mater Studiorum Università di
More informationCloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
More informationjourney to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
More informationNETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
More informationStorage Architectures for Big Data in the Cloud
Storage Architectures for Big Data in the Cloud Sam Fineberg HP Storage CT Office/ May 2013 Overview Introduction What is big data? Big Data I/O Hadoop/HDFS SAN Distributed FS Cloud Summary Research Areas
More informationThe Hybrid Cloud: Bringing Cloud-Based IT Services to State Government
The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government October 4, 2009 Prepared By: Robert Woolley and David Fletcher Introduction Provisioning Information Technology (IT) services to enterprises
More informationIntroduction to Cloud Computing
Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services
More informationMIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2
IJCITP Volume.8* Number 2* December 2013, pp. 53-58 Serials Publications MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING K.Sireesha 1 and S. Suresh 2 1 M.Tech. Student,
More informationPrivate Cloud in Educational Institutions: An Implementation using UEC
Private Cloud in Educational Institutions: An Implementation using UEC D. Sudha Devi L.Yamuna Devi K.Thilagavathy,Ph.D P.Aruna N.Priya S. Vasantha,Ph.D ABSTRACT Cloud Computing, the emerging technology,
More informationSecuring Data in the Cloud
Securing Data in the Cloud Meeting the Challenges of Data Encryption and Key Management for Business-Critical Applications 1 Contents Protecting Data in the Cloud: Executive Summary.....................................................
More informationCloud based Conceptual Framework of Service Level Agreement for University
Cloud based Conceptual Framework of Service Level Agreement for University Krunal D. Trivedi Acharya Motibhai Patel Institute of Computer Studies, Ganpat University, Mehsana, Gujarat, INDIA N J. Patel,
More informationThe Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
More informationPrivate Cloud 201 How to Build a Private Cloud
Private Cloud 201 How to Build a Private Cloud Chris E. Avis Sr. IT Pro Evangelist Microsoft Corp. http://chrisavis.com Presented at Seattle Windows Networking User Group January 4, 2012 al 1 The Cloudscape
More informationFundamental Concepts and Models
Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract
More informationSECURITY THREATS TO CLOUD COMPUTING
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD
More informationTamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
More informationSecuring and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
More informationyvette@yvetteagostini.it yvette@yvetteagostini.it
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
More informationHow To Compare Cloud Computing To Cloud Platforms And Cloud Computing
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms
More informationEvaluation Methodology of Converged Cloud Environments
Krzysztof Zieliński Marcin Jarząb Sławomir Zieliński Karol Grzegorczyk Maciej Malawski Mariusz Zyśk Evaluation Methodology of Converged Cloud Environments Cloud Computing Cloud Computing enables convenient,
More informationCLOUD COMPUTING. When It's smarter to rent than to buy
CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit
More informationCloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
More informationCLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM Taha Chaabouni 1 and Maher Khemakhem 2 1 MIRACL Lab, FSEG, University of Sfax, Sfax, Tunisia chaabounitaha@yahoo.fr 2 MIRACL Lab, FSEG, University
More informationThe Future Of Cloud Computing. Thursday, September 1, 11
1 The Future Of Cloud Computing 2 ::Setting Some Context Cloud Computing is a natural, disruptively innovative and timely opportunistic response to a converging set of socioeconomic, political, cultural
More informationHow To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
More informationCloud Storage: Where Does It Fit Into Tomorrow s IT?
Cloud Storage: Where Does It Fit Into Tomorrow s IT? Vincent Franceschini CTO Distributed Data Storage Solutions Hitachi Data Systems Corporation Vincent.Franceschini@hds.com Constant, increasing reliance
More informationPerformance Gathering and Implementing Portability on Cloud Storage Data
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering
More informationWeb Services & Database Services Availability through Multi-Cloud Environment
Web Services & Database Services Availability through Multi-Cloud Environment Veenesh Kumar Shrotriya 1, Ashutosh Kumar 2 1 M.Tech, 2 Assistant Professor, Department of Computer Science and Engineering,
More informationContents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com
Sentinet Overview Contents Overview... 3 Architecture... 3 Technology Stack... 4 Features Summary... 6 Repository... 6 Runtime Management... 6 Services Virtualization and Mediation... 9 Communication and
More informationEfficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
More informationCloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security
More informationKent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
More informationCloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
More informationOptimizing Service Levels in Public Cloud Deployments
WHITE PAPER OCTOBER 2014 Optimizing Service Levels in Public Cloud Deployments Keys to Effective Service Management 2 WHITE PAPER: OPTIMIZING SERVICE LEVELS IN PUBLIC CLOUD DEPLOYMENTS ca.com Table of
More informationEnabling the SmartGrid through Cloud Computing
Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from
More informationArchitecting the Cloud
Architecting the Cloud Sumanth Tarigopula Director, India Center, Best Shore Applications Services 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
More informationCLOUD COMPUTING INTRODUCTION HISTORY
1 CLOUD COMPUTING INTRODUCTION 1. Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from
More informationRunning head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:
More informationCoding Techniques for Efficient, Reliable Networked Distributed Storage in Data Centers
Coding Techniques for Efficient, Reliable Networked Distributed Storage in Data Centers Anwitaman Datta Joint work with Frédérique Oggier (SPMS) School of Computer Engineering Nanyang Technological University
More informationImplementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive
Using XenData Software and a Spectra Logic Archive With the Video Edition of XenData Archive Series software on a Windows server and a Spectra Logic T-Series digital archive, broadcast organizations have
More informationHow To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
More informationCloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
More informationAssignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
More informationFigure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT
An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information
More informationGrid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
More informationRole of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop
Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop Kanchan A. Khedikar Department of Computer Science & Engineering Walchand Institute of Technoloy, Solapur, Maharashtra,
More informationAn Efficient data storage security algorithm using RSA Algorithm
An Efficient data storage security algorithm using RSA Algorithm Amandeep Kaur 1, Sarpreet Singh 2 1 Research fellow, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University,
More informationA CLOUD-BASED FRAMEWORK FOR ONLINE MANAGEMENT OF MASSIVE BIMS USING HADOOP AND WEBGL
A CLOUD-BASED FRAMEWORK FOR ONLINE MANAGEMENT OF MASSIVE BIMS USING HADOOP AND WEBGL *Hung-Ming Chen, Chuan-Chien Hou, and Tsung-Hsi Lin Department of Construction Engineering National Taiwan University
More informationMPSTOR Technology Overview
MPSTOR Technology Overview Delivering operational efficiency to the datacenter through software defined storage enabling data centers generate new higher margin revenue streams via a single programmable
More informationProviding Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud R.Udhayakumar 1, M. Jawahar 2, I.Ramasamy 3 PG Student, Dept. Of CSE,KSR Institute For Engineering
More informationWhite Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
More informationDISTRIBUTED SYSTEMS AND CLOUD COMPUTING. A Comparative Study
DISTRIBUTED SYSTEMS AND CLOUD COMPUTING A Comparative Study Geographically distributed resources, such as storage devices, data sources, and computing power, are interconnected as a single, unified resource
More informationHow To Understand Cloud Computing
Capacity Management for Cloud Computing Chris Molloy Distinguished Engineer Member, IBM Academy of Technology October 2009 1 Is a cloud like touching an elephant? 2 Gartner defines cloud computing as a
More informationData Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
More informationCustomer Security Issues in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
More informationAn Introduction to Cloud Computing Concepts
Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC ahmed.gamal.eldin@itida.gov.eg
More informationCLOUD PERFORMANCE TESTING - KEY CONSIDERATIONS (COMPLETE ANALYSIS USING RETAIL APPLICATION TEST DATA)
CLOUD PERFORMANCE TESTING - KEY CONSIDERATIONS (COMPLETE ANALYSIS USING RETAIL APPLICATION TEST DATA) Abhijeet Padwal Performance engineering group Persistent Systems, Pune email: abhijeet_padwal@persistent.co.in
More informationEmbedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Embedding more security in digital signature system by using combination of public
More informationAn Application of Visual Cryptography To Financial Documents
An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University
More information