Cloud and Mobile Security Seminar
|
|
- Jordan Melvin Spencer
- 8 years ago
- Views:
Transcription
1 Cloud and Mobile Security Seminar Spring 2013 Lecture 2: Intro to Cloud Computing and Its Challenges
2 Assignment Status Paper presenter assignment: Only five people have volunteered for papers Deadline for self-volunteering is next Monday (Feb 11) Past that day, we will assign papers to you Note that papers might change, so you are selecting topics not specific papers Project selection: Only two people have told me verbally about their ideas Everyone must send me and TA a brief description of the project and team by next Monday (Feb 11) Less than 1 page, but needs to explain problem clearly! See instructions here: < Absolutely no deadline extensions! Note that you'll have to provide a more detailed description by Feb 18 (following week, so you want to submit earlier, so you can get feedback)
3 Outline A history of cloud computing (Roxana) Slides were inspired by Armando Fox presentation on cloud computing history for the UC Berkeley s CS-10 course General challenges (Dmitryi) Above the clouds: A Berkeley view of cloud computing. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, M. Zaharia. Technical Report UCB/EECS , Specific challenge: Side-channel leakage (Deepika) Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. In Proceedings of the ACM Conference on Computing Communications Security (CCS), Further challenges (Roxana)
4 Outline A history of cloud computing (Roxana) Slides were inspired by Armando Fox presentation on cloud computing history for the UC Berkeley s CS-10 course General challenges (Dmitryi) Above the clouds: A Berkeley view of cloud computing. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, M. Zaharia. Technical Report UCB/EECS , Specific challenge: Side-channel leakage (Deepika) Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. In Proceedings of the ACM Conference on Computing Communications Security (CCS), Further challenges (Roxana)
5 What Is Cloud Computing? Computing technology in which data and/or computation are outsourced to a massive-scale, multi-user infrastructure that is managed by a third-party. Includes both: Software as a service (e.g., Gmail, Google Docs, Mozy, etc.) Infrastructure/platform as a service (e.g., Amazon AWS, Google AppEngine, Microsoft Azure, etc.) Appeared gradually due to two important challenges facing the Web: Scaling Management
6 Around 1995: The Scaling Challenge The Web and e-commerce were gaining traction Their challenge: how to scale? 1996 to 1997: ebay grew from 41,000 to 341,000 users!
7 Pre-1995 Answer: Big, Expensive Computers Example: ebay used Sun E supermini 64 64GB RAM, 20TB disk, ~$1M The good: Easy to manage Easy to program Simple failure mode The bad: Q: Any ideas?
8 Pre-1995 Answer: Big, Expensive Computers Example: ebay used Sun E supermini 64 64GB RAM, 20TB disk, ~$1M The good: Easy to manage Easy to program Simple failure mode The bad: Expensive Single point of failure No incremental scalability
9 1995: Berkeley Network of Workstations (NOW) Idea: Leverage many interconnected small, cheap, general-purpose machines for incremental scalability and reliability Typical PC: 200 MHz CPU, 32MB RAM, 4GB disk A Case for Networks of Workstations: NOW. IEEE Micro, Tom Anderson, Dave Culler, Dave Patterson, el.al.
10 NOW : NOW had 4 HP-735 s
11 NOW : NOW had 32 Sun SPARC stations
12 NOW : 60 Sun SPARC-2 s Build Inktomi app
13 Companies Adopt NOW Everybody builds their own clusters and grows them to handle more and more load Examples: ebay, Amazon, Google, all.com bubble companies Similar to early days of electricity when everyone built their own generator Q: What do you think happened next?
14 Late 1990s: The Manageability Challenge Hard to manage and program large clusters How to write scalable distributed programs? How to debug large-scale programs? How to make services reliable? How to architect the network infrastructure? How to provision a cluster to handle peak load? How to administer a huge number of computers? Each company had to build their own complex software Like each of us building an OS from scratch!
15 Early 2000s: Scalable Cluster Primitives Very few technically strong companies create powerful scalable and reliable primitives for cluster management and programming Examples: Google s Map/Reduce The Google File System (GFS) Google s Bigtable Amazon s Dynamo Distributed debugging and tracing tools Datacenter temperature regulators Scalable distributed communication mechanisms
16 Mid 2000s: Three Valuable Commodities Giant-scale clusters with enormous excess capacity Everybody provisioned for peak Q: How big was a typical Google datacenter around 2005? a. 1,000 machines b. 5,000 machines c. 10,000 machines d. 50,000 machines e. 100,000 machines
17 Mid 2000s: Three Valuable Commodities Giant-scale clusters with enormous excess capacity Everybody provisioned for peak Expertise for managing and operating clusters at low cost Economies of scale Complex software to help program/manage clusters Even full applications (e.g., Gmail, Google Calendar, etc.) Q: What do you think happened next?
18 2006: Monetization of Cloud Infrastructure AWS sells resources, expertise, and access to cloud primitives in a pay-for-what-you-use model Resources: CPU, network bandwidth, persistent storage Cloud primitives: Amazon S3, EC2, SQS, Map/Reduce, etc. Google launches Google Apps for Your Domain Customizable Gmail, Google Docs, Google Calendar under a custom domain (e.g., gmail.cs.columbia.edu) Google then launches the App Engine Web hosting infrastructure (such infrastructures existed before, but never enjoyed popularity) Microsoft launches Azure in 2009
19 Great Advantages of Cloud Computing Low barrier of market entry for startups Cheaper, low-management , calendars, CRM solutions New mobile applications Faster batch processing via parallelization Dmitryi will discuss
20 Outline A history of cloud computing (Roxana) Slides were inspired by Armando Fox presentation on cloud computing history for the UC Berkeley s CS-10 course General challenges (Dmitryi) Above the clouds: A Berkeley view of cloud computing. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, M. Zaharia. Technical Report UCB/EECS , Specific challenge: Side-channel leakage (Deepika) Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. In Proceedings of the ACM Conference on Computing Communications Security (CCS), Further challenges (Roxana)
21 Above the Clouds: A Berkley View of Cloud Computing By Armbrust et al. Dmitriy Gromov 2/4/2013
22 Overview l Summary - What is Cloud Compu6ng? - Why Cloud Compu6ng? - Business Model - Obstacle and Opportuni6es l Review l Post Paper Thoughts Report Presentation - Gromov
23 What is Cloud Compu6ng? It s stupidity. It s worse than stupidity: it s a marke6ng hype campaign. Somebody is saying this is inevitable and whenever you hear somebody saying that, it s very likely to be a set of businesses campaigning to make it true. Richard Stallman, quoted in The Guardian, September 29, Report Presentation - Gromov
24 What is Cloud Compu6ng? BUT REALLY! Report Presentation - Gromov
25 What is Cloud Compu6ng? l l So#ware as a Service (SaaS): Applica6on delivered as a service over the Internet Cloud: Datacenter Hardware and SoYware - Public Cloud: Cloud as a pay as you go service - Private Cloud: Internal datacenter not made available to the public l U8lity Compu8ng: The service being sold via a Public Cloud - Amazon Web Service, Google AppEngine l l Cloud Compu8ng = Public Cloud + U6lity Compu6ng Paying someone to use their service on their datacenter Report Presentation - Gromov
26 What is Cloud Compu6ng? l New Workflow Report Presentation - Gromov
27 Why Cloud Compu6ng l User Perspec6ve - The Good l l l Pay only for what you need Cheap Service Grow and shrink service very quickly - The Bad l Need to trust your cloud provider Report Presentation - Gromov
28 Why Cloud Compu6ng l Provider Perspec6ve - The Good l l l l Money! - Hardware in bulk is cheaper and lots of users Can easily build on what you have Can drive industry by providing solu6ons everyone needs Can become a pla`orm everyone uses - The Bad l Need to pay for and maintain datacenter Report Presentation - Gromov
29 Why Cloud Compu6ng l Why Then (in '08)? - SoYware improvements demanded beder hardware - Companies were not sure exactly what they needed - Hardware was cheap enough to buy in bulk and rent away. Report Presentation - Gromov
30 Why Cloud Compu6ng l l New Applica6ons - Mobile Apps - Huge Parallel Apps - Analy6cs - Desktop Extension U6lity Classes - Storage (S3) - Dev Pla`orms (Google AppEngine) - Computa6on (EC2) Report Presentation - Gromov
31 Business Model l Trade Off Equa6on: If the cost of ren6ng a cloud for some 6me is cheaper than sehng up a datacenter and using it for the same 6me, then use the cloud. l l Cost of datacenter factors in Utilization If Utilization = 1 the two sides look the same but this never happens. Report Presentation - Gromov
32 l Without cloud - Risky Business Model - Having too few resources can cause costumer loss (10% of affected will leave) - Having too many resources is expensive l With cloud - Less Risk - Can grow and shrink on demand - If cloud costs a lidle more this is outweighed by smaller risk. Report Presentation - Gromov
33 Business Model l Cost Report Presentation - Gromov
34 Obstacles and Opportuni6es l Availability of Service - If cloud goes down users suffer + Cloud providers are predy good about not failing + Help prevent DDoS extor6on by scaling up quickly and for cheaper than the demands l Data Lock- In - User can't get data from cloud + Can charge more for beder APIs and Services Report Presentation - Gromov
35 Obstacles and Opportuni6es l Data Confiden6ality and Auditability - Users concerned about their data + Government rules in place to regulate this + No fundamental obstacles to making cloud as secure as in- house environment Report Presentation - Gromov
36 Obstacles and Opportuni6es l Data Transfer Bodleneck - Takes a long 6me to transfer a huge data to the cloud - Also could take a long 6me inside of the clouds network + Drive networks to be faster Report Presentation - Gromov
37 Obstacles and Opportuni6es l Performance Unpredictability - CPU is fine but I/O can be slow + Beder scheduling + Flash, High Performance Compu6ng l Scalable Storage - By demand storage - Infinite capacity + Develop new storage systems Report Presentation - Gromov
38 Obstacles and Opportuni6es l l Bugs - Hard to find bug on huge distributed system + VMs allow for greater low level debugging than physical hardware Scaling Quickly - Pay as you go is difficult with Computa6on - More expensive to leave machine with high load + Figure out predic6ve model to scale CPUs up and down. Report Presentation - Gromov
39 Obstacles and Opportuni6es l Reputa6on Fate Sharing - 1 Bad costumer can make whole cloud look bad + Can charge for special trusted account l SoYware Licensing - Unclear how to sell license to proprietary soyware on open source cloud + Can charge a bit more for cloud usage + Long term- commitment deals Report Presentation - Gromov
40 l Good things Review - Good explana6on of cloud compu6ng - Well defined terms - Paper is accessible to both tech and non- tech people - Solid examples of real life cases - Good outline of obstacles and opportuni6es - Good data presenta6on Report Presentation - Gromov
41 Review l Bad things - Somewhat repe66ve - What are the requirements of cloud providers? - Opportuni6es are not well defined in some cases - Lidle discussion of technical aspect of clouds - OYen talks about a lot but says lidle Report Presentation - Gromov
42 Post Paper Thoughts l State of cloud compu6ng today - EC2 - Large Instance l 7.5 GiB memory, 4 EC2 Compute Units (2 virtual cores with 2 EC2 Compute Units each), 850 GB, 64 Bit, 500 Mbps I/O - Auto Scaling - Elas6c Load Balancing for performance - Intra Amazon transfer is mostly free. Store on S3 process on EC2 Report Presentation - Gromov
43 Post Paper Thoughts l How do cloud providers create the illusion of unlimited hardware? - In terms of space? - CPUs? Report Presentation - Gromov
44 Post Paper Thoughts l Have there been new issues and/or risks iden6fied with the increasing popularity of cloud compu6ng? Report Presentation - Gromov
45 Post Paper Thoughts l This paper seems a bit biased towards cloud applica6ons. What kind of large scale development would not be good for the cloud? Report Presentation - Gromov
46 Discussion Topics What other challenges does cloud computing raise? Do you agree with this quote: There are no fundamental obstacles to making a cloud-computing environment as secure as the vast majority of in-house IT environments? What is the cloud economics equation missing?
47 Discussion Topics What other challenges does cloud computing raise? Global energy consumption: is it better to run in optimized cloud and transfer data back and forth OR run locally on less optimized devices? Do you agree with this quote: There are no fundamental obstacles to making a cloud-computing environment as secure as the vast majority of in-house IT environments? Lack of trust in cloud providers changes game fundamentally What is the cloud economics equation missing? Quality of service: availability, reliability, etc. how to put a value on those?
48 Outline A history of cloud computing (Roxana) Slides were inspired by Armando Fox presentation on cloud computing history for the UC Berkeley s CS-10 course General challenges (Dmitryi) Above the clouds: A Berkeley view of cloud computing. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, M. Zaharia. Technical Report UCB/EECS , Specific challenge: Side-channel leakage (Deepika) Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. In Proceedings of the ACM Conference on Computing Communications Security (CCS), Further challenges (Roxana)
49 Hey, You, Get Off of My Cloud Exploring Information Leakage in Third-Party Compute Clouds By Thomas Ristenpart, Eran Tromer, Hovav Shacham and Stefan Savage Presented by: Deepika Tunikoju
50 Agenda About the paper Introduction Not a goal Goal Technical overview Merits Demerits Solutions proposed Amazon s response Questions and discussion points
51 About the paper University of California, San Diego, USA Thomas Ristenpart, Hovav Shacham, Stefan Savage Massachusetts Institute of Technology, Cambridge, USA Eran Tromer Published in CCS 09 Proceedings of the 16th ACM conference on Computer and communications security Total citations 117 Total downloads 3838
52 Introduction Third-party computing clouds provide infrastructure for hosting data and software They provide several benefits such as economies of scale Dynamic provisioning Low capital expenditure Like every coin, it has a flip-side: Risk of handing over confidential data and software to cloud providers Sharing physical resources with unknown parties(other tenants of cloud)
53 Not a Goal Malicious behavior by the cloud provider Traditional threat where the attacker attempts to exploit the vulnerabilities of the software
54 Goal Exploring the practicality of mounting cross VM attacks in existing third-party compute clouds. Focus on EC2 and then generalize to all compute clouds such as Microsoft s Windows Azure, Rackspace s Mosso etc. Utilize only standard customer capabilities to compromise the privacy. Use CPU s data caches for cross-vm side channel information leakage.
55 Hey! You! Get off of my cloud Don't hang around 'cause two's a crowd n my cloud By The Rolling Stones, 1965.
56 Overview The attack contains two main steps: Placement Extraction
57 Technical Overview Placement: Cloud cartography Determining co-residence Matching Domain 0 IP address Small packet round trip times Numerically close IP addresses Extraction: Cross VM information leakage Measuring cache usage Load based co-residence detection Estimating traffic rates Keystroke timing attack
58 Determining co-residence Matching Dom 0 IP addresses Small packet round trip times Numerically close internal IP addresses Load based co-residence detection
59 Prime Trigger Probe victim attacker cache
60 Demerits Cache based covert channel working to be explained in more depth as it is the heart of the research All experiments were conducted assuming no other VMs are present on the co-resident victim VM, attacker VM and Domain0 VM. Key stroke attack performed on EC2-like environment but not EC2. Scans ports 80 and 443 only leaving out several other public services on EC2
61 Merits Provides in depth background before diving into their research idea Supports all the assumptions by proving directly or indirectly through the experiments Structured experiment with various phases one leading to another All experiments done on EC2 environment Cost-effective solution is proposed at the end Motivated the cloud providers to investigate potential exploits and loopholes and making efforts to bolster security Effect of various parameters analyzed such as zone, account and time of day.
62 Solutions Proposed Obfuscate the internal structure of services and placement policy Side channels must be anticipated and blinded Foolproof solution: Users must be allocated physical machines populated by only their VMs or known harmless VMs.
63 Amazon s response "The side channel techniques presented are based on testing results from a carefully controlled lab environment with configurations that do not match the actual Amazon EC2 environment." "As the researchers point out, there are a number of factors that would make such an attack significantly more difficult in practice. (such as noise from other VMs and victim and attacker being able to co-ordinate as shown in Prime- Trigger-Probe method) ighting_vulnerabilities_its_cloud_service Officials from mazon characterized the attack described in the report as "hypothetical," and one that would be "significantly more difficult in practice."
64 Questions and discussions.
65 Discussion Topics A weakness is only a vulnerability if it s worth exploiting. Does this paper prove the existence or worthness of a vulnerability? Why do you think Amazon exhibits these vulnerabilities? Would allowing users to specify where to run their instances be better, worse, or the same for security? What are the disadvantages of a random placement policy?
66 Outline A history of cloud computing (Roxana) Slides were inspired by Armando Fox presentation on cloud computing history for the UC Berkeley s CS-10 course General challenges (Dmitryi) Above the clouds: A Berkeley view of cloud computing. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, M. Zaharia. Technical Report UCB/EECS , Specific challenge: Side-channel leakage (Deepika) Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. In Proceedings of the ACM Conference on Computing Communications Security (CCS), Further challenges (Roxana)
67 Additional Data-related Challenges Both of today s papers assume trust in the cloud provider But should the provider always be trusted?
68 Additional Data-related Challenges Both of today s papers assume trust in the cloud provider But should the provider always be trusted? Weak and dynamic contractual agreements (ToS) result in weak assurances by the cloud Provider could respond to subpoenas without client s knowledge or control Provider may have monetary incentives to reveal your data to unintended parties (ad companies, insurance companies) Provider may want to lower replication factors for your long-unused data to save on storage costs Provider may want to keep your data even after you request its deletion to be able to mine it
69 Next Class: Crypto Solutions for Cloud Security Public key encryption with keyword search. D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. In Proceedings of the IACR Annual Eurocrypt Conference, CryptDB: Protecting Confidentiality with Encrypted Query Processing. Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. In Proceedings of SOSP, Assignments for next time: 1. Submit your project description by next time (Feb 11) PDF or TXT format please, send to both TA and instructor 2. Sign up for paper presentations by next time (Feb 11) Send this to TA If you don't sign up, we will assign paper ourselves
Distributed Systems. Lec 2: Example use cases: Cloud computing, Big data, Web services
Distributed Systems Lec 2: Example use cases: Cloud computing, Big data, Web services 1 Example Use Cases Cloud computing (today) What it means and how it began Big data (today) Role of distributed systems
More informationDistributed Systems [Fall 2012]
Distributed Systems [Fall 2012] [W4995-2] Lec 2: Example use cases: The Web and cloud computing 1 Lab 0: C/C++ Warm-Up (Due Sept 14) There will be an initial C/C++ warm-up lab (Lab 0) Use lab to figure
More informationHEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE IN THIRD-PARTY COMPUTE CLOUDS T. Ristenpart, H. Shacham, S. Savage UC San Diego E. Tromer MIT CPCS 722: Advanced Systems Seminar Ewa Syta GET
More informationHey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Clouds. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage
Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Clouds Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage UCSD MIT UCSD UCSD Today s talk in one slide Third-party
More informationEvripidis Paraskevas (ECE Dept. UMD) 04/09/2014
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds (T. Ristenpart, Eran Tromer, Hovav Schacham and Stefan Savage CCS 2009) Evripidis Paraskevas (ECE Dept. UMD) 04/09/2014
More informationPart V Applications. What is cloud computing? SaaS has been around for awhile. Cloud Computing: General concepts
Part V Applications Cloud Computing: General concepts Copyright K.Goseva 2010 CS 736 Software Performance Engineering Slide 1 What is cloud computing? SaaS: Software as a Service Cloud: Datacenters hardware
More informationCloud Computing Trends
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered
More informationSecurity and Privacy in Cloud Computing
Security and Privacy in Cloud Computing Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 1 01/25/2010 Welcome to the class Administrative details When? : Monday 3pm-3.50pm Where?: Shaffer
More informationCloud computing security
Cloud computing security Exploring information leakage in third-party compute clouds Yangchun Fu November 18 th, 2011 Outline 1 Introduction 2 EC2 cloud cartography 3 Co-residence 4 side-channel cross-vm
More informationSummary of Cloud Compu.ng (CC) from the paper Abovce the Clouds: A Berkeley View of Cloud Compu.ng (Feb. 2009)
Summary of Cloud Compu.ng (CC) from the paper Abovce the Clouds: A Berkeley View of Cloud Compu.ng (Feb. 2009) Defini.ons (I) Cloud Compu)ng refers to both the applica)ons delivered as services over the
More informationA Review on "Above the Clouds: A Berkeley View of Cloud Computing (Armbrust, Fox, Griffith at.el.)"
A Review on "Above the Clouds: A Berkeley View of Cloud Computing (Armbrust, Fox, Griffith at.el.)" Introduction: Cloud computing is the physical form of "computing as a utility". What is Cloud Computing:
More informationHow to Build a Data Center?
Next up Cloud Compu-ng Warehouse scale computers How to build/program data centers Google so?ware stack GFS BigTable Sawzall Chubby Map/reduce What is cloud compu-ng Illusion of infinite compu-ng resources
More informationData Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
More informationMTAT.08.027 Basics of Cloud Computing (3 ECTS) Satish Srirama satish.srirama@ut.ee
MTAT.08.027 Basics of Cloud Computing (3 ECTS) Satish Srirama satish.srirama@ut.ee Course Purpose Introduce cloud computing concepts Introduce cloud providers and usage scenarios Introduction to distributed
More informationAn Overview on Important Aspects of Cloud Computing
An Overview on Important Aspects of Cloud Computing 1 Masthan Patnaik, 2 Ruksana Begum 1 Asst. Professor, 2 Final M Tech Student 1,2 Dept of Computer Science and Engineering 1,2 Laxminarayan Institute
More informationCloud Computing: Obstacles & Opportunities
Image: John Curley http://www.flickr.com/photos/jay_que/1834540/ UC Berkeley Cloud Computing: Obstacles & Opportunities David Patterson, UC Berkeley Reliable Adaptive Distributed Systems Lab 1 Outline
More informationDISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
More informationBasics of Cloud Computing
Basics of Cloud Computing MTAT.08.027 Basics of Cloud Computing (3 ECTS) MTAT.08.011 Basics of Grid and Cloud Computing Satish Srirama satish.srirama@ut.ee Course Purpose Introduce cloud computing concepts
More informationCloud computing. Examples
Cloud computing Cloud computing Web Systems and Algorithms Cloud Computing Chris Brooks Department of Computer Science University of San Francisco What is cloud computing? What separates it from: grid
More informationCloud computing. Scaling Management
09 Cloud Computing Cloud computing Computing technology in which data and/or computation are outsourced to a massive scale, multi-user infrastructure that is managed by a third-party. Appeared gradually
More informationIntroduction to Cloud Computing
Discovery 2015: Cloud Computing Workshop June 20-24, 2011 Berkeley, CA Introduction to Cloud Computing Keith R. Jackson Lawrence Berkeley National Lab What is it? NIST Definition Cloud computing is a model
More informationØ Teaching Evaluations. q Open March 3 through 16. Ø Final Exam. q Thursday, March 19, 4-7PM. Ø 2 flavors: q Public Cloud, available to public
Announcements TIM 50 Teaching Evaluations Open March 3 through 16 Final Exam Thursday, March 19, 4-7PM Lecture 19 20 March 12, 2015 Cloud Computing Cloud Computing: refers to both applications delivered
More informationAre Cache Attacks on Public Clouds Practical?
Are Cache Attacks on Public Clouds Practical? Thomas Eisenbarth Joint work with Gorka Irazoqui, Mehmet Sinan Inci, Berk Gulmezoglu and Berk Sunar WPI - 10/19/2015 Outline Cloud Computing and Isolation
More informationCloud Based Instructional Resources for Distance Learning
Cloud Based Instructional Resources for Distance Learning Noah Sturdevant Stamford International University Bangkok, Thailand Abstract Technology has advanced sufficiently, especially in the area of communication,
More informationFrom mini-clouds to Cloud Computing
From mini-clouds to Cloud Computing Boris Mejías, Peter Van Roy Université catholique de Louvain Belgium {boris.mejias peter.vanroy}@uclouvain.be Abstract Cloud computing has many definitions with different
More informationA Survey on Build Private Cloud Computing implementation tools 1 Rana M Pir, 2 Rumel M S Pir, 3 Imtiaz U Ahmed 1 Lecturer, 2 Assistant Professor, 3 Lecturer 1 Leading University, Sylhet Bangladesh, 2 Leading
More informationCS573 Data privacy and security in the cloud. Slide credits: Ragib Hasan, Johns Hopkins University
CS573 Data privacy and security in the cloud Slide credits: Ragib Hasan, Johns Hopkins University What is Cloud Computing? Let s hear from the experts 2 What is Cloud Computing? The infinite wisdom of
More informationThe Hidden Extras. The Pricing Scheme of Cloud Computing. Stephane Rufer
The Hidden Extras The Pricing Scheme of Cloud Computing Stephane Rufer Cloud Computing Hype Cycle Definition Types Architecture Deployment Pricing/Charging in IT Economics of Cloud Computing Pricing Schemes
More informationCloud Computing and Amazon Web Services
Cloud Computing and Amazon Web Services Gary A. McGilvary edinburgh data.intensive research 1 OUTLINE 1. An Overview of Cloud Computing 2. Amazon Web Services 3. Amazon EC2 Tutorial 4. Conclusions 2 CLOUD
More informationCopyright IEEE. Citation for the published paper:
Copyright IEEE. Citation for the published paper: This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of BTH's products
More informationAbove the Clouds A Berkeley View of Cloud Computing
UC Berkeley Above the Clouds A Berkeley View of Cloud Computing UC Berkeley RAD Lab Presentation at RPI, September 2011 1 Outline What is it? Why now? Cloud killer apps Economics for users Economics for
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationPRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS
PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,
More informationCloud Computing ECPE 293A. Introduc1on
Cloud Computing ECPE 293A Introduc1on 2 3 Introductions Introduce yourself Name Undergrad major Interests Hardware which area? SoAware which area? 4 = Looking at pictures of clouds with computers 5 Cloud
More informationSecurity Issues On Cloud Computing
Security Issues On Cloud Computing Pratibha Tripathi #1, Mohammad Suaib #2 1 M.Tech(CSE), Second year 2 Research Guide # Department of Computer Science and Engineering Abstract Integral University, Lucknow
More informationCloud Computing Is In Your Future
Cloud Computing Is In Your Future Michael Stiefel www.reliablesoftware.com development@reliablesoftware.com http://www.reliablesoftware.com/dasblog/default.aspx Cloud Computing is Utility Computing Illusion
More informationCloud computing: benefits, risks and recommendations for information security
Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation
More informationDISTRIBUTED SYSTEMS AND CLOUD COMPUTING. A Comparative Study
DISTRIBUTED SYSTEMS AND CLOUD COMPUTING A Comparative Study Geographically distributed resources, such as storage devices, data sources, and computing power, are interconnected as a single, unified resource
More informationCloud Design and Implementation. Cheng Li MPI-SWS Nov 9 th, 2010
Cloud Design and Implementation Cheng Li MPI-SWS Nov 9 th, 2010 1 Modern Computing CPU, Mem, Disk Academic computation Chemistry, Biology Large Data Set Analysis Online service Shopping Website Collaborative
More informationResearch Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD
More informationOutline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
More informationHigh Performance Computing Cloud Computing. Dr. Rami YARED
High Performance Computing Cloud Computing Dr. Rami YARED Outline High Performance Computing Parallel Computing Cloud Computing Definitions Advantages and drawbacks Cloud Computing vs Grid Computing Outline
More informationDynamic Resource Pricing on Federated Clouds
Dynamic Resource Pricing on Federated Clouds Marian Mihailescu and Yong Meng Teo Department of Computer Science National University of Singapore Computing 1, 13 Computing Drive, Singapore 117417 Email:
More informationChapter 7: Distributed Systems: Warehouse-Scale Computing. Fall 2011 Jussi Kangasharju
Chapter 7: Distributed Systems: Warehouse-Scale Computing Fall 2011 Jussi Kangasharju Chapter Outline Warehouse-scale computing overview Workloads and software infrastructure Failures and repairs Note:
More informationCS 91: Cloud Systems & Datacenter Networks
CS 91: Cloud Systems & Datacenter Networks The Datacenter Environment Kevin Webb Swarthmore College September 3, 2014 Announcements Sign up for piazza If you didn t just add the course, you should have
More informationA Web Base Information System Using Cloud Computing
A Web Base Information System Using Cloud Computing Zainab Murtadha, Mohammad Amin Roshanasan Abstract: Cloud Computing is the new field that was invented and developed during a period not so long ago.
More informationDatacenters and Cloud Computing. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/cs5540/spring2014/index.html
Datacenters and Cloud Computing Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/cs5540/spring2014/index.html What is Cloud Computing? A model for enabling ubiquitous, convenient, ondemand network
More informationBusiness Cloud Systems Challenges and Uncertainty
1 Business Cloud Systems Challenges and Uncertainty Dr. Adnan Agbaria SAP Labs 1 Computing Evolution Time 1970 1980 1990 2000 2010 Serial computing 2020 Cluster computing Grid computing Cloud computing?
More informationCloud security CS642: Computer Security Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu University of Wisconsin CS 642
Cloud security CS642: Computer Security Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu University of Wisconsin CS 642 Announcements Take- home final versus in- class Homework
More informationIntroduction to Cloud Computing
Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services
More informationData Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationCLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
More informationAbove the Clouds: A Berkeley View of Cloud Computing"
UC Berkeley Above the Clouds: A Berkeley View of Cloud Computing" Armando Fox, UC Berkeley Reliable Adaptive Distributed Systems Lab 2009 Image: John Curley http://www.flickr.com/photos/jay_que/1834540/
More informationWhat Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos
Research Challenges Overview May 3, 2010 Table of Contents I 1 What Is It? Related Technologies Grid Computing Virtualization Utility Computing Autonomic Computing Is It New? Definition 2 Business Business
More informationPutchong Uthayopas, Kasetsart University
Putchong Uthayopas, Kasetsart University Introduction Cloud Computing Explained Cloud Application and Services Moving to the Cloud Trends and Technology Legend: Cluster computing, Grid computing, Cloud
More informationHow To Understand Cloud Computing
Data-intensive computing systems Cloud Computing University of Verona Computer Science Department Damiano Carra Acknowledgements! Credits Part of the course material is based on slides provided by the
More informationCSE543 Computer and Network Security Module: Cloud Computing
CSE543 Computer and Network Security Module: Computing Professor Trent Jaeger 1 Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory 2 Computing Is Here Systems and Internet
More informationCIT 668: System Architecture
CIT 668: System Architecture Cloud Security Topics 1. The Same Old Security Problems 2. Virtualization Security 3. New Security Issues and Threat Model 4. Data Security 5. Amazon Cloud Security Data Loss
More informationSecurity of Cloud Computing
1 University of Bath & BCS Council 26 March 2012 1 Thanks to Ali Kaafarani for the briefing How secure is cloud computing? How secure is c l o u d computing? the two questions are essentially equivalent,
More informationMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Arpitha.K 1,Aawini.T 2,Divya J. 3, Kalyani P 4, Prof. Sudhakar Avareddy 5 1,2,3,4 Department of CSE, BITM Bellary, Karnataka. 5 Department
More informationCloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More informationA Review of Load Balancing Algorithms for Cloud Computing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8297-8302 A Review of Load Balancing Algorithms for Cloud Computing Dr.G.N.K.Sureshbabu
More informationCloud Computing: Technical Challenges and CloudSim Functionalities
Cloud Computing: Technical Challenges and CloudSim Functionalities Firas D. Ahmed 1, Amer Al Nejam 2 1 Universiti Tenaga Nasional, College of Information Technology, Jalan IKRAM-UNITEN, 43000 Kajang, Malaysia
More informationCloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
More informationCloud Computing An Elephant In The Dark
Cloud Computing An Elephant In The Dark Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir
More informationRunning head: THE FUTURE OF CLOUD COMPUTING 1
Running head: THE FUTURE OF CLOUD COMPUTING 1 The Future of Cloud Computing Patrick O. Eronini Northwestern University THE FUTURE OF CLOUD COMPUTING 2 Abstract This paper examines the evolution of cloud
More informationCloud Computing an introduction
Prof. Dr. Claudia Müller-Birn Institute for Computer Science, Networked Information Systems Cloud Computing an introduction January 30, 2012 Netzprogrammierung (Algorithmen und Programmierung V) Our topics
More informationLi Sheng. lsheng1@uci.edu. Nowadays, with the booming development of network-based computing, more and more
36326584 Li Sheng Virtual Machine Technology for Cloud Computing Li Sheng lsheng1@uci.edu Abstract: Nowadays, with the booming development of network-based computing, more and more Internet service vendors
More informationEmerging Technologies In The Implementation Of ERP
Emerging Technologies In The Implementation Of ERP Dr. Sarvjit Singh Bhatia, Assistant Professor, Khalsa College Patiala, vincal67@rediffmail.com Vikram Gupta Assistant Professor, Khalsa College Patiala,
More informationSECURITY THREATS TO CLOUD COMPUTING
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD
More informationIndex Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,
More informationCLOUD PERFORMANCE TESTING - KEY CONSIDERATIONS (COMPLETE ANALYSIS USING RETAIL APPLICATION TEST DATA)
CLOUD PERFORMANCE TESTING - KEY CONSIDERATIONS (COMPLETE ANALYSIS USING RETAIL APPLICATION TEST DATA) Abhijeet Padwal Performance engineering group Persistent Systems, Pune email: abhijeet_padwal@persistent.co.in
More informationImpact of Applying Cloud Computing On Universities Expenses
IOSR Journal of Business and Management (IOSR-JBM) e-issn: 2278-487X, p-issn: 2319-7668. Volume 17, Issue 2.Ver. I (Feb. 2015), PP 42-47 www.iosrjournals.org Impact of Applying Cloud Computing On Universities
More informationLarge-scale Data Processing on the Cloud
Large-scale Data Processing on the Cloud MTAT.08.036 Lecture 1: Data analytics in the cloud Satish Srirama satish.srirama@ut.ee Course Purpose Introduce cloud computing concepts Introduce data analytics
More informationCLOUD COMPUTING: WHAT YOU SHOULD KNOW
CLOUD COMPUTING: WHAT YOU SHOULD KNOW There is hardly a topic creating more of a buzz in software industry, than the Cloud. Cloud computing is a dramatic shift in the way we think about providing computing
More informationMark Bennett. Search and the Virtual Machine
Mark Bennett Search and the Virtual Machine Agenda Intro / Business Drivers What to do with Search + Virtual What Makes Search Fast (or Slow!) Virtual Platforms Test Results Trends / Wrap Up / Q & A Business
More informationPublic Auditing for Shared Data in the Cloud by Using AES
Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer
More informationHeterogeneity-Aware Resource Allocation and Scheduling in the Cloud
Heterogeneity-Aware Resource Allocation and Scheduling in the Cloud Gunho Lee, Byung-Gon Chun, Randy H. Katz University of California, Berkeley, Yahoo! Research Abstract Data analytics are key applications
More informationWhat is Cloud Computing? Why call it Cloud Computing?
What is Cloud Computing? Why call it Cloud Computing? 1 Cloud Computing Key Properties Advantages Shift from CAPEX to OPEX Lowers barrier for starting a new business/project Can be cheaper even in the
More informationSECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE
SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of
More informationWINDOWS AZURE AND ISVS
WINDOWS AZURE AND ISVS A GUIDE FOR DECISION MAKERS DAVID CHAPPELL JULY 2009 SPONSORED BY MICROSOFT CORPORATION CONTENTS ISVs and Cloud Computing... 2 A Brief Overview of Windows Azure... 3 Technology...
More informationSecurity Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of
More informationSurvey On Cloud Computing
Survey On Cloud Computing 1,2 Heena I. Syed 1, Naghma A. Baig 2 Jawaharlal Darda Institute of Engineering & Technology, Yavatmal,M.S., India. 1 kauser.heena853@gmail.com 2 naghmabaig@gmail.com Abstract
More informationReallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b
Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan
More informationTechnology and Cost Considerations for Cloud Deployment: Amazon Elastic Compute Cloud (EC2) Case Study
Creating Value Delivering Solutions Technology and Cost Considerations for Cloud Deployment: Amazon Elastic Compute Cloud (EC2) Case Study Chris Zajac, NJDOT Bud Luo, Ph.D., Michael Baker Jr., Inc. Overview
More informationAmazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida
Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.
More informationData Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
More informationEnable Public Audit ability for Secure Cloud Storage
Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant
More informationBeyond the Internet? THIN APPS STORE FOR SMART PHONES BASED ON PRIVATE CLOUD INFRASTRUCTURE. Innovations for future networks and services
Beyond the Internet? Innovations for future networks and services THIN APPS STORE FOR SMART PHONES BASED ON PRIVATE CLOUD INFRASTRUCTURE Authors Muzahid Hussain, Abhishek Tayal Ashish Tanwer, Parminder
More informationData Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
More informationAbove the clouds: A Berkeley View of Cloud Computing
Partial Review-2 On the paper Above the clouds: A Berkeley View of Cloud Computing By Nikhil Ramteke Sr. No.- 07125 6. Cloud Computing Economics Observation in Cloud Economics mainly concerns with following
More informationPublic Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
More informationCloud Security Overview
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Security Overview Murat Kantarcioglu Outline Current cloud security techniques Amazon Web services Microsoft Azure Cloud Security Challengers
More informationCloud Computing and Amazon Web Services. CJUG March, 2009 Tom Malaher
Cloud Computing and Amazon Web Services CJUG March, 2009 Tom Malaher Agenda What is Cloud Computing? Amazon Web Services (AWS) Other Offerings Composing AWS Services Use Cases Ecosystem Reality Check Pros&Cons
More informationClouds vs Grids KHALID ELGAZZAR GOODWIN 531 ELGAZZAR@CS.QUEENSU.CA
Clouds vs Grids KHALID ELGAZZAR GOODWIN 531 ELGAZZAR@CS.QUEENSU.CA [REF] I Foster, Y Zhao, I Raicu, S Lu, Cloud computing and grid computing 360-degree compared Grid Computing Environments Workshop, 2008.
More informationWhen talking about hosting
d o s Cloud Hosting - Amazon Web Services Thomas Floracks When talking about hosting for web applications most companies think about renting servers or buying their own servers. The servers and the network
More informationISACA Presentation. Cloud, Forensics and Cloud Forensics
ISACA Presentation Cloud, Forensics and Cloud Forensics Agenda What is the Cloud What is Forensics Challenges Cloud poses to Information Security and Forensic Investigations Using Cloud technologies to
More informationOptimal Service Pricing for a Cloud Cache
Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,
More informationCh. 4 - Topics of Discussion
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 6 Cloud Platform Architecture over Virtualized Data Centers Part -4 Cloud Security and Trust Management Text Book: Distributed
More informationReputation in Cloud Computing
Reputation in Cloud Computing Adrian Yanes Aalto University School of Science and Technology adrian.yanes@aalto.fi Abstract Nowadays the concept of cloud computing is getting popular around the Net. The
More information