Defining, Securing, and Standardizing Cloud Computing

Size: px
Start display at page:

Download "Defining, Securing, and Standardizing Cloud Computing"

Transcription

1 Defining, Securing, and Standardizing Cloud Computing Lee Badger and Chris Johnson Sep. 28, 2010

2 Outline 1 2 Brief review of clouds. few security issues in the cloud. - virtualization 3 SCP 4 Introduction to Standards cceleration to Jumpstart doption of Cloud Computing (SJCC). Note: ny mention of a vendor or product is NOT an endorsement or recommendation. 2

3 1 Brief review of clouds. 3

4 Cloud Computing Computers in a network, providing service. Users with network access. Convenient remote computer rental.... In any quantity. Feels local. technical or business innovation?

5 Working Cloud Definition (1 of 3) 5 Key Characteristics 1 2 On-demand self service $ renting takes minutes Ubiquitous network access 4 $( $ ( Elasticity Jan Feb Mar = rent it in any quantity Dec Jan ) ) 5 Resource pooling anywhere / any device reduces cost 3 Metered use = off off on conserve resources 5

6 Working Cloud Definition (1 of 3) 5 Key Characteristics 1 2 On-demand self service $ renting takes minutes Ubiquitous network access 4 $( $ ( Elasticity Jan Feb Mar = rent it in any quantity Dec Jan ) ) 5 Resource pooling anywhere / any device reduces cost 3 Metered use = conserve resources off off on where is my workload? 6

7 Working Cloud Definition (2 of 3) 3 Deployment Models Cloud Provider Cloud Customer 1 Software as a Service (SaaS) dmin control Total control pplication e.g., mail Middleware e.g.,.net Operating System Hardware Limited dmin control No control 2 Platform as a Service (PaaS) dmin control Total control pplication Middleware Operating System Hardware Limited programmability No control 3 Infrastructure as a Service (IaaS) No control dmin control pplication Middleware Operating System Hypervisor Hardware Total control No control 7

8 Working Cloud Definition (3 of 3) 4 Delivery Models Cloud Provider Infrastructure Cloud Customer Data Center 1 Private 2 Community management 3 Public 4 Hybrid 8

9 2 few security issues in the cloud. - virtualization 9

10 What is Security? Traditionally, approximately: confidentiality: your data not leaked integrity: your data or system not corrupted availability: your system keeps running What does this mean in the cloud? without user physical control Some issues with dynamically changing infrastructure key management virtualization 10

11 Some Traditional Ideas Subject Low Reference Monitor Object Low SubjectHigh 1) non-bypassable 2) protected from tampering 3) simple ObjectHigh Bell/Lapadule (BLP) model no read up no write down Biba integrity model inverse of BLP rules Clark/Wilson integrity invariant maintenance via transactions Basic modeling approach: secure initial state security-preserving state transition security-preserving state transition security-preserving state transition... credit: nderson report from early 1970 s (reference monitor).

12 Clouds Might Contain Reference Monitors (but it s a different situation) Queriess, Cmds Queriess, Cmds reports reports Users Logical IaaS Cloud rchitecture Cloud Manager DOS Legend DOS - Data Object Storage PLS Persistent Local Storage CM Computer Manager... network WN LN Cluster Manager 1 PLS Cluster PLS... Manager 2 Cluster Manager N PLS CM 1 CM 2... CM N... Computer CM N CM 1 CM 2... CM N Manager (CM) J credit: this figure inspired by the Eucalyptus system [2][9] and the Ubuntu Enterprise Cloud [10]. CM 1... vm 1 hypervisor vm 2... vm N 12

13 Hardware Virtualization applications OS, e.g., Linux VM applications OS, e.g., Win32 VM VMM hardware... simple picture! But implementation is complex. Virtual Machines (VMs) can be: suspended/copied/moved/lost/recovered.

14 Hardware Virtualization (Box View) 1 2 dom0 Guest OS Guest OS VMM HW type 1 Para-virtualization Guest OS I/O VMM Host OS HW type 2 Guest OS VMM dom0 Guest OS Guest OS VMM HW type 1 Full virtualization Guest OS I/O VMM Host OS HW type 2 Guest OS VMM 3 Terminology Guest OS : runs only on VMM Host OS : runs only on HW Domain : virtual machine on VMM Hypervisor : virtual machine monitor 4 x86 CPU mode ring 3 ring 2 ring 1 ring 0 Issue: Deprivileging ring 3 ring 0 Guest OS (kernel) Guest OS (kernel) VMM ring 3 ring 1 ring 0

15 Making x86 Virtualizable Using Binary Translation Guest OS kernel in ring 1 Running Basic blocks C B 2 Copy a newlyencountered basic block to the cache. ret C jmp Translation Cache (also in memory) B call instruction instruction SGDT instruction instruction call instruction instruction instruction instruction instruction instruction instruction call Guest OS kernel in ring 1 (if needed) VMM ring 0 1 Identify the next block by scanning instructions for a jump/call/etc (that ends a basic block). 3 Binary translate any prohibited instruction into a sequence that emulates it safely. 4 Run/rerun translated block at full speed. Technique used by VMware, in 1999.

16 Making x86 Virtualizable Using Extra Hardware Floating Point Data 17 rithmetic 26 Compare 14 Transcendental 8 Constants 7 Control 20 State management 2 SIMD 94 MMX 47 SSE 62 SSE2 69 SSE3 13 SSSE3 32 SSE Intel 64 General Purpose Data transfer 32 rithmetic 18 Logical 4 Shift/rotate 9 Bit/byte 23 Control transfer 31 String 18 I/O 8 Enter/leave 2 Flag control 11 Segment register 5 Misc VT-x Extensions 12 Safe mode 1 Intel version of x86-64 contains ~595 instructions. Hardware extensions make the instruction set virtualizable System bit mode 10

17 Original structure CPU mode ring 3 ring 2 ring 1 ring 0 Intel Virtual Machine Extensions (VMX) Host OS Host OS Host OS Host OS Host OS ring 3 Host OS ring 0 Legacy software runs in the expected rings, hopefully unaware. there is no software-visible bit indicates VMX non-root operation, Intel 64 manual. VMX non-root Deprivileged (very configurable). CPU State transitions Ring 0 VMXON VMXOFF VMXLUNCH VMXRESUME VMM VMX root VMXCLL side effects Many instructions cause faultlike VM exits: interrupts I/O events page table management privileged instructions, etc. VMM handles faults VM exit rate determines performance ddress translation is complex

18 How Complex is Virtualization? legend Source Lines Of Code 55,000,000 Debian Linux Operating system Virtualization system 35,000,000 20,000,000 15,000,000 Windows 95 Windows 2k Windows NT Red Hat Linux 3,000,000 1,000,000 60, Windows 3.1 VirtualBox Xen Qemu Bochs Kaffe VMM code counts generated using David. Wheeler's SLOCCount tool. Windows estimate from Bruce Schneier Linux estimates from Gonzalez-Barahona et al., and David Wheeler

19 Cloud Computing Security Lack of Visibility number of issues: complexity loss of (user) control network dependance multi-tenancy browser-dependence key management trusted platform module automated management compliance... 19

20 3 SCP 20

21 Is there a common thread among these Issues & Challenges? Lack of visibility into the cloud Lack of concrete evidence regarding the security of the cloud environment leads to varying degrees of fear, uncertainty and doubt Risk: We can t understand what we can t see Control and visibility varies depending on the delivery and deployment model Operating on Faith: Trusting absent proof or material evidence 21

22 What is needed? - Trust, But Verify bility to express security requirements Means of ensuring and reporting compliance Technical evidence that demonstrates how requirements are being met Metadata about the compliance report and technical evidence collected Common, uniform representations that foster interoperability across security products Security utomation Technical Evidence and rtifacts ctionable Information Organizational Knowledge 22

23 Role of Security utomation Express Security Requirements extensible Configuration Checklist Description Format (XCCDF) Standard XML for specifying checklists and for reporting results of checklist evaluation uthor checklists to assess hypervisors, guest operating systems and applications hosted in the cloud 23

24 Role of Security utomation Common, uniform representations that foster interoperability across security products Common Configuration Enumeration Common Vulnerabilities and Exposures Common Platform Enumeration 24

25 Role of Security utomation ssess and Report ssessment Details Open Vulnerability and ssessment Language Used to assess low-level machine state ble to provide detailed assessment results Language expresses the technical details for evaluating security settings 25

26 Future Scope of Security utomation Program Security utomation Expose and understand the nuances of these domains and activities within cloud computing environments Security utomation specifications are required in each domain/activity area to ensure true interoperability across the IT security landscape. Security utomation Domains Security utomation ctivities Legend

27 dditional Thoughts on utomation in the Cloud Temporal dimension is important Persistence Short duration State changes Cloud Resource Provisioning Cycles Monitoring change over the life of a cloud object Latency Object is gone before you even knew it was there Latency in assessment and results reporting 27

28 dditional Thoughts on utomation in the Cloud May require some new thinking on how we describe assets and systems Composition of ssets Clusters Hypervisor and VMs Vendor publication of well-documented PIs that allow us to evaluate security state and automated security checklist guidance 28

29 4 Introduction to Standards cceleration to Jumpstart doption of Cloud Computing (SJCC). Lee Badger Tim Grance Dawn Leaf 29

30 Important Cloud Computing Requirements interoperability: clouds work together portability: workloads can move around security: customer workloads protected (to the extent possible) Well-formulated standards could help, but they take time to evolve. 30

31 Short Term Standards Effort Until standards mature: What is needed is a process to test important cloud system requirements --- will provide that. SJCC Portable Interoperable Secure (as possible) Standards cceleration to Jumpstart doption of Cloud Computing 31

32 Use Cases Use Case: a description of how groups of users and their resources may interact with one or more cloud computing systems to achieve specific goals. Goal abstract use case Step 1 Step 2 Step a Step b Step I Step j OR OR... add concrete details case study 32

33 Use Cases Use Case: a description of how groups of users and their resources may interact with one or more cloud computing systems to achieve specific goals. Goal abstract use case Step 1 Step 2 Step a Step b Step I Step j OR OR... add concrete details case study Example: Parent $ Bank $ Student 33

34 Use Case Use Case: a description of how groups of users and their resources may interact with one or more systems to achieve specific goals. ctors: the active entities Goals: what the use case tries to achieve ssumptions: conditions assumed true Success Scenario 1 (name, IaaS, PaaS, SaaS) stepby-step narrative of what happens to achieve the use case goal Failure Conditions: what might go wrong Failure Handling: how to deal with known failures Success Scenario 2 (name, IaaS, PaaS, SaaS) nother narrative Failure Conditions: what might go wrong Failure Handling: how to deal with known failures... Credit: any source that inspired us We are using the approach of. Cockburn, slightly customized Cockburn: scope of application

35 SJCC Flow Cloud Standards Portal 1 Initial Use Cases Provided by Gov. 4 Success? Government-run Validation Exercises yes Use Cases Validated Specifications Reference Implementations 2 Legacy specifications Identified by Gov. Spec 1 Spec 2 Spec n Test 1 Test 2 Test n Proposed Specifications Reference Implementations 3 Generate Test cases specifications, use cases: provide insight on how clouds can work reference implementations: enable validation exercises continuously growing portal: new content added over time publically available: anyone can access 35

36 Use Case SP For now, a simple taxonomy 22 use cases more on the way uthors: Jeff Voas, Ramaswamy Chandramouli, Robert Patt-Corner, Robert Bohn, Tom Karygiannis, Tim Grance, Lee Badger. Credit: various use cases inspired by mazon, the Eucalyptus project, the DMTF, SNI, the libcloud project, and by Gaithersburg MD May 2010 use case workshop participants.

37 References [1] mazon Web Services, aws.amazon.com. [2] Eucalyptus: Technical Report on an Elastic Utility Computing rchitecture Linking Your Programs to Useful Systems, UCSB Computer Science Technical Report Number [3] IDC Enterprise Panel, ugust 2008 n=244 [4] Interoperable Clouds, White Paper from the Open Cloud Standards Incubator, Distributed Management Task Force, Version 1.0, DMTF Informational, Nov. 11, 2009, DSP-IS0101 [5] libcloud, [6] Open Virtualization Format Specification, DMTF Document Number DSP0243, Version 1.0, Feb. 22, [7] Cloud Storage Use Cases, Storage Network Industry ssociation, Version 0.5 rev 0, June 8, [8] Starting mazon EC2 with Mac OS X. Robert Sosinski. /starting-amazon-ec2-with-mac-os-x/ [9] The Eucalyptus Open-source Cloud-computing System, D. Nurmi, R. Wolski, C. Grzegorcyk, G. Obertelli, S. Soman, L. Youseff, D. Zagorodnov, in Proceedings of Cloud Computing and Its pplications, Oct [10] Ubuntu Enterprise Cloud rchitecture, S. Wardley, E. Goyer and N. Barcet, Technical White Paper, 2009, 37

38 Backup 38

39 VMM Implementation Quality Should Not be ssumed In 2007, Tavis Ormandy subjected 6 virtualization systems to guided random testing of their invalid instruction handling and I/O emulation. Bochs QEMU VMWare Xen nonymous 1 nonymous 2 178k SLOC 373k SLOC 910k SLOC ll of the systems failed the tests, most with arbitrary execution failures. Device emulation was a particular area of vulnerability. For details, see: taviso.decsystem.org/virtsec.pdf Reference: n Empirical Study into the Security Exposures to Host of Hostile Virtualized Environments, by Travis Ormandy. taviso.decsystem.org/virtsec.pdf Code counts generated using David. Wheeler's SLOCCount tool.

Clouds, Virtualization and Security or Look Out Below

Clouds, Virtualization and Security or Look Out Below Clouds, Virtualization and Security or Look Out Below Lee Badger Hardware Virtualization (Box View) 1 2 dom0 HW type 1 Para-virtualization I/O Host HW type 2 dom0 HW type 1 Full virtualization I/O Host

More information

Cloud Computing: Some Implications for Key Management

Cloud Computing: Some Implications for Key Management Cloud Computing: Some Implications for Key Management June 8, 2009 Lee Badger For those viewing via webcast, please submit questions for this presentation to kmwquestions@nist.gov Cloud Computing: Still

More information

Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC)

Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC) Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC) Lee Badger Dawn Leaf Dec. 7, 2010 : Mission To promote U.S. innovation and industrial competitiveness by advancing measurement science,

More information

US Government Driven Cloud. A panel discussion including: DMTF, Cloud Security Alliance, NIST and SNIA

US Government Driven Cloud. A panel discussion including: DMTF, Cloud Security Alliance, NIST and SNIA US Government Driven Cloud Computing Standards A panel discussion including: DMTF, Cloud Security Alliance, NIST and SNIA Lee Badger: Computer Scientist, Computer Security Division, National Institute

More information

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

Virtualization. Jukka K. Nurminen 23.9.2015

Virtualization. Jukka K. Nurminen 23.9.2015 Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,

More information

Cloud Computing #6 - Virtualization

Cloud Computing #6 - Virtualization Cloud Computing #6 - Virtualization Main source: Smith & Nair, Virtual Machines, Morgan Kaufmann, 2005 Today What do we mean by virtualization? Why is it important to cloud? What is the penalty? Current

More information

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines: Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between

More information

Server Virtualization Techniques Includes Slides from NIST (Lee Badger)

Server Virtualization Techniques Includes Slides from NIST (Lee Badger) Server Virtualization Techniques Includes Slides from (Lee Badger) genda Define Server Virtualization The Server Virtualization Sectrum Server virtualization solutions Similarities and differences OS Issues

More information

Virtualization. Types of Interfaces

Virtualization. Types of Interfaces Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity

More information

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information

More information

Virtualization. Pradipta De pradipta.de@sunykorea.ac.kr

Virtualization. Pradipta De pradipta.de@sunykorea.ac.kr Virtualization Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation

More information

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey

More information

Data Centers and Cloud Computing

Data Centers and Cloud Computing Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers

More information

Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361

Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines

More information

The Eucalyptus Open-source Cloud Computing System

The Eucalyptus Open-source Cloud Computing System The Eucalyptus Open-source Cloud Computing System Chris Grzegorczyk, Dan Nurmi, Graziano Obertelli, Rich Wolski, Sunil Soman, Lamia Youseff, Dmitrii Zagorodnov University of California, Santa Barbara Cloud

More information

9/26/2011. What is Virtualization? What are the different types of virtualization.

9/26/2011. What is Virtualization? What are the different types of virtualization. CSE 501 Monday, September 26, 2011 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,

More information

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned

More information

Linux/Open Source and Cloud computing Wim Coekaerts Senior Vice President, Linux and Virtualization Engineering

Linux/Open Source and Cloud computing Wim Coekaerts Senior Vice President, Linux and Virtualization Engineering Linux/Open Source and Cloud computing Wim Coekaerts Senior Vice President, Linux and Virtualization Engineering NIST Definition of Cloud Computing Cloud computing is a model for enabling convenient, on-demand

More information

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization CS 695 Topics in Virtualization and Cloud Computing More Introduction + Processor Virtualization (source for all images: Virtual Machines: Versatile Platforms for Systems and Processes Morgan Kaufmann;

More information

Virtualization Technology. Zhiming Shen

Virtualization Technology. Zhiming Shen Virtualization Technology Zhiming Shen Virtualization: rejuvenation 1960 s: first track of virtualization Time and resource sharing on expensive mainframes IBM VM/370 Late 1970 s and early 1980 s: became

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the

More information

Chapter 5 Cloud Resource Virtualization

Chapter 5 Cloud Resource Virtualization Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.

More information

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits: Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique

More information

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to

More information

matasano Hardware Virtualization Rootkits Dino A. Dai Zovi

matasano Hardware Virtualization Rootkits Dino A. Dai Zovi Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda Introductions Virtualization (Software and Hardware) Intel VT-x (aka Vanderpool ) VM Rootkits Implementing a VT-x based Rootkit Detecting Hardware-VM

More information

ANALYSIS OF RISKS AND SKEPTICISM OF ORGANIZATIONAL CLOUD COMPUTING

ANALYSIS OF RISKS AND SKEPTICISM OF ORGANIZATIONAL CLOUD COMPUTING ANALYSIS OF RISKS AND SKEPTICISM OF ORGANIZATIONAL CLOUD COMPUTING Richmond Ikechukwu Ibe (Ph.D.) Assistant Professor of business Management, Jarvis Christian College, Howkins, TX United States of America

More information

CS 695 Topics in Virtualization and Cloud Computing. Introduction

CS 695 Topics in Virtualization and Cloud Computing. Introduction CS 695 Topics in Virtualization and Cloud Computing Introduction This class What does virtualization and cloud computing mean? 2 Cloud Computing The in-vogue term Everyone including his/her dog want something

More information

Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006

Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006 Rich Uhlig, et.al, Intel Virtualization Technology, Computer, published by the IEEE Computer Society, Volume 38, Issue 5, May 2005. Pages 48 56. Jukka Ylitalo Tik-79.5401 TKK, April 24, 2006 Outline of

More information

CS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction

CS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction CS 695 Topics in Virtualization and Cloud Computing and Storage Systems Introduction Hot or not? source: Gartner Hype Cycle for Emerging Technologies, 2014 2 Source: http://geekandpoke.typepad.com/ 3 Cloud

More information

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011 A Strawman Model NIST Cloud Computing Reference Architecture and Taxonomy Working Group January 3, 2011 Objective Our objective is to define a neutral architecture consistent with NIST definition of cloud

More information

International Symposium on Grid Computing 2009 April 23th, Academia Sinica, Taipei, Taiwan

International Symposium on Grid Computing 2009 April 23th, Academia Sinica, Taipei, Taiwan International Symposium on Grid Computing 2009 April 23th, Academia Sinica, Taipei, Taiwan New resource provision paradigms for Grid Infrastructures: Virtualization and Cloud Ruben Santiago Montero Distributed

More information

Virtualization in Linux KVM + QEMU

Virtualization in Linux KVM + QEMU CS695 Topics in Virtualization and Cloud Computing KVM + QEMU Senthil, Puru, Prateek and Shashank 1 Topics covered KVM and QEMU Architecture VTx support CPU virtualization in KMV Memory virtualization

More information

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981!

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981! Demystifying Cloud Computing What is Cloud Computing? First, a little history. Tim Horgan Head of Cloud Computing Centre of Excellence http://cloud.cit.ie 1" 2" Mainframe Era (1944-1978) Workstation Era

More information

SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen feisal@techumen.com

SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen feisal@techumen.com SECURING HEALTH INFORMATION IN THE CLOUD Feisal Nanji, Executive Director, Techumen feisal@techumen.com Conflict of Interest Disclosure Feisal Nanji, MPP, CISSP Has no real or apparent conflicts of interest

More information

Virtualization. ! Physical Hardware. ! Software. ! Isolation. ! Software Abstraction. ! Encapsulation. ! Virtualization Layer. !

Virtualization. ! Physical Hardware. ! Software. ! Isolation. ! Software Abstraction. ! Encapsulation. ! Virtualization Layer. ! Starting Point: A Physical Machine Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D.

More information

Course Title: Virtualization Security, 1st Edition

Course Title: Virtualization Security, 1st Edition Course Title: Virtualization Security, 1st Edition Page 1 of 7 Virtualization Security Copyright by EC-Council Press Course Description: The DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES is comprised

More information

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced

More information

FREE AND OPEN SOURCE SOFTWARE FOR CLOUD COMPUTING SERENA SPINOSO (serena.spinoso@polito.it) FULVIO VALENZA (fulvio.valenza@polito.

FREE AND OPEN SOURCE SOFTWARE FOR CLOUD COMPUTING SERENA SPINOSO (serena.spinoso@polito.it) FULVIO VALENZA (fulvio.valenza@polito. + FREE AND OPEN SOURCE SOFTWARE FOR CLOUD COMPUTING SERENA SPINOSO (serena.spinoso@polito.it) FULVIO VALENZA (fulvio.valenza@polito.it) + OUTLINE INTRODUCTION OF CLOUD DEFINITION OF CLOUD BASIC CLOUD COMPONENTS

More information

Cloud Computing. Adam Barker

Cloud Computing. Adam Barker Cloud Computing Adam Barker 1 Overview Introduction to Cloud computing Enabling technologies Different types of cloud: IaaS, PaaS and SaaS Cloud terminology Interacting with a cloud: management consoles

More information

Clouds Under the Covers. Elgazzar - CISC 886 - Fall 2014 1

Clouds Under the Covers. Elgazzar - CISC 886 - Fall 2014 1 Clouds Under the Covers KHALID ELGAZZAR GOODWIN 531 ELGAZZAR@CS.QUEENSU.CA Elgazzar - CISC 886 - Fall 2014 1 References Understanding Full Virtualization, Paravirtualization, and Hardware Assist White

More information

A Gentle Introduction to Cloud Computing

A Gentle Introduction to Cloud Computing A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years

More information

Virtualization for Cloud Computing

Virtualization for Cloud Computing Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources

More information

Cloud OS. Philip Meyer Partner Technology Specialist - Hosting

Cloud OS. Philip Meyer Partner Technology Specialist - Hosting Cloud OS Philip Meyer Partner Technology Specialist - Hosting The New Era of Hosting 52.4% 68% 62.5% Customers Cloud Applications Grow their business or realign to new company strategy Plan to adopt hybrid

More information

Virtualization and the U2 Databases

Virtualization and the U2 Databases Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the

More information

Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool

Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool Outline CS 6V81-05: System Security and Malicious Code Analysis Overview of System ization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science

More information

Compromise-as-a-Service

Compromise-as-a-Service ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda

More information

KVM, OpenStack, and the Open Cloud

KVM, OpenStack, and the Open Cloud KVM, OpenStack, and the Open Cloud Adam Jollans, IBM & Mike Kadera, Intel CloudOpen Europe - October 13, 2014 13Oct14 Open VirtualizaGon Alliance 1 Agenda A Brief History of VirtualizaGon KVM Architecture

More information

Eucalyptus: An Open-source Infrastructure for Cloud Computing. Rich Wolski Eucalyptus Systems Inc. www.eucalyptus.com

Eucalyptus: An Open-source Infrastructure for Cloud Computing. Rich Wolski Eucalyptus Systems Inc. www.eucalyptus.com Eucalyptus: An Open-source Infrastructure for Cloud Computing Rich Wolski Eucalyptus Systems Inc. www.eucalyptus.com Exciting Weather Forecasts Commercial Cloud Formation Eucalyptus - Confidential What

More information

An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform

An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform A B M Moniruzzaman 1, Kawser Wazed Nafi 2, Prof. Syed Akhter Hossain 1 and Prof. M. M. A. Hashem 1 Department

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

COS 318: Operating Systems. Virtual Machine Monitors

COS 318: Operating Systems. Virtual Machine Monitors COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have

More information

2972 Linux Options and Best Practices for Scaleup Virtualization

2972 Linux Options and Best Practices for Scaleup Virtualization HP Technology Forum & Expo 2009 Produced in cooperation with: 2972 Linux Options and Best Practices for Scaleup Virtualization Thomas Sjolshagen Linux Product Planner June 17 th, 2009 2009 Hewlett-Packard

More information

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,

More information

Options in Open Source Virtualization and Cloud Computing. Andrew Hadinyoto Republic Polytechnic

Options in Open Source Virtualization and Cloud Computing. Andrew Hadinyoto Republic Polytechnic Options in Open Source Virtualization and Cloud Computing Andrew Hadinyoto Republic Polytechnic No Virtualization Application Operating System Hardware Virtualization (general) Application Application

More information

Distributed Systems. Virtualization. Paul Krzyzanowski pxk@cs.rutgers.edu

Distributed Systems. Virtualization. Paul Krzyzanowski pxk@cs.rutgers.edu Distributed Systems Virtualization Paul Krzyzanowski pxk@cs.rutgers.edu Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License. Virtualization

More information

Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/

Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ Virtualization Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ What is Virtualization? Virtualization is the simulation of the software and/ or hardware upon which other software runs. This

More information

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department

More information

An Introduction to Cloud Computing Concepts

An Introduction to Cloud Computing Concepts Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC ahmed.gamal.eldin@itida.gov.eg

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:

More information

Introduction to Cloud Computing. Srinath Beldona srinath_beldona@yahoo.com

Introduction to Cloud Computing. Srinath Beldona srinath_beldona@yahoo.com Introduction to Cloud Computing Srinath Beldona srinath_beldona@yahoo.com Agenda Pre-requisites Course objectives What you will learn in this tutorial? Brief history Is cloud computing new? Why cloud computing?

More information

Virtual Hosting & Virtual Machines

Virtual Hosting & Virtual Machines & Virtual Machines Coleman Kane Coleman.Kane@ge.com September 2, 2014 Cyber Defense Overview / Machines 1 / 17 Similar to the network partitioning schemes described previously, there exist a menu of options

More information

Cloud Computing CS 15-319

Cloud Computing CS 15-319 Cloud Computing CS 15-319 Virtualization Case Studies : Xen and VMware Lecture 20 Majd F. Sakr, Mohammad Hammoud and Suhail Rehman 1 Today Last session Resource Virtualization Today s session Virtualization

More information

The NIST Definition of Cloud Computing (Draft)

The NIST Definition of Cloud Computing (Draft) Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication

More information

Basics of Virtualisation

Basics of Virtualisation Basics of Virtualisation Volker Büge Institut für Experimentelle Kernphysik Universität Karlsruhe Die Kooperation von The x86 Architecture Why do we need virtualisation? x86 based operating systems are

More information

Eucalyptus: An Open-source Infrastructure for Cloud Computing. Rich Wolski Eucalyptus Systems Inc. www.eucalyptus.com

Eucalyptus: An Open-source Infrastructure for Cloud Computing. Rich Wolski Eucalyptus Systems Inc. www.eucalyptus.com Eucalyptus: An Open-source Infrastructure for Cloud Computing Rich Wolski Eucalyptus Systems Inc. www.eucalyptus.com Exciting Weather Forecasts Commercial Cloud Formation Eucalyptus - Confidential What

More information

A Unified View of Virtual Machines

A Unified View of Virtual Machines A Unified View of Virtual Machines First ACM/USENIX Conference on Virtual Execution Environments J. E. Smith June 2005 Introduction Why are virtual machines interesting? They allow transcending of interfaces

More information

Keywords Cloud computing, Cloud platforms, Eucalyptus, Amazon, OpenStack.

Keywords Cloud computing, Cloud platforms, Eucalyptus, Amazon, OpenStack. Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms

More information

3.1 IaaS Definition. IaaS: Infrastructure as a Service

3.1 IaaS Definition. IaaS: Infrastructure as a Service 1 3.1 IaaS Definition IaaS: Infrastructure as a Service Through the internet, provide IT server, storage, computing power and other infrastructure capacity to the end users and the service fee based on

More information

Introduction to Virtualization & KVM

Introduction to Virtualization & KVM Introduction to Virtualization & KVM By Zahra Moezkarimi ICT Research Institute Software Platform Laboratory Outline Virtualization History Overview Advantages and Limitations Types of virtualization Virtualization

More information

Distributed and Cloud Computing

Distributed and Cloud Computing Distributed and Cloud Computing K. Hwang, G. Fox and J. Dongarra Chapter 3: Virtual Machines and Virtualization of Clusters and datacenters Adapted from Kai Hwang University of Southern California March

More information

Cloud Computing. Dipl.-Wirt.-Inform. Robert Neumann

Cloud Computing. Dipl.-Wirt.-Inform. Robert Neumann Cloud Computing Dipl.-Wirt.-Inform. Robert Neumann Pre-Cloud Provisioning Provisioned IT Capacity Load Forecast IT Capacity Overbuy Underbuy Fixed Cost for Capacity Investment Hurdle Real Load Time 144

More information

IOS110. Virtualization 5/27/2014 1

IOS110. Virtualization 5/27/2014 1 IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to

More information

Windows Server 2008 R2 Hyper V. Public FAQ

Windows Server 2008 R2 Hyper V. Public FAQ Windows Server 2008 R2 Hyper V Public FAQ Contents New Functionality in Windows Server 2008 R2 Hyper V...3 Windows Server 2008 R2 Hyper V Questions...4 Clustering and Live Migration...5 Supported Guests...6

More information

Virtualization Concepts And Applications. Yash Jain DA-IICT (DCOM Research Group)

Virtualization Concepts And Applications. Yash Jain DA-IICT (DCOM Research Group) Virtualization Concepts And Applications Yash Jain DA-IICT (DCOM Research Group) Virtualization Virtualization is a framework or methodology of dividing the resources of a computer into multiple execution

More information

Evaluation Methodology of Converged Cloud Environments

Evaluation Methodology of Converged Cloud Environments Krzysztof Zieliński Marcin Jarząb Sławomir Zieliński Karol Grzegorczyk Maciej Malawski Mariusz Zyśk Evaluation Methodology of Converged Cloud Environments Cloud Computing Cloud Computing enables convenient,

More information

Nested Virtualization

Nested Virtualization Nested Virtualization State of the art and future directions Bandan Das Yang Z Zhang Jan Kiszka 2 Outline Introduction Changes and Missing Features for AMD Changes and Missing Features for Intel Working

More information

COM 444 Cloud Computing

COM 444 Cloud Computing COM 444 Cloud Computing Lec 3: Virtual Machines and Virtualization of Clusters and Datacenters Prof. Dr. Halûk Gümüşkaya haluk.gumuskaya@gediz.edu.tr haluk@gumuskaya.com http://www.gumuskaya.com Virtual

More information

Taming Hosted Hypervisors with (Mostly) Deprivileged Execution

Taming Hosted Hypervisors with (Mostly) Deprivileged Execution Taming Hosted Hypervisors with (Mostly) Deprivileged Execution Chiachih Wu, Zhi Wang *, Xuxian Jiang North Carolina State University, * Florida State University Virtualization is Widely Used 2 There are

More information

Application Performance in the Cloud, and its Relationship to QoS

Application Performance in the Cloud, and its Relationship to QoS Application Performance in the Cloud, and its Relationship to QoS Fall 2010 First, Last Someone@my.csun.edu Student ID: xxxxxxxxx September 22, 2010 Committee Chair: Dr. Shan Barkataki Approved by: Committee

More information

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Caveats and Disclaimers This presentation provides education on cloud technology and its benefits

More information

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models. Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,

More information

Build & Manage Clouds with Red Hat Cloud Infrastructure Products. TONI WILLBERG Solution Architect Red Hat toni@redhat.com

Build & Manage Clouds with Red Hat Cloud Infrastructure Products. TONI WILLBERG Solution Architect Red Hat toni@redhat.com Build & Manage Clouds with Red Hat Cloud Infrastructure Products TONI WILLBERG Solution Architect Red Hat toni@redhat.com AGENDA Cloud Concepts Market Overview Evolution to Cloud Workloads Evolution to

More information

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson

More information

Virtualization. 2010 VMware Inc. All rights reserved

Virtualization. 2010 VMware Inc. All rights reserved Virtualization Based on materials from: Introduction to Virtual Machines by Carl Waldspurger Understanding Intel Virtualization Technology (VT) by N. B. Sahgal and D. Rodgers Intel Virtualization Technology

More information

Virtualization and Cloud Computing

Virtualization and Cloud Computing Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr. Virtualization Purpose of Presentation: To inform entities about the importance of assessing

More information

Beyond the Hypervisor

Beyond the Hypervisor Beyond the Hypervisor A Technical Roadmap for Open Virtualization, Linux, KVM Mike Day Distinguished Engineer, Chief Virtualization Architect, Open Systems Development Saturday, February 22, 2014 1 mdday@us.ibm.com

More information

Advanced Computer Networks. Network I/O Virtualization

Advanced Computer Networks. Network I/O Virtualization Advanced Computer Networks 263 3501 00 Network I/O Virtualization Patrick Stuedi Spring Semester 2014 Oriana Riva, Department of Computer Science ETH Zürich 1 Outline Last week: Today: Software Defined

More information

Cloud Computing. What Are We Handing Over? Ganesh Shankar Advanced IT Core Pervasive Technology Institute

Cloud Computing. What Are We Handing Over? Ganesh Shankar Advanced IT Core Pervasive Technology Institute Cloud Computing What Are We Handing Over? Ganesh Shankar Advanced IT Core Pervasive Technology Institute Why is the Cloud Relevant to In the current research workflow. Medical Research? Data volumes are

More information

StACC: St Andrews Cloud Computing Co laboratory. A Performance Comparison of Clouds. Amazon EC2 and Ubuntu Enterprise Cloud

StACC: St Andrews Cloud Computing Co laboratory. A Performance Comparison of Clouds. Amazon EC2 and Ubuntu Enterprise Cloud StACC: St Andrews Cloud Computing Co laboratory A Performance Comparison of Clouds Amazon EC2 and Ubuntu Enterprise Cloud Jonathan S Ward StACC (pronounced like 'stack') is a research collaboration launched

More information

Security Model for VM in Cloud

Security Model for VM in Cloud Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,

More information

Virtualization Technologies

Virtualization Technologies 12 January 2010 Virtualization Technologies Alex Landau (lalex@il.ibm.com) IBM Haifa Research Lab What is virtualization? Virtualization is way to run multiple operating systems and user applications on

More information

LSKA 2010 Survey Report I Device Drivers & Cloud Computing

LSKA 2010 Survey Report I Device Drivers & Cloud Computing LSKA 2010 Survey Report I Device Drivers & Cloud Computing Yu Huang and Hao-Chung Yang {r98922015, r98944016}@csie.ntu.edu.tw Department of Computer Science and Information Engineering March 31, 2010 Abstract

More information

Virtualization and Cloud Computing

Virtualization and Cloud Computing Written by Zakir Hossain, CS Graduate (OSU) CEO, Data Group Fed Certifications: PFA (Programming Foreign Assistance), COR (Contracting Officer), AOR (Assistance Officer) Oracle Certifications: OCP (Oracle

More information

The NIST Definition of Cloud Computing

The NIST Definition of Cloud Computing Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST

More information

Enabling Technologies for Distributed and Cloud Computing

Enabling Technologies for Distributed and Cloud Computing Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading

More information

The Art of Virtualization with Free Software

The Art of Virtualization with Free Software Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike

More information

Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13

Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13 Virtualization Clothing the Wolf in Wool Virtual Machines Began in 1960s with IBM and MIT Project MAC Also called open shop operating systems Present user with the view of a bare machine Execute most instructions

More information

Cloud Computing Security Master Seminar, Summer 2011

Cloud Computing Security Master Seminar, Summer 2011 Cloud Computing Security Master Seminar, Summer 2011 Maxim Schnjakin, Wesam Dawoud, Christian Willems, Ibrahim Takouna Chair for Internet Technologies and Systems Definition of Cloud Computing 2 Cloud

More information