WWRF Cloud Implications to Security, Privacy, and Trust
|
|
|
- Gerald Terry
- 10 years ago
- Views:
Transcription
1 ITU-T Workshop on Addressing security challenges on a global scale , Geneva WWRF Cloud Implications to Security, Privacy, and Trust Mario Hoffmann Chair WWRF Working Group 7 Security & Trust Fraunhofer Institute for Secure Information Technology Head of Department Secure Services & Quality Testing Darmstadt/Munich, Germany
2 WWRF Founded 2001, 100 members Global pre-standardisation platform to initiate global cooperation towards future wireless world Vision from user perspective requirements for the enabling technologies Unique way of active cooperation within and between industry and academia Reduce risk for investment in research Ease future standardisation by globally harmonising views Proven history of creating large scale research cooperation and facilitating funding Open to all actors
3 WG7 Privacy, Security & Trust Approach (1/2) Integration of Privacy, Security and Trust into... Integration Layers Protection Goals Source: EU-IST Project, 2001 Application Layer Platforms/Middleware Mobile Devices Infrastructure Availability Confidentiality Integrity Accountability Authenticity
4 WG7 Privacy, Security & Trust Approach (2/2) How to Source: WWRF... specify, negotiate, enforce and monitor a certain level of Privacy, Security & Trust between cooperation and communication partners in ambient environments?... implement and integrate security enablers by design?... tackle attacking strategies such as spy out, deny, tamper, misuse, misinform?... fulfill user empowerment, user awareness, enforcing security policies, establishing context security?... ensure transparency, usable security?
5 Cloud Computing Deployment Models low Economy of Scales high private Cloud hybrid Cloud public Cloud strong Control weak
6 Cloud Computing Service Models high low Economy of Scales high low Software as a Service Abstraction private Cloud hybrid Cloud Platform as a Service Infrastructure as a Service public Cloud Flexibility low strong Control weak high
7 Cloud - Transparency Feature Resources and data are just somewhere in the Cloud and can be accessed on demand from everywhere at any time. Challenge Where is my data? Who has access to it? How can a Cloud service consumer monitor and control access to his resources? How can I guarantee compliance with national law, certified processes, and company s security policies? Which jurisdiction is applicable?
8 Cloud - Identity Management An integral part of Cloud services is identity and access management. Identity as a Service: From simple user provisioning to identity federation Identification of a unique object within an ambiguous environment and its identity lifecycle Single-sign-on and usability
9 Cloud - Interoperability Distinguish Public, Private, Hybrid Clouds (plus Community, Virtual Private Clouds) Challenge: Complexity, interoperability, and the ability to change the cloud service provider easily are major issues as standardization is only in an early phase. For service providers as well as service consumers it is most important to identify the individual protection goals and risks appropriately following a comprehensive taxonomy
10 Cloud - Mobility From a research perspective the Cloud approach can be extended to restricted resources which are only temporarily available, such as mobile devices in a meeting room. Devices could share single features and dedicated resources for a specific time period taking advantage of additional features from the direct environment. Here, the term Cloud has to be re-defined for mobile application scenarios (see [KaFi2010]) 10
11 Cloud - Encryption A promising candidate to solve the issue that encrypted data in the Cloud has to be decrypted first before it can be processed is full homomorphic encryption. Here operations such as multiplication and addition can be realized on encrypted data which would eventually reach a much higher security level (see [SmVe2009])
12 Cloud - Trustworthy Virtualisation Next generation Trusted Platform Modules (TPMs) are able to support virtualization on hardware layer. Since virtualization is a very important enabler of Cloud Computing this addresses issues related to untrustworthy transactions between Cloud entities on infrastructure, platform as well as software level. In environments with high security requirements TPMs might serve as trust anchors (see for example [HKH2009])
13 Cloud - Top Threats Abuse of Cloud Computing Resources Shared Technology Vulnerabilities Data Loss or Leakage Insecure Application Programmer Interface Account, Service & Traffic Hijacking Malicious Insiders Unknown Risk Profile
14 cloud computing systems and their lower level security risks. The structure is made up of 4 main domains: infrastructure, application and platform, administration, and compliance. Each of these main areas and the associated security risks are discussed in detail in the following sections with a checklist of specified questions which a cloud consumer would be well advised to ask a cloud vendor. Cloud - Security Taxonomy e of g!"#$%$&'($)(*+,(-,./01*'("-2,.*-($)(.3$/4(.$&2/5%6(-'-*,&-( 9%)0"-*0/.*/0,( "5$%("%4( 74&1%1-*0"5$%( :$&231"%.,( 23"8$0&( A+'-1."3( -,./01*'( C$-*( D10*/"31E"5$%( F,*>$0?( ;"*"(-,./01*'( "5$%( -,./01*'( A3"8$0&(-,./01*'( G,./01*'("-("( -,0<1.,( A+"-,-($)(-,0<1.,( /-,( 7/41*( 94,%5*'("%4(016+*-( &"%"6,&,%*( B,'(&"%"6,&,%*( 9%*,0$2,0"I131*'("%4( 2$0*"I131*'( ;"*"(201<".'( H1-??( &"%"6,&,%*( =,6"3( The interdependencies between each of these areas are analyzed in greater de-
15 Cloud - DOs & DONTs (1) Use a holistic security concept (2) Integrate the services in an existing security concept (3) Build a relationship of trust between the cloud consumer and the cloud vendor (4) Protect the network infrastructure (5) Use innovative security solutions for cloud computing systems (6) Reuse basic services (7) Pay attention to lock-in effects (8) Request security certificates (9) Don t forgo security concepts for purely financial reasons (10) Use service level agreements
16 Cloud - Innovation Areas Public - Community - Private - Hybrid Application Areas Broadcast/Media Collaboration ACD, CRM, IAM Online-Services egovernment emobility Logistics Trusted Cloud Innovation Areas Governance, Risk, Compliance Monitoring, Risk Analysis Identity Lifecycle Management Security Services Virtualisation & Interoperability Infrastructure - Platform - Software
17 Cloud - Funding Companies Cloud-Consumers: What does Cloud Computing mean to my processes, business, and infrastructures? Cloud-Providers: How will Cloud Computing affect Future Internet and vice versa? European Union, FP7, Call 8 (Jan 2012) Germany, Trusted Cloud Call (30 M, Jan 2011)
18 Cloud - References [CSA2009] [CSA2010] [ENISA2009] [HKH2009] [KaFi2010] [Kantara2010] [OASIS2010] [StRu2010] [SmVe2009] Cloud Security Alliance: Security Guidance for Critical Areas of Focus in Cloud Computing V2.1Dd, Cloud Security Alliance: Guidance for Identity & Access Management V Enisa: Cloud Computing Risk Assessment, cloud-computing-risk-assessment/at_download/fullreport Kai Hwang, Sameer Kulkareni, Yue Hu, Cloud Security with Virtualized Defense and Reputation- Based Trust Mangement, Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Chengdu, China, 2009 M.Katz and F. Fitzek, Mobile Clouds: Challenges and Potentials, WWRF#24, Penang, Malaysia, April 2010, Kantara Initiative, Kantara Federation Interoperability Workgroup (FIWG), kantarainitiative.org/confluence/display/fiwg/home OASIS: Identity in the Clouds Tech. committee, OASIS Identity & Trusted infrastructure, xml.coverpages.org/identity-clouds-proposal.html Werner Streitberger, Angelika Ruppel, Cloud Computing Security Protection Goals, Taxonomy, Market Review, N.P. Smart, F. Vercauteren, Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes,
19 WG7 Privacy, Security & Trust Contact Join WWRF and WG7 Website: Subscribe to our mailing list! Contact: Mario Hoffmann (Chair) Marcus Wong (Vice Chair) Source: WWRF
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Data Storage Security, Cloud Computing and Virtualization
Data Storage Security, Cloud Computing and Virtualization What You Think You Know Can Hurt You 1 The 8 Fallacies of Distributed Computing 1. The network is reliable 2. Latency is zero 3. Bandwidth is infinite
Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A
Brochure More information from http://www.researchandmarkets.com/reports/2213812/ Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A Description: The auditor's guide to ensuring
Cloud Security & Standardization. Markku Siltanen Tietoturvakonsultti CISA, CGEIT, CRISC
0 Copyright 2011 FUJITSU Cloud Security & Standardization Markku Siltanen Tietoturvakonsultti CISA, CGEIT, CRISC Cloud computing 1 Copyright 2011 FUJITSU Characteristics of cloud 2 Copyright 2011 FUJITSU
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
CLOUD COMPUTING SECURITY
FRAUNHOFER RESEARCH INSTITUTION AISEC CLOUD COMPUTING SECURITY PROTECTION GOALS.TAXONOMY.MARKET REVIEW. DR. WERNER STREITBERGER, ANGELIKA RUPPEL 02/2010 Parkring 4 D-85748 Garching b. München Tel.: +49
Trust areas: a security paradigm for the Future Internet
Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany [email protected]
http://www.cisjournal.org Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir
Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir Department of Computer Science Lahore College for Women University, Lahore, Pakistan. [email protected],
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Ensuring Cloud Security Using Cloud Control Matrix
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 933-938 International Research Publications House http://www. irphouse.com /ijict.htm Ensuring
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST
CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires
ITU- T Focus Group Cloud Compu2ng
ITU- T Focus Group Cloud Compu2ng International Telecommunication Union 1 ITU-T FG Cloud Management & Structure Management team: Chairman: Victor Kutukov (Russia) Vice-Chairman: Jamil Chawki (France Telecom
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING 1. K.SURIYA Assistant professor Department of Computer Applications Dhanalakshmi Srinivasan College of Arts and Science for Womren Perambalur Mail: [email protected]
Cloud Infrastructure Security
Cloud Infrastructure Security Dimiter Velev 1 and Plamena Zlateva 2 1 University of National and World Economy, UNSS - Studentski grad, 1700 Sofia, Bulgaria [email protected] 2 Institute of Control and
A Review: Data Security Approach in Cloud computing by using RSA Algorithm
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Review:
Is it Time to Trust the Cloud? Unpacking the Notorious Nine
Is it Time to Trust the Cloud? Unpacking the Notorious Nine Jonathan C. Trull, CISO, Qualys Cloud Security Alliance Agenda Cloud Security Model Background on the Notorious Nine Unpacking the Notorious
How To Secure Cloud Computing
Next Generation Cloud Computing Issues and Solutions Jeon SeungHwan 1, Yvette E. Gelogo 1 and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon,
Cloud Security. Let s Open the Box. Abu Shohel Ahmed [email protected] NomadicLab, Ericsson Research
t Cloud Security Let s Open the Box t Abu Shohel Ahmed [email protected] NomadicLab, Ericsson Research Facts about Ericsson Ericsson is a world-leading provider of telecommunication equipment and
Current and Future Research into Network Security Prof. Madjid Merabti
Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
Cloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
CLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Management of Security Information and Events in Future Internet
Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
CSA Virtualisation Working Group Best Practices for Mitigating Risks in Virtualized Environments
CSA Virtualisation Working Group Best Practices for Mitigating Risks in Virtualized Environments Kelvin Ng Tao Yao Sing Heng Yiak Por Acknowledgeme nts Co-Chairs Kapil Raina, Zscaler Kelvin Ng, Nanyang
Open Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
Trust and Reputation Management in Distributed Systems
Trust and Reputation Management in Distributed Systems Máster en Investigación en Informática Facultad de Informática Universidad Complutense de Madrid Félix Gómez Mármol, Alemania ([email protected])
SECURITY INFRASTRUCTURE Standards and implementation practices for protecting the privacy and security of shared genomic and clinical data
Global Alliance for Genomics and Health SECURITY INFRASTRUCTURE Standards and implementation practices for protecting the privacy and security of shared genomic and clinical data VERSION 1.1 March 12,
23.9.2015. Kangas Cybersecurity strategy
Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures
D. L. Corbet & Assoc., LLC
Demystifying the Cloud OR Cloudy with a Chance of Data D. L. Corbet & Assoc., LLC [email protected] Why 'The Cloud' Common Clouds Considerations and Risk Why 'The Cloud' Distributed Very Large / Very
Assessing Risks in the Cloud
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
SDN/NFV Position Paper
SDN/NFV Position Paper Virtualization Working Group Justin Foster [email protected] Kapil Raina [email protected] Kelvin Ng [email protected] Cloud Security Alliance, 2015 Agenda Goals
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
Overview. What are operational policies? Development, adoption, implementation
Practical Geospatial Policies: Resolving Operational Issues to Optimize Your SDI Ed Kennedy Hickling Arthurs Low Corporation and Cynthia Mitchell and Simon Riopel Division, Natural Resources Canada Overview
Compliance in Clouds A cloud computing security perspective
Compliance in Clouds A cloud computing security perspective Kristian Beckers, Martin Hirsch, Jan Jürjens GI Workshop: Governance, Risk & Compliance on the 19th of March 2010 What is Cloud Computing? Today:
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
A Secure System Development Framework for SaaS Applications in Cloud Computing
A Secure System Development Framework for SaaS Applications in Cloud Computing Eren TATAR, Emrah TOMUR AbstractThe adoption of cloud computing is ever increasing through its economical and operational
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
Security and Compliance in Clouds: Challenges and Solutions
Security and Compliance in Clouds: Challenges and Solutions Prof. Dr. Jan Jürjens Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund http://jan.jurjens.de This Talk What are the challenges?
Adopting Cloud Computing with a RISK Mitigation Strategy
Adopting Cloud Computing with a RISK Mitigation Strategy TS Yu, OGCIO 21 March 2013 1. Introduction 2. Security Challenges Agenda 3. Risk Mitigation Strategy Before start using When using 4. Policy & Guidelines
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
A Marketplace Broker for Platform-as-a-Service Portability
Seamless Adaptive Multi-cloud Management of Service-based Applications Workshop at ESOCC 14, Manchester, UK A Marketplace Broker for Platform-as-a-Service Portability Bholanathsingh Surajbali and Adrian
PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH
PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH FOC2015 Vienna / 17.06.2015 Challenges for Future ICT Systems Cloud computing
Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
A Secure Authenticate Framework for Cloud Computing Environment
A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure
Requirements Engineering for SaaS Application Security in Cloud Using SQUARE Methodology
Requirements Engineering for SaaS Application Security in Cloud Using SQUARE Methodology E. Pragnavi J. Sandeep Kumar Assistant Professor, Product Technical Lead, Dept. of CSE, UCE, Infosys, Hyderabad
Security Challenges in the Cloud
Security Challenges in the Cloud Claudia Eckert Fraunhofer Research Institution for Applied and Integrated Security (AISEC) Chair for IT Security, TU München 7.2. Darmstadt, Conference of the e-finance
Expert Group on Cloud Computing Services and Standards ( EGCCSS ) Formation of Working Groups
For Discussion on 27 May 2014 Paper EGCCSS-6-3 Expert Group on Cloud Computing Services and Standards ( EGCCSS ) Formation of Working Groups Purpose To propose the setting up of two Working Groups under
Certified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
Public Cloud Security: Surviving in a Hostile Multitenant Environment
Public Cloud Security: Surviving in a Hostile Multitenant Environment SESSION ID: EXP-R01 Mark Russinovich Technical Fellow Windows Azure, Microsoft @markrussinovich The Third Computing Era Security Could
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu
How To Secure Cloud Computing
A hole in the cloud: Is cloud secure? N. Vijaykumar Infosys Technologies Limited, Bangalore presented at Security in cloud is a key challenge! 70% 60% 50% 40% 30% 20% 10% 0% Data integrity tampering Hacker
