An Architectural Model for Deploying Critical Infrastructure Services in the Cloud

Size: px
Start display at page:

Download "An Architectural Model for Deploying Critical Infrastructure Services in the Cloud"

Transcription

1 An Architectural Model for Deploying Critical s in the Marcus Schöller NEC Europe Ltd. Heidelberg, Germany marcus.schoeller@neclab.eu Roland Bless, Frank Pallas, Jens Horneber Karlsruhe Institute of Technology Karlsruhe, Germany {bless, frank.pallas, horneber}@kit.edu Paul Smith Austrian Institute of Technology Vienna, Austria Paul.Smith@ait.ac.at Abstract The Computing operational model is a major recent trend in the IT industry, which has gained tremendous momentum. This trend will likely also reach the IT services that support Critical s (CI), because of the potential cost savings and benefits of increased resilience due to elastic cloud behaviour. However, realizing CI services in the cloud introduces security and resilience requirements that existing offerings do not address well. For example, due to the opacity of cloud environments, the risks of deploying cloud-based CI services are difficult to assess, especially at the technical level, but also from legal or business perspectives. This paper discusses challenges and objectives related to bringing CI services into cloud environments, and presents an architectural model as a basis for the development of technical solutions with respect to those challenges. I. INTRODUCTION Computing is an operational model that provides on-demand elastic computing or storage in a costeffective manner, often using ization as an enabling base technology. As one major recent trend in the IT industry, it has gained enormous momentum and started to revolutionise the way enterprises create and deliver IT solutions. As more sectors utilise cloud-based services in their computing environment, Critical (CI) services are likely to adopt this paradigm. A first candidate are telecommunication providers ETSI ISG NFV was formed earlier this year with the purpose of developing pre-standards for moving telecommunications functions in the cloud and other CI service operators from the traffic and transportation, or the infrastructure surveillance systems domain are expected to follow soon. The promised advantages do not only relate to cost reductions and increased flexibility, but also new ways to improve the resilience and availability of the CI, e.g., through the use of abundant. However, realising CI services in the cloud implies security and resilience requirements that existing cloud offerings do not address well. Due to the opacity of cloud environments, the risks of deploying cloud-based CI services are difficult to assess, especially at the technical level, but also from legal or business perspectives. Existing security measures do not fully address related important issues (e.g., risk, trust, and resilience), resulting in uncertainty for operators and manufacturers of critical infrastructure IT systems. Therefore, our goal is to analyse and evaluate cloud computing technologies c 2013 IEEE, Published at IEEE Com 2013 with respect to security risks in sensitive environments, and to develop methodologies, technologies, and best practices for creating a secure, trustworthy, and high assurance cloud computing environment for critical infrastructures. A. Objective and Challenges In order to address the security and resilience [1] challenges associated with deploying high assurance services in the cloud for the critical infrastructure sector, one can identify a number of objectives. These can be summarised as follows: For the use of cloud services in the critical infrastructure sector one needs to identify the relevant legal framework and the resulting obligations and constraints. Without such thorough consideration of the legal givens, use of the cloud in this sector, in which there are often stringent regulatory and legal requirements, will be severely limited. Furthermore, it is important to have clear guidance on how to address liability issues in light of service failures. Related to this, and building on the aforementioned legal framework, we need to develop technical solutions for the provision of evidence and data protection for cloud services. This includes investigating solutions for digital forensics in cloud infrastructures. Since attacks and failures are inevitable, and possibly even more attractive in cloud environments, it is important to develop approaches to understanding cloud behaviour in the face of challenges and attacks. Attacking a cloud infrastructure is a potentially highly attractive goal, since services of all tenants who run them in the cloud are affected. Consequently, clouds are a more attractive target for attackers if they are aware that CI services are running inside the cloud environment. In this area, we will investigate where the appropriate points in a cloud architecture are for placing monitoring and detection functionality, and to examine how robust state of the art detection algorithms are with respect to elastic cloud behaviour. A key challenge that potential critical infrastructure cloud service users face is to understand the risks it brings. Despite some work in this area, e.g., on the development of threat catalogues, there is a lack of suitable techniques and processes for understanding and managing risk associated with cloud environments. Building on all these activities, an objective is to establish a set of best practice guidelines for secure cloud service implementations, which can be used by various stakeholders in this area to ensure secure and resilient cloud services that permit to realise CI services in cloud environments.

2 Based on these higher level objectives, we can infer a number of objectives on a technical level, leading to the development of solutions for the following items: architectures that focus on security, trust, and resilience, that are suitable to deploy and run CI services. Process-oriented security guidelines, policies, and policy languages that allow to express the security requirements needed for CI services in clouds. Anomaly-based techniques to discover deviations from expected system and network behaviour, in order to disclose attacks and to predict their impact. Context-aware policy enforcement technologies. Tools and technologies to increase the trustworthiness of cloud environments, e.g., monitoring and auditing tools that permit service audits in a lawful and privacy compliant manner. Creation of additional and corresponding cooperative interfaces to the cloud infrastructure should increase the transparency to allow for root-cause analysis, while not disclosing too much operational details. In order to achieve these higher level objectives as well as the technical requirements, a first step is to create an architectural model that permits the development of the listed technical solutions that support running CI services fully or partially in cloud infrastructures. B. A Use Case To illustrate an application of our architectural model, we describe a scenario in which services and data from a video surveillance system are provisioned in the cloud. In this scenario, a security company (called CITYSEC) has outsourced the operation of a video surveillance system, which is used to monitor a critical infrastructure, to a third-party company (TENSYS). Appreciating the potential benefits of using the cloud, TENSYS has chosen to deploy aspects of the ICT services associated with the video surveillance system in the cloud. For instance, the TENSYS system makes use of automated detection services that generate alarms to inform security personnel when unusual movement is detected. Furthermore, TENSYS has an obligation to archive video footage, which they choose to use cloud services for. To realise this cloud-based deployment, TENSYS purchases connectivity from the critical infrastructure site to the cloud from a telecommunications company (TELCOM) and cloud compute and storage services from a cloud provider (CLOUDCORP). In this scenario, a number of undesirable outcomes could occur, which motivate the need for a specialised cloud architectural model for critical infrastructure services. A primary purpose of the video surveillance system is to alert security personnel to malicious activity, e.g., vandalism of the critical infrastructure. This is possible using the previously mentioned automated detection service. However, if an incident is not attended to by CITYSEC personnel, and damages occur, a question of liability arises. Specifically, the question of whether the failure occurred because of the use of cloud technologies. Similarly, privacy issues are prominent in this scenario for example, video footage of public servant indiscretions could be leaked to the media (e.g., by unauthorised access or indiscretion of an employee). Again, the use of cloud technology could be brought into question, and suitable technical measures need to be available to address liability issues amongst the various stakeholders in the scenario. To support such use cases as this, our architectural model enables the fine-grained specification of privacy, security and resilience requirements, which are upheld by the cloud infrastructure. Furthermore, the model supports the monitoring of the cloud infrastructure to determine when problems arise, and if necessary, provably indicate the root cause of a problem that led to a failure of the kinds previously discussed. C. Legal Requirements and Challenges From the legal perspective, even this comparably simple use case raises several yet unsolved questions, which have to be addressed properly in order to to render the use of Computing possible in the field of critical infrastructure IT. In particular, this refers to the two legal fields of data protection law and liability/evidence law. Our use case, and the many other possible applications of Computing in the field of critical infrastructures, involves the collection, processing and use of personal data. Consequently, any technical architecture that shall serve as the basis for a cloud-based critical infrastructure IT must provide the means necessary for reaching compliance with relevant data protection regulations. For instance, regulations are defined in Art. 2 of the data protection directive 95/46/EC [2] or in Art. 4 of the currently discussed draft for a forthcoming general data protection regulation [3]. This is definitely the case for legally implied security requirements. European data protection law strongly focuses on the role of the so-called controller of personal data, which is defined as the natural or legal person, public authority, agency or any other body which alone or jointly with others determines the purposes and means of the processing of personal data in [2]. In particular, the controller is required to implement appropriate technical and organisational measures [2] to prevent unauthorised access and disclosure and unlawful or accidental destruction, loss or alteration of personal data. In this regard, the appropriateness of a certain measure depends on the costs that would arise from its implementation and the kind or sensitivity of the data. As the sensitivity and the amount of personal data being collected, processed and used in critical infrastructure scenarios are in many cases substantial, this often implies that even sophisticated and expensive mechanisms become appropriate for various use cases of cloud-based infrastructure IT. This will have to be provided for in the underlying infrastructure. Transparency is another core concept of European data protection law. It prescribes that any data subject has the right to inform herself about the precise circumstances under which her personal data are processed and stored. The controller, in turn, has the obligation to actually provide the data subject with this information. Under the specific givens of cloud computing with dynamic (re-)allocation of being explicitly intended, for example the fulfilment of this obligation becomes significantly harder than in traditional environments.

3 A cloud infrastructure that provides mechanisms for reliably tracing the current location(s) of data, and for gathering further dimensions regarding the precise circumstances of the processing and storage of data would be highly helpful in this regard. This is because it would allow the data controller to report the respective information to the data subject, and thereby fulfil their legal transparency obligations. Furthermore, similar mechanisms and technologies would also prove highly valuable with regard to the monitoring and control of data transfers. It is, for example, illegal to transfer personal data from Europe to Non-European countries that do not ensure an adequate level of protection [2]. The location of the physical cloud infrastructure that personal data are processed and stored on is thus of high relevance for the legitimacy of transferring personal data to the respective systems. Again, reliable tracing mechanisms would help the controller to ensure (and, not to forget, demonstrate) that such transfer restrictions are actually adhered to. Last but not least, legal data protection requirements strongly depend on the different legal roles assumed by the different actors within a given setting. Generally speaking, legal data protection requirements have to be fulfilled by the party that is deemed the controller of the personal data (see above). With regard to cloud computing, it is usually assumed that the cloud service user (in our example, the security company CITYSEC) assumes this role, while the cloud provider (CLOUDCORP) is usually seen as merely processing data on behalf of the controller, thereby basically leaving the responsibility for ensuring compliance with data protection requirements with the cloud service user. In order to fulfil this duty, the cloud service user must be able to ensure and validate that the cloud provider actually behaves in conformance with the instructions given by him. As the cloud service user can hardly fulfil this obligation by inspecting the cloud provider s data centre(s) locally, this requires powerful technical mechanisms and instruments for remote-auditing (including trusted audit trails) to be provided by the underlying architecture. However, such mechanisms are not only required for reasons of data protection law, but also from the perspective of liability and evidence law. For example, if the cloud service user suffers a damage resulting from a malfunctioning cloud service and wants the respective cloud provider to compensate him, he would have to prove that the failure actually resulted from the cloud provider not having fulfilled his duties. This, in turn, is not be possible in current cloud settings, as the cloud service user typically has no access to any evidence which could irrefutably prove an actual misconduct on the side of the cloud provider. In the end, this would result in situations where cloud service users have to bear the costs resulting from another party s misconduct. Again, the abovementioned technologies for remote auditing and for establishing trustworthy audit trails could provide means for addressing this yet open challenge. An architecture that provides such trustworthy electronic evidence would prove highly valuable, not only with regard to critical infrastructure IT, but rather for nearly any advanced use of cloud computing in general. These are just some of the multiple legal requirements emerging in the context of cloud-based critical infrastructure IT. They are far from being exhaustive, but give an impression about the challenges that the concept of cloud computing raises beyond the purely technical perspective. If taken seriously into account from the very beginning, many of these challenges can, however, be addressed during the design of the underlying cloud infrastructure, thereby rendering a legally compliant use of cloud computing significantly more achievable or even possible at all during later stages of development. II. RELATED WORK There exist a number of reference architectures for Computing that describe and identify technical, operational and security issues. All existing reference architectures are either layered, role-based or some combination thereof. Layered cloud architectures adjust their architecture either on technical functionality, as is done by Cisco [4] and the Internet Engineering Task Force (IETF) [5], or on the provided cloud service model. This latter approach is taken by the Security Alliance (CSA) [6]. Common key components or layers that are shared in current reference architectures include: Physical hardware and their ized counterparts, often categorised as Network, Storage and Computing. The provided service model, describing the abstraction level of the provided services. The most common models, stacked on top of each other in this order, are as a (IaaS), Platform as a (PaaS) and Software as a (SaaS). A service register or catalogue that is used to manage the provide the services and cloud capabilities to users and developers based on the service model. s to provide and control user access via interfaces or portals. s can specify the desired capabilities and requirements for their application either explicitly via interface or implicitly by service selection. Management components to handle the complexity of clouds introduced, e.g., by elasticity and resource migration. Security is either handled by the management components or in additional specialised components. Other reference architectures, e.g., from IBM [7], further divide their management into a component handling business-related processes and issues like billing, accounting, contracting and SLAs, and an operational management component handling the technical aspects. Management can also be seen as a vertical layer as modelled in the architectures from the Distributed Management Task Force (DMTF) [8], T-s project [9] and the CSA, providing support with specialised tasks ordered hierarchically but also spanning multiple other layers and components. APIs for cloud service development, deployment, and management used by external developers implementing their own new services or even service models. Additional interfaces to provide monitoring, reporting, performance metering or auditing data collected by a cloud provider to clients or third parties.

4 Fig. 1. Repository Model (IaaS, PaaS, SaaS) Developer accesses services constructs services An abstract view of several architectural models Provider In summary, existing role-based architectures like those from the DMTF, IBM and the National Institute of Standards and Technology (NIST) [10] usually focus on the roles of the Provider, and the Developer as shown in Fig. 1. The focus of most of such architectures is the data centre, and thus level, i.e., they consider methods and mechanisms regarding how to provide -based services to customers and users. This includes ization software and techniques, as well as management of physical hardware, network [5], and entities. A purpose of such models is to identify the flow of information and the structure of required interfaces between the involved roles. Regarding the Provider, a common view is that its role is very monolithic, with management responsibilities ranging from the cloud hardware platform up to service provisioning and user accounting. We argue that the role of Providers should be logically divided into different roles, which respect the technical and legal responsibilities in the context of Critical s. The Open Security Architecture (OSA) [11] architecture already uses a very fine-grained role-model to identify and analyse the security issues that have to be considered in cloud infrastructures. Unfortunately, the architecture does not consider dividing the Provider responsibilities into different roles with individual security, management, monitoring, and audit tasks. In Section I, we discussed the requirements needed to support critical infrastructures in cloud environments. Existing reference architectures for Computing focus on encapsulating the technical and administrative aspects to the given roles. The interfaces between different roles are reduced and simplified as much as possible to allow an isolated view on different components and to support interchangeable orthogonal developments. Nevertheless, to support critical infrastructures services, current cloud architectures are lacking these items that are needed to address the following requirements: A retrospective or real-time root cause analysis function for malfunctions and security deficiencies is only feasible when the cloud architecture provides appropriate management and logging capabilities, which can be assigned to specific infrastructure levels and components. To analyse who is responsible for a given problem situation, the architecture has to be transparent with respect to data processing, storage, and communication; this is even necessary at the infrastructure level of cloud service providers. Consequently, cloud architectures for CI services need additional entities or components allowed to do infrastructure comprehensive tracing with dedicated knowledge about the interface between two architectural layers. Current reference architectures usually consider a very encapsulated cloud service provider infrastructure resulting in monolithic management modules, and lack root cause analysis capabilities inside this layer, and in interaction with other layers. Partial transparency of storage, computation and communication processes, and the involved physical locations is also needed to validate the data protection requirements for CIs. Furthermore, a cloud architecture has to consider trusted remote audit trails, in order to empower cloud users to validate the infrastructure is operating in conformance with current data protection laws. This requirement results in an architecture that permits tracing data or even entire information flows with all involved components and locations. For that purpose the architecture may provide an aggregated feedback channel to the involved stakeholders on the appropriate abstraction level. Most of the current reference architectures do not consider this additional information flow. Resilience requirements for CIs usually exceed the average demands for cloud services. Redundancy is typically desired for CIs, such that supporting architectures have additionally to deal with multi-tenancy and multi-homing aspects for CI services. Besides handling redundancy, a CI cloud service architecture also has to provide an adequate and fine-grained interface to specify service specific privacy, security, and resilience requirements for underlying infrastructure components. Also, interfaces should allow for auditing the fulfilment of such requirements. Most of the existing reference architectures already consider interfaces to specify service requirements. CI services need a refinement of those interfaces in order to support the necessary redundancy, service models and resource specific declaration of requirements. III. ARCHITECTURAL MODEL We need an architectural model in order to identify and locate the various mechanisms and potential new interfaces that are necessary to support critical infrastructure IT services. The proposed architectural model (cf. Fig. 2) aims at a more precise role distinction that allows for better security analysis, separation of responsibilities, identification of separate administrative interfaces, and for checking the influence and coverage of legal aspects. One important aspect is to consider that a single is typically simultaneously used by several tenants (i.e., customers, users), whose are usually isolated from each other to some degree within the (similar to [5] that focuses on communication aspects). The distinction between the and the physical is important, since a clear separation between responsibilities

5 is necessary. In case a CI service fails, a root cause analysis should reveal the responsible party. Moreover, additional monitoring or logging mechanisms for auditing can be located within the, as well as within the infrastructure of the tenant. In this context, it may be helpful to identify additional interfaces that allow for increasing the trust level between the tenant and the cloud infrastructure provider by permitting some level of audits. Moreover, the architecture must clearly distinguish the service provider from the tenant infrastructure. This allows to separate two important aspects of any CI service: functional and behavioural features. On the service layer, the functional features of the service are dealt with. Which components are required to compose the service and how these components need to be inter-connected. On the tenant infrastructure level the behavioural features of the service are dealt with: this includes elasticity features, component redundancy, and overload control. Failures on the physical infrastructure level can be made transparent to the service by self-healing mechanisms on the tenant infrastructure level, e.g., automatic fail-over to redundant components and auto-recovery by on-demand provisioning of. In addition, geo-diversity can be realized on the tenant infrastructure level by requesting from multiple independent cloud infrastructure providers for increased dependability but also for higher privacy and security. Abstraction Critical (CI) Physical Fig. 2. Compute Storage Network A Resources Client Devices CI B s Virtual Compute Resources Virtual Storage Virtual Network C (Data Centre) Different Considered Abstraction s Provides (SaaS /Paas) manages service Provides Virtual (IaaS /PaaS) manages Provides Virtual Resources (IaaS) manages cloud Stakeholder CI SLAs CI Provider Infrastr. Provider Provider Consequently, Fig. 2 shows different levels of abstraction that we want to distinguish. The different abstraction levels correspond to different stakeholders and their view on the managed. Most existing architectures concentrate on the provisioning of at the level, i.e., how to provide and manage cloud within a data centre. A more overarching view covering different levels and stakeholders is needed: At the top level, i.e., we have the Critical who remotely accesses the Critical. For instance, an urban traffic management operator could observe and control the traffic flow within a city, using webbased interfaces as well as various distributed sensors that deliver measurement data as input to the next lower CI components. In the example of Section I-B it would be CITYSEC watching at the output of the video surveillance system. The next lower level is controlled by the CI Provider who manages the at. The CI is composed of several components that interact with each other in order to provide the actual service. The CI Provider monitors the service operation and performance at this level. The service components usually either provide the application or the platform that are required at user level. The service components are instantiated on the infrastructure that is provided by the next lower level. In use case of Section I-B it would be TENSYS, who uses and provides video archival and automated video analysis services as well as streaming and web servers that provide secured access to video camera live streams and stored footage. The provides a infrastructure that consists of compute, storage, and network. Those are managed by the Provider. We distinguish this stakeholder from the service provider since they may be separate organisations. Several such tenants are typically hosted within one that is the next lower level. The Provider may provide either the pure infrastructure (IaaS) or some basic services as a platform (PaaS) to the CI Provider. In the former case the CI Provider may install complete VM images containing an operating system, middleware services, and application-oriented service components, including necessary configuration data. In the latter case, the Provider may provide and operate some pre-installed operating system images and middleware or supporting services. Aside from that, the Provider is not aware what services and applications are running inside this infrastructure. In the use case from Section I-B, it would also be TENSYS who operates the various as a basis for their video surveillance service. The Physical at the bottom provides real physical (sometimes called bare metal ) compute, storage, and network, which are hosted in a data centre and administered by the Provider. This level usually provides (IaaS) to its upper level, i.e., the tenant. The ization solution usually provides (a certain degree of) isolation between the different tenants that are multiplexed onto the same physical infrastructure and thus permits the sharing of. For increasing the resource efficiency, the Provider can usually transparently move across its physical infrastructure, unnoticed by the tenant. In use case of Section I-B it would be CLOUDCORP who operate the physical.

6 It should be noted that stakeholder roles may sometimes be realised by the same organization. For instance, the Provider may be also the CI Provider (like TENSYS in our use case) or the CI Provider is also the, or the Provider may be the same organisation as the Provider. The different stakeholders are usually bound to each other by bilateral Agreements (SLAs). In case of a CI service failure, it must be possible to investigate whose fault it actually was and maybe prove that an SLA violation has happened. Therefore, new interfaces are required to permit more transparency and security audits for specific functions. For instance, if the Provider moved a machine from one physical host to a different physical host, it is still opaque to which particular physical machine the VM was actually moved, but the event as such may be indicated to the Provider, maybe with enough details so that co-location constraints can be verified. Such additional information would be helpful in auditing service execution. In case of an SLA violation, trusted audit trails may be useful to find the root cause. Fig. 3 shows further important aspects that need to be considered: multi-tenancy and resilience by using from different data centres that may be operated by different Providers. The aspect of multi-tenancy is illustrated by having X and Y that are both using hosted in Data Centre B.1 from Provider B. X is hosting a CI service, whereas Y is running a service which is not related to Critical s. Since current systems do not allow for perfect isolation of, services running in Y s infrastructure may influence CI services running in X s. For instance, this may be the case where are co-located within the same physical machine, or if network traffic to Y adversely affects data traffic to X s. This may be especially true in case that Y suffers from a (Distributed) Denial-of- attack, or its infrastructure is used as an attack source itself and quality-ofservice mechanisms in the network to enforce proper tenant network separation are missing. Moreover, s may explicitly request from different locations, i.e., either from different data centres of the same Provider (cf. Y s hosted in Data Centres B.1 and B.2) or from different Providers (cf. X s hosted in Data Centres A.1 and B.1). If the different Provider cooperate the latter is also called Federation [12]. One objective for distributing across different regions, availability zones, or even providers is to increase the availability of the CI service. Furthermore, the access to cloud in a data centre is a critical path for operating the CI service: if the Internet connection to the data centre(s) is unavailable, the service operation may fail, e.g., because the operating personnel cannot access the service or because critical data input such as telemetry data or camera streams is not delivered into the data centre. In use case of Section I-B this connection Physical Fig. 3. A CI s hosts B X Data Centre A.1 Provider A C CI hosts service components hosts Data Centre B.1 Data Centre B.2 Provider B Resilience and Multi-Tenancy Aspects A Other s hosts service components hosts C B D Other Y hosts from service user CITYSEC to the data centre is provided by TELCOM. In that case, it may be necessary to provide a dedicated access path to the data centre, e.g., by providing an MPLS VPN that extends to the data centre. This requires, however, that TELCOM has enough control over the whole network path from the data centre to the service user CITYSEC. Alternatively, TELCOM must request corresponding services from other ISPs or must cooperate with them accordingly. There are many ways of providing the required resilience and redundancy in network access, using services from multiple providers is usually preferable than depending on only a single provider. Moreover, site multi-homing of the data centre itself is an additional requirement, possibly inherently present in case of using multiple Providers. Fig. 4 shows a site multi-homing scenario for a single Provider. The exemplary data centre network is hierarchically structured, consisting of so-called Top-of-Rack Switches aggregated by possibly several levels above (aggregation and core level), up to the WAN access level, that typically consists of IP routers using BGP (Border Gateway Protocol). We note that several other data centre network topologies are in use, especially increasingly meshed ones, like FatTree or BCube, allowing for multipath transport and more efficient solutions this fact is, however, not relevant for our further considerations. In this example, the data centre is multi-homed to two different Internet Providers (ISP A and ISP B), so the user can probably access the hosted in the data centre even if one of both ISPs fails. However, redundant (i.e., site multi-homed) network access should be available at the client side, too, otherwise a single-point of failure exists on this side. Additionally, it should be verified that the redundant paths are really disjoint also physically, especially on the last mile. As mentioned earlier, there is a need to identify mechanisms and interfaces that can be used to increase the trust level between the tenant and the Provider. Fig. 5 shows a management-oriented view of the architectural model.

7 Fig. 4. Client Devices ISP A Top ofrack Switch Compute+ Network Resources Internet Client Internet Access ISP B (Data Centre) Network Access to Multi-Homed CI services WAN Access Aggregation and Core Storage Resources Starting at the, the CI Operator controls its service components by using an Operating Support System (OSS). For initialisation of an actual deployment the latter passes an Description to the Management System. It is responsible to request the adequate, including the necessary constraints like co-location restrictions and redundancy requirements, from the Management System by passing corresponding resource descriptions to it. Orchestration means that the Management System provides the required services components by instantiating and connecting the necessary and instances, e.g., a web service with high reliability requirements could automatically be mapped onto a load balancing component and two or more backend web servers, that have to be placed on disjoint physical hosts. Traditionally, such constraints have been expressed by affinity and anti-affinity rules. This is not sufficient for dependent components, e.g., stateful components in an active-standby protection use cases. Provisioning for such use cases requires explicit parametrization of the deployment, e.g., maximum tolerable delay between two instances for synchronisation (see [13] for details). Monitoring must be also performed at this level in order to verify fulfilment of the resilience requirements as well as the enforcement of the requested policies. At the level, different kinds of systems are supplied and managed: Virtual Machines (VMs), Virtual Storage (VS), or Virtual Network (VN) components. The are provided by a ization software solution that usually includes a Management System, which manages individual within the physical machines by using Virtual Machine Monitors (VMMs, often also called Hypervisors), Virtual Storage Monitors, and Virtual Network Monitors respectively. In case that the Provider also supplies preconfigured components, it may load preinstalled VM images from a repository into the allocated. The Management System may automatically request the creation and instantiation of new within the SLA bounds in order to utilise the elasticity of cloud. At each level a corresponding monitoring is necessary: the CI Operator monitors its components at service level (e.g., transaction latency, number of failed and successful requests and so on). The monitoring is component specific and requires service internal functionality; often this component specific monitoring is called Element Management System (EMS). The EMS interfaces with the OSS for event reporting. At the OSS level the events from several components get correlated to achieve a holistic view on the current service context. Based on this context adaptive actions can be initiated, e.g., starting of additional replicas to prevent overload situations. In addition to the service specific monitoring, generic monitoring on the resource level provides input to scale-out/down and load balancing decisions. Such measurements are taken on the Operator level, monitoring the service s own (state of the machines etc.), whereas the Operator monitors the physical infrastructure as well as all from all tenants. The cloud infrastructure provider can use these measurements to assess if VMs should be migrated to other compute nodes and shut some down for energy savings or if resource contention is increasing and VMs should be migrated to prevent service failures. Fig. 5. A CI B Orchestration Provisioning Monitoring Policy Control C VS VM VM VN VSM VMM VMM VNM VImage DB A Management Oriented View Operating Support System Management System Management System Stakeholder CI CI Operator Descriptions Infrastr. Operator Resource Descriptions Operator In case a service failure happens the root cause must be identified. The elasticity and dynamics of the cloud environment makes it difficult to reconstruct what actually happened during a certain time period, since the state of the topology and its components may change frequently. For instance, the Operator may have requested to install an additional network component for resilience, which may have caused a temporary loop for a few seconds due to mis-configuration by the Operator. This implies several questions, e.g., how can the Provider prove that the additional component was correctly provided and that the failure was not on his side? Is it

8 possible to prove that a certain topology was active a specific point in time? Moreover, if the Provider provides more transparency to the tenant for otherwise opaque operations may help to increase the trust level between both parties, because auditing of security and related requirements may be possible. Usually, the tenant has no knowledge where the instances are actually placed within the or when they are migrated. For auditing purposes it may be useful though to provide some additional information, so that the tenant can verify his collocation requirements are kept or when a machine was migrated. Log data and some operational data may be stored at some trusted third party in order to provide a solution that allows for non-repudiation. While the objective of most other approaches is mainly to specify and standardise mechanisms for the cloud infrastructure level and how to realise and provide services on top of this cloud infrastructure, our architecture aims at covering the provision, deployment, and operation of critical infrastructure services in cloud environments. A separation of different stakeholders and their responsibilities is important in order to address technical and legal requirements that we identified. IV. CONCLUSION This paper addressed the special requirements that can be identified if critical infrastructure services are moved fully or partially into cloud environments. Understanding and managing risk associated with such environments is important in order to eliminate the uncertainty for operators and providers of critical infrastructure IT systems. Thus, realising such CI services in the cloud implies security and resilience requirements that existing cloud offerings do not address well. From a legal perspective, we derived a requirement for provision of mechanisms and instruments that permit remote-auditing (including trusted audit trails). Separation of different stakeholders and their responsibilities is important in order to adequately address the technical and legal requirements that we have identified. Therefore, the presented architectural model aims at a more precise role distinction that allows for better security analysis, separation of responsibilities, identification of separate administrative interfaces, and for checking the influence and coverage of legal aspects. We identified different abstraction levels: The level, the CI level, the level, as well as the Physical level. This model constitutes a basis for the development of interfaces that permit the utilisation of monitoring and auditing tools that enable service audits in a lawful and privacy compliant manner. Such cooperative interfaces should increase transparency in the cloud infrastructure to allow for root-cause analysis. This work will be complemented by the development of process-oriented security guidelines, policies, and policy languages that allow the expression of security requirements that are needed for realising CI services in clouds. Other work will concentrate on anomaly detection mechanisms that are used to discover deviations from expected system and network behaviour, in order to disclose attacks and to predict their impact. As a next step we are identifying and defining the mentioned interfaces and mechanisms along the architectural model required to support deployment of CI services. ACKNOWLEDGMENT The research presented in this paper has been funded by the European Commission in the context of the Research Framework Program Seven (FP7) project SECCRIT (Grant Agreement No ). REFERENCES [1] J. P. G. Sterbenz, D. Hutchison, E. K. Çetinkaya, A. Jabbar, J. P. Rohrer, M. Schöller, and P. Smith, Resilience and Survivability in Communication Networks: Strategies, Principles, and Survey of Disciplines, Computer Networks: Special Issue on Resilient and Survivable Networks (COMNET), vol. 4, pp , [2] European Parliament and Council of Europe, Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data (Data Protection Directive), [3] European Commission, Proposal for a regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), [4] V. Josyula, M. Orr, and G. Page, Computing: Automating the Virtualized Data Center. Cisco Press Networking Technology, Cisco Systems, [5] M. Lasserre, F. Balus, T. Morin, N. Bitar, and Y. Rekhter, Framework for DC Network Virtualization. Internet-Draft, Internet Engineering Task Force, July draft-ietf-nvo3-framework/. [6] Security Alliance, Quick Guide to the Reference Architecture - Trusted Initiative, [7] A. Kochut, Y. Deng, M. R. Head, J. Munson, A. Sailer, H. Shaikh, C. Tang, A. Amies, M. Beaton, D. Geiss, D. Herman, H. Macho, S. Pappe, S. Peddle, R. Rendahl, A. E. T. Reyes, H. Sluiman, B. Snitzer, T. Volin, and H. Wagner, Evolution of the ibm cloud: enabling an enterprise cloud services ecosystem, IBM J. Res. Dev., vol. 55, pp , Nov [8] Distributed Management Task Force (DMTF), Architecture for Managing s Version 1.0.0: A White Paper from the Open Standards Incubator, June [9] I. M. Abbadi, s Taxonomy, Properties, and Management s, in Advances in Computing and Communications (A. Abraham, J. L. Mauri, J. F. Buford, J. Suzuki, and S. M. Thampi, eds.), vol. 193 of Communications in Computer and Information Science, pp , Springer Berlin Heidelberg, [10] R. B. Bohn, J. Messina, F. Liu, J. Tong, and J. Mao, NIST Computing Reference Architecture, in Proceedings of the 2011 IEEE World Congress on s, SERVICES 11, (Washington, DC, USA), pp , IEEE Computer Society, [11] Open Security Architecture, SP-011: Computing Pattern. pattern-cloud-computing. [12] B. Rochwerger, D. Breitgand, A. Epstein, D. Hadas, I. Loy, K. Nagin, J. Tordsson, C. Ragusa, M. Villari, S. Clayman, E. Levy, A. Maraschini, P. Massonet, H. Muoz, and G. Tofetti, Reservoir When One Is Not Enough, Computer, vol. 44, no. 3, pp , [13] M. Schöller, M. Stiemerling, A. Ripke, and R. Bless, Resilient deployment of network functions, in to appear in Fifth International Workshop on Reliable Networks Design and Modeling (RNDM 2013), 2013.

Secure Cloud Computing for Critical Infrastructures

Secure Cloud Computing for Critical Infrastructures SEcure Cloud computing for CRitical Infrastructure IT Secure Cloud Computing for Critical Infrastructures Aleksandar Hudic and Christian Wagner AIT Austrian Institute of Technology AIT Austrian Institute

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

NIST Cloud Computing Reference Architecture

NIST Cloud Computing Reference Architecture NIST Cloud Computing Reference Architecture Version 1 March 30, 2011 2 Acknowledgements This reference architecture was developed and prepared by Dr. Fang Liu, Jin Tong, Dr. Jian Mao, Knowcean Consulting

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

Virtual Machine in Data Center Switches Huawei Virtual System

Virtual Machine in Data Center Switches Huawei Virtual System Virtual Machine in Data Center Switches Huawei Virtual System Contents 1 Introduction... 3 2 VS: From the Aspect of Virtualization Technology... 3 3 VS: From the Aspect of Market Driving... 4 4 VS: From

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Remote Voting Conference

Remote Voting Conference Remote Voting Conference Logical Architecture Connectivity Central IT Infra NIST Best reachability in India for R-Voting Initiative 200+ Physical MPLS POPs across India 5 Regional Data Centre at Pune,

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

Cloud Networking: An Infrastructure Service Architecture for the Wide Area

Cloud Networking: An Infrastructure Service Architecture for the Wide Area Future Network and MobileSummit 2012 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2012 ISBN: 978-1-905824-29-8 Cloud Networking:

More information

White Paper. Cloud Vademecum

White Paper. Cloud Vademecum White Paper Cloud Vademecum Cloud is the new IT paradigm this document offers a collection of thoughts, internal and external discussions and information. The goal is to inspire and stimulate the route

More information

Cloud Computing Standards: Overview and ITU-T positioning

Cloud Computing Standards: Overview and ITU-T positioning ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working

More information

Challenges for Provenance in Cloud Computing

Challenges for Provenance in Cloud Computing Challenges for Provenance in Cloud Computing Imad M. Abbadi and John Lyle Department of Computer Science, University of Oxford Email: firstname. lastname @cs.ox.ac.uk Abstract Many applications which require

More information

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot

More information

Cloud Computing Architecture: A Survey

Cloud Computing Architecture: A Survey Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and

More information

JISC. Technical Review of Using Cloud for Research. Guidance Notes to Cloud Infrastructure Service Providers. Introduction

JISC. Technical Review of Using Cloud for Research. Guidance Notes to Cloud Infrastructure Service Providers. Introduction JISC Technical Review of Using Cloud for Research Guidance Notes to Cloud Infrastructure Service Providers May, 2010 Introduction Provisioning and maintenance of research computing facilities is a core

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

1.1.1 Introduction to Cloud Computing

1.1.1 Introduction to Cloud Computing 1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the

More information

Leveraging SDN and NFV in the WAN

Leveraging SDN and NFV in the WAN Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined

More information

A Look at the New Converged Data Center

A Look at the New Converged Data Center Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable

More information

SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING

SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING 1. K.SURIYA Assistant professor Department of Computer Applications Dhanalakshmi Srinivasan College of Arts and Science for Womren Perambalur Mail: Surik.mca@gmail.com

More information

Seed4C: A Cloud Security Infrastructure validated on Grid 5000

Seed4C: A Cloud Security Infrastructure validated on Grid 5000 Seed4C: A Cloud Security Infrastructure validated on Grid 5000 E. Caron 1, A. Lefray 1, B. Marquet 2, and J. Rouzaud-Cornabas 1 1 Université de Lyon. LIP Laboratory. UMR CNRS - ENS Lyon - INRIA - UCBL

More information

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service

More information

Cloud Standards - A Telco Perspective

Cloud Standards - A Telco Perspective Cloud Standards - A Telco Perspective Abdellatif Benjelloun Touimi abdellatif.benjelloun@huawei.com Corporate Standards Department www.huawei.com TEN YEARS OF CONNECTING EUROPE HUAWEI TECHNOLOGIES CO.,

More information

Logical Data Models for Cloud Computing Architectures

Logical Data Models for Cloud Computing Architectures Logical Data Models for Cloud Computing Architectures Augustine (Gus) Samba, Kent State University Describing generic logical data models for two existing cloud computing architectures, the author helps

More information

The Advantages of Cloud Services

The Advantages of Cloud Services Cloud-Based Services: Assure Performance, Availability, and Security What You Will Learn Services available from the cloud offer cost and efficiency benefits to businesses, but until now many customers

More information

Can PCI DSS Compliance Be Achieved in a Cloud Environment?

Can PCI DSS Compliance Be Achieved in a Cloud Environment? royal holloway Can Compliance Be Achieved in a Cloud Environment? Organisations are considering whether to run -based systems in a cloud environment. The security controls in the cloud may be sufficient

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

zen Platform technical white paper

zen Platform technical white paper zen Platform technical white paper The zen Platform as Strategic Business Platform The increasing use of application servers as standard paradigm for the development of business critical applications meant

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

Improving the Microsoft enterprise. network for public cloud connectivity

Improving the Microsoft enterprise. network for public cloud connectivity Improving the Microsoft enterprise cloud network for public cloud connectivity Page 1 Improving network performance between Microsoft and the public Situation As Microsoft IT located more of its line-ofbusiness

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,

More information

IAAS CLOUD EXCHANGE WHITEPAPER

IAAS CLOUD EXCHANGE WHITEPAPER IAAS CLOUD EXCHANGE WHITEPAPER Whitepaper, July 2013 TABLE OF CONTENTS Abstract... 2 Introduction... 2 Challenges... 2 Decoupled architecture... 3 Support for different consumer business models... 3 Support

More information

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security

More information

CLOUD COMPUTING SECURITY ISSUES

CLOUD COMPUTING SECURITY ISSUES CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Lecture 02a Cloud Computing I

Lecture 02a Cloud Computing I Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

Security & Trust in the Cloud

Security & Trust in the Cloud Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer

More information

Data Center Networking Designing Today s Data Center

Data Center Networking Designing Today s Data Center Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability

More information

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

GETTING THE MOST FROM THE CLOUD. A White Paper presented by GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

Resilient deployment of virtual network functions

Resilient deployment of virtual network functions Resilient deployment of virtual network functions Marcus Schöller, Martin Stiemerling, Andreas Ripke NEC Europe Ltd. Heidelberg, Germany Email: marcus.schoeller@neclab.eu Roland Bless Karlsruhe Institute

More information

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF NFX FOR MSP SOLUTION BRIEF SP Monitor Jump Start Security-as-a-Service Designed to give you everything you need to get started immediately providing security-as-a service, SP Monitor is a real-time event

More information

Ensuring end-user quality in NFV-based infrastructures

Ensuring end-user quality in NFV-based infrastructures Ensuring end-user quality in NFV-based infrastructures Leveraging distributed NFV cloud nodes to provide instant assessment of end-user experience EXECUTIVE SUMMARY Compute resources for virtual network

More information

CSE543 Computer and Network Security Module: Cloud Computing

CSE543 Computer and Network Security Module: Cloud Computing CSE543 Computer and Network Security Module: Computing Professor Trent Jaeger 1 Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory 2 Computing Is Here Systems and Internet

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011 A Strawman Model NIST Cloud Computing Reference Architecture and Taxonomy Working Group January 3, 2011 Objective Our objective is to define a neutral architecture consistent with NIST definition of cloud

More information

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

The NREN s core activities are in providing network and associated services to its user community that usually comprises: 3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of

More information

Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES

Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES Meeting the 7 Challenges in Testing and Performance Management Introduction With advent of the cloud paradigm, organizations are transitioning

More information

ASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach

ASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach ASCETiC Whitepaper Motivation The increased usage of ICT, together with growing energy costs and the need to reduce greenhouse gases emissions call for energy-efficient technologies that decrease the overall

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

The Need for Service Catalog Design in Cloud Services Development

The Need for Service Catalog Design in Cloud Services Development The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental

More information

Hybrid Cloud Computing

Hybrid Cloud Computing Dr. Marcel Schlatter, IBM Distinguished Engineer, Delivery Technology & Engineering, GTS 10 November 2010 Hybrid Computing Why is it becoming popular, Patterns, Trends, Impact Hybrid Definition and Scope

More information

Nokia Networks. Nokia Networks. telco cloud is on the brink of live deployment

Nokia Networks. Nokia Networks. telco cloud is on the brink of live deployment Nokia Networks Nokia Networks telco cloud is on the brink of live deployment With Nokia Networks multi-stack telco cloud approach, operators have the freedom to choose the cloud platform that matches their

More information

Planning the Migration of Enterprise Applications to the Cloud

Planning the Migration of Enterprise Applications to the Cloud Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction

More information

Integrated management information in utilities

Integrated management information in utilities Integrated management information in utilities Information from Cigré The objective of this article is to assist utilities define, specify and evaluate the high level management systems that form the information

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

Software Defined Security Mechanisms for Critical Infrastructure Management

Software Defined Security Mechanisms for Critical Infrastructure Management Software Defined Security Mechanisms for Critical Infrastructure Management SESSION: CRITICAL INFRASTRUCTURE PROTECTION Dr. Anastasios Zafeiropoulos, Senior R&D Architect, Contact: azafeiropoulos@ubitech.eu

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

Network Virtualization for Large-Scale Data Centers

Network Virtualization for Large-Scale Data Centers Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning

More information

NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization

NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization White Paper NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization NFV Orchestration Overview Network Function Virtualization (NFV) technology, in combination

More information

Assumption Busters Workshop - Cloud Computing

Assumption Busters Workshop - Cloud Computing Assumption Busters Workshop - Cloud Computing Background: In 2011, the U.S. Federal Cyber Research Community conducted a series of four workshops designed to examine key assumptions that underlie current

More information

The changing face of global data network traffic

The changing face of global data network traffic The changing face of global data network traffic Around the turn of the 21st century, MPLS very rapidly became the networking protocol of choice for large national and international institutions. This

More information

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud

More information

Introduction to OpenStack

Introduction to OpenStack Introduction to OpenStack Carlo Vallati PostDoc Reseracher Dpt. Information Engineering University of Pisa carlo.vallati@iet.unipi.it Cloud Computing - Definition Cloud Computing is a term coined to refer

More information

Bootstrapping "softwarised" infrastructure trust: from SDN towards NFV

Bootstrapping softwarised infrastructure trust: from SDN towards NFV Bootstrapping "softwarised" infrastructure trust: from towards NFV Ludovic Jacquin Hewlett-Packard Laboratories < ludovic.jacquin@hp.com > Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28/4/2015

More information

Cloud/SaaS enablement of existing applications

Cloud/SaaS enablement of existing applications Cloud/SaaS enablement of existing applications GigaSpaces: Nati Shalom, CTO & Founder About GigaSpaces Technologies Enabling applications to run a distributed cluster as if it was a single machine 75+

More information

Trust areas: a security paradigm for the Future Internet

Trust areas: a security paradigm for the Future Internet Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de

More information

Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform

Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform Daniel King d.king@lancaster.ac.uk Matthew Broadbent m.broadbent@lancaster.ac.uk David Hutchison d.hutchison@lancaster.ac.uk

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

Drawbacks to Traditional Approaches When Securing Cloud Environments

Drawbacks to Traditional Approaches When Securing Cloud Environments WHITE PAPER Drawbacks to Traditional Approaches When Securing Cloud Environments Drawbacks to Traditional Approaches When Securing Cloud Environments Exec Summary Exec Summary Securing the VMware vsphere

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Delivering Managed Services Using Next Generation Branch Architectures

Delivering Managed Services Using Next Generation Branch Architectures Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN

More information

John Essner, CISO Office of Information Technology State of New Jersey

John Essner, CISO Office of Information Technology State of New Jersey John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management

More information

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments What You Will Learn Deploying network services in virtual data centers is extremely challenging. Traditionally, such Layer

More information

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions

More information

SDN Unlocks New Opportunities for Cloud Service Providers

SDN Unlocks New Opportunities for Cloud Service Providers White Paper SDN Unlocks New Opportunities for Cloud Service Providers Prepared by Caroline Chappell Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.juniper.net March 2014 Executive

More information

Recommendations for companies planning to use Cloud computing services

Recommendations for companies planning to use Cloud computing services Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation

More information

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Cloud Computing and the Internet. Conferenza GARR 2010

Cloud Computing and the Internet. Conferenza GARR 2010 Cloud Computing and the Internet Conferenza GARR 2010 Cloud Computing The current buzzword ;-) Your computing is in the cloud! Provide computing as a utility Similar to Electricity, Water, Phone service,

More information

Why Service Providers Need an NFV Platform Strategic White Paper

Why Service Providers Need an NFV Platform Strategic White Paper Why Service Providers Need an NFV Platform Strategic White Paper Network Functions Virtualization (NFV) brings proven cloud computing and IT technologies into the networking domain to help service providers

More information

Seeing Though the Clouds

Seeing Though the Clouds Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating

More information

TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES

TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES ANNEX IV (D) TO THE CONTRACT NOTICE TENDER

More information

Syslog Analyzer ABOUT US. Member of the TeleManagement Forum. info@ossera.com +1-916-290-9300 http://www.ossera.com

Syslog Analyzer ABOUT US. Member of the TeleManagement Forum. info@ossera.com +1-916-290-9300 http://www.ossera.com Syslog Analyzer ABOUT US OSSera, Inc. is a global provider of Operational Support System (OSS) solutions for IT organizations, service planning, service operations, and network operations. OSSera's multithreaded

More information

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35

More information

WHY SERVICE PROVIDERS NEED A CARRIER PaaS SOLUTION cpaas for Network

WHY SERVICE PROVIDERS NEED A CARRIER PaaS SOLUTION cpaas for Network WHY SERVICE PROVIDERS NEED A CARRIER PaaS SOLUTION cpaas for Network Functions Virtualization White Paper Carrier PaaS provides the tools service providers need to transform their current network operational

More information

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud

More information

AEIJST - June 2015 - Vol 3 - Issue 6 ISSN - 2348-6732. Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha

AEIJST - June 2015 - Vol 3 - Issue 6 ISSN - 2348-6732. Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha Abstract Cloud Broker * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha Dept of ISE, The National Institute of Engineering, Mysore, India Cloud computing is kinetically evolving areas which

More information