Secure Cloud Computing: KEVIN JACKSON

Size: px
Start display at page:

Download "Secure Cloud Computing: KEVIN JACKSON"

Transcription

1 Secure Cloud Computing: An Architecture t Ontology Approach KEVIN JACKSON

2 Forces Driving Cloud Computing The New IT Era rev date 4/15/2009 slide 2

3 Cloud Computing Value rev date 4/15/2009 slide 3

4 Cloud Computing Challenge rev date 4/15/2009 slide 4

5 Unified Ontology of Cloud Computing ( Cloud Application (SaaS) Cloud Software Environment (PaaS) Cloud Software Infrastructure Computational Storage Communications Resources (IaaS) (DaaS) (CaaS) Software Kernal Firmware / Hardware (HaaS) Lamia Youseff University of California, Santa Barbara Maria Butrico, Dilma Da Silva IBM T.J. Watson Research Center

6 Tactical Employment Issues Internet t connectivity it assumed SOA platform Security management Application service discovery and management Workflow orchestration Access management

7 Ontology Modifications for Tactical Cloud Computing Access Cloud Management Application (SaaS) Cloud Cloud Application Application (SaaS) Workflow Workflow Orchestration (SaaS) Orchestration Policy Engine Cloud Security Software API Environment Security API Services Cloud / Services Software (PaaS) Discovery Services / Services Discovery Environment Service Management (PaaS) Service Management Cloud Software Cloud Infrastructure Software Environment Cloud Software Cloud Infrastructure Software (PaaS) Environment Cloud Software Infrastructure (PaaS) Storage Communications Cloud Network Software Security Infrastructure t Storage (DaaS) Communications (CaaS) Network (DaaS) Connectivity (CaaS) Computational Network Storage Security Computational Storage Communications Resources Computational (IaaS) Resources (IaaS) Communications Computational Resources (IaaS) Storage (DaaS) (CaaS) Software Kernal Communications (CaaS) (IaaS) (DaaS) Software Kernal Software Software Kernal Kernal ) Firmware Hardware (HaaS) Firmware / Hardware (HaaS)

8 Tactical Cloud Computing Ontology Computational Resources (IaaS) Access Management Cloud Application (SaaS) Workflow Orchestration Policy Engine Security API Services / Services Discovery Service Management Cloud Software Environment (PaaS) Cloud Software Infrastructure Network Connectivity Storage (DaaS) Software Kernal Firmware / Hardware (HaaS) Communications (CaaS)

9 Ontology Modification Federated SOA Global l Governance Dynamic Tasking Access Management Cloud Application i (SaaS) S) Workflow Orchestration Policy Engine Security API Services / Services Discovery Service Management Cloud Software Environment (PaaS) Access Management Cloud Application i (SaaS) S) Workflow Orchestration Policy Engine Security API Services / Services Discovery Service Management Cloud Software Environment (PaaS) Cloud Software Infrastructure Cloud Software Infrastructure Network Connectivity Network Connectivity Computational Resources (IaaS) Storage (DaaS) Communications (CaaS) Computational Resources (IaaS) Storage (DaaS) Communications (CaaS) Software Kernal Software Kernal Firmware / Hardware (HaaS) Firmware / Hardware (HaaS)

10 Secure Cloud Computing An Approach Access Management Out of Band authentication Access Management Cloud Application (SaaS) Security API y g Use of services Binding of service Services / Services Discovery COI driven Service Management management No VPN Data aain Motion o security Computational Resources VM management Data-centric security model Storage Data at Rest security COI driven access Computational Resources (IaaS) Workflow Orchestration Policy Engine Security API Cloud dsoftware Environment (PaaS) Cloud Software Infrastructure Network Connectivity Storage (DaaS) Software Kernal Firmware / Hardware (HaaS) Communications (CaaS)

11 SecureParser Document -mail E Database Video Map Imagery Cryptographically splits data Creates physically separate fault tolerant Shares CDIP & COI Framework AES Encryption Random Bit Split M of N Fault Tolerance Share Authentication High-efficiency cryptographic module: Provably-secure Computational Secret Sharing Cryptographic Data Splitting Data Integrity Protection Modules can be change out, e.g. AES could be changed with a TYPE I encryption as requirement called for Physically Separate Shares Written to Storage Data at Rest Written to Networks Data in Motion Created at any IO Point in the system User Definable Number of Shares Fault Tolerance Key Management

12 Independent Testing and Evaluation 2005 CWID: AFCA assessment & AF C2 Battle Lab demo as demonstrating the potential to be labeled as an MLS/PL-4 System 2005 DISA: Technical Information Panel (TIP) found to have merit for further evaluation and consideration for use as an information assurance technology potential to fundamentally alter the way storing and securing of data is approached SOCOM: National Center for the Study of Counter-terrorism and Cybercrime IV&V completed successfully for SOCOM MLS Pilot Project 2006 EUCOM Combined Endeavor: Joint Interoperability Test Center (JITC) value of the SecureParser was obvious. This capability not only offers increased security of data, but reduces costs by eliminating the need for redundant resources Selected by DISA as a demonstration solution for CWID 08 - June 08 Selected by NSA for HAP Trade Study as a Crypto Service and for DAR

13 Mission Network Centric Operations Industry Consortium Our mission is to facilitate global realization of the benefit inherent in Network Centric Operations. To that end, we seek to enable continuously increasing levels of interoperability across the spectrum of joint, interagency, intergovernmental, and multinational industrial and commercial operations. We will execute this mission in good faith as a global organization with membership open to all enterprises in quest of applying the vast potential of network centric technology to the operational challenges faced by our nations and their citizens. Past successes Network Centric Analysis Tool (NCAT) NCOIC Interoperability Framework (NIF) Future Develop operational art in support of netcentric operations Support operational art advances through collaboration (Government, Industry, Non-profits, Interest Groups) Provide value to members Use of NCOIC developed process provided differentiator in recent European procurement for a member company NCOIC Patterns addressing interoperability concerns of member government agencies

14 Cloud Computing Operational Art Embrace collaboration OSD tactical Cloud Computing TIGR Government Cloud Computing Cloud Interoperability bl Forum Use Operational and Capability pattern process to develop Cloud Computing Technical Patterns Identify key netcentric operations interoperability requirements and preferences within identified technical patterns Iterate with NCOIC stakeholder companies and government organizations Use Capability and Operational patterns to validate operational impact of reduced cloud interoperability Leverage analysis to drive cloud interoperability recommendations and best practices

15 Thank You! com

Toward a Unified Ontology of Cloud Computing

Toward a Unified Ontology of Cloud Computing Toward a Unified Ontology of Cloud Computing Lamia Youseff University of California, Santa Barbara Maria Butrico, Dilma Da Silva IBM T.J. Watson Research Center 1 In the Cloud Several Public Cloud Computing

More information

Service based Personalized Learning System in Cloud Computing Environment

Service based Personalized Learning System in Cloud Computing Environment Service based Personalized Learning System in Cloud Computing Environment HwaYoung Jeong 1, BongHwa-Hong 2, 1 Humanitas College of Kyunghee University. Hoegi-dong, Seoul, 130-701, Korea. 2 Dept. of Information

More information

International Journal of Emerging Technology & Research

International Journal of Emerging Technology & Research International Journal of Emerging Technology & Research Volume 1, Issue 5, July-Aug, 2014 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 Proposed Improvement BPM as a Knowledge Layer into SaaS

More information

Cloud Computing Standards: Overview and ITU-T positioning

Cloud Computing Standards: Overview and ITU-T positioning ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working

More information

Cloud Computing. Jussi Talaskivi Information Management Centre University of Jyväskylä

Cloud Computing. Jussi Talaskivi Information Management Centre University of Jyväskylä Cloud Computing Jussi Talaskivi Information Management Centre University of Jyväskylä About the presenter Information Systems Analyst Scrum master Web Content Management System (Plone) www.jyu.fi Koppa

More information

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM Taha Chaabouni 1 and Maher Khemakhem 2 1 MIRACL Lab, FSEG, University of Sfax, Sfax, Tunisia chaabounitaha@yahoo.fr 2 MIRACL Lab, FSEG, University

More information

Application of Selective Algorithm for Effective Resource Provisioning In Cloud Computing Environment

Application of Selective Algorithm for Effective Resource Provisioning In Cloud Computing Environment Application of Selective Algorithm for Effective Resource Provisioning In Cloud Computing Environment Mayanka Katyal 1 and Atul Mishra 2 1 Deptt. of Computer Engineering, YMCA University of Science and

More information

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways

More information

Own your own Enterprise Cloud with. FlexCloud

Own your own Enterprise Cloud with. FlexCloud Own your own Enterprise Cloud with FlexCloud What Problem do we solve? Traditional Virtualization Stack Data protection software applications PDU Backup Servers + Virtualization Storage Switch HA shared

More information

Oracle Reference Architecture and Oracle Cloud

Oracle Reference Architecture and Oracle Cloud Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended

More information

ALSO CHOICE. The Channel Partner s Cloud Marketplace ALSO CHOICE. Marketplace. Sales. Provisioning. Billing. Reporting. Self-Care.

ALSO CHOICE. The Channel Partner s Cloud Marketplace ALSO CHOICE. Marketplace. Sales. Provisioning. Billing. Reporting. Self-Care. ALSO CHOICE The Channel Partner s Cloud ALSO CHOICE alsochoice.cloudmarketplace.d e 1 ALSO CHOICE The Concept ALSO becomes a Cloud Service aggregator offering to our channel partner an ALSO qualified and

More information

Considerations for Adopting PaaS (Platform as a Service)

Considerations for Adopting PaaS (Platform as a Service) Considerations for Adopting PaaS (Platform as a Service) Michael Dolan (mdolan@pivotal.io) Senior Field Engineer April 2015 1 Becoming The Agile Enterprise To effectively achieve its missions, the Department

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Trust and Dependability in Cloud Computing

Trust and Dependability in Cloud Computing Trust and Dependability in Cloud Computing Claus Pahl IC4 Principal Investigator November 7 th, 2013 Research Philosophy design for growth design for best service provision design for widest acceptance

More information

The standards landscape in cloud

The standards landscape in cloud The standards landscape in cloud PRESENTATION computing TITLE GOES HERE Vincent Franceschini CTO Distributed Architectures, Hitachi Data System Chairman Emeritus, SNIA Governing Board Member, SNIA Cloud

More information

VMware for your hosting services

VMware for your hosting services VMware for your hosting services Anindya Kishore Das 2009 VMware Inc. All rights reserved Everybody talks Cloud! You will eat your cloud and you will like it! Everybody talks Cloud - But what is it? VMware

More information

Service Oriented Architecture (SOA) for DoD

Service Oriented Architecture (SOA) for DoD Service Oriented Architecture (SOA) for DoD Prof. Paul A. Strassmann January 9, 2008 1 Part 1 SOA Requirements 2 The DoD Challenge 3 Most DoD Projects Have Own Data Projects 07 Budget $ Millions Number

More information

Inside the Cloud The Supporting Architecture of Cloud Computing. Jack Hanison Jack.Hanison@capgemini.com

Inside the Cloud The Supporting Architecture of Cloud Computing. Jack Hanison Jack.Hanison@capgemini.com Inside the Cloud The Supporting Architecture of Cloud Computing Jack Hanison Jack.Hanison@capgemini.com What is Cloud Computing? 2 http://www.flickr.com/photos/galego/3131005845/ Is Cloud Computing these

More information

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CSV-W02 Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control David Etue VP, Business Development, Identity and Data Protection Gemalto @djetue Cloud and Virtualization Are

More information

Preparation Guide Content. EXIN Cloud. 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13. Computing Foundation

Preparation Guide Content. EXIN Cloud. 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13. Computing Foundation Preparation Guide Content EXIN Cloud 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13 Computing Foundation Edition December 2015 Copyright 2015 EXIN All rights reserved.

More information

The NIST Cloud Computing Program

The NIST Cloud Computing Program The NIST Cloud Computing Program Robert Bohn Information Technology Laboratory National Institute of Standards and Technology October 12, 2011 Information Technology Laboratory Cloud 1 Computing Program

More information

NIST Cloud Computing Reference Architecture & Taxonomy Working Group

NIST Cloud Computing Reference Architecture & Taxonomy Working Group NIST Cloud Computing Reference Architecture & Taxonomy Working Group Robert Bohn Information Technology Laboratory June 21, 2011 2 Outline Cloud Background Objective Working Group background NIST Cloud

More information

Profile. Business solutions with a difference

Profile. Business solutions with a difference Profile Business solutions with a difference Overview ITeM Group was founded in 1999 and has a successful history of delivering IT solutions in Australia, New Zealand, Indonesia, China and Canada. We specialise

More information

Shared Services Canada (SSC)

Shared Services Canada (SSC) Shared Services Canada (SSC) Cloud Computing Architecture Identity, Credential & Access Architecture Framework Advisory Committee Transformation, Service Strategy and Design August 29, 2013 1 Agenda TIME

More information

Grid Computing Vs. Cloud Computing

Grid Computing Vs. Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid

More information

Cloud Perspectives. Steven Woodward CFPS, CSQA steve@cloud-perspectives.com 613-823-7573 www.cloud-perspectives.com

Cloud Perspectives. Steven Woodward CFPS, CSQA steve@cloud-perspectives.com 613-823-7573 www.cloud-perspectives.com Cloud Perspectives Steven Woodward CFPS, CSQA steve@cloud-perspectives.com 613-823-7573 www.cloud-perspectives.com Introduction Models and Standards Categories and Context Function Point Scenarios Hints

More information

Information Technology 2016-2021 Strategic Plan

Information Technology 2016-2021 Strategic Plan Information Technology 2016-2021 Strategic Plan Draft Table of Contents Table of Contents... 3 Introduction... 4 Mission of IT... 4 Primary Service Delivery Objectives... 4 Availability of Systems...

More information

Take Your Rocket U2 Apps Mobile with Rocket LegaSuite. Greg Mummah, Product Manager Rocket Software

Take Your Rocket U2 Apps Mobile with Rocket LegaSuite. Greg Mummah, Product Manager Rocket Software Take Your Rocket U2 Apps Mobile with Rocket LegaSuite Greg Mummah, Product Manager Rocket Software Greg Mummah Product Manager Managed application modernization team at municipal government software vendor

More information

Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec

Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec What is Cloud Computing? Cloud Computing refers to the delivery of software (SaaS), infrastructure (IaaS), and/or platform

More information

New Computing Models, and What They Mean to the Small and Mid-Sized Business Consumer

New Computing Models, and What They Mean to the Small and Mid-Sized Business Consumer New Computing Models, and What They Mean to the Small and Mid-Sized Business Consumer How your business can make practical decisions between The Cloud, Utility Computing and Hosted Services 1 Business

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Service Oriented Cloud Computing Architectures. Asher Vitek 12/3/2011 UMM CSci Senior Seminar Conference Morris, MN.

Service Oriented Cloud Computing Architectures. Asher Vitek 12/3/2011 UMM CSci Senior Seminar Conference Morris, MN. Service Oriented Cloud Computing Architectures Asher Vitek 12/3/2011 UMM CSci Senior Seminar Conference Morris, MN. Overview Cloud Computing What is cloud computing Types of cloud computing Service Oriented

More information

Applying Cryptography as a Service to Mobile Applications

Applying Cryptography as a Service to Mobile Applications Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography

More information

Preparation Guide. EXIN Cloud Computing Foundation

Preparation Guide. EXIN Cloud Computing Foundation Preparation Guide EXIN Cloud Computing Foundation Edition June 2012 Copyright 2012 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing

More information

What Cloud computing means in real life

What Cloud computing means in real life ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)

More information

Cloud Data Security. Sol Cates CSO @solcates scates@vormetric.com

Cloud Data Security. Sol Cates CSO @solcates scates@vormetric.com Cloud Data Security Sol Cates CSO @solcates scates@vormetric.com Agenda The Cloud Securing your data, in someone else s house Explore IT s Dirty Little Secret Why is Data so Vulnerable? A bit about Vormetric

More information

Web Application Hosting Cloud Solution Architecture. http://www.cloud-council.org/web-app-hosting-wp/index.htm

Web Application Hosting Cloud Solution Architecture. http://www.cloud-council.org/web-app-hosting-wp/index.htm Web Application Hosting Cloud Solution Architecture http://www.cloud-council.org/web-app-hosting-wp/index.htm February, 2015 Presenters Heather Kreger CTO International Standards, IBM US kreger@us.ibm.com

More information

Business applications:

Business applications: Consorzio COMETA - Progetto PI2S2 UNIONE EUROPEA Business applications: the COMETA approach Prof. Antonio Puliafito University of Messina Open Grid Forum (OGF25) Catania, 2-6.03.2009 www.consorzio-cometa.it

More information

Enterprise Managed Cloud Computing at NASA. Karen Petraska NASA Office of the CIO Computing Services Service Office (CSSO) October 1, 2014

Enterprise Managed Cloud Computing at NASA. Karen Petraska NASA Office of the CIO Computing Services Service Office (CSSO) October 1, 2014 Enterprise Managed Cloud Computing at NASA Karen Petraska NASA Office of the CIO Computing Services Service Office (CSSO) October 1, 2014 What is Cloud Computing? Cloud Computing in a Nutshell Cloud computing

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

More information

2015 LENOVO. ALL RIGHTS RESERVED. Isabel Zarate Lenovo EBG Leader

2015 LENOVO. ALL RIGHTS RESERVED. Isabel Zarate Lenovo EBG Leader 2015 LENOVO. ALL RIGHTS RESERVED. Isabel Zarate Lenovo EBG Leader Enterprise is Key to Lenovo Triple Plus Strategy SMART CONNECTED DEVICES TOTAL PORTFOLIO ** * 2 2015 Lenovo Internal. All rights reserved.

More information

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage

More information

Novel Network Computing Paradigms (I)

Novel Network Computing Paradigms (I) Lecture 4 Novel Network Computing Paradigms (I) Part B Cloud Computing Graduate Course, Hosei U., J. Ma 1 Computing Paradigm Evolution Personal PC Client Server Cloud Computing Hardware Centric Software

More information

Eucalyptus-Based. GSAW 2010 Working Group Session 11D. Nehal Desai

Eucalyptus-Based. GSAW 2010 Working Group Session 11D. Nehal Desai GSAW 2010 Working Group Session 11D Eucalyptus-Based Event Correlation Nehal Desai Member of the Tech. Staff, CSD/CSTS/CSRD, The Aerospace Corporation Dr. Craig A. Lee, lee@aero.org Senior Scientist, CSD/CSTS/CSRD,

More information

Windows Azure Platform

Windows Azure Platform Windows Azure Platform Giordano Tamburrelli, PhD giotam@microsoft.com Academic Developer Evangelist Slides by David Chou You manage You manage You manage Types of Clouds Private (On-Premise) Infrastructure

More information

An Ontology-enhanced Cloud Service Discovery System

An Ontology-enhanced Cloud Service Discovery System An Ontology-enhanced Cloud Service Discovery System Taekgyeong Han and Kwang Mong Sim* Abstract This paper presents a Cloud service discovery system (CSDS) that aims to support the Cloud users in finding

More information

BigData Management and Analytics in the Cloud** In the Contenxt of the Materials Genome Initiative

BigData Management and Analytics in the Cloud** In the Contenxt of the Materials Genome Initiative BigData Management and Analytics in the Cloud** In the Contenxt of the Materials Genome Initiative Mladen A. Vouk* North Carolina State University, Raleigh, NC (*) Professor and Head of Computer Science

More information

Cloud Computing Essentials Course Outline

Cloud Computing Essentials Course Outline Cloud Computing Essentials Course Outline Find out everything you need to know about cloud computing on this 4-day interactive course. About CYBERMODO: CYBERMODO is a professional Education Center that

More information

Session 3. the Cloud Stack, SaaS, PaaS, IaaS

Session 3. the Cloud Stack, SaaS, PaaS, IaaS Session 3. the Cloud Stack, SaaS, PaaS, IaaS The service models resemble a cascading architecture where services on a higher level, as identified by Weinhardt et.al. (2009); encapsulate functionality from

More information

A Cloud Computing Framework for Ethiopian Higher Education Institutions

A Cloud Computing Framework for Ethiopian Higher Education Institutions IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 6, Issue 6 (Nov. - Dec. 2012), PP 01-09 A Cloud Computing Framework for Ethiopian Higher Education Institutions Shaik

More information

for Oil & Gas Industry

for Oil & Gas Industry Wipro s Upstream Storage Solution for Oil & Gas Industry 1 www.wipro.com/industryresearch TABLE OF CONTENTS Executive summary 3 Business Appreciation of Upstream Storage Challenges...4 Wipro s Upstream

More information

Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region

Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region 1 1) Government Cloud Journey 2) Government Clouds 3) Way Forward 2 1. Government Cloud

More information

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Customer Cloud Architecture for Mobile. http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile

Customer Cloud Architecture for Mobile. http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile Customer Cloud Architecture for Mobile http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile June, 2015 1 Presenters Heather Kreger CTO International Standards, IBM US SC38 mirror

More information

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course

More information

Secure your cloud applications by building solid foundations with enterprise (security ) architecture

Secure your cloud applications by building solid foundations with enterprise (security ) architecture Supporting Business Agility Secure your cloud applications by building solid foundations with enterprise (security ) architecture Vladimir Jirasek, Managing director Jirasek Consulting Services & Research

More information

Rapid Development of Smart and Self-Adaptive Cloud, Mobile & IoT Applications - Accelerating the Last Mile of Cloud Computing

Rapid Development of Smart and Self-Adaptive Cloud, Mobile & IoT Applications - Accelerating the Last Mile of Cloud Computing Rapid Development of Smart and Self-Adaptive Cloud, Mobile & IoT Applications - Accelerating the Last Mile of Cloud Computing Jesse Shiah CEO and Co-founder Jesse.shiah@agilepoint.com 2013 AgilePoint,

More information

Amit Sheth & Ajith Ranabahu, 2010. Presented by Mohammad Hossein Danesh

Amit Sheth & Ajith Ranabahu, 2010. Presented by Mohammad Hossein Danesh Amit Sheth & Ajith Ranabahu, 2010 Presented by Mohammad Hossein Danesh 1 Agenda Introduction to Cloud Computing Research Motivation Semantic Modeling Can Help Use of DSLs Solution Conclusion 2 3 Motivation

More information

TECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing

TECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing TECHNOLOGY GUIDE THREE Emerging Types of Enterprise Computing TECHNOLOGY GU IDE OUTLINE TG3.1 Introduction TG3.2 Server Farms TG3.3 Virtualization TG3.4 Grid Computing TG3.5 Utility Computing TG3.6 Cloud

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently

More information

Enhancing Operational Capacities and Capabilities through Cloud Technologies

Enhancing Operational Capacities and Capabilities through Cloud Technologies Enhancing Operational Capacities and Capabilities through Cloud Technologies How freight forwarders and other logistics stakeholders can benefit from cloud-based solutions 2013 vcargo Cloud Pte Ltd All

More information

Cyber Situational Awareness - Big Data Solution

Cyber Situational Awareness - Big Data Solution Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and

More information

A Security Practitioner s Guide to the Cloud Maintain Trust and Control in Virtualized Environments with SafeNet s Trusted Cloud Fabric

A Security Practitioner s Guide to the Cloud Maintain Trust and Control in Virtualized Environments with SafeNet s Trusted Cloud Fabric A Security Practitioner s Guide to the Cloud Maintain Trust and Control in Virtualized Environments with SafeNet s Trusted Cloud Fabric TRUSTED CLOUD FABRIC A Security Practitioner s Guide to the Cloud

More information

Space and Naval Warfare Systems Center Atlantic

Space and Naval Warfare Systems Center Atlantic Space and Naval Warfare Systems Center Atlantic Small Business and Industry Outreach Initiative (SBIOI) Twenty-Seventh Quarterly Symposium 31 January 2013 Mr. Charles Adams Transport & Computing Infrastructure

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Cloud Security and Data Protection

Cloud Security and Data Protection Cloud Security and Data Protection Cloud Strategy Partners, LLC Sponsored by: IEEE Educational Activities and IEEE Cloud Computing Course Presenter s Biography This IEEE Cloud Computing tutorial has been

More information

Key Management Challenges in a Cloud Ecosystem

Key Management Challenges in a Cloud Ecosystem Key Management Challenges in a Cloud Ecosystem A Discussion Starter Based on the Cloud Security WG s Research - Dr. Michaela Iorga, NIST (presenting) Anil Karmel, C2 Lab, Inc. (presenting) Juanita Koilpilai,

More information

What You Need to Know About CLOUD INFORMATION PROTECTION SOLUTIONS

What You Need to Know About CLOUD INFORMATION PROTECTION SOLUTIONS What You Need to Know About CLOUD INFORMATION PROTECTION SOLUTIONS Table of Contents Cloud Adoption Drivers Key Capabilities and Technologies Usability and User Experience Security Technology Architecture

More information

Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0

Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0 sm Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Reference Framework... 5 Context... 6 Applicability...

More information

Designing and Implementing Cloud Governance: Cloud, and Cloud Governance, are Emerging Capabilities

Designing and Implementing Cloud Governance: Cloud, and Cloud Governance, are Emerging Capabilities Designing and Implementing Governance:, and Governance, are Emerging Capabilities Eric Marks President & CEO AgilePath Corporation emarks@agile-path.com Designing and Implementing Governance Governance

More information

Computing Platforms Web applications Business applications Social applications

Computing Platforms Web applications Business applications Social applications 2 Just as there are different segments of cloud computing, there are also 4 different types of PaaS. There may actually be more in the future. There are new developments in cloud computing every day. But

More information

Oracle Cloud Computing Strategy

Oracle Cloud Computing Strategy Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement The following is intended

More information

Service Desk as a Service

Service Desk as a Service Service Desk on Command A Steria Cloud Services Offering Service Name Service Desk on Command Service Desk as a Service Type of Service: IaaS PaaS SaaS Specialist Services Deployment Model: Public Private

More information

4/6/2009 CLOUD COMPUTING : PART I WHY IS CLOUD COMPUTING DISTINCT? INTRODUCTION: CONTINUE A PERSPECTIVE STUDY

4/6/2009 CLOUD COMPUTING : PART I WHY IS CLOUD COMPUTING DISTINCT? INTRODUCTION: CONTINUE A PERSPECTIVE STUDY CLOUD COMPUTING : A PERSPECTIVE STUDY PART I BACKGROUND AND CONCEPTS Guannang Wang YingFeng Wang Qi Li INTRODUCTION: Coined in late of 2007 Currently emerges as a hot topic due to its abilities to offer

More information

Trends and Research Opportunities in Spatial Big Data Analytics and Cloud Computing NCSU GeoSpatial Forum

Trends and Research Opportunities in Spatial Big Data Analytics and Cloud Computing NCSU GeoSpatial Forum Trends and Research Opportunities in Spatial Big Data Analytics and Cloud Computing NCSU GeoSpatial Forum Siva Ravada Senior Director of Development Oracle Spatial and MapViewer 2 Evolving Technology Platforms

More information

CARTES 2012 Demo presentation. Secure Cloud Storage

CARTES 2012 Demo presentation. Secure Cloud Storage CARTES 2012 Demo presentation Cloud Computing: NIST Framework Public Private Hybrid Deployment model Infrastructure as a service (IaaS Platform as a service (PaaS) Software as a service (SaaS) Service

More information

Credit Unions and The Cloud. By: Chris Sachse

Credit Unions and The Cloud. By: Chris Sachse Credit Unions and The Cloud By: Chris Sachse Agenda! Introduction.! Definition of the cloud.! Discuss cloud popularity.! Look at the use of the cloud.! Discuss cloud management.! Discuss cloud security.!

More information

Cloud Data Security and the Insider Threat

Cloud Data Security and the Insider Threat Cloud Data Security and the Insider Threat Sol Cates CSO @solcates scates@vormetric.com Copyright 2014 Vormetric, Inc. All rights reserved. A bit about me InfoSec for ~ 18 years Currently have 4 jobs Infrastructure

More information

Virtual Infrastructure Creates Communications Agility

Virtual Infrastructure Creates Communications Agility Virtual Infrastructure Creates Communications Agility June 2013 Prepared by: Zeus Kerravala Virtual Infrastructure Creates Communications Agility by Zeus Kerravala June 2013 º º º º º º º º º º º º º º

More information

Space Ground Services in the Joint Information Environment (JIE)

Space Ground Services in the Joint Information Environment (JIE) Space Ground Services in the Joint Information Environment (JIE) Scott Niebuhr, Jeremy Burton, Judy Kerner, Sky Troyer The Aerospace Corporation 2015 The Aerospace Corporation Space Ground Services in

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract

More information

Cloud Computing Essentials Course Outline

Cloud Computing Essentials Course Outline Cloud Computing Essentials Course Outline Taught by real professionals/ teachers who guide you through every topic step by step. You can now avoid all the frustration and disappointment that comes when

More information

DoD s Strategic Mobility Vision: Needs & Challenges

DoD s Strategic Mobility Vision: Needs & Challenges DoD s Strategic Mobility Vision: Needs & Challenges Greg Youst DISA Chief Mobility Engineer October 22, 2014 Agenda DoD Mobility Strategy Overview End-State Visions Implementation Challenges: A Reality

More information

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer

More information

Extending your datacenter to the cloud

Extending your datacenter to the cloud Extending your datacenter to the cloud Steve Beaumont @StevybSC http://www.poweronplatforms.com Chiyo Odika @MrChiyo http://www.mrchiyo.com Steve Beaumont Grimsby, United Kingdom @StevybSC Product Development

More information

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015 AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))

More information

The Scottish Wide Area Network Programme

The Scottish Wide Area Network Programme The Scottish Wide Area Network Release: Issued Version: 1.0 Date: 16/03/2015 Author: Andy Williamson Manager Owner: Anne Moises SRO Client: Board Version: Issued 1.0 Page 1 of 8 16/04/2015 Document Location

More information

Threat Model for Software Reconfigurable Communications Systems

Threat Model for Software Reconfigurable Communications Systems Threat Model for Software Reconfigurable Communications Systems Presented to the Management Group 6 March 007 Bernard Eydt Booz Allen Hamilton Chair, SDR Security Working Group Overview Overview of the

More information

Fujitsu Global Cloud Strategy

Fujitsu Global Cloud Strategy Fujitsu Global Cloud Strategy Hemminki Sääksjärvi Director, Cloud Office & Marketing, Fujitsu Nordic April 2012 0 Realizing Human Centric Intelligent Society Close relationship between real world and virtual

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

PaaS Cloud Migration Migration Process, Architecture Problems and Solutions. Claus Pahl and Huanhuan Xiong

PaaS Cloud Migration Migration Process, Architecture Problems and Solutions. Claus Pahl and Huanhuan Xiong PaaS Cloud Migration Migration Process, Architecture Problems and Solutions Claus Pahl and Huanhuan Xiong Cloud Migration Motivation HOW TO MIGRATE TO CLOUD IaaS PaaS SaaS Cloud Migration Definition A

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

Freedom Stairway to the Cloud Offering

Freedom Stairway to the Cloud Offering Freedom OSS is the Top Enterprise Cloud Computing System Integrator on the Market today The 451 Group We look at Freedom PST as a full-fledged, strategic partner that can help us deliver quality cloud

More information

Offer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone

Offer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone Offer Highly Available SAAS Solutions with Huawei Huang Li Executive Vice President of isoftstone Contents Contents 1 2 3 4 5 6 7 Significance of SMEs in Urban Development SME Status Quo IT Capabilities

More information

How To Get Cloud Services To Work For You

How To Get Cloud Services To Work For You Product Overview Citrix CloudPortal Business Manager Unified cloud services delivery and business management platform Enterprises and cloud providers have focused most of their initial cloud strategies

More information