Preface Introduction
|
|
|
- Benedict Burns
- 10 years ago
- Views:
Transcription
1 Preface Introduction Cloud computing is revolutionizing all aspects of technologies to provide scalability, flexibility and cost-effectiveness. It has become a challenge to ensure the security of cloud computing that supports cross-domain services on a federation of multilevel secure servers. To secure cloud services and resources, cloud auditing and rapid response tasks are very important to meet the Service Level Agreement (SLA) requirements that may specify the levels of availability, serviceability, performance, security, or other attributes of the service. This book mainly focuses on cloud security and high performance computing for cloud auditing. Big cloud audit data sets may consist of client and server audit logs, router logs, etc. Since cloud computing may deploy services in federated cloud environments, audit data are collected and stored in distributed environments. It is necessary to feasibly capture, store, and analyze logs in order to identify threats and prevent attacks. Capturing security relevant information and auditing the results to determine the existence of security threats in the clouds are still challenging problems. There is a growing demand for cloud computing standards. Establishing cloud computing standards is challenging because it is very complicated to integrate existing standards and new cloud computing related standards to provide reliable cloud services in federated cloud computing environments. Standards organizations (see Table 1) and working groups are documenting the guidelines and specifications to preparecloud computingstandardizations (see Table 2). The National Institute of Standards and Technology (NIST), the Cloud Security Alliance (CSA) and the Distributed Management Task Force (DMTF) Cloud Auditing Data Federation (CADF) Working Group have released essential cloud computing related publications. The NIST cloud computing publications provide comprehensive cloud computing, cloud security and cloud auditing guidelines. The CSA has released cloud security guidelines to establish a stable and secure baseline for cloud operations. The DMTF CADF cloud auditing specifications contain useful information for cloud auditing. v
2 vi Preface Table 1 Cloud-related standards organizations Standards organization National Institute of Standards and Technology (NIST) Distributed Management Task Force (DMTF) IEEE Standards Association (IEEE-SA) Telecommunications Union (ITU) European Telecommunications Standards Institute (ETSI) Organization for the Advancement of Structured Information Standards (OASIS) Organization for Standardization (ISO)/IEC United States European Table 2 Cloud security and auditing publications Publication title NIST Challenging Security Requirements for US Government Cloud Computing Adoption NIST Cloud Computing Security Reference Architecture NIST Guide to Security for Full Virtualization Technologies CSA Security Guidance for Critical Areas of Cloud Computing CSA Trusted Cloud Initiative (TCI) Reference Guidelines DMTF The CADF Data Format and Interface Definitions Specification CSC Digital Trust in the Clouds OACIS Security, Access and Identity Policy Standards ITU Focus Group on Cloud Computing Technical Report (Parts 1 6) The NIST has collaborated on cloud computing to define and advance standards with United States Government (USG) agencies, federal Chief Information Officers (CIOs), private sector experts, and international bodies to identify and reach consensus on cloud computing technology and standardization priorities. The NIST released a two-volume USG Cloud Computing Technology Roadmap document (see NIST Special Publication ) to support secure and effective cloud computing for the purpose of reducing costs and improving federated cloud computing services. These volumes put forth ten NIST strategic and tactical objectives related to cloud computing. The NIST has also established public working groups to achieve the ten requirements by leveraging the expertise of the broad cloud computing stakeholder community. The NIST Cloud Computing Security Working Group (NCC-SWG) is working on six of these requirements which facilitate secure adoption of cloud services. The goal of the CSA Trusted Computing Initiative (TCI) is to support cloud providers in developing industry-recommended secure and interoperable identity, access and compliance management configurations, and practices. The TCI-Reference Architecture (TCI-RA) has been developed to provide a methodology and a set of tools that enable security architects, enterprise architects and risk management professionals to leverage a common set of solutions to meet the security requirements for a secure and trusted cloud. The NCC-SWG has developed the NIST Cloud Computing Security Reference Architecture
3 Preface vii (NCC-SRA) that was derived from the NIST Cloud Computing Reference Architecture (NCC-RA). The NIST leveraged the CSA TCI-RA to identify the set of security components in the NCC-SRA. The set of security components for a particular cloud model is introduced in detail in NCC-SRA. The NCC-SRA security components are carried on the three root-domains (Business Operation Support Service (BOSS), Information Technology Operation Support (ITOS) and Security and Risk Management (S&RM)) and the four service layers. Eighteen security control families are identified in the NIST SP The DMTF CADF Working Group proposed the open standards to meet the cloud customer expectations that cloud providers must provide standard mechanisms for their tenant customers to self-manage and self-audit application security. A cloud providers ability to provide specific audit event, log and report information on a per-tenant and application basis is essential. Therefore, the DMTF CADF Working Group has released the CADF Data Format and Interface Specification to enable information sharing by supporting the federation of normative audit event data in the form of customized reports and logs. This documentation also defines domain specific identifiers, event classification values and tags that can be used to dynamically generate customized logs and reports for cloud subscribers or customers. Cloud federation is still a new and emerging research area. Federated cloud computing faces challenges relating to policy, technology, guidance, security, and standards. Cloud computing related specifications, standards and implementation technologies are required to establish security, interoperability, and portability to support federated cloud computing. Comprehensive federated computing technologies are critical to ensure cost-effective and secure cloud computing, and to assure mission-critical requirements. Therefore, standards organizations have worked with numerous cloud security and auditing working groups to develop cloud computing standards. In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. Expected Audience This book provides cloud security and auditing implementation strategies and research directions to diverse audiences: Academics and students: This book contains a comprehensive review of cloud security and auditing technologies, secure cloud architectures, programming languages, software and/or hardware based implementation and evaluation strategies for high performance cloud auditing and applications. It also provides introductory course materials for students.
4 viii Preface Researchers: This book puts forth future research directions and provides important references to a variety of research areas. Researchers can find this material useful in developing their concepts and strategies. Standard developers and policy makers: The standard developers need to use the high performance cloud auditing technology to adapt cloud security into the NCC-SRA or other cloud security reference models. Cloud access control and assured information sharing are useful to the policy makers. Cloud vendors and auditors: This book presents a comprehensive treatment of cloud security and auditing technologies. This book provides useful knowledge for building secure clouds to process and analyze massive audit data sets and to meet the SLA requirements. Book Overview The objectives of this book are to present surveys, concepts, algorithms, techniques and components of high performance cloud auditing systems in order to reduce cloud security risks, and to increase availability and performance of cloud computing for surviving in a contested network environment. The book consists of 13 chapters contributed by 40 authors. The book chapters are split into three parts. Part I: Cloud Architectures and Security Issues Part I contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures. This part is designed to provide introductory materials for cloud auditing technologies. Chapter An Overview of Issues and Recent Developments in Cloud Computing and Storage Security presents an overview of issues and recent developments in cloud computing and storage security. This chapter addresses security and privacy concerns due to lack of data protection transparency and accountability in the cloud. The survey topics include recent security threats, authentication, virtualization, availability, accountability, and privacy and integrity of remote storage and outsourced computation. Chapter Moving Target Defense for Cloud Infrastructures: Lessons from Botnets proposes the novel moving target defense (MTD) for cloud infrastructures. Botnets are fast-moving targets that are difficult to detect with conventionalsecurity tools. Therefore, MTD has become a major theme in cyber security researches. The authors comprehensively survey the botnet literature, describe the evolution in botnet technologies, draw lessons from botnets in identifying cloud security challenges, and propose solutions to MTD for cloud infrastructures in order to make the network more resilient against novel and persistent attacks.
5 Preface ix Chapter Secure Mobile Cloud Computingand Security Issues discusses secure mobile cloud computing and security issues. This chapter provides an overview of the latest mobile computing models and architectures focusing on security properties. A wide range of threats against the availability, privacy and integrity of mobile cloud computing architectures is investigated in order to develop defense mechanisms for secure mobile cloud computing and applications. Chapter Information Fusion in a Cloud-Enabled Environment presents information fusion in a cloud-enabled environment. This chapter describes three aspects of current developments to low/high-level information fusion (LLIF/HLIF) and cloud computing such as agent-based service architectures, ontologies, and metrics for timeliness, confidence and security, and introduces the Cloud-Enabled Bayes Network (CEBN) for wide area motion imagery target tracking and identification. Part II: Cloud Auditing and Assured Information Sharing Part II aims to provide in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies. The cloud access control and assured information sharing technologies are in this part because cloud data contain sensitive information which needs to be shared in order to aggregate, analyze and query the data in federated cloud computing environments. Chapter Diagnosing Vulnerability Patterns in Cloud Audit Logs analyzes the diagnosis of vulnerability patterns in cloud audit logs. Existing security standards, protocols and auditing mechanisms can provide audit logs but auditable events of web service compositions in service cloud architectures are not well defined. This chapter specifies the audit log and defines the Vulnerability Diagnostic Trees (VDTs) to determine security vulnerability patterns emerging from Service Orientation Architecture (SOA) communications in conjunction with service composition allocation and cross-cloud communication. Chapter Exploiting Timing Side Channel in Secure Cloud Scheduling exploits a timing side channel in secure cloud scheduling. In multi-tenancy cloud environments, a malicious user can learn about the service usage pattern of an innocent user by a timing based side channel attack. This chapter demonstrates the information leakage of a timing side channel in shared schedulers, discusses timing side channel threats and countermeasures, and introduces the design of secure scheduling policies. Chapter Federated Cloud Security Architecture for Secure and Agile Clouds introduces the federated cloud security architecture for secure and agile clouds. This chapter describes cloud security threats and proposes a novel federated security architecture that consists of a set of seamlessly integrated systematic security mechanisms at the application layer, the network layer and the system layer in federated cloud computing environments.
6 x Preface Chapter Trust-Based Access Control for Secure Cloud Computing presents trust-based access control for secure cloud computing. Multi-tenancy, elasticity and dynamicity pose several novel challenges for access control in a cloud environment. This chapter summarizes traditional and modern access control models, explores challenges of cloud access control, identifies various authorization and enforcement requirements and desirable properties of access control models, and introduces graph-theoretic semantics of an access control model. Chapter Assured Information Sharing (AIS) Using Private Clouds introduces the concept of assured information sharing in private clouds. The authors provide basic characteristics of an AIS framework, discuss the state of the art in the realm of AIS, and provide contemporary cloud-based AIS implementation methodologies for Cloud-centric Assured Information Sharing System (CAISS) and CAISS XACML policies (CAISS-X). The CAISS uses a cloud-based framework for both data storage and retrieval as well as policy enforcement and CAISS-X employs a cloud-centric framework to store and query large amounts of data via a non-cloud policy engine that enforces XACML-based policies. Part III: High Performance Cloud Computing Part III outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets. It is impractical to process a huge audit data set using existing on-hand database management tools or data processing applications in real-time. CPU-GPU computing, MapReduce and router-based filtering technologies are employed to face the challenges of big data processing. Chapter GPGPU Computing for Cloud Auditing presents GPGPU computing for cloud auditing. There is a growing need for computing platforms that are able to rapidly analyze data-intensive cloud audit data. GPGPU computing can perform data analysis with a high level of parallelism employing tools like Hadoop MapReduce. The chapter contains a broad background on GPGPU computing, architectures, and programming options, illustrated by helpful programming examples. Chapter CPU-GPU System Designs for High Performance Cloud Computing discusses CPU-GPU system designs for high performance cloud computing. This chapter focuses on the improvement of cloud computing performance by combining the powerful scalar processing on CPU with the efficient parallel processing on GPU. The authors also introduce the mainstream and emerging memory hierarchy designs in CPU-GPU systems and optimization techniques of the data allocation and migration between CPU and GPU for performance improvement. Chapter MapReduce Performance in Federated Cloud Computing Environments introduces MapReduce optimization in federated cloud computing environments. The demand for federation among multiple distributed clusters is growing, in order to process data-intensive and compute-intensive applications. The MapReduce framework coupled with cloud computing is emerging as a viable
7 Preface xi solution for distributed big data processing. The authors describe various cloud based applications over distributed clouds and provide a network aware MapReduce optimization technique. Chapter Improving Cloud Performance with Router-Based Filtering presents improving cloud performance with router-based filtering. The router-based filtering technology has been developed to enhance the availability of cloud computing and performance of cloud auditing. An overview of the specification and generation of filtering rules used by routers, and a theoretical model to find the best locations for hardware routers in a network to block malicious traffic, and experimental results are provided in this chapter. Rome, NY, USA Kansas City, MO, USA College Station, TX, USA Keesook J. Han Baek-Young Choi Sejun Song Approved for Public Release; Distribution Unlimited: 88ABW , 31-May-2013
8
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
NIST Cloud Computing Security Reference Architecture (SP 500-299 draft)
NIST Cloud Computing Security Reference Architecture (SP 500-299 draft) NIST Cloud Computing Security Working Group Dr. Michaela Iorga, NIST Senior Security Technical Lead for Cloud Computing Chair, NIST
It s All About Cloud Key Concepts, Players, Platforms And Technologies
It s All About Cloud Key Concepts, Players, Platforms And Technologies 3-day seminar Description Cloud computing has gained a lot of attention in recent years. It has mostly been used for non business
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING 1. K.SURIYA Assistant professor Department of Computer Applications Dhanalakshmi Srinivasan College of Arts and Science for Womren Perambalur Mail: [email protected]
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Accelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
REVIEW OF CLOUD TESTING, TYPES, CHALLENGES AND FUTURE SCOPE
http:// REVIEW OF CLOUD TESTING, TYPES, CHALLENGES AND FUTURE SCOPE 1 Bhumika Maurya, 2 Chandraprabha and 3 Rashmi Patil 1,2 Research Scholar, SRMS CET, Bareilly. (India) 3 Assistant Professor, SRMS CET,
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Meeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Highlights & Next Steps
USG Cloud Computing Technology Roadmap Highlights & Next Steps NIST Mission: To promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Cloud Monitoring and Auditing with CADF (Cloud Auditing and Data Federation)
July, 2013 Portland Cloud Monitoring and Auditing with CADF (Cloud Auditing and Data Federation) Jacques Durand (Fujitsu) Matt Rutkowski (IBM) Disclaimer The information in this presentation represents
Massive Cloud Auditing using Data Mining on Hadoop
Massive Cloud Auditing using Data Mining on Hadoop Prof. Sachin Shetty CyberBAT Team, AFRL/RIGD AFRL VFRP Tennessee State University Outline Massive Cloud Auditing Traffic Characterization Distributed
Assessing Risks in the Cloud
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
Cloud Security & Standardization. Markku Siltanen Tietoturvakonsultti CISA, CGEIT, CRISC
0 Copyright 2011 FUJITSU Cloud Security & Standardization Markku Siltanen Tietoturvakonsultti CISA, CGEIT, CRISC Cloud computing 1 Copyright 2011 FUJITSU Characteristics of cloud 2 Copyright 2011 FUJITSU
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Capturing the New Frontier:
Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings
Cloud Infrastructure Planning. Chapter Six
Cloud Infrastructure Planning Chapter Six Topics Key to successful cloud service adoption is an understanding of underlying infrastructure. Topics Understanding cloud networks Leveraging automation and
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Management of Security Information and Events in Future Internet
Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
NIST Cloud Computing Program
NIST Program USG Roadmap Top 10 high priority requirements to accelerate USG adoption of the model NIST Mission: To promote U.S. innovation and industrial competitiveness by advancing measurement science,
A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY
Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY Subhash Sankuratripati NetApp SNIA Legal Notice The material contained in
A Comprehensive Study on Cloud Computing Standardization
A Comprehensive Study on Cloud Computing Standardization Dr. Mukesh Chandra Negi Project Manager, Tech Mahindra Ltd, Noida, India ABSTRACT: Standard is a trust between standardization body, buyers and
IBM Security in the Cloud
Cesare Radaelli Security Tiger Team Leader, Italy IBM Security Solutions IBM Security in the Cloud What is cloud computing? Cloud is an emerging consumption and delivery model for many IT-based services,
Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory
Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Standardization and Cloud Computing Cloud computing is a convergence of many technologies Some
HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA
HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA Executive Summary While a number of organizations are gaining experience and increased
The Internet of ANYthing
The of ANYthing Abstract It is projected that by 2020 there will be 50 billion things connected to the. This presents both unprecedented opportunity and challenge. In the global network of things, new
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Master of Science Service Oriented Architecture for Enterprise. Courses description
Master of Science Service Oriented Architecture for Enterprise Courses description SCADA and PLC networks The course aims to consolidate and transfer of extensive knowledge regarding the architecture,
Relational Databases in the Cloud
Contact Information: February 2011 zimory scale White Paper Relational Databases in the Cloud Target audience CIO/CTOs/Architects with medium to large IT installations looking to reduce IT costs by creating
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES
Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES Meeting the 7 Challenges in Testing and Performance Management Introduction With advent of the cloud paradigm, organizations are transitioning
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
Secure Cloud Computing Concepts Supporting Big Data in Healthcare. Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC
Secure Cloud Computing Concepts Supporting Big Data in Healthcare Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC Learning Objectives After this session, the learner should
Enabling the SmartGrid through Cloud Computing
Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from
The NIST Cloud Computing Program
The NIST Cloud Computing Program Robert Bohn Information Technology Laboratory National Institute of Standards and Technology October 12, 2011 Information Technology Laboratory Cloud 1 Computing Program
CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs
CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs Eric Simmon January 28 th, 2014 BACKGROUND Federal Cloud Computing Strategy Efficiency improvements will shift resources towards higher-value
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs)
Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs) Robert Bohn, PhD Advanced Network Technologies Division Cloud FS Americas 2015 New York,
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Effective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
Ubuntu and Hadoop: the perfect match
WHITE PAPER Ubuntu and Hadoop: the perfect match February 2012 Copyright Canonical 2012 www.canonical.com Executive introduction In many fields of IT, there are always stand-out technologies. This is definitely
Appendix A-2 Generic Job Titles for respective categories
Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
The Global Attacker Security Intelligence Service Explained
White Paper How Junos Spotlight Secure Works The Global Attacker Security Intelligence Service Explained Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Session 2. The economics of Cloud Computing
Session 2. The economics of Cloud Computing Cloud computing is the next step in the on-going evolution of Information Technology. From a technical standpoint, very little that currently is done on cloud
Security Issues On Cloud Computing
Security Issues On Cloud Computing Pratibha Tripathi #1, Mohammad Suaib #2 1 M.Tech(CSE), Second year 2 Research Guide # Department of Computer Science and Engineering Abstract Integral University, Lucknow
Public Cloud Workshop Offerings
Cloud Perspectives a division of Woodward Systems Inc. Public Cloud Workshop Offerings Cloud Computing Measurement and Governance in the Cloud Duration: 1 Day Purpose: This workshop will benefit those
Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A
Brochure More information from http://www.researchandmarkets.com/reports/2213812/ Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A Description: The auditor's guide to ensuring
Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices
Emerging Approaches in a -Connected Enterprise: Containers and Microservices Anil Karmel Co-Founder and CEO, C2 Labs Co-Chair, NIST Security Working Group [email protected] @anilkarmel Emerging Technologies
Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.
New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New
Survey on software testing techniques in cloud computing
Survey on software testing techniques in cloud computing V.Priyadharshini #1, Dr. A. Malathi *2 # PhD Research Scholar PG & Research Department of CS Government Arts College (Autonomous) Coimbatore 18.
SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP
SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
SECURE CLOUD COMPUTING
Outline SECURE CLOUD COMPUTING Introduction (of many buzz words) References What is Cloud Computing Cloud Computing Infrastructure Security Cloud Storage and Data Security Identity Management in the Cloud
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
Attacking the roadblocks preventing aggressive adoption of Cloud Standards:
Attacking the roadblocks preventing aggressive adoption of Cloud Standards: How SNIA and other standards orgs are developing standards that benefit high priority use cases. John Eastman, CTO, Presented
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
Cloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
CHALLENGES AND ISSUES OF DEPLOYMENT ON CLOUD
CHALLENGES AND ISSUES OF DEPLOYMENT ON CLOUD S. Vimal Don Bosco 1, Dr. N Prabakaran 2 Research Scholar, Department of Computer Applications, St.Peter s University, Avadi, Chennai 600 054, India 1 Associate
WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD
WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM
Latest in Cloud Computing Standards. Eric A. Hibbard, CISSP, ISSAP, ISSEP, ISSMP, CISA CTO Security & Privacy Hitachi Data systems
Latest in Cloud Computing Standards Eric A. Hibbard, CISSP, ISSAP, ISSEP, ISSMP, CISA CTO Security & Privacy Hitachi Data systems 1 Short Introduction CTO Security & Privacy, Hitachi Data Systems Involved
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
White Paper. Cloud Vademecum
White Paper Cloud Vademecum Cloud is the new IT paradigm this document offers a collection of thoughts, internal and external discussions and information. The goal is to inspire and stimulate the route
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
Strategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES
TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES APRIL 2-4, 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) [email protected]
How To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
