Introduction to Cloud Computing. Srinath Beldona
|
|
- Kenneth Jordan
- 5 years ago
- Views:
Transcription
1 Introduction to Cloud Computing Srinath Beldona
2 Agenda Pre-requisites Course objectives What you will learn in this tutorial? Brief history Is cloud computing new? Why cloud computing? Cloud Computing Definition and Principles
3 Pre-requisites (1) Understanding of basic computer architecture CPU Memory Storage (Volatile and Non-volatile) Understanding of basic networking principles Ethernet Switching Basic Routing principles Basic Network security
4 Pre-requisites (2) Understanding of basic security principles Application security Operating system security Device security Understanding basics of Virtualization Virtual Machines Hypervisors
5 What you will learn in this tutorial? Basic Cloud computing principles Deployment Models Service Models Economic Considerations Operational Characteristics Service Agreements including Service Level Agreements Cloud Security Cloud Risks & compliance Recommendations How to select a Cloud Provider? Conclusion
6 Brief history: Is cloud Computing New? Utility Computing: 1961 Time Sharing: 1970s Large Distributed Data Centers 1980s-1990s Internet Computing 2000-Present What is new in cloud computing today? Faster data communication Faster and more reliable computing Denser and cheaper storage Newer Programming paradigms Comprehensive Computational resource sharing
7 Why Cloud Computing is needed? Value to Consumers Value to Vendors New Revenue and Jobs
8 NIST Cloud Computing Model Model Organization Five essential characteristics Three Service Models Four Deployment Models
9 NIST Cloud Computing Model
10 Value of NIST Cloud Computing Model Why do we need a cloud computing model? Value of the model Cloud Networks configurations and its use Major benefits to provider and users Precision Clarity
11 CLOUD COMPUTING PRINCIPLES
12 What is Cloud Computing? Cloud Computing is a on demand model Shared pool of computing resources Servers Storage Applications Services
13 What is Cloud Computing? (contd.) Rapidly provisioned Rapidly released Minimal Management Effort of Service Providers Other definitions also exist
14 Five Essential Characteristics of Cloud Computing On Demand Self-Service Measured Service Broad Network Access Cloud Computing Rapid Elasticity Resource Pooling
15 Cloud Service Models Software as a Service SaaS Platform as a Service PaaS Infrastructure as a Service IaaS
16 Deployment Models Private Cloud Public Cloud Private cloud the cloud infrastructure is 1) provisioned for exclusive use by a single organization with 2) multiple consumers, 3) for example individual business units 4) owned, managed, and operated by the organization public cloud infrastructure is 1) provisioned for open use by public 2) Owned, managed and operated by a business, government or university 3) Mostly in the premises of a cloud provider
17 Deployment Models Community Cloud Hybrid Cloud community cloud for use by a community 1. Owned by specific community of consumers from organizations that have shared concerns, missions of security etc. 2. owned, managed, and operated by the organization in the community Hybrid cloud infrastructure is 1) Consists of two or more distinct cloud infrastructures 2) Can be private, public, or community based 3) Can be proprietary or standardized 4) More complex integrated systems 5) Subject to implications and constraints
18
19
20 General Cloud/Consumer View
21 General Cloud/Consumer View
22 Cloud Security and the Customer Assumed the the customer/consumer will relinquish Control Visibility Actually it depends: Cloud Model Adapted What is negotiated with the Cloud Provider?
23 Cloud Security and the Customer Rights and Control
24 Onsite Private Cloud Scenario
25 Outsourced Private Cloud Scenario
26 Onsite Community Cloud Scenario
27 Outsource Community Cloud Scenario
28 Public Cloud Scenario
29 Hybrid Cloud Scenario
30 Hybrid Cloud Possibilities Disaster Recovery Role Specific Deployment Multi Cloud Configurations Cloud Bursting
31 Assumptions Network dependency Consumer s IT skills Transparent workload assignment Risks from multi-tenancy Data import/export and performance limitations
32 Terms of Service Service agreement Service Level Agreement (SLA) Internal agreement Memorandum of Understanding (MOU) Quality of Service (QoS) Provider promises Published agreement
33 Promises Availability Remedies for failure to perform Data preservation Legal care of consumer information
34 Limitations Scheduled Outages Force Majeure Events Service Agreement Changes Security Service API Changes
35 Obligations Acceptable Use Policies Licensed Software Timely Payments
36 Recommendations Terminology Remedies Compliance Security, Criticality and Backup Negotiated Service Agreement Service Agreement Changes
37 Cloud Computing Implications Network Dependency IT Skills reduction Risks from Multi-tenancy Data Import/Export and performance limitations
38 Cloud Service Models Software as a Service SaaS Platform as a Service PaaS Infrastructure as a Service IaaS
39 Deployment Models Private Cloud Public Cloud Private cloud the cloud infrastructure is 1) provisioned for exclusive use by a single organization with 2) multiple consumers, 3) for example individual business units 4) owned, managed, and operated by the organization public cloud infrastructure is 1) provisioned for open use by public 2) Owned, managed and operated by a business, government or university 3) Mostly in the premises of a cloud provider Private or outsourced
40 Deployment Models Community Cloud Hybrid Cloud community cloud for use by a community 1. Owned by specific community of consumers from organizations that have shared concerns, missions of security etc. 2. owned, managed, and operated by the organization in the community Private or outsourced Hybrid cloud infrastructure is 1) Consists of two or more distinct cloud infrastructures 2) Can be private, public, or community based 3) Can be proprietary or standardized 4) More complex integrated systems 5) Subject to implications and constraints
41 Scope and Control for the Consumer
42 SaaS Abstraction Interaction Dynamics
43 SaaS Software Stack Control
44 SaaS Benefits Reduced Disruption Efficient use of Software Licenses Centralized Management of Data Platform Responsibilities managed by providers Up front cost savings
45 SaaS issues and concerns Browser based risks Network dependence Lack of Portability
46 SaaS Application Suitability Business Logic Collaboration Office Productivity Software Tools Not suitable for any of the following: Real time software Bulk consumer data Critical Software
47 SaaS Recommendations Data Protection Client Device/Application protection Encryption Secure data deletion
48 PaaS Abstract Interaction Dynamics
49 PaaS Software Stack Control
50 PaaS Benefits Reduced Disruption Efficient use of Software Licenses Centralized Management of Data Platform Responsibilities managed by providers Up front cost savings
51 PaaS Issues and Concerns Browser based risks and risk remediation Network Dependence Isolation vs. Efficiency Lack of Portability Event based Processor Scheduling Security Engineering Multiple Languages
52 Paas Application Suitability PaaS implemented as SaaS Application Classes Business Logic Collaboration Office Productivity Software tools
53 PaaS Recommendations Generic Interfaces Standard Languages and Tools Data Access Data Protection Application Frameworks Component Testing Security Secure Data Deletion
54 IaaS Abstract Interaction Dynamics
55 IaaS Software Stack Control
56 IaaS Operational Overview
57 Operation of the Cloud Manager
58 Operation of the Cluster Managers
59 Operation of Computer Managers
60 IaaS Issues and Concerns Compatibility with legacy security vulnerabilities Virtual Machine Sprawls Verifying Authencity Robustness of VM level isolation Features for dynamic network configuration Data Erase practices
61 IaaS Recommendations Multi-tenancy Data Protection Secure Data Deletion Administrative Access VM Migration Virtualization best practices NIST guide to security for full virtualization technologies
62 Cloud Service Models
63 SWOT Analysis for Migrating to Cloud
64 SWOT Analysis: Migrating to Cloud
65 SWOT Analysis: Migrating to Cloud
66 SWOT Analysis: Migrating to Cloud
67 SWOT Analysis: Migrating to Cloud
68 General Value Proposition Technical Human Relational
69 SaaS Value Proposition Typical Customers Organizations End Users Administrators Consumer value Usage fees
70 PaaS Value Proposition Typical Consumers Application developers Application testers Application deployers Application administrators Application end users Consumer Value Usage Fees
71 IaaS Value Proposition Typical Consumers Small and Medium Business Enterprises Startups Communities Consumer Value Usage Fees
72 General Cloud Computing Risks Complexity
73 General Cloud Computing Risks Complexity Exposure of Critical Data
74 General Cloud Computing Risks Complexity Exposure of Critical Data Technical and Economic Concerns
75 Risks: Computing Performance Latency Not under control of Consumer Not under the control of Cloud Provider Decision to determine which applications will be cloud based
76 Risks: Computing Performance Offline Data synchronization When Consumer is offline (Requires version control)
77 Risks: Computing Performance Scalable Programming For high performance computing needs for data analytics For scientific studies etc. Many of the above environments requires a careful examination of cloud providers implementation and environment
78 Risks: Computing Performance Data Storage Management poses challenges Provisioning Local restriction Erasure verification Secure disposal Access control
79 Risks: Cloud Reliability Reliability Hardware and Software Cloud providers personnel Connectivity Consumer s personnel Measurement Composition Environment Intractable
80 Risks: Network Dependence Continuous Service Complexity Health Contention Force Majeure Denial of Service Attacks
81 Risks: Cloud Provider Outages Inevitable downtime Attacks Errors Disasters Outage Frequency Frequency Resiliency
82 Risks: Safety Critical Processing Loss of life or property Regulated by government Pedigree
83 Risks: Compliance Lack of visibility Physical Data location Regulation Jurisdiction Forensics
84 Risks: Information Security Risks of unintended disclosure Data Privacy System Integrity Multi-Tenancy Browsers
85 Value/Risk: Open Source Software Easy deployable Interoperability and Standards Openness = vulnerability Loss of control Licensing risks
86 Up front costs
87 Operational costs
88 Annual Disinvestment Costs
89 Total Cost of Ownership
90 Selecting an IaaS provider
91 IEEE P2301 Standard Portability and Interoperability Standards Standards based choices Different Cloud personalities
92 IEEE P2302 Standard Intercloud Interoperability and Federation Requirements Advantages Participants
93 Intercloud Interoperability
94 Management Recommendations Data Migration Continuity of Operations Compliance Administrator staff Legal Operating process Acceptable use policies Licensing Patch Management
95 Data Governance Recommendations Data Access Standards Data Separation Data Integrity Data Regulations Data Disposition Data Recovery
96 Consumer side vulnerabilities Encryption Physical Authentication Identity and access management Security and Reliability Recommendations Performance Requirements
97 Virtual Machine Recommendations VM Vulnerabilities Other VMs Host Network VM Migration
98 Software and Application Recommendations Time Critical Software Safety Critical Software Application Development Tools Application Run time support Application configuration Standard programming languages
99 Success Factors Trust Core Competency Relational, Technical and managerial capabilities
100 Tutorial - Summary Critical Rigorous Decision Making process Comply with standards Compare all alternatives Use Best Practices
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST
Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen feisal@techumen.com
SECURING HEALTH INFORMATION IN THE CLOUD Feisal Nanji, Executive Director, Techumen feisal@techumen.com Conflict of Interest Disclosure Feisal Nanji, MPP, CISSP Has no real or apparent conflicts of interest
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
yvette@yvetteagostini.it yvette@yvetteagostini.it
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.
Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Presented by: Sabrina M. Segal, USITC, Counselor to the Inspector General, Sabrina.segal@usitc.gov Reference
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
VMware vcloud Powered Services
SOLUTION OVERVIEW VMware vcloud Powered Services VMware-Compatible Clouds for a Broad Array of Business Needs Caught between shrinking resources and growing business needs, organizations are looking to
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Cloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
Table of Content Cloud Computing Tutorial... 2 Audience... 2 Prerequisites... 2 Copyright & Disclaimer Notice... 2 Cloud Computing - Overview...
Table of Content Cloud Computing Tutorial... 2 Audience... 2 Prerequisites... 2 Copyright & Disclaimer Notice... 2 Cloud Computing - Overview... 9 What is Cloud?... 9 What is Cloud Computing?... 9 Basic
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
BUSINESS MANAGEMENT SUPPORT
BUSINESS MANAGEMENT SUPPORT Business disadvantages using cloud computing? Author: Maikel Mardjan info@bm-support.org 2010 BM-Support.org Foundation. All rights reserved. EXECUTIVE SUMMARY Cloud computing
Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
http://www.alljntuworld.in/
Table of Content Cloud Computing Tutorial... 2 Audience... 2 Prerequisites... 2 Copyright & Disclaimer Notice... 2 Cloud Computing - Overview... 9 What is Cloud?... 9 What is Cloud Computing?... 9 Basic
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS
Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS Transitioning from today s highly virtualized data center environments to a true cloud environment requires solutions that let companies
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
Cloud Glossary. A Guide to Commonly Used Terms in Cloud Computing
Cloud Glossary A Guide to Commonly Used Terms in Cloud Computing 1 Cloud Talk The cloud is evolving. As it does, new terms are constantly appearing and some of the older terms are gaining new meaning.
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
Commercial Software Licensing
Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession
CompTIA Cloud+ 9318; 5 Days, Instructor-led
CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,
SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP
SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson
6 Cloud computing overview
6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable
On Premise Vs Cloud: Selection Approach & Implementation Strategies
On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
Cloud Computing Tutorial
Cloud Computing Tutorial CLOUD COMPUTINGTUTORIAL by tutorialspoint.com tutorialspoint.com i ABOUT THE TUTORIAL Cloud Computing Tutorial Cloud Computing provides us a means by which we can access the applications
OVERVIEW Cloud Deployment Services
OVERVIEW Cloud Deployment Services Audience This document is intended for those involved in planning, defining, designing, and providing cloud services to consumers. The intended audience includes the
Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009
Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of
Planning the Migration of Enterprise Applications to the Cloud
Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction
IS PRIVATE CLOUD A UNICORN?
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:
CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification
Key Considerations of Regulatory Compliance in the Public Cloud
Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 w_haskins-hafer@intuit.com Disclaimer Unless otherwise specified,
Healthcare: La sicurezza nel Cloud October 18, 2011. 2011 IBM Corporation
Healthcare: La sicurezza nel Cloud October 18, 2011 Cloud Computing Tests The Limits Of Security Operations And Infrastructure Security and Privacy Domains People and Identity Data and Information Application
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture Version 1 March 30, 2011 2 Acknowledgements This reference architecture was developed and prepared by Dr. Fang Liu, Jin Tong, Dr. Jian Mao, Knowcean Consulting
A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011
A Strawman Model NIST Cloud Computing Reference Architecture and Taxonomy Working Group January 3, 2011 Objective Our objective is to define a neutral architecture consistent with NIST definition of cloud
Cloud Computing: The atmospheric jeopardy. Unique Approach Unique Solutions. Salmon Ltd 2014 Commercial in Confidence Page 1 of 5
Cloud Computing: The atmospheric jeopardy Unique Approach Unique Solutions Salmon Ltd 2014 Commercial in Confidence Page 1 of 5 Background Cloud computing has its place in company computing strategies,
Security & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:
Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist
Private Cloud Database Consolidation with Exadata Nitin Vengurlekar Technical Director/Cloud Evangelist Agenda Private Cloud vs. Public Cloud Business Drivers for Private Cloud Database Architectures for
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Fundamental Concepts and Models
Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract
LEGAL ISSUES IN CLOUD COMPUTING
LEGAL ISSUES IN CLOUD COMPUTING RITAMBHARA AGRAWAL INTELLIGERE 1 CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
Cisco Cloud Onboarding Solution
Cisco Cloud Onboarding Solution Paul Hamilton, Senior Director, Cloud & IT Transformation, Cisco Services Kiran Inampudi, Global SP Segment Lead, Cloud & IT Transformation, Cisco Services Alex Foster,
Cloud Computing Synopsis and Recommendations
Special Publication 800-146 Cloud Computing Synopsis and Recommendations Recommendations of the National Institute of Standards and Technology Lee Badger Tim Grance Robert Patt-Corner Jeff Voas NIST Special
Cloud Computing Use Cases Version 1.0
Cloud Computing Use Cases Version 1.0 October, 2011 2011 Cloud Standards Customer Council. All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud Computing
Cloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
Orchestrating the New Paradigm Cloud Assurance
Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems
Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
Top 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
HRG Assessment: Stratus everrun Enterprise
HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at
OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds
sm OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds SM Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Overview... 5 Interoperability... 6 Service
Cloud Computing Security. Belmont Chia Data Center Solutions Architect
Cloud Computing Security Belmont Chia Data Center Solutions Architect 1 Cloud Computing Security What is this Cloud stuff? Security in Public Clouds Security in Private Clouds 2 Defining Cloud Computing
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
journey to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) Introduction to Cloud Security. Taniya
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 6464(Print)
RELIABILITY AND AVAILABILITY OF CLOUD COMPUTING. Eric Bauer. Randee Adams IEEE IEEE PRESS WILEY A JOHN WILEY & SONS, INC.
RELIABILITY AND AVAILABILITY OF CLOUD COMPUTING Eric Bauer Randee Adams IEEE IEEE PRESS WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS Figures Tables Equations Introduction xvii xxi xxiii xxv I
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
THOUGHT LEADERSHIP. Journey to Cloud 9. Navigating a path to secure cloud computing. Alastair Broom Solutions Director, Integralis
Journey to Cloud 9 Navigating a path to secure cloud computing Alastair Broom Solutions Director, Integralis March 2012 Navigating a path to secure cloud computing 2 Living on Cloud 9 Cloud computing represents
Technology & Business Overview of Cloud Computing
Your Place or Mine? In-House e-discovery Platform vs. Software as a Service Technology & Business Overview of Cloud Computing Janine Anthony Bowen, Esq. Jack Attorneys & Advisors www.jack-law.com Atlanta,
Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014
Consumption IT Michael Shepherd Business Development Manager Cisco Public Sector May 1 st 2014 Short Bio Cloud BDM in Public Sector (SLED + FED) Cisco for 14 + years Focused on cloud for 4 + years Awareness,
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Ocean Park IT Cloud Solution
Ocean Park IT Cloud Solution Request for Expressions of Interest for Design, Implementation and Maintenance of Ocean Park IT Cloud Solution The Ocean Park Corporation (the Corporation) invites expressions
Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Deploying Public, Private, and Hybrid Storage Clouds. Marty Stogsdill, Oracle
Deploying Public, Private, and Hybrid Storage Clouds Marty Stogsdill, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies
How To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
Cloud Service Model. Selecting a cloud service model. Different cloud service models within the enterprise
Cloud Service Model Selecting a cloud service model Different cloud service models within the enterprise Single cloud provider AWS for IaaS Azure for PaaS Force fit all solutions into the cloud service
EXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
VMware for your hosting services
VMware for your hosting services Anindya Kishore Das 2009 VMware Inc. All rights reserved Everybody talks Cloud! You will eat your cloud and you will like it! Everybody talks Cloud - But what is it? VMware
Clarity in the Cloud. Defining cloud services and the strategic impact on businesses.
Clarity in the Cloud Defining cloud services and the strategic impact on businesses. Table of Contents Executive Summary... 3 Cloud Services... 4 Clarity within the Cloud... 4 Public Cloud Solution...
Cloud Workload Migration
Cover Sheet Infographic Summary Introduction Migration Potential Cloud Applications Security: Myth vs. Reality Data Retrieval Cloud Workload Migration Cloud Control Single vs. Multiple Providers Regulation
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
The attached DRAFT document (provided here for HISTORICAL purposes) has been superseded by the following publication:
The attached DRAFT document (provided here for HISTORICAL purposes) has been superseded by the following publication: Publication Number: Special Publication 800-146 Title: Cloud Computing Synopsis and