Building More Reliable Cloud Services The CUMULUS Project
|
|
- Melanie Phelps
- 8 years ago
- Views:
Transcription
1 Building More Reliable Cloud Services The CUMULUS Project Antonio Álvarez Romero London, 17 th June
2 Table of contents Motivations Goals to be achieved What is CUMULUS? Application scenario: Smart Lightning Recap 2
3 Table of contents Motivations Cloud computing definition Cloud computing strengths Cloud computing drawbacks The problem of security Goals to be achieved What is CUMULUS? Application scenario: Smart Lightning Recap 3
4 Motivations Cloud computing definition Let s reflect on the definition of cloud computing A technology that allows to offer services by means of the Internet This definition can be improved Rather than a new computing technology, it is a change of paradigm An innovative model of providing IT services, in comparison to the classic system of private networks 4
5 Motivations Cloud computing definition The definition can be made from the point of view of customers or providers Customer s view Cloud computing is a set of IT solutions accesible from a laptop on the Internet, regardless of its location Its usage is generally charged following a flat rate model It can be easily scaled on demand It works in a context of confidence both from the technical and the legal point of view The only infrastructure needed is a terminal enabled to be connected to the Internet Data are not stored on the device, but on the cloud 5
6 Motivations Cloud computing definition The definition can be made from the point of view of customers or providers Provider s view A set of HW and SW resources provided as a service by means of the Internet The model followed is similar to that of water and electrical supply The customer is charged periodically (mostly on a monthly basis) Can be also charged basing on resources consumption The maintenance cannot add an extra cost It must be authomatically scalable on demand Services must be reusable (standardization) Services must be multiuser 6
7 Motivations Cloud computing definition In addition to this: The implementation of a service can use one or more machines in a transparent manner (virtualization), and the quality of service, as well as data and communications security must be guaranteed by a Service Level Agreement (SLA) 7
8 Motivations Cloud computing strengths A flexible and unlimited infrastructure The bill depends on each customer s needs The service can be expended on demand Immediately Without needing big investements on hardware and maintenance Apps, services and data can be accesed by a wide range of devices (smartphones, laptops ) Reduction of costs 8
9 Motivations Cloud computing strengths A better Quality of Service The investment on technology made by cloud service providers will always be bigger than the one made by a company in their own 24/7 service availability Cloud computing services average downtime is 7,5 hours a year (0,1%) D.Bonderud: 99.9% cloud computing uptime? That 0.1% costs more than you would think. Midsize insider
10 Motivations Cloud computing drawbacks Security regarding data storage Security regarding data transmission within the cloud Security for apps stored on the cloud Security regarding the integrity of data stored on the cloud Security related to third parties 10
11 Motivations Cloud computing promising but problematic Cloud computing is a flourishing business, promising to become a breakthrough in the computation era Everybody seems to agree on its benefits and advantages Despite its indubitable appealing, the desired growth of the business of cloud computing is seriously threatened 11
12 Motivations The problem of security Cloud computing still shows serious weaknesses regarding security These weaknesses make prospective customers to refrain from using cloud services Providers are reluctant to take full responsibility of the security of their services once the services are uploaded and offered through a cloud In consequence, both providers and customers have raised their concerns about security, which has become a major issue Anyway, both customers and providers are really willing to trust each other and build relationships based on confidence 12
13 Motivations Other problems Security is not the only problem affecting cloud computing Privacy Governance Compliance 13
14 Table of contents Motivations Goals to be achieved What is CUMULUS? Application scenario: Smart Lightning Recap 14
15 Goals to be achieved We want to build trustworthy cloud services We want to encourage both providers and suppliers to rely on cloud services We want to boost the growth of the cloud computing business Highlighting and even improving its strengths Looking for solutions to its weaknesses Especially those related to security issues 15
16 Goals to be achieved How can we do it? Issuing certificates is the most traditional way to ensure security properties for IT services It has a long story as a mechanism for verifiying properties and increasing trust in software services However, when it comes to certifying software running on top of the cloud stack, or services offered at different layers of the cloud stack, a serious lack in certification tools is evident 16
17 Goals to be achieved How can we do it? Therefore, a certification process for advanced cloud services is needed It s here when the CUMULUS project comes into scene CUMULUS aims to give a solution to the lack of tools to certificate security on cloud services. CUMULUS helps to build reliable services that reassure both providers and customers and encourage them to place their trust in cloud computing CUMULUS is eventually a tool which will contribute to the expected growth and development of the cloud computing business 17
18 Table of contents Motivations Goals to be achieved What is CUMULUS? The project The purpose The methodology Application scenario: Smart Lightning Recap 18
19 What is CUMULUS? The project CUMULUS stands for Certification infrastructure for MUlti-Layer cloud Services It is an EU funded project 3 years October 2012 September 2015 Eight partners from European science and industry Investigate how in future cloud services can be made more secure and trustworthy for end users 19
20 What is CUMULUS? Partners 20
21 What is CUMULUS? Purpose 21
22 What is CUMULUS? The framework The certification process is a function that takes as input the assertions about a security property and target of certification and produces as output a machinereadable certificate containing the evidence that proves the requested properties, by means of verification and validation techniques 22
23 What is CUMULUS? The framework The certification process produces a set of metadata in the form of machine-readable certificates An XML file These certificates can be used to compare and rank services Identify the best one addressing client preferences Since they are machine readable, a certificate does not need to be read by a person. A machine will interpret it 23
24 What is CUMULUS? The framework A certificate is an XML file including the elements needed for a given class of certification SaaS, Paas, IaaS model Verification type Test, Monitoring, TC Proofs, hybrid, incremental Evidence Others It is an instance of a certification model A certification model is a particular version of a certification meta-model 24
25 What is CUMULUS? The framework The certification process in CUMULUS is about collecting different types of evidence ensuring the fulfillment of a security property Testing The property is checked by making periodical verifications Monitoring The property is continuously checked Trusted computing proofs For Hardware elements of cloud infrastructures 25
26 What is CUMULUS? The framework Let s see some examples Testing Database encryption: by means of querys we can see if the information on a database is stored in plain text or not Monitoring Software running Apache server is running on a virtual machine Trusted computing proofs Data Integrity The data stored in a certain memory area is encrypted The encryption is made by a Trusted Platform Module (TPM) provided by Infineon 26
27 What is CUMULUS? The framework An hybrid certification process combines at least two types of evidence Example: testing + Trusted Computing Proofs Availability of a SaaS layer service Testing to check the availabilty of the service TC Proofs to check that the configuration of the cloud infrastructure has not changed Example: monitoring + Trusted Computing Proofs A given service is always operated within the European Union TC Proofs to certify that the virtual machine is deployed in a hardware located in the EU Monitoring to prove that the service is always executed on the mentioned virtual machine 27
28 What is CUMULUS? The framework A multilayer certification process is the combination of the certification of inter-dependent services at different layers of the cloud stack Example: Saas + IaaS Using monitoring evidences to certify that a mail service (SaaS) is running on a virtual machine having certain features (IaaS) regarding, for instance: Hard disk space RAM memory Processing capability 28
29 What is CUMULUS? The framework An incremental certification process has the ability to cover changes that may affect certified properties of cloud services without having to recertify properties from scratch Example: certify that a mail service is running on a virtual machine having certain properties The mail service is updated The certificate has to be updated as well But it is only necessary to certificate the mail service, so the whole certification process does not have to be done An incremental certificate is issued 29
30 What is CUMULUS? The framework IaaS PaaS SaaS Test-based (TB) X X X BASIC models Monitoring-based (MB) X X X TPM-Based (TPMB) X X X TB,MB X X X HYBRID models TB,TPMB X X X MB,TPMB X X X TB,MB,TPMB X X X IaaS/PaaS X X MULTI LAYER models PaaS/SaaS X X IaaS/SaaS X X IaaS/PaaS/SaaS X X X INCREMENTAL models TB,MB X X X 30
31 What is CUMULUS? The framework Which are our targets of certification? 31
32 What is CUMULUS? The framework Typical engineering processes for design and development of services and applications relied on functional aspects and requirements of the system to be modelled Security was neglected, added as an afterthought or minimized due to cost or efficiency conditions in the development 32
33 What is CUMULUS? The framework This has changed and it is no longer possible to achieve the required level of security by adding security measures late in the development process Security engineering needs to be part of the development in all stages of the process That s why a cloud service needs a CUMULUS-aware engineering process in order to be issued CUMULUS certificates It is not possible to do it directly It is necessary to use CUMULUS specific engineering tools 33
34 What is CUMULUS? The framework The CUMULUS engineering process is reflected in a set of engineering tools developed throughout the project There are four kind of actors benefiting from the engineering process Application and service engineers Certification authorities Cloud providers Service consumers 34
35 What is CUMULUS? The framework What does the engineering process provide? For application and service engineers Expressing security requirements for systems running on the cloud Understanding security concerns relevant to their systems Mapping security requirements to certificates Tracing security requirements down to security mechanisms in the code For certification authorities Communicating their procedures to engineers Issuing certifications for cloud components 35
36 What is CUMULUS? The framework What does the engineering process provide? For cloud providers Increasing users trust both in their specific clouds and in the cloud model itself Expressing the security properties provided by available services of their cloud infrastructures / platforms Understanding security concerns relevant for their clouds For service consumers Communicating their preferences to cloud providers Trusting cloud providers platforms Proving that their systems conform to policies/rules/law 36
37 What is CUMULUS? The methodology WP Name 1 Project Management 2 Certification Models and Processes 3 Core Certification Mechanisms 4 CUMULUS-aware system engineering 5 Infrastructure design and integration 6 Industrial scenarios and validation 7 Dissemination and exploitation 37
38 What is CUMULUS? The methodology 38
39 Table of contents Motivations Goals to be achieved What is CUMULUS? Application scenario: Smart Lightning Recap 39
40 Application Scenario: Smart Lightning Wellness Telecom has developed a new product designed to manage public lightning. WeLight is the open architecture, adaptable, product developed by Wellness Telecom to control and monitor any public lightning panel The system also does not need its own server or its own communications infrastructure. All the information is available through an Internet-based software service It provides Telemanagement platform Alerts Reports 40
41 Application Scenario: Smart Lightning WeLight cloud infrastructure 41
42 Application Scenario: Smart Lightning WeLight cloud infrastructure 42
43 Application Scenario: Smart Lightning Some of the security properties we would like to certify Certificate that the different components of the architecture are trusworthy Avoid the use of VPN We could ensure that the communications are using SSL We could also ensure that HTTP requests are redirected to the HTTP port Access control Avoid unauthorized remote disconnect likely to create system wide blackout Authentication of users Avoid feeding the system with false data 43
44 Table of contents Motivations Goals to be achieved What is CUMULUS? Application scenario: Smart Lightning Recap 44
45 Recap 45
46 46
47 47
Cloud Panel Service Evaluation Scenarios
Cloud Panel Service Evaluation Scenarios August 2014 Service Evaluation Scenarios The scenarios below are provided as a sample of how Finance may approach the evaluation of a particular service offered
More informationNCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
More informationThe Private Cloud Your Controlled Access Infrastructure
White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,
More informationNew Computing Models, and What They Mean to the Small and Mid-Sized Business Consumer
New Computing Models, and What They Mean to the Small and Mid-Sized Business Consumer How your business can make practical decisions between The Cloud, Utility Computing and Hosted Services 1 Business
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationTopics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
More informationCloud Computing and Amazon Web Services
Cloud Computing and Amazon Web Services Gary A. McGilvary edinburgh data.intensive research 1 OUTLINE 1. An Overview of Cloud Computing 2. Amazon Web Services 3. Amazon EC2 Tutorial 4. Conclusions 2 CLOUD
More informationConnecting to the Cloud
Connecting to the Cloud Six Degrees Group www.6dg.co.uk Managed Cloud Hosting Companies all over the world are intrigued by the possibility of cloud services but they have profound concerns about the privacy,
More informationCHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
More informationINTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
More informationWhite Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
More informationHow to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
More informationSecuring Cloud Computing by GED-i
Securing Cloud Computing by GED-i General Most IT professionals estimate that the cloud computing environment will dominate the deployment and usage of the IT and storage environment in the near future.
More informationHow to Turn the Promise of the Cloud into an Operational Reality
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
More informationHit Hanan & Faisal Faruqi Nexscience
Leveraging Mobile Technology for Oracle Databases Management Hit Hanan & Faisal Faruqi Nexscience Mobile Market.. The total number of PCs will reach 1.78 billion in three years, while the number of smart
More informationCLOUD COMPUTING An Overview
CLOUD COMPUTING An Overview Abstract Resource sharing in a pure plug and play model that dramatically simplifies infrastructure planning is the promise of cloud computing. The two key advantages of this
More informationCertified Cloud Computing Professional VS-1067
Certified Cloud Computing Professional VS-1067 Certified Cloud Computing Professional Certification Code VS-1067 Vskills Cloud Computing Professional assesses the candidate for a company s cloud computing
More informationPrivate vs. Public Cloud Solutions
Private vs. Public Cloud Solutions Selecting the right cloud technology to fit your organization Introduction As cloud storage evolves, different cloud solutions have emerged. Our first cloud whitepaper
More informationCloud Security Certification
Cloud Security Certification January 21, 2015 1 Agenda 1. What problem are we solving? 2. Definitions (Attestation vs Certification) 3. Cloud Security Responsibilities and Risk Exposure 4. Who is responsible
More informationCloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
More informationTable of Contents. Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined.
Table of Contents Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined. 1.1 Cloud Computing Development... Error! Bookmark not
More informationCloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
More informationvnebula Cloud. Made Easy. Introducing vnebula from Stream Networks. A simple, self-service cloud portal for our partner community.
vnebula Cloud. Made Easy. Introducing vnebula from Stream Networks. A simple, self-service cloud portal for our partner community. Keep it simple Our partners asked us for a cloud portal that was simple
More information6. WHAT DOES IT TAKES TO PROVIDE SAAS?
6. WHAT DOES IT TAKES TO PROVIDE SAAS? NIST has defined SaaS as a capability for the consumers benefit to use the provider s applications that are being run on the cloud's infrastructure. The consumers
More informationThe Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
More informationKeyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
More informationSecurity Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
More informationAskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
More informationWHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach
WHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach Marc Jansen Computer Science Institute University of Applied Sciences Ruhr West Tannenstr. 43, 46240 Bottrop Germany marc.jansen@hs-ruhrwest.de
More informationCLOUD COMPUTING SECURITY CONCERNS
CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.
More informationModule 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
More informationCloudSync Mobile Device Management Technical Overview
CloudSync Mobile Device Management Technical Overview Version 1.0 CloudSync, Inc. 3103 Fife Court Denver, CO 80211 +1 (720) 221-4444 phone +1 (720) 221-2670 fax contact@cloudsync.com Table of Contents
More informationA Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
More informationIT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
More informationHigh Performance Computing Cloud Computing. Dr. Rami YARED
High Performance Computing Cloud Computing Dr. Rami YARED Outline High Performance Computing Parallel Computing Cloud Computing Definitions Advantages and drawbacks Cloud Computing vs Grid Computing Outline
More informationEXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
More informationCloud Computing Backgrounder
Cloud Computing Backgrounder No surprise: information technology (IT) is huge. Huge costs, huge number of buzz words, huge amount of jargon, and a huge competitive advantage for those who can effectively
More informationManagement of Security Information and Events in Future Internet
Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?
More informationHow To Understand Cloud Computing
Dr Markus Hagenbuchner markus@uow.edu.au CSCI319 Introduction to Cloud Computing CSCI319 Chapter 1 Page: 1 of 10 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to how
More informationThe Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
More informationLooking Ahead The Path to Moving Security into the Cloud
Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application
More informationTENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4
TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control
More informationBernie Velivis President, Performax Inc
Performax provides software load testing and performance engineering services to help our clients build, market, and deploy highly scalable applications. Bernie Velivis President, Performax Inc Load ing
More informationCourse 20533: Implementing Microsoft Azure Infrastructure Solutions
Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationTufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:
More informationWhite. Paper. What s Needed for Cloud Computing? Focus on Networking and WAN Optimization. June, 2010
White Paper What s Needed for Cloud Computing? Focus on Networking and WAN Optimization By Jon Oltsik June, 2010 This ESG White Paper was commissioned by Riverbed Technology and is distributed under license
More informationBrainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
More informationCLOUD COMPUTING OVERVIEW
CLOUD COMPUTING OVERVIEW http://www.tutorialspoint.com/cloud_computing/cloud_computing_overview.htm Copyright tutorialspoint.com Cloud Computing provides us a means by which we can access the applications
More informationThe deployment of OHMS TM. in private cloud
Healthcare activities from anywhere anytime The deployment of OHMS TM in private cloud 1.0 Overview:.OHMS TM is software as a service (SaaS) platform that enables the multiple users to login from anywhere
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationBusiness Alliance B.A.A.E.R. Managed services
Business Alliance B.A.A.E.R. Managed services 11-12.XII.2014 Belgium Francois Van Leuven Chief Executive Manager (CEM) Table of Contents Managed Services - Data center partnership - Middleware services
More informationRegulated Applications in the Cloud
Keith Williams CEO Regulated Applications in the Cloud Aspects of Security and Validation Statement on the Cloud and Pharma s added Complexity Clouds already make sense for many small and mediumsize businesses,
More informationA.Prof. Dr. Markus Hagenbuchner markus@uow.edu.au. CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1
A.Prof. Dr. Markus Hagenbuchner markus@uow.edu.au CSCI319 A Brief Introduction to Cloud Computing CSCI319 Page: 1 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to
More informationSCADA Cloud Computing
SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: erik.daalder@nl.yokogawa.com
More informationFundamental Concepts and Models
Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract
More informationLOW RISK ADOPTION OF CLOUD INFRA- STRUCTURE FOR ENTERPRISES
LOW RISK ADOPTION OF CLOUD INFRA- STRUCTURE FOR ENTERPRISES Business leaders are recognising that with the emergence of enterprise grade cloud computing, there is no good reason to continue to invest in
More informationCloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
More informationCLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
More informationSecurity Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
More informationXerox SMart esolutions. Security White Paper
Xerox SMart esolutions Security White Paper 1 Xerox SMart esolutions White Paper Network and data security is one of the many challenges that businesses face on a daily basis. Recognizing this, Xerox Corporation
More informationSecurity Inspection Inc. Solutions to secure your network
Security Inspection Inc. TM Solutions to secure your network Secure Cloud Utilization Strategies! responsibilities Out of 127 cloud providers surveyed, a recently released study showed that only 25% of
More informationData Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: prashantpatil11@rediffmail.com ABSTRACT
More informationARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 admin@trustedcomputinggroup.org www.trustedcomputinggroup.org
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationSecurity Issues On Cloud Computing
Security Issues On Cloud Computing Pratibha Tripathi #1, Mohammad Suaib #2 1 M.Tech(CSE), Second year 2 Research Guide # Department of Computer Science and Engineering Abstract Integral University, Lucknow
More informationSecurity Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of
More informationINUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture
More informationImplementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
More informationNetworks and Services
Networks and Services Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Fall 2015 TOC 1 Infrastructure as a Service 2 Platform as a Service 3 Software as a Service Infrastructure as a Service Definition Infrastructure
More informationImplementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationWilliamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:
More informationOverview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud
Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities
More informationN TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
More informationEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud Computing What Every Business Owner Should Consider When Choosing Cloud Hosted Versus Internally Hosted Software 1 INTRODUCTION Cloud computing is the current information
More informationCourse 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
More informationProof of Retrivability: A Third Party Auditor Using Cloud Computing
Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry
More informationFundamental Concepts and Models
Chapter 4: Fundamental Concepts and Models Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
More informationIntroduction to Cloud Computing
Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services
More informationCloud Computing. Cloud computing:
Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:
More informationCLOUD. MADE EASY. vnebula Portal
CLOUD. MADE EASY. vnebula Portal Introducing Stream s self service vnebula portal. A product for our Stream Partners. 1 Stream Networks vnebula Portal The design philosophy behind the vnebula portal At
More informationTPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
More informationCloud Panel Draft Statement of Requirement
Cloud Panel Draft Statement of Requirement August 2014 Statement of Requirement This draft Statement of Requirement (SOR) has been created to provide Commonwealth Agencies, industry members and interested
More informationyvette@yvetteagostini.it yvette@yvetteagostini.it
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
More informationStandardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs)
Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs) Robert Bohn, PhD Advanced Network Technologies Division Cloud FS Americas 2015 New York,
More informationWhite Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
More informationDeveloping SAP Enterprise Cloud Computing Strategy
White Paper WFT Cloud Technology SAP Cloud Integration Service Provider Developing SAP Enterprise Cloud Computing Strategy SAP Cloud Computing is a significant IT paradigm change with the potential to
More informationMicrosoft Azure Cloud for Solution Architects
Microsoft Azure Cloud for Solution Architects Roy Kim @roykimtoronto roykimtoronto@gmail.com September 2015 About me 7+ years design and developing SharePoint solutions. 13+ career on the Microsoft technology
More informationA Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com
More informationInvestigation of Cloud Computing: Applications and Challenges
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
More informationA Survey on Security Issues in Service Delivery Models of Cloud Computing
A Survey on Security Issues in Service Delivery Models of Cloud Computing { S. Subashini and V. Kavitha (2011) Presented by: Anthony Postiglione Outline Introduction What is Cloud Computing Pros/Cons of
More informationWhite Paper. Cloud Vademecum
White Paper Cloud Vademecum Cloud is the new IT paradigm this document offers a collection of thoughts, internal and external discussions and information. The goal is to inspire and stimulate the route
More informationEnterprise Application Enablement for the Internet of Things
Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices
More informationLecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
More informationCloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More informationConsiderations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
More informationData Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
More informationDynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
More informationComputing Power at your Service: IaaS from the Private Cloud Dynamic Services for Infrastructure
Computing Power at your Service: IaaS from the Private Cloud Dynamic Services for Infrastructure November 2011 18.11.2010 1 CIO s challenges 2010. Challenges of many CIOs in 2010: IT budgets approx. 20%
More informationMicrosoft SharePoint Architectural Models
Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint
More information