Building More Reliable Cloud Services The CUMULUS Project

Size: px
Start display at page:

Download "Building More Reliable Cloud Services The CUMULUS Project"

Transcription

1 Building More Reliable Cloud Services The CUMULUS Project Antonio Álvarez Romero London, 17 th June

2 Table of contents Motivations Goals to be achieved What is CUMULUS? Application scenario: Smart Lightning Recap 2

3 Table of contents Motivations Cloud computing definition Cloud computing strengths Cloud computing drawbacks The problem of security Goals to be achieved What is CUMULUS? Application scenario: Smart Lightning Recap 3

4 Motivations Cloud computing definition Let s reflect on the definition of cloud computing A technology that allows to offer services by means of the Internet This definition can be improved Rather than a new computing technology, it is a change of paradigm An innovative model of providing IT services, in comparison to the classic system of private networks 4

5 Motivations Cloud computing definition The definition can be made from the point of view of customers or providers Customer s view Cloud computing is a set of IT solutions accesible from a laptop on the Internet, regardless of its location Its usage is generally charged following a flat rate model It can be easily scaled on demand It works in a context of confidence both from the technical and the legal point of view The only infrastructure needed is a terminal enabled to be connected to the Internet Data are not stored on the device, but on the cloud 5

6 Motivations Cloud computing definition The definition can be made from the point of view of customers or providers Provider s view A set of HW and SW resources provided as a service by means of the Internet The model followed is similar to that of water and electrical supply The customer is charged periodically (mostly on a monthly basis) Can be also charged basing on resources consumption The maintenance cannot add an extra cost It must be authomatically scalable on demand Services must be reusable (standardization) Services must be multiuser 6

7 Motivations Cloud computing definition In addition to this: The implementation of a service can use one or more machines in a transparent manner (virtualization), and the quality of service, as well as data and communications security must be guaranteed by a Service Level Agreement (SLA) 7

8 Motivations Cloud computing strengths A flexible and unlimited infrastructure The bill depends on each customer s needs The service can be expended on demand Immediately Without needing big investements on hardware and maintenance Apps, services and data can be accesed by a wide range of devices (smartphones, laptops ) Reduction of costs 8

9 Motivations Cloud computing strengths A better Quality of Service The investment on technology made by cloud service providers will always be bigger than the one made by a company in their own 24/7 service availability Cloud computing services average downtime is 7,5 hours a year (0,1%) D.Bonderud: 99.9% cloud computing uptime? That 0.1% costs more than you would think. Midsize insider

10 Motivations Cloud computing drawbacks Security regarding data storage Security regarding data transmission within the cloud Security for apps stored on the cloud Security regarding the integrity of data stored on the cloud Security related to third parties 10

11 Motivations Cloud computing promising but problematic Cloud computing is a flourishing business, promising to become a breakthrough in the computation era Everybody seems to agree on its benefits and advantages Despite its indubitable appealing, the desired growth of the business of cloud computing is seriously threatened 11

12 Motivations The problem of security Cloud computing still shows serious weaknesses regarding security These weaknesses make prospective customers to refrain from using cloud services Providers are reluctant to take full responsibility of the security of their services once the services are uploaded and offered through a cloud In consequence, both providers and customers have raised their concerns about security, which has become a major issue Anyway, both customers and providers are really willing to trust each other and build relationships based on confidence 12

13 Motivations Other problems Security is not the only problem affecting cloud computing Privacy Governance Compliance 13

14 Table of contents Motivations Goals to be achieved What is CUMULUS? Application scenario: Smart Lightning Recap 14

15 Goals to be achieved We want to build trustworthy cloud services We want to encourage both providers and suppliers to rely on cloud services We want to boost the growth of the cloud computing business Highlighting and even improving its strengths Looking for solutions to its weaknesses Especially those related to security issues 15

16 Goals to be achieved How can we do it? Issuing certificates is the most traditional way to ensure security properties for IT services It has a long story as a mechanism for verifiying properties and increasing trust in software services However, when it comes to certifying software running on top of the cloud stack, or services offered at different layers of the cloud stack, a serious lack in certification tools is evident 16

17 Goals to be achieved How can we do it? Therefore, a certification process for advanced cloud services is needed It s here when the CUMULUS project comes into scene CUMULUS aims to give a solution to the lack of tools to certificate security on cloud services. CUMULUS helps to build reliable services that reassure both providers and customers and encourage them to place their trust in cloud computing CUMULUS is eventually a tool which will contribute to the expected growth and development of the cloud computing business 17

18 Table of contents Motivations Goals to be achieved What is CUMULUS? The project The purpose The methodology Application scenario: Smart Lightning Recap 18

19 What is CUMULUS? The project CUMULUS stands for Certification infrastructure for MUlti-Layer cloud Services It is an EU funded project 3 years October 2012 September 2015 Eight partners from European science and industry Investigate how in future cloud services can be made more secure and trustworthy for end users 19

20 What is CUMULUS? Partners 20

21 What is CUMULUS? Purpose 21

22 What is CUMULUS? The framework The certification process is a function that takes as input the assertions about a security property and target of certification and produces as output a machinereadable certificate containing the evidence that proves the requested properties, by means of verification and validation techniques 22

23 What is CUMULUS? The framework The certification process produces a set of metadata in the form of machine-readable certificates An XML file These certificates can be used to compare and rank services Identify the best one addressing client preferences Since they are machine readable, a certificate does not need to be read by a person. A machine will interpret it 23

24 What is CUMULUS? The framework A certificate is an XML file including the elements needed for a given class of certification SaaS, Paas, IaaS model Verification type Test, Monitoring, TC Proofs, hybrid, incremental Evidence Others It is an instance of a certification model A certification model is a particular version of a certification meta-model 24

25 What is CUMULUS? The framework The certification process in CUMULUS is about collecting different types of evidence ensuring the fulfillment of a security property Testing The property is checked by making periodical verifications Monitoring The property is continuously checked Trusted computing proofs For Hardware elements of cloud infrastructures 25

26 What is CUMULUS? The framework Let s see some examples Testing Database encryption: by means of querys we can see if the information on a database is stored in plain text or not Monitoring Software running Apache server is running on a virtual machine Trusted computing proofs Data Integrity The data stored in a certain memory area is encrypted The encryption is made by a Trusted Platform Module (TPM) provided by Infineon 26

27 What is CUMULUS? The framework An hybrid certification process combines at least two types of evidence Example: testing + Trusted Computing Proofs Availability of a SaaS layer service Testing to check the availabilty of the service TC Proofs to check that the configuration of the cloud infrastructure has not changed Example: monitoring + Trusted Computing Proofs A given service is always operated within the European Union TC Proofs to certify that the virtual machine is deployed in a hardware located in the EU Monitoring to prove that the service is always executed on the mentioned virtual machine 27

28 What is CUMULUS? The framework A multilayer certification process is the combination of the certification of inter-dependent services at different layers of the cloud stack Example: Saas + IaaS Using monitoring evidences to certify that a mail service (SaaS) is running on a virtual machine having certain features (IaaS) regarding, for instance: Hard disk space RAM memory Processing capability 28

29 What is CUMULUS? The framework An incremental certification process has the ability to cover changes that may affect certified properties of cloud services without having to recertify properties from scratch Example: certify that a mail service is running on a virtual machine having certain properties The mail service is updated The certificate has to be updated as well But it is only necessary to certificate the mail service, so the whole certification process does not have to be done An incremental certificate is issued 29

30 What is CUMULUS? The framework IaaS PaaS SaaS Test-based (TB) X X X BASIC models Monitoring-based (MB) X X X TPM-Based (TPMB) X X X TB,MB X X X HYBRID models TB,TPMB X X X MB,TPMB X X X TB,MB,TPMB X X X IaaS/PaaS X X MULTI LAYER models PaaS/SaaS X X IaaS/SaaS X X IaaS/PaaS/SaaS X X X INCREMENTAL models TB,MB X X X 30

31 What is CUMULUS? The framework Which are our targets of certification? 31

32 What is CUMULUS? The framework Typical engineering processes for design and development of services and applications relied on functional aspects and requirements of the system to be modelled Security was neglected, added as an afterthought or minimized due to cost or efficiency conditions in the development 32

33 What is CUMULUS? The framework This has changed and it is no longer possible to achieve the required level of security by adding security measures late in the development process Security engineering needs to be part of the development in all stages of the process That s why a cloud service needs a CUMULUS-aware engineering process in order to be issued CUMULUS certificates It is not possible to do it directly It is necessary to use CUMULUS specific engineering tools 33

34 What is CUMULUS? The framework The CUMULUS engineering process is reflected in a set of engineering tools developed throughout the project There are four kind of actors benefiting from the engineering process Application and service engineers Certification authorities Cloud providers Service consumers 34

35 What is CUMULUS? The framework What does the engineering process provide? For application and service engineers Expressing security requirements for systems running on the cloud Understanding security concerns relevant to their systems Mapping security requirements to certificates Tracing security requirements down to security mechanisms in the code For certification authorities Communicating their procedures to engineers Issuing certifications for cloud components 35

36 What is CUMULUS? The framework What does the engineering process provide? For cloud providers Increasing users trust both in their specific clouds and in the cloud model itself Expressing the security properties provided by available services of their cloud infrastructures / platforms Understanding security concerns relevant for their clouds For service consumers Communicating their preferences to cloud providers Trusting cloud providers platforms Proving that their systems conform to policies/rules/law 36

37 What is CUMULUS? The methodology WP Name 1 Project Management 2 Certification Models and Processes 3 Core Certification Mechanisms 4 CUMULUS-aware system engineering 5 Infrastructure design and integration 6 Industrial scenarios and validation 7 Dissemination and exploitation 37

38 What is CUMULUS? The methodology 38

39 Table of contents Motivations Goals to be achieved What is CUMULUS? Application scenario: Smart Lightning Recap 39

40 Application Scenario: Smart Lightning Wellness Telecom has developed a new product designed to manage public lightning. WeLight is the open architecture, adaptable, product developed by Wellness Telecom to control and monitor any public lightning panel The system also does not need its own server or its own communications infrastructure. All the information is available through an Internet-based software service It provides Telemanagement platform Alerts Reports 40

41 Application Scenario: Smart Lightning WeLight cloud infrastructure 41

42 Application Scenario: Smart Lightning WeLight cloud infrastructure 42

43 Application Scenario: Smart Lightning Some of the security properties we would like to certify Certificate that the different components of the architecture are trusworthy Avoid the use of VPN We could ensure that the communications are using SSL We could also ensure that HTTP requests are redirected to the HTTP port Access control Avoid unauthorized remote disconnect likely to create system wide blackout Authentication of users Avoid feeding the system with false data 43

44 Table of contents Motivations Goals to be achieved What is CUMULUS? Application scenario: Smart Lightning Recap 44

45 Recap 45

46 46

47 47

Cloud Panel Service Evaluation Scenarios

Cloud Panel Service Evaluation Scenarios Cloud Panel Service Evaluation Scenarios August 2014 Service Evaluation Scenarios The scenarios below are provided as a sample of how Finance may approach the evaluation of a particular service offered

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

The Private Cloud Your Controlled Access Infrastructure

The Private Cloud Your Controlled Access Infrastructure White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,

More information

New Computing Models, and What They Mean to the Small and Mid-Sized Business Consumer

New Computing Models, and What They Mean to the Small and Mid-Sized Business Consumer New Computing Models, and What They Mean to the Small and Mid-Sized Business Consumer How your business can make practical decisions between The Cloud, Utility Computing and Hosted Services 1 Business

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted. Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

Cloud Computing and Amazon Web Services

Cloud Computing and Amazon Web Services Cloud Computing and Amazon Web Services Gary A. McGilvary edinburgh data.intensive research 1 OUTLINE 1. An Overview of Cloud Computing 2. Amazon Web Services 3. Amazon EC2 Tutorial 4. Conclusions 2 CLOUD

More information

Connecting to the Cloud

Connecting to the Cloud Connecting to the Cloud Six Degrees Group www.6dg.co.uk Managed Cloud Hosting Companies all over the world are intrigued by the possibility of cloud services but they have profound concerns about the privacy,

More information

CHAPTER 8 CLOUD COMPUTING

CHAPTER 8 CLOUD COMPUTING CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

How to Secure Infrastructure Clouds with Trusted Computing Technologies

How to Secure Infrastructure Clouds with Trusted Computing Technologies How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.

More information

Securing Cloud Computing by GED-i

Securing Cloud Computing by GED-i Securing Cloud Computing by GED-i General Most IT professionals estimate that the cloud computing environment will dominate the deployment and usage of the IT and storage environment in the near future.

More information

How to Turn the Promise of the Cloud into an Operational Reality

How to Turn the Promise of the Cloud into an Operational Reality TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing

More information

Hit Hanan & Faisal Faruqi Nexscience

Hit Hanan & Faisal Faruqi Nexscience Leveraging Mobile Technology for Oracle Databases Management Hit Hanan & Faisal Faruqi Nexscience Mobile Market.. The total number of PCs will reach 1.78 billion in three years, while the number of smart

More information

CLOUD COMPUTING An Overview

CLOUD COMPUTING An Overview CLOUD COMPUTING An Overview Abstract Resource sharing in a pure plug and play model that dramatically simplifies infrastructure planning is the promise of cloud computing. The two key advantages of this

More information

Certified Cloud Computing Professional VS-1067

Certified Cloud Computing Professional VS-1067 Certified Cloud Computing Professional VS-1067 Certified Cloud Computing Professional Certification Code VS-1067 Vskills Cloud Computing Professional assesses the candidate for a company s cloud computing

More information

Private vs. Public Cloud Solutions

Private vs. Public Cloud Solutions Private vs. Public Cloud Solutions Selecting the right cloud technology to fit your organization Introduction As cloud storage evolves, different cloud solutions have emerged. Our first cloud whitepaper

More information

Cloud Security Certification

Cloud Security Certification Cloud Security Certification January 21, 2015 1 Agenda 1. What problem are we solving? 2. Definitions (Attestation vs Certification) 3. Cloud Security Responsibilities and Risk Exposure 4. Who is responsible

More information

Cloud Computing Technology

Cloud Computing Technology Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures

More information

Table of Contents. Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined.

Table of Contents. Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined. Table of Contents Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined. 1.1 Cloud Computing Development... Error! Bookmark not

More information

Cloud Computing for SCADA

Cloud Computing for SCADA Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry

More information

vnebula Cloud. Made Easy. Introducing vnebula from Stream Networks. A simple, self-service cloud portal for our partner community.

vnebula Cloud. Made Easy. Introducing vnebula from Stream Networks. A simple, self-service cloud portal for our partner community. vnebula Cloud. Made Easy. Introducing vnebula from Stream Networks. A simple, self-service cloud portal for our partner community. Keep it simple Our partners asked us for a cloud portal that was simple

More information

6. WHAT DOES IT TAKES TO PROVIDE SAAS?

6. WHAT DOES IT TAKES TO PROVIDE SAAS? 6. WHAT DOES IT TAKES TO PROVIDE SAAS? NIST has defined SaaS as a capability for the consumers benefit to use the provider s applications that are being run on the cloud's infrastructure. The consumers

More information

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - 45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

Security Issues In Cloud Computing and Countermeasures

Security Issues In Cloud Computing and Countermeasures Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department

More information

AskAvanade: Answering the Burning Questions around Cloud Computing

AskAvanade: Answering the Burning Questions around Cloud Computing AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,

More information

WHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach

WHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach WHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach Marc Jansen Computer Science Institute University of Applied Sciences Ruhr West Tannenstr. 43, 46240 Bottrop Germany marc.jansen@hs-ruhrwest.de

More information

CLOUD COMPUTING SECURITY CONCERNS

CLOUD COMPUTING SECURITY CONCERNS CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

CloudSync Mobile Device Management Technical Overview

CloudSync Mobile Device Management Technical Overview CloudSync Mobile Device Management Technical Overview Version 1.0 CloudSync, Inc. 3103 Fife Court Denver, CO 80211 +1 (720) 221-4444 phone +1 (720) 221-2670 fax contact@cloudsync.com Table of Contents

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

IT Architecture Review. ISACA Conference Fall 2003

IT Architecture Review. ISACA Conference Fall 2003 IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture

More information

High Performance Computing Cloud Computing. Dr. Rami YARED

High Performance Computing Cloud Computing. Dr. Rami YARED High Performance Computing Cloud Computing Dr. Rami YARED Outline High Performance Computing Parallel Computing Cloud Computing Definitions Advantages and drawbacks Cloud Computing vs Grid Computing Outline

More information

EXIN Cloud Computing Foundation

EXIN Cloud Computing Foundation Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing

More information

Cloud Computing Backgrounder

Cloud Computing Backgrounder Cloud Computing Backgrounder No surprise: information technology (IT) is huge. Huge costs, huge number of buzz words, huge amount of jargon, and a huge competitive advantage for those who can effectively

More information

Management of Security Information and Events in Future Internet

Management of Security Information and Events in Future Internet Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Dr Markus Hagenbuchner markus@uow.edu.au CSCI319 Introduction to Cloud Computing CSCI319 Chapter 1 Page: 1 of 10 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to how

More information

The Evolving Threat Landscape and New Best Practices for SSL

The Evolving Threat Landscape and New Best Practices for SSL The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...

More information

Looking Ahead The Path to Moving Security into the Cloud

Looking Ahead The Path to Moving Security into the Cloud Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application

More information

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control

More information

Bernie Velivis President, Performax Inc

Bernie Velivis President, Performax Inc Performax provides software load testing and performance engineering services to help our clients build, market, and deploy highly scalable applications. Bernie Velivis President, Performax Inc Load ing

More information

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

White. Paper. What s Needed for Cloud Computing? Focus on Networking and WAN Optimization. June, 2010

White. Paper. What s Needed for Cloud Computing? Focus on Networking and WAN Optimization. June, 2010 White Paper What s Needed for Cloud Computing? Focus on Networking and WAN Optimization By Jon Oltsik June, 2010 This ESG White Paper was commissioned by Riverbed Technology and is distributed under license

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

CLOUD COMPUTING OVERVIEW

CLOUD COMPUTING OVERVIEW CLOUD COMPUTING OVERVIEW http://www.tutorialspoint.com/cloud_computing/cloud_computing_overview.htm Copyright tutorialspoint.com Cloud Computing provides us a means by which we can access the applications

More information

The deployment of OHMS TM. in private cloud

The deployment of OHMS TM. in private cloud Healthcare activities from anywhere anytime The deployment of OHMS TM in private cloud 1.0 Overview:.OHMS TM is software as a service (SaaS) platform that enables the multiple users to login from anywhere

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Business Alliance B.A.A.E.R. Managed services

Business Alliance B.A.A.E.R. Managed services Business Alliance B.A.A.E.R. Managed services 11-12.XII.2014 Belgium Francois Van Leuven Chief Executive Manager (CEM) Table of Contents Managed Services - Data center partnership - Middleware services

More information

Regulated Applications in the Cloud

Regulated Applications in the Cloud Keith Williams CEO Regulated Applications in the Cloud Aspects of Security and Validation Statement on the Cloud and Pharma s added Complexity Clouds already make sense for many small and mediumsize businesses,

More information

A.Prof. Dr. Markus Hagenbuchner markus@uow.edu.au. CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1

A.Prof. Dr. Markus Hagenbuchner markus@uow.edu.au. CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1 A.Prof. Dr. Markus Hagenbuchner markus@uow.edu.au CSCI319 A Brief Introduction to Cloud Computing CSCI319 Page: 1 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to

More information

SCADA Cloud Computing

SCADA Cloud Computing SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: erik.daalder@nl.yokogawa.com

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract

More information

LOW RISK ADOPTION OF CLOUD INFRA- STRUCTURE FOR ENTERPRISES

LOW RISK ADOPTION OF CLOUD INFRA- STRUCTURE FOR ENTERPRISES LOW RISK ADOPTION OF CLOUD INFRA- STRUCTURE FOR ENTERPRISES Business leaders are recognising that with the emergence of enterprise grade cloud computing, there is no good reason to continue to invest in

More information

Cloud Computing. What is Cloud Computing?

Cloud Computing. What is Cloud Computing? Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited

More information

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,

More information

Security Information & Policies

Security Information & Policies Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER

More information

Xerox SMart esolutions. Security White Paper

Xerox SMart esolutions. Security White Paper Xerox SMart esolutions Security White Paper 1 Xerox SMart esolutions White Paper Network and data security is one of the many challenges that businesses face on a daily basis. Recognizing this, Xerox Corporation

More information

Security Inspection Inc. Solutions to secure your network

Security Inspection Inc. Solutions to secure your network Security Inspection Inc. TM Solutions to secure your network Secure Cloud Utilization Strategies! responsibilities Out of 127 cloud providers surveyed, a recently released study showed that only 25% of

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: prashantpatil11@rediffmail.com ABSTRACT

More information

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

ARCHITECT S GUIDE: Mobile Security Using TNC Technology ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 admin@trustedcomputinggroup.org www.trustedcomputinggroup.org

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Security Issues On Cloud Computing

Security Issues On Cloud Computing Security Issues On Cloud Computing Pratibha Tripathi #1, Mohammad Suaib #2 1 M.Tech(CSE), Second year 2 Research Guide # Department of Computer Science and Engineering Abstract Integral University, Lucknow

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently

More information

Networks and Services

Networks and Services Networks and Services Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Fall 2015 TOC 1 Infrastructure as a Service 2 Platform as a Service 3 Software as a Service Infrastructure as a Service Definition Infrastructure

More information

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:

More information

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities

More information

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

Everything You Need To Know About Cloud Computing

Everything You Need To Know About Cloud Computing Everything You Need To Know About Cloud Computing What Every Business Owner Should Consider When Choosing Cloud Hosted Versus Internally Hosted Software 1 INTRODUCTION Cloud computing is the current information

More information

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course

More information

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

Proof of Retrivability: A Third Party Auditor Using Cloud Computing Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Chapter 4: Fundamental Concepts and Models Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services

More information

Cloud Computing. Cloud computing:

Cloud Computing. Cloud computing: Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:

More information

CLOUD. MADE EASY. vnebula Portal

CLOUD. MADE EASY. vnebula Portal CLOUD. MADE EASY. vnebula Portal Introducing Stream s self service vnebula portal. A product for our Stream Partners. 1 Stream Networks vnebula Portal The design philosophy behind the vnebula portal At

More information

TPM Key Backup and Recovery. For Trusted Platforms

TPM Key Backup and Recovery. For Trusted Platforms TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents

More information

Cloud Panel Draft Statement of Requirement

Cloud Panel Draft Statement of Requirement Cloud Panel Draft Statement of Requirement August 2014 Statement of Requirement This draft Statement of Requirement (SOR) has been created to provide Commonwealth Agencies, industry members and interested

More information

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs)

Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs) Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs) Robert Bohn, PhD Advanced Network Technologies Division Cloud FS Americas 2015 New York,

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

Developing SAP Enterprise Cloud Computing Strategy

Developing SAP Enterprise Cloud Computing Strategy White Paper WFT Cloud Technology SAP Cloud Integration Service Provider Developing SAP Enterprise Cloud Computing Strategy SAP Cloud Computing is a significant IT paradigm change with the potential to

More information

Microsoft Azure Cloud for Solution Architects

Microsoft Azure Cloud for Solution Architects Microsoft Azure Cloud for Solution Architects Roy Kim @roykimtoronto roykimtoronto@gmail.com September 2015 About me 7+ years design and developing SharePoint solutions. 13+ career on the Microsoft technology

More information

A Survey on Cloud Security Issues and Techniques

A Survey on Cloud Security Issues and Techniques A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com

More information

Investigation of Cloud Computing: Applications and Challenges

Investigation of Cloud Computing: Applications and Challenges Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,

More information

A Survey on Security Issues in Service Delivery Models of Cloud Computing

A Survey on Security Issues in Service Delivery Models of Cloud Computing A Survey on Security Issues in Service Delivery Models of Cloud Computing { S. Subashini and V. Kavitha (2011) Presented by: Anthony Postiglione Outline Introduction What is Cloud Computing Pros/Cons of

More information

White Paper. Cloud Vademecum

White Paper. Cloud Vademecum White Paper Cloud Vademecum Cloud is the new IT paradigm this document offers a collection of thoughts, internal and external discussions and information. The goal is to inspire and stimulate the route

More information

Enterprise Application Enablement for the Internet of Things

Enterprise Application Enablement for the Internet of Things Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices

More information

Lecture 02a Cloud Computing I

Lecture 02a Cloud Computing I Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Computing Power at your Service: IaaS from the Private Cloud Dynamic Services for Infrastructure

Computing Power at your Service: IaaS from the Private Cloud Dynamic Services for Infrastructure Computing Power at your Service: IaaS from the Private Cloud Dynamic Services for Infrastructure November 2011 18.11.2010 1 CIO s challenges 2010. Challenges of many CIOs in 2010: IT budgets approx. 20%

More information

Microsoft SharePoint Architectural Models

Microsoft SharePoint Architectural Models Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint

More information