Cloud computing in a nutshell
|
|
|
- Mitchell Boone
- 10 years ago
- Views:
Transcription
1 Segurança na Nuvem da Confidencialidade à isponibilidade dos ados Miguel Correia Trabalho conjunto com Alysson Bessani, Francisco Rocha, P. Sousa, B. Quaresma, F. André, S. Abreu Jornadas Técnicas de Computação em Nuvem ESTG IPL Leiria, Março 2012 Cloud computing in a nutshell Computing as a utility Public cloud cloud service provider (CSP) different from the cloud user (typ. a company) Pay per use / pay as you go Resource pooling / multi tenancy Elasticity Large scale datacenters 2 Microsoft s Chicago datacenter 1
2 Cloud computing service models What is the service provided by the cloud? Infrastructure as a Service (IaaS): virtual machines, storage (e.g., Amazon EC2, Amazon S3) Platform as a Service (PaaS): programming and execution (e.g., Google AppEngine, Force.com, Windows Azure) Software as a Service (SaaS): mostly web applications (e.g., Yahoo! Mail, Google ocs, Facebook, ) 3 Security of what from whom? Victim is not the user or cloud; cloud is attack tool User (bad) uses the cloud d( (good) d)to attack others SPAM, os, hosting malicious data, botnet C&C Victim is the cloud User or someone else (bad) attack the cloud (good) Victim is the user Cloud insider or another user (bad) attacks the user (good) 4 2
3 Security in the cloud (from the cloud user viewpoint) Security is a key aspect of cloud computing Factor that favors and prevents adoption That s how it should be! Challenges The system is no longer in the user premises The infrastructure is shared with other users The access is made through hthe internet The three classical security attributes can be jeopardized: confidentiality, integrity, availability 5 Outline Security and dependability threats in the cloud Stealing data in the cloud Approach 1: improve the IaaS cloud infrastructure Approach 2: build a storage cloud of clouds of clouds Conclusions 6 3
4 SECURITY AN EPENABILITY THREATS IN THE CLOU 7 Unavailability Problems in the Internet are relatively frequent Congestion, problems with routers / switches / links, Routing problems (Cisco bug + RIPE NCC test Aug. 10) Problems at the cloud (e.g., Amazon EC2 outage May 11) 8 4
5 Loss and corruption of data Can happen in the cloud as anywhere else Ma.gnolia lost all users data, half TB (Feb. 09) anger Inc. / Sideckick lost contacts, notes, photos, etc. of its clients; took days to recover (Oct. 09) 9 Attacks through management interface Cloud users have access to management interfaces Operations: control/monitor virtual it machines, users, Interfaces: web console, web services, REST Personification attacks through the interface The usual culprits: CSRF, SQL injection, XSS, XML Signature Wrapping (recently found possible in EC2 and Eucalyptus) Phishing / socialengineering attacks to obtain authentication credentials 10 5
6 Attacks between VMs In IaaS, VMs of several users usually share the same physical machine co residence Attack in two steps Attacker instantiates several VMs until co residence with the victim is achieved The attacker s VM attacks the victim, e.g., using a vulnerability in the hypervisor or using shared resources to obtain confidential information 11 Malicious insider and confidentiality The data is in the cloud and the malicious insider is a real problem CyberLynk (March 09) and Google (early 10) events 12 6
7 STEALING ATA IN THE CLOU 13 Infrastructure as a Service (VM) Service provided is the execution of Virtual Machines (VMs) full software stack, including OS Servers run an Hypervisor (or VMM) that supports the execution of several VMs 14 7
8 Experimental environment We played the role of a malicious insider with access to the management VM The cloud was just a single machine Hypervisor was Xen Management VM was Xen om 0 with Linux 1 user VM (victim) with Linux and an Apache server Malicious insider had login in om 0? 15 Attack 1: steal passwords in memory Trivial: take mem snapshot, look for passwords $ xm dump-core 2 -L lucidomu.dump d umping core of domain: 2... $ cat lucidomu.dump strings grep loginpwd loginpwd loginpwd $ cat lucidomu.dump strings grep apachersapwd apachersapwd apachersapwd apachersapwd 16 8
9 Attack 2: steal private keys in memory Trivial: they re in a standard format in memory $ xm dump-core 2 -L lucidomu.dump d umping core of domain: 2... $ rsakeyfind lucidomu.dump found private key at 1b061de8 version = 00 modulus = 00 d0 66 f8 9d e2 be 4a 2b 6d be 9f de 46 db 5a... publicexponent = privateexponent =... prime1 =... prime2 = Attack 3: steal files in file system Trivial: essentially mounting a drive (with LVM) $ lvcreate -L 2G -s -n lv_st /dev/main_vol/domuvol/domu Snapshot victim s VM drive Logical volume lv_st created $ kpartx -av /dev/main_vol/lv_st Add partition map to the new vol.... $ vgscan Search for LVM volumes Found volume group LucidomU $ vgchange -ay LucidomU Activate the snapshot volume $ mount /dev/lucidomu/root /mnt/ 18 9
10 Current solutions? From Cloud Computing Roundtable (Nov/ec 2010) 5 directors/senior staff from: Google, Microsoft, Cisco, Amazon, Cloud Security Alliance We have very strict procedures in place for when our employees are allowed to [physically] access the machines the customer data resides on. Excellent, but the attacks we saw can be done remotely We keep track of every action that they take on those machines, and we log all that information for later audits Excellent, but detecting in later audits is usually too late there re some things that will never go into [our cloud], for example, our SAP back end 19 Cryptography? Obvious solution: simply encrypt the data But what is data in IaaS? User files, web pages, databases, program variables, etc. Is it possible to modify applications to handle encrypted data? An application server (Tomcat, JBoss, )? Where do we store the encryption keys safely? Some applications manipulate data Arithmetic w/encrypted data: fully homomorphic encrypt. Slow, doesn t work if data encrypted with different keys, application server has also to be modified 20 10
11 APPROACH 1: IMPROVE THE IAAS CLOU INFRASTRUCTURE 21 Key idea To prove to the cloud user that its data is in a server with a good software configuration (e.g., in which the management VM has no snapshot function) o this using the Trusted Platform Module (TPM), a security chip designed by the Trusted Computing Group, now shipping with common PC hardware 22 11
12 TPM basic functions Two basic functions: Storage of cryptographic keys e.g. to protect RSA private keys from theft or disclosure System software integrity measurement to check what is the software configuration 23 Measurements TPM has Platform Configuration Registers (PCR) A PCR stores (typically) a measurement of a software block, i.e., its cryptographic hash uring system boot, BIOS stores hash(boot loader) in PCR 0, boot loader stores hash(hypervisor) in PCR 1, A vector of PCR values gives a trusted measurement of the software configuration 24 12
13 Remote attestation Computer gives to a challenger a measurement of the software configuration, i.e., a vector of PCRvalues Challenger has the Endorsement Key Certificate, signed by the TPM vendor (means it s a real TPM) 2 Request TPM vector of PCRs signed with EK Computer being attested (with TPM) 1 Request attestation 3 PCR vector (signed with EK) Challenger 4 Verify signature and if PCR values match a trusted configuration 25 Approach overview Servers run a Trusted Virtualization Environment (TVE), formed by hypervisor + management VM that the user trusts TVE does not provide dangerous operations to administrators: snapshot, volume mount TVE provides only trusted versions of certain operations: launch, migrate, backup, terminate VMs VMs enter and leave a TVE encrypted Users do remote attestation of TVEs/operations to be sure that their VMs are either in a TVE or encrypted 26 13
14 Trusted Virtualization Environment The virtualization environment is measured: at boot time, hashes ofthe software components that are stored in PCRs The environment is a TVE if its measurements (PCR values) fall in a set of TVE configurations 27 Open problems Gap between checking a measurement (just a hash) and trusting a complex software module How can we know that there aren t vulnerabilities, undesirable functionality or malware inside? Putting this solution in production is far from simple Short time to market and too many players: cloud provider, software producers, assurance labs, cloud user 28 14
15 APPROACH 2: BUIL A STORAGE CLOU OF CLOUS 29 Securing the cloud 1 st approach: improve the cloud infrastructure with trusted computing 2 nd approach: build a (virtual) cloud of clouds based on a few clouds First can be implemented by providers, second by users User 30 15
16 Cloud of clouds benefits Can tolerate data corruption ue to malicious i insiders, id other attacks, accidental faults (e.g., due to bugs) Can tolerate datacenter and cloud outages No vendor lock in Faster read access Confidentiality User 31 Cloud of clouds / epsky system No longer IaaS cloud computing, (only) storage Cloud of clouds l d provides the same service as single cloud: read data, write data, etc. Amazon S3 Nirvanix Rackspace Windows Azure 32 16
17 epsky design principles 1. No trust on individual cloud providers istributed trust is obtained by using several clouds 2. Use storage clouds as they are No server side code in the replication protocols 3. ata is updatable Byzantine quorum replication protocols for consistency 33 Write protocol time WRITE ATA ACK WRITE METAATA ACK Cloud A Cloud B Cloud C Cloud Assume a version of the file is already stored 34 17
18 Read protocol highest version number time REA METAATA METAATA REA ATA ATA Cloud A Cloud B Cloud C Cloud ata is fetched from other clouds if needed 35 Limitations of the solution so far ata Limitations: 1. ata is accessible by cloud providers 2. Requires n ata storage space Cloud A Cloud B Cloud C Cloud ata ata ata ata 36 18
19 Only for data, not metadata Combining erasure codes and secret sharing ata encrypt K key disperse share F 1 F 2 F 3 F 4 S 1 S 2 S 3 S 4 Cloud A Cloud B Cloud C Cloud F 1 S 1 F 2 S 2 F 3 S 3 F 4 S 4 Inverse process for reading Encrypted so data can t be read at a cloud! from f+1 shares/fragments Only twice the size of storage, not 4 times! 37 Performance evaluation setup Prototype: 3K LOCs (Java), REST/HTTPS Experimental setup 2 epsky versions: A (availability), CA (av. + confidentiality) 4 commercial storage clouds: S3 (Amazon S3), WA (Windows Azure), NX (Nirvanix SN) and RS (Rackspace) Clients in 8 PlanetLab sites around the world Three clients on each site, reading/writing data units of three sizes (100KB, 1MB and 10MB) reads/writes late
20 epsky storage costs ($) epsky A (plain replication) epsky CA (erasure codes) epsky CA storage cost (1M U) 2 (average cloud cost) 39 epsky latency (100KB U) epsky read latency is close to the cloud with the best latency epsky write latency is close to the cloud with the worst latency 40 20
21 epsky perceived availability Apparently, some clouds don t provide the promised 5 or 6 9 s of availability Internet availability plays an important role 41 CONCLUSIONS 42 21
22 Conclusions (1) Cloud security is clearly a problem for organizations that want to use it for critical systems/data The malicious insider is an especially hard problem Two approaches, but not exactly for the same problem 43 Conclusions (2) Approach 1 improve the cloud infrastructure with trusted computing Cloud providers may implement something of the kind soon (TCG, Intel, IBM are pushing) Approach 2 build a storage cloud of clouds based on a few clouds A user side solution, so easier to deploy More expensive than single cloud, but not excessively 44 22
23 More information Google miguel correia inesc id The Final Frontier: Confidentiality and Privacy in the Cloud F. Rocha, S. Abreu, M. Correia, IEEE Computer, September 2011 EPSKY: ependable and Secure Storage in a Cloud of Clouds A. N. Bessani, M. Correia, B. Quaresma, F. André, P. Sousa, Proceedings of EuroSys 2011 Lucy in the Sky without iamonds: Stealing Confidential ata in the Cloud F. Rocha, M. Correia, Proceedings of the 1st CV Workshop, April
Software Execution Protection in the Cloud
Software Execution Protection in the Cloud Miguel Correia 1st European Workshop on Dependable Cloud Computing Sibiu, Romania, May 8 th 2012 Motivation clouds fail 2 1 Motivation accidental arbitrary faults
DepSky Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa
epsky ependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa University of Lisbon, Faculty of Sciences 1 Moving to Clouds ata is
Clouds-of-Clouds: Segurança e Confiança no
Clous-of-Clous: Segurança e Confiança no Funcionamento nas Nuvens Miguel P. Correia Trabalho conjunto com A. Bessani, F. Rocha, B. Quaresma, F. Anré, P. Sousa (Universiae e Lisboa, Fac. Ciências) UNICAMP,
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking B.Sujana 1, P.Tejaswini 2, G.Srinivasulu 3, Sk.Karimulla 4 1,2,3,4 QUBA COLLEGE OF ENGINEERING & TECH, NELLORE Abstract:
Outline. Clouds of Clouds lessons learned from n years of research Miguel Correia
Dependability and Security with Clouds of Clouds lessons learned from n years of research Miguel Correia WORKSHOP ON DEPENDABILITY AND INTEROPERABILITY IN HETEROGENEOUS CLOUDS (DIHC13) August 27 th 2013,
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos
Research Challenges Overview May 3, 2010 Table of Contents I 1 What Is It? Related Technologies Grid Computing Virtualization Utility Computing Autonomic Computing Is It New? Definition 2 Business Business
MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2
IJCITP Volume.8* Number 2* December 2013, pp. 53-58 Serials Publications MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING K.Sireesha 1 and S. Suresh 2 1 M.Tech. Student,
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
Introduction to Cloud Computing
Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
CSE543 Computer and Network Security Module: Cloud Computing
CSE543 Computer and Network Security Module: Computing Professor Trent Jaeger 1 Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory 2 Computing Is Here Systems and Internet
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
A survey on cost effective multi-cloud storage in cloud computing
A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral
Cloud Computing Trends
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Mobile Cloud Computing T-110.5121 Open Source IaaS
Mobile Cloud Computing T-110.5121 Open Source IaaS Tommi Mäkelä, Otaniemi Evolution Mainframe Centralized computation and storage, thin clients Dedicated hardware, software, experienced staff High capital
Control your corner of the cloud.
Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous
Index. BIOS rootkit, 119 Broad network access, 107
Index A Administrative components, 81, 83 Anti-malware, 125 ANY policy, 47 Asset tag, 114 Asymmetric encryption, 24 Attestation commercial market, 85 facts, 79 Intel TXT conceptual architecture, 85 models,
Private Cloud in Educational Institutions: An Implementation using UEC
Private Cloud in Educational Institutions: An Implementation using UEC D. Sudha Devi L.Yamuna Devi K.Thilagavathy,Ph.D P.Aruna N.Priya S. Vasantha,Ph.D ABSTRACT Cloud Computing, the emerging technology,
Iaas for Private and Public Cloud using Openstack
Iaas for Private and Public Cloud using Openstack J. Beschi Raja, Assistant Professor, Department of CSE, Kalasalingam Institute of Technology, TamilNadu, India, K.Vivek Rabinson, PG Student, Department
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Technical Brief Distributed Trusted Computing
Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,
Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012
Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Why the interest in Clouds? A method to avoid/defer CAPEX/OPEX and possibly accelerating implementation 2 It all started here - Timeshare Computers and
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
A Review on Cloud Computing Vulnerabilities
A Review on Cloud Computing Vulnerabilities Ms. Sugandha Nandedkar, Ms.Sangeeta Kakarwal Asst.Prof., Department of Computer Science and Engineering, DIEMS /Dr. BAMU, Aurangabad, MH, India. Prof. and HOD,
"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
Ø Teaching Evaluations. q Open March 3 through 16. Ø Final Exam. q Thursday, March 19, 4-7PM. Ø 2 flavors: q Public Cloud, available to public
Announcements TIM 50 Teaching Evaluations Open March 3 through 16 Final Exam Thursday, March 19, 4-7PM Lecture 19 20 March 12, 2015 Cloud Computing Cloud Computing: refers to both applications delivered
Cloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Mutual Authentication Cloud Computing Platform based on TPM
Mutual Authentication Cloud Computing Platform based on TPM Lei Peng 1, Yanli Xiao 2 1 College of Information Engineering, Taishan Medical University, Taian Shandong, China 2 Department of Graduate, Taishan
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Definitions. Hardware Full virtualization Para virtualization Hosted hypervisor Type I hypervisor. Native (bare metal) hypervisor Type II hypervisor
Virtualization Objectives Definitions Why Problems Versions Virtualization vs Cloud Creating a New Virtual Machine Working with a Virtual Machine Virtual Machine Settings Virtual Machine Snapshots Definitions
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
A Web Base Information System Using Cloud Computing
A Web Base Information System Using Cloud Computing Zainab Murtadha, Mohammad Amin Roshanasan Abstract: Cloud Computing is the new field that was invented and developed during a period not so long ago.
Deployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
A Gentle Introduction to Cloud Computing
A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years
CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST
CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
Cloud Computing and Attacks
Cloud Computing and Attacks Joseph Spring School of Computer Science 7COM1027 - Distributed Systems Security 1 Areas for Discussion Cloud Computing Attacks Firewalls 2 Cloud Computing A Cloud is a large
Last time. Today. IaaS Providers. Amazon Web Services, overview
Last time General overview, motivation, expected outcomes, other formalities, etc. Please register for course Online (if possible), or talk to Yvonne@CS Course evaluation forgotten Please assign one volunteer
Addressing Data Security Challenges in the Cloud
Addressing Data Security Challenges in the Cloud Coordinate Security. The Need for Cloud Computing Security A Trend Micro White Paper July 2010 I. INTRODUCTION Enterprises increasingly recognize cloud
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Property Based TPM Virtualization
Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix
Data Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) Introduction to Cloud Security. Taniya
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 6464(Print)
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
CA ARCserve Replication and High Availability Deployment Options for Hyper-V
Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS. Review Business and Technology Series www.cumulux.com
` CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS Review Business and Technology Series www.cumulux.com Table of Contents Cloud Computing Model...2 Impact on IT Management and
Virtualization & Cloud Computing (2W-VnCC)
Virtualization & Cloud Computing (2W-VnCC) DETAILS OF THE SYLLABUS: Basics of Networking Types of Networking Networking Tools Basics of IP Addressing Subnet Mask & Subnetting MAC Address Ports : Physical
2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
Module: Cloud Computing Security
Module: Cloud Computing Security Professor Trent Jaeger Penn State University 1 Cloud Computing Is Here Why not use it? Systems and Internet Infrastructure Security (SIIS) Laboratory 2 What s Happening
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
Part V Applications. What is cloud computing? SaaS has been around for awhile. Cloud Computing: General concepts
Part V Applications Cloud Computing: General concepts Copyright K.Goseva 2010 CS 736 Software Performance Engineering Slide 1 What is cloud computing? SaaS: Software as a Service Cloud: Datacenters hardware
International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014
An Overview on Cloud Computing Services And Related Threats Bipasha Mallick Assistant Professor, Haldia Institute Of Technology [email protected] Abstract. Cloud computing promises to increase the velocity
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
Amazon Web Services Demo Tech Exchange. Slides: http://goo.gl/mwz0es. [email protected]
Amazon Web Services Demo Tech Exchange Slides: http://goo.gl/mwz0es [email protected] $ dig +short emergency.iu.edu emergency.iu.edu.s3-website-us-east-1.amazonaws.com. s3-website-us-east-1.amazonaws.com. 54.231.14.220
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
FACING SECURITY CHALLENGES
24 July 2013 TimeTec Cloud Security FACING SECURITY CHALLENGES HEAD-ON - by Mr. Daryl Choo, Chief Information Officer, FingerTec HQ Cloud usage and trend Cloud Computing is getting more common nowadays
Introduction What is the cloud
Overview/Description: Discussion on the benefits of hosting the campus card system in the cloud. Topic will cover a general overview of what the cloud is; how the cloud hosted solution can benefit the
Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
AVLOR SERVER CLOUD RECOVERY
AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties
Survey on Security Attacks and Solutions in Cloud Infrastructure
Survey on Security Attacks and Solutions in Cloud Infrastructure Shilpa D 1, Nagashree C 2, Divya C 3, Spurthi G S 4 Assistant Professor, Department of Computer Science and Engineering, SVIT, Bangalore,
If you do NOT use applications based on Amazon Web Services raise your hand.
If you do NOT use applications based on Amazon Web Services raise your hand. If you use NetFlix, lower your hand. Use reddit, lower your hand. Use Scribd, lower your hand. Use Spotify, lower your hand.
