Enforcing End-to-end Application Security in the Cloud
|
|
|
- Randell Farmer
- 10 years ago
- Views:
Transcription
1 Enforcing End-to-end Application Security in the Cloud Jean Bacon, David Evans, David M. Eyers, Matteo Migliavacca, Peter Pietzuch, and Brian Shand University of Cambridge, UK Imperial College London, UK CBCU/ECRIC, National Health Serivice, UK {migliava, Middleware 2010
2 Motivation Cloud computing is all the rage Steve Ballmer s talk of Hockey stick cloud growth Rackspace doubled cloud customers over 2009: 50,000 increase Success stories: elasticity for on-line retail and services However security concerns in the cloud will be challenging T-Mobile Sidekick, GMail outages, (older) Amazon S3 failures,... Availability and persistence issues. Responsibility for data recovery? Splitting responsibility: Legal due diligence? Make application needs less abstract... 2
3 BI: Application-Level Virtualisation Server virtualisation: Isolatable, portable VMs ALV: Isolatable, portable, distributed application instances Not just OS-level process or user-level isolation Match the overall security needs of applications Cloud clients: explicit about application security needs Providers: provide basis for building secure applications End-to-end security as opposed to boundary protection Data-linked guarantees on confidentiality, integrity and availability 3
4 Evolution from boundary security... Users App 1 Web Server Business Logic Business Logic DB Filestore Filestore Users App 2 Web Server DB 4
5 ... into end-to-end security Users App 1 Business Business Business Logic Logic Logic Web Web Server Web Server Server Users App 2 DB DB DB Filestore Filestore Filestore 5
6 Talk outline Enabling technologies Clouds, IFC, Asynchronous messaging, RBAC & distributed policy Application-level virtualisation Case studies Pairs trading Healthcare scenarios Outstanding research issues Conclusion 6
7 Different cloud provider types IaaS: clients rent and manage VMs EC2 (Amazon), Rackspace, and Nimbus PaaS: develop over restricted PL or services Google s App Engine and Microsoft s Azure SaaS: Cloud hosts given application Highest level of abstraction: clients just configure Salesforce Application specific software Middleware, Server software (DBs, Web servers) Operating System IaaS PaaS SaaS Goal: secure IaaS expressiveness with SaaS convenience 7
8 Information Flow Control (IFC) Event name data type bid body... trader_id trader-77 integrity tags {i-trader-77} {i-trader-77} {i-trader-77} confidentiality tags {dark-pool} {dark-pool,s-trader-77} event parts security label Strong guarantees over: data confidentiality and integrity Labels tag data and processes: facilitates flow constraints Data can only flow to processes with compatible labels Data can only be released that is compatible with label of process Privileges for declassification and endorsement are needed DIFC: decentralised, dynamic control of label definitions 8
9 Asynchronous messaging with IFC Non-trivial cloud apps are large-scale distributed systems Decoupling is often employed for robustness Even for cloud services that are stateless message passing is useful Robustness during failures and reconfiguration Treat all communicated messages as multi-part structures Independent IFC labelling of parts Data-oriented access control: amenable to middleware protection Parallel processing: each part has its own data and security label. 9
10 Role-based Access Control (RBAC) Effective technology for large scale privilege management Decouple users from privileges by using roles See ANSI standards Parameterised RBAC: needs inference engine Applications with multiple administrative domains: need Service Level Agreements (SLAs) Distributed RBAC with DIFC Dependent roles Principal Session Roles Privileges 10
11 Application-level virtualisation Much cloud security is at boundary of infrastructure ALV: end-to-end, data-linked security using DIFC Application specifies explicit data containment policy Useful authority requires coverage of net, IPC, & disk data paths Secrecy, privacy, integrity, availability... Encode legal-level concerns: responsibilities for data management Middleware abstractions should make code more portable Across and between different cloud providers 11
12 Application-level virtualisation Cloud provider must explicitly specify interactions with the Trusted Computing Base (TCB) e.g. IFC and middleware-managed containers Extend to persistence mechanisms Provider can monitor, audit, enforce, check compliance Cloud provider can reuse security mechanisms to isolate different clients applications 12
13 Case study: pairs trading Pairs trading is a simple algorithm for stock trading Assume that stocks in a related market will move in a related way Look for divergence and bet on divergence soon reducing Modern exchanges are electronic, event-based systems: Orders are quick transactions, pub/sub for dissemination of stocks Competition in the market makes it very latency sensitive Co-host trading algorithms on server co-located with exchange Large brokers can offer dark pools : avoids exchange 13
14 Case study: pairs trading Used IFC to support safely co-located pairs trading Protection of market data integrity Strict control of interactions between clients investment strategies Ensure confidentiality of orders in dark pool trading Bulk-move equities without revealing trader s identity Allow auditing by regulatory authorities on completed transactions Treating stock-exchange hosting as a cloud (in effect) Application-level virtualisation protects traders strategies while efficiently utilising infrastructure 14
15 DEFCon pairs trading event model owns s Stock Exchange owns t 1 secrecy: t 1 owns t 2 KEY: Unit that can declassify all of its state Unit that cannot declassify any of its state Unit that has some state that it cannot declassify Event secrecy: t 2 15
16 DEFCon pairs trading event model owns s Stock Exchange owns t 1 secrecy: t 1 1 KEY: Unit that can declassify all of its state Unit that cannot declassify any of its state Unit that has some state that it cannot declassify Event secrecy: t 2 owns t 2 16
17 DEFCon pairs trading event model owns s Stock Exchange owns t 1 secrecy: t 1 1 KEY: Unit that can declassify all of its state Unit that cannot declassify any of its state Unit that has some state that it cannot declassify Event Tick MSFT 1230$ 12:22:13 2 secrecy: t 2 owns t 2 17
18 DEFCon pairs trading event model Stock Exchange owns s Match buy: GOOG sell: MSFT mean: owns t 1 secrecy: t 1 1 KEY: Unit that can declassify all of its state Unit that cannot declassify any of its state Unit that has some state that it cannot declassify Event Tick MSFT 1230$ 12:22:13 2 secrecy: t 2 Match buy: MSFT sell: GOOG mean: 1.92 owns t 2 18
19 DEFCon pairs trading event model Stock Exchange owns s secrecy: t 1 Match buy: GOOG sell: MSFT mean: owns t Bid sell: MSFT name: KEY: Tick MSFT 1230$ 12:22:13 Unit that can declassify all of its state Unit that cannot declassify any of its state 2 secrecy: t 2 Match buy: MSFT sell: GOOG mean: 1.92 owns t 2 Ask buy: MSFT name: Unit that has some state that it cannot declassify Event 19
20 DEFCon pairs trading event model Stock Exchange owns s secrecy: t 1 Match buy: GOOG sell: MSFT mean: owns t Bid sell: MSFT name: owns b 5 Broker KEY: Tick MSFT 1230$ 12:22:13 Unit that can declassify all of its state Unit that cannot declassify any of its state 2 secrecy: t 2 Match buy: MSFT sell: GOOG mean: 1.92 owns t 2 Ask buy: MSFT name: Unit that has some state that it cannot declassify Event 20
21 DEFCon pairs trading event model Stock Exchange KEY: owns s Tick MSFT 1230$ 12:22:13 Unit that can declassify all of its state Unit that cannot declassify any of its state 2 secrecy: t 1 secrecy: t 2 Match buy: GOOG sell: MSFT mean: Match buy: MSFT sell: GOOG mean: 1.92 owns t 1 1 owns t Bid sell: MSFT name: Trade symbol: MSFT buyer: seller: Ask buy: MSFT name: owns b 5 Broker Unit that has some state that it cannot declassify Event 21
22 DEFCon pairs trading event model Stock Exchange KEY: owns s Tick MSFT 1230$ 12:22:13 Unit that can declassify all of its state Unit that cannot declassify any of its state 2 secrecy: t 1 secrecy: t 2 Match buy: GOOG sell: MSFT mean: Match buy: MSFT sell: GOOG mean: 1.92 owns t 1 1 owns t Bid sell: MSFT name: Trade symbol: MSFT buyer: seller: Ask buy: MSFT name: owns b 5 Broker owns r,s 7 Delegation user: Unit that has some state that it cannot declassify Event Regulator 22
23 DEFCon pairs trading event model Stock Exchange KEY: owns s Unit that can declassify all of its state Unit that cannot declassify any of its state Unit that has some state that it cannot declassify Event Tick MSFT 1230$ 12:22:13 2 secrecy: t 1 secrecy: t 2 Match buy: GOOG sell: MSFT mean: Match buy: MSFT sell: GOOG mean: 1.92 owns t 1 1 owns t Warning msg: Trading volume exceeded quota Bid sell: MSFT name: Trade symbol: MSFT buyer: seller: Ask buy: MSFT name: 8 owns b 5 Broker owns r,s Regulator 7 Delegation user: 23
24 DEFCon pairs trading event model Stock Exchange KEY: owns s Unit that can declassify all of its state Unit that cannot declassify any of its state Unit that has some state that it cannot declassify Event Tick MSFT 1230$ 12:22:13 Tick MSFT 1234$ 12:32:13 2 secrecy: t 1 secrecy: t 2 Match buy: GOOG sell: MSFT mean: Match buy: MSFT sell: GOOG mean: 1.92 owns t 1 1 owns t Warning msg: Trading volume exceeded quota Bid sell: MSFT name: Trade symbol: MSFT buyer: seller: Ask buy: MSFT name: 8 owns b 5 Broker owns r,s Regulator 7 Delegation user: 9 24
25 Case study: UK NHS and ECRIC At a high level: UK NHS involves many collaborating but separate organisations Some organisations do similar work aggregate! The organisations software needs to handle access control: ALV E.g. ECRIC is a cancer registry has legal privilege to collect patients records without consent Multi-Disciplinary Teams work in hospitals Work with cancer patients ECRIC currently not connected with them on-line 25
26 Case study: UK NHS and ECRIC Two separate potential clouds: ECRIC and the hospitals IFC Jail DB Labeler Patterns Patterns Patterns Web server MDT users Event Detection Framework Presentation application Modules Patterns Patterns DB DB ECRIC network ECRIC DMZ N3 NHS network 26
27 Case study: UK NHS and ECRIC Explore programmer-friendly layers over DEFCon Compile higher-level policy representations into IFC constraints e.g. DPL language for expressing constraints over information flows Couple RBAC policy with event types and thence DIFC treating-doctor(referring-hospital-id, referring-doctor-id, patient-id), consultant-doctor(hospital-id, doctor-id), consultant-referral(referring-doctor-id, doctor-id, patient-id) treating-doctor(hospital-id, doctor-id, patient-id) treating-doctor(hospital-id, doctor-id, patient-id) priv-clinical(patient-id) clinical-researcher(study-id, researcher-id, patient-id) priv-clinical(patient-id) 27
28 Open research challenges Cloud security mechanisms different trusted code bases and their applicability performance: can policy establishment avoid the critical path? what s the impact of enforcement in general? Policy specification in the cloud programmer friendly make it easy for programmer and for inter-domain agreement RBAC relevance? protecting policy itself: e.g. sensitive tags in labels policy review and formal verification? 28
29 Conclusion Security in the cloud must be designed in from the start need strong isolation of data, even during outsourced processing isolate users of shared services as well as services Integrate strong end-to-end security mechanisms Decentralised Information Flow Control event-based communication for robust service interconnection role-based policy specification including on processing and storage explicit trusted computing base Our research to date demonstrates feasibility of subparts 29
How To Make A Complex System Secure In The Cloud
Big Ideas Paper: Enforcing End-to-end Application Security in the Cloud Jean Bacon 1, David Evans 1, David M. Eyers 1, Matteo Migliavacca 2, Peter Pietzuch 2, and Brian Shand 3 1 University of Cambridge
Cloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
Using Cloud Computing to Drive Innovation: Technological Opportunities and
Using Cloud Computing to Drive Innovation: Technological Opportunities and Management Challenges Edgar A. Whitley Based on work with Leslie P Willcocks and Will Venters MSc Management, Information Systems
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
Integration Architecture & (Hybrid) Cloud Scenarios on the Microsoft Business Platform. Gijs in t Veld CTO BizTalk Server MVP BTUG NL, June 7 th 2012
Integration Architecture & (Hybrid) Cloud Scenarios on the Microsoft Business Platform Gijs in t Veld CTO BizTalk Server MVP BTUG NL, June 7 th 2012 Agenda Integration architecture; what & why? On-premise
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)
Security & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
Cloud Computing. Technologies and Types
Cloud Computing Cloud Computing Technologies and Types Dell Zhang Birkbeck, University of London 2015/16 The Technological Underpinnings of Cloud Computing Data centres Virtualisation RESTful APIs Cloud
Hybrid Cloud Computing
Dr. Marcel Schlatter, IBM Distinguished Engineer, Delivery Technology & Engineering, GTS 10 November 2010 Hybrid Computing Why is it becoming popular, Patterns, Trends, Impact Hybrid Definition and Scope
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
CLOUDFORMS Open Hybrid Cloud
Open Hybrid Cloud Cloud Evolution statt Cloud Revolution Lutz Lange, RHCA, Solution Architect, Red Hat Frank Rosendahl, RHCA, Solution Architect, DASEQ GmbH Cloud Operations Management Delivers an Open
A Naïve Approach for Managing Virtualized Resources and Optimistic cost
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 3 (2012), pp. 167-171 International Research Publications House http://www. ripublication.com A Naïve Approach
IT Environments Management
IT Environments Management IT Environments Management is probably one of the most misunderstood concepts in terms of the part it plays within the IT Organisation as a whole, especially its contribution
Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013
Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud
Software-Defined Networks Powered by VellOS
WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible
Cloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
Data Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
Cloud-based Services: To Move or Not To Move. Seminar Internet Economics Cristian Anastasiu & Taya Goubran
Cloud-based Services: To Move or Not To Move Seminar Internet Economics Cristian Anastasiu & Taya Goubran Agenda Motivation What is Cloud Computing Cloud Service Market Dimensions and Factors of the Cloud
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Learning from the Cloud providers to use the CMDB to drive cost savings through automation
Smart Infrastructure Solutions London New York Singapore www.citihub.com etrading & Market Data Agile infrastructure Telecoms Data Centre Grid Learning from the Cloud providers to use the CMDB to drive
Platform Leadership in Software as a Service: How Platforms Facilitate Innovation
Platform Leadership in Software as a Service: How Platforms Facilitate Innovation Bartłomiej Kołakowski Judge Business School University of Cambridge Based on an MPhil dissertation for Technology Policy
Certified Cloud Computing Professional VS-1067
Certified Cloud Computing Professional VS-1067 Certified Cloud Computing Professional Certification Code VS-1067 Vskills Cloud Computing Professional assesses the candidate for a company s cloud computing
Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University
Cloud computing: the state of the art and challenges Jānis Kampars Riga Technical University Presentation structure Enabling technologies Cloud computing defined Dealing with load in cloud computing Service
Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
Cloud Computing An Introduction
Cloud Computing An Introduction Distributed Systems Sistemi Distribuiti Andrea Omicini [email protected] Dipartimento di Informatica Scienza e Ingegneria (DISI) Alma Mater Studiorum Università di
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Cloud & Security. Dr Debabrata Nayak [email protected]
Cloud & Security Dr Debabrata Nayak [email protected] AGENDA General description of cloud Cloud Framework Top issues in cloud Cloud Security trend Cloud Security Infrastructure Cloud Security Advantages
Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices
Emerging Approaches in a -Connected Enterprise: Containers and Microservices Anil Karmel Co-Founder and CEO, C2 Labs Co-Chair, NIST Security Working Group [email protected] @anilkarmel Emerging Technologies
How To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management
The Cloud at Crawford Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Wikipedia defines cloud computing as Internet-based computing, whereby shared
Healthcare Enterprise View of Cloud What is Cloud Additional Needs Cloud Models Cloud Economics 101 Stack Decision Framework
Cloud 101 General Overview of Cloud Services January 21, 2015 Agenda Healthcare Enterprise View of Cloud What is Cloud Additional Needs Cloud Models Cloud Economics 101 Stack Decision Framework 2. 2014
Design of Cloud Services for Cloud Based IT Education
www.jitae.org Journal of Information Technology and Application in Education Vol. 3 Iss. 3, September 2014 doi: 10.14355/jitae.2014.0303.03 Design of Cloud Services for Cloud Based IT Education Li Chao
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
IAAS CLOUD EXCHANGE WHITEPAPER
IAAS CLOUD EXCHANGE WHITEPAPER Whitepaper, July 2013 TABLE OF CONTENTS Abstract... 2 Introduction... 2 Challenges... 2 Decoupled architecture... 3 Support for different consumer business models... 3 Support
Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
Cloud computing - Architecting in the cloud
Cloud computing - Architecting in the cloud [email protected] 1 Outline Cloud computing What is? Levels of cloud computing: IaaS, PaaS, SaaS Moving to the cloud? Architecting in the cloud Best practices
IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11
Cloud Computing (IV) s and SPD Course 19-20/05/2011 Massimo Coppola IaaS! Objectives and Challenges! & management in s Adapted from two presentations! by Massimo Coppola (CNR) and Lorenzo Blasi (HP) Italy)!
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
Service Oriented Cloud Computing Architectures. Asher Vitek 12/3/2011 UMM CSci Senior Seminar Conference Morris, MN.
Service Oriented Cloud Computing Architectures Asher Vitek 12/3/2011 UMM CSci Senior Seminar Conference Morris, MN. Overview Cloud Computing What is cloud computing Types of cloud computing Service Oriented
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
Licensing Guide for Partners. Leveraging Data Center Providers and Software Services Resellers
Licensing Guide for Partners Leveraging Data Center Providers and Software Services Resellers LEVERAGING DATA CENTER PROVIDERS AND SOFTWARE SERVICES RESELLERS: LICENSING GUIDE Table of Contents Introduction...
6 Cloud strategy formation. 6.1 Towards cloud solutions
6 Cloud strategy formation 6.1 Towards cloud solutions Based on the comprehensive set of information, collected and analysed during the strategic analysis process, the next step in cloud strategy formation
SOA and Cloud in practice - An Example Case Study
SOA and Cloud in practice - An Example Case Study 2 nd RECOCAPE Event "Emerging Software Technologies: Trends & Challenges Nov. 14 th 2012 ITIDA, Smart Village, Giza, Egypt Agenda What is SOA? What is
Cluster, Grid, Cloud Concepts
Cluster, Grid, Cloud Concepts Kalaiselvan.K Contents Section 1: Cluster Section 2: Grid Section 3: Cloud Cluster An Overview Need for a Cluster Cluster categorizations A computer cluster is a group of
NATO s Journey to the Cloud Vision and Progress
NATO s Journey to the Cloud Vision and Progress Dr Peter J. Lenk 2 Definitions of the Cloud A large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted,
Cloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
Cloud Computing. Lecture 24 Cloud Platform Comparison 2014-2015
Cloud Computing Lecture 24 Cloud Platform Comparison 2014-2015 1 Up until now Introduction, Definition of Cloud Computing Pre-Cloud Large Scale Computing: Grid Computing Content Distribution Networks Cycle-Sharing
Cloud Computing. Cloud computing:
Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
CLOUD COMPUTING. When It's smarter to rent than to buy
CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit
Securing The Cloud With Confidence. Opinion Piece
Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
How To Compare Cloud Computing To Cloud Platforms And Cloud Computing
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms
Cloud Computing in the Enterprise: A Question of Control.. And who has it. INF5210 Ben Eaton 12/11/2013
Cloud Computing in the Enterprise: A Question of Control.. And who has it. INF5210 Ben Eaton 12/11/2013 1 The Cloud We all use it as consumers But I m going to talk about cloud computing in an enterprise
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
CSE543 Computer and Network Security Module: Cloud Computing
CSE543 Computer and Network Security Module: Computing Professor Trent Jaeger 1 Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory 2 Computing Is Here Systems and Internet
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
How To Understand Cloud Computing
CLOUD COMPUTING Jillian Raw Partner, Kennedys http://www.kennedys-law.com/jraw/ Cloud Computing- what they say about it the cloud will transform the information technology industry profoundly change the
Cloud Computing An Elephant In The Dark
Cloud Computing An Elephant In The Dark Amir H. Payberah [email protected] Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir
Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected]
Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected] At-a-Glance Trends Do MORE with LESS Increased Insider Threat Increasing IT spend on cloud
Cloud Computing @ SingularLogic:
Cloud Computing @ SingularLogic: Government cloud services: definitions and best practices Synergies with the private sector Are Greek IT companies able to provide Cloud Services? SingularLogic s Cloud
Cloud Computing. Adam Barker
Cloud Computing Adam Barker 1 Overview Introduction to Cloud computing Enabling technologies Different types of cloud: IaaS, PaaS and SaaS Cloud terminology Interacting with a cloud: management consoles
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012
Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Why the interest in Clouds? A method to avoid/defer CAPEX/OPEX and possibly accelerating implementation 2 It all started here - Timeshare Computers and
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
A Gentle Introduction to Cloud Computing
A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years
Oracle Applications and Cloud Computing - Future Direction
Oracle Applications and Cloud Computing - Future Direction February 26, 2010 03:00 PM 03:40 PM Presented By Subash Krishnaswamy [email protected] Vijay Tirumalai [email protected]
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213 Application Compatibility Many organizations have business critical or internally
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National
Cisco Nexus Data Broker: Deployment Use Cases with Cisco Nexus 3000 Series Switches
White Paper Cisco Nexus Data Broker: Deployment Use Cases with Cisco Nexus 3000 Series Switches What You Will Learn Network Traffic monitoring using taps and Switched Port Analyzer (SPAN) is not a new
Deploying a Geospatial Cloud
Deploying a Geospatial Cloud Traditional Public Sector Computing Environment Traditional Computing Infrastructure Silos of dedicated hardware and software Single application per silo Expensive to size
