A Viewpoint on Cloud Computing Security Issues



Similar documents
Cloud Computing. What is Cloud Computing?

CHAPTER 8 CLOUD COMPUTING

Using WebSphere Application Server on Amazon EC2. Speaker(s): Ed McCabe, Arthur Meloy

Session 2. The economics of Cloud Computing

A Gentle Introduction to Cloud Computing

Cloud Computing An Elephant In The Dark

Expert Reference Series of White Papers. Cloud Computing: What It Is and What It Can Do for You

Expert Reference Series of White Papers. Cloud Computing: What It Is and What It Can Do for You

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

Kent State University s Cloud Strategy

Cloud Computing: Concepts and Technology

Introduction to Cloud Computing

The Private Cloud Your Controlled Access Infrastructure

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Cloud Collaboration: Strategies and Technologies. Bud Porter-Roth Porter-Roth Associates

Cloud Computing. Cloud computing:

Cloud Computing Overview

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Understanding Virtualization and Cloud in the Enterprise

2011 Morrison & Foerster LLP All Rights Reserved mofo.com. Risk, Governance and Negotiation in the Cloud: Capture Benefits and Reduce Risks

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era ( ) Workstation Era ( ) Xerox Star 1981!

INTRODUCTION THE CLOUD

Strategic approach to cloud computing deployment

Cloud Computing: Transforming IT

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

HYBRID CLOUD: A CATALYST TO DRIVING EFFICIENCIES AND MEETING THE DIGITAL ASPIRATIONS OF THE UK PUBLIC SECTOR

Cloud Computing. Bringing the Cloud into Focus

The Cloud. JL Cabrera LTEC 4550

Shaping Your IT. Cloud

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Hybrid Cloud Identity and Access Management Challenges

The Need for Service Catalog Design in Cloud Services Development

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Cloud Security Prof. Dr. Michael Waidner Fraunhofer SIT CASED. Fraunhofer SIT. Fraunhofer-Gesellschaft 2011

Cloud Courses Description

Cloud Computing & Service Oriented Architecture An Overview

Deploying a Geospatial Cloud

Outlook. Corporate Research and Technologies, Munich, Germany. 20 th May 2010

TECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing

Case Study. Highly Available, Fault Tolerant Cloud Solution & AWS Managed Support. Case Study. A Telehealthcare Company

Service-Oriented Cloud Automation. White Paper

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Cloud of clouds. Guiding the journey to the cloud. Matthew Allcoat

WHITE PAPER: Egenera Cloud Suite

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Journeys in the Clouds The Cloud Codex John Barr, Head of EU Research

Building Out Your Cloud-Ready Solutions. Clark D. Richey, Jr., Principal Technologist, DoD

Top 10 Cloud Risks That Will Keep You Awake at Night

Is Hyperconverged Cost-Competitive with the Cloud?

THE AGILE CONTACT CENTER: A New Approach to Customer Service

journey to a hybrid cloud

Keywords: Cloud computing, Characteristics of Cloud computing, Models of Cloud computing, Distance learning, Higher education.

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015

Cloud Computing Technology

BUSINESS MANAGEMENT SUPPORT

The Software-defined Data Center in the Enterprise

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

The Business Benefits of Cloud Computing

Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing

Cloud for Large Enterprise Where to Start. Terry Wise Director, Business Development Amazon Web Services

How To Compare The Two Cloud Computing Models

George Broadbent Director, Entium Technology Partners. Jamie Brown Director, Colt Telecom

Federal Aviation Administration. efast. Cloud Computing Services. 25 October Federal Aviation Administration

Unified Communications and the Cloud

Cloud Computing/ Semantic Web Initiatives & Tutorial

Part V Applications. What is cloud computing? SaaS has been around for awhile. Cloud Computing: General concepts

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l t e r r e m a r k. c o m

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Q&A: The Many Aspects of Private Cloud Computing

Elastic Private Clouds

COST VS. ROI Is There Value to Virtualization and Cloud Computing?

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Cloud P ROVIDER CHOOSE A HOW TO. A White Paper presented by

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

Transcription:

What I Have Learned About Cloud in the Last 6 Years Department of Computer Science May 2, 2013

About Me The College of New Jersey, BSc Columbia University, MSc, PhD (2007) Postdoc at Dartmouth College (NH, 2008) Research Prof at George Mason University (VA, 2008-2010) Assistant Professor, University of Calgary (2010-now) The Trustworthy Systems Group (TSG) is engaged in experimental computer science research that investigates cross-layer methods of creating efficient, trustworthy computer systems. We seek to understand why it seems difficult to build trustworthy systems and how we can get better at it.

Trustworthy Systems Group

Agenda Learning Objectives Takeaway Message: Five Things I Think I Know About Cloud My answer to what is cloud? Share some of my experiences and observations about cloud from the past six years in various projects (COMTOR, ISPIA Private Cloud, Using AWS in the Classroom). Understand some of the potential limitations of cloud, especially with respect to security and assurance If time, a brief overview of Amazon s AWS Console

Five Things I Think I Learned About Cloud (1) Cloud is not a single working environment, but rather the culmination and intersection of years of technology development promise (2) Customers have outrun the vendor hype cycle. (3) Few organizations offer customized cloud incident response. (4) A successful cloud requires people. (5) Cloud offers a low barrier to entry for deploying software.

A Beginning: 2007 USENIX ATC Talk By Verner Vogels The point here is how impressed I was with his anecdote: scalable computing led directly to scalable business.

What is Cloud? The answer depends on who you talk to: cloud vendor (IBM), cloud software vendor (VMWare), cloud provider (Google, Amazon), cloud customer (?).

IBM Definition It s a new MIS consumption and delivery model to drive business value.

NIST Definition (1) Resource Pooling servers, storage, network, applications and devices (2) Rapid Elasticity dynamic infrastructure (3) Ubiquitous Network Access anytime, place (4) Self-Service user enabled services catalog (5) Measured Service pay as you go model

What is Cloud? In terms of maturing technology... This is how I choose to understand cloud: You ve heard these terms before: B2B The Network is the Computer RPC, Java RMI Web services Service Discovery protocols and naming (UDDI) N-tiered web applications Essentially the fulfillment of on-demand computing resources enabled by maturing capabilities in networking, storage, processing, software engineering, and virtualization.

What is the Promise of Cloud? This is really cool... The ultimate promise of cloud as a computing services delivery model is: Business process as a Service (BPaaS): the nimble, agile outsourced contractor, supplier, client, or partner who is cheap, efficient, always there, on demand, reliable, and scalable This promise is not 100% complete: cloud is often thought of as a utility (e.g., water, gas, electricity) but it is not.

The TCNJ COMTOR Project A Success Story http://cloud.comtor.org Educational tool for helping students improve their technical documentation skills. Original LAMP-stack software web app took 3 years with varying amounts and quality of undergraduate labor to build. Move to a cloud version, from scratch initiation to completion:?

The TCNJ COMTOR Project A Success Story http://cloud.comtor.org Educational tool for helping students improve their technical documentation skills. Original LAMP-stack software web app took 3 years with varying amounts and quality of undergraduate labor to build. Move to a cloud version, from scratch initiation to completion: 3 weeks.

ISPIA Private Cloud IBM Cloudburst The Institute for Security, Privacy, and Information Assurance is near the tail end of a 2 year RFP, purchase, and shakedown process for buying a locally-hosted private cloud infrastructure. Multiple meetings with 4 potential vendors. Intended as a research instrument. But nothing is easy... The lesson? Cloud needs people. Those people need expertise.

My Reactions to a Google Talk About Cloud Security

Outsourcing Cloud Security Does Not Work IEEE Security & Privacy Magazine Article

Cloud is one size fits all However, as a result, cloud providers are increasingly saddled with the responsibility to deal with, mask, and recover from faults and failures. This is ultimately an uncomfortable position, particularly because they aren t in the business of specializing an intrusion response to a particular customer or network environment. Rather, their business is predicated on the assumption that providing cloud services to a variety of organizations is essentially a one-size-fits-all framework.

Challenges for Cloud From a security and assurance perspective Although the upfront costs of offloading services to the cloud are stunningly attractive, they ignore the very real costs associated with a cloud computing environment s failure modes, such as: (1) increased time to solve simple problems, for example, why an email is bouncing; (2) wasted time as employees sit around doing nothing while a cloud provider works on an issue; (3) cost of downtime if the organization is in the middle of fundraising or other critical activity; (4) cost of identifying and notifying customers whose information might have been compromised; and (5) cost of not being able to hold an employee accountable because the job is outsourced.

Controlling Cloud Failure Modes Ultimately, we can only trust (that is, rationally consider trustworthy) systems whose failure modes we can understand. With such understanding, we can respond to failures even if we cannot predict their exact form or control them as they happen.

Predictions We predict that a fundamental challenge that cloud computing will face in the next few years after significant migration of industry, government, and academic institutions to the cloud is pushback from clients as they attempt to regain some measure of control over parts of their outsourced infrastructure. Significant pressure exists to let institutions break through the abstractions that make the cloud so alluring.

Other Cloud Security Challenges Going Forward (a) http://cloudlaw.ca/agenda/ (b) Data locality (c) Enforcing SLA provisions (d) Computing on encrypted data (e) Better hypervisors

AWS Console Overview

AWS Bill

Key Takeaway Message This also is related to Data Liberation When you adopt cloud, you are exporting a workflow not data! (well, data too, but that s not the important thing) The important thing is the dependencies your employees or contractors will naturally form on these existing outstourced workflows: their work practicies and expectations will form dependencies on cloud services. There will thus be a transition cost away from a particular provider or cloud in general.

Time for Questions email: locasto@ucalgary.ca Twitter: @mlocasto Blog: mlocasto.blogspot.com Research Group: Trustworthy Systems Group http://tsg.cpsc.ucalgary.ca/

Additional Slides

Reminder: Saltzer and Schroeder These are venerable security design principles Economy of mechanism (complexity kills) Fail-safe defaults (fail closed, not fail open) Complete mediation (identify all control/entry/measurement points) Open Design (no security through obscurity) Separation of privilege (map functionality to a disjoint set of roles) Least privilege (what power do you need for Task T?) Least-common mechanism (minimize size of TCB in terms of common surface/shared surface) Psychological acceptability (usable security, intuitive, people-centric model)