Security Techniques for Protecting Data in Cloud Computing one SHOULD know WHAT... Venkata Sravan Kumar Maddineni, Blekinge Institute of Technology IT Security for the Next Generation European Cup, Prague 17-19 February, 2012
Presentation Agenda Introduction Motivation Aims & Objectives Research Questions Research Methodology Systematic Literature Review Survey Results Conclusion Future Work
Introduction NIST defines Cloud Computing as: " Cloud Computing is a model for enabling ubiquitous, convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction" PAGE 3
Importance of SECURITY in Cloud Computing Source: http://blogs.idc.com/ie/wp-content/uploads/2009/12/idc_cloud_challenges_2009.jpg PAGE 4
Motivation Security issues when part of the local network data resides in a Cloud. (Data at TRANSIT) Security issues when the total data resides within a Cloud. (Data at REST) PAGE 5
Aims & Objectives Aim: To identify and understand the security issues which effect the performance of Cloud Computing. Also, to understand the security techniques which are being used to mitigate these security issues. Thereby providing the standard guidelines for the Cloud service providers and as well as for Cloud users. Objectives: To understand the security issues and to identify the appropriate security techniques those are being used in the current world of Cloud Computing. To identify the security challenges those are expected in the future of Cloud Computing. To suggest some counter measures for the future challenges to be faced in Cloud Computing. PAGE 6
Research Questions Research Question 1: What are the various security techniques being used by the leading Cloud Computing providers, when the data is being transferred between the Cloud and a local network? Research Question 2: What are the various security techniques being used to prevent unauthorized access to data within the Cloud? Research Question 3: What are the major security challenges we expect in future Cloud Computing? Research Question 4: How can we handle security problems that are expected in future Cloud Computing? PAGE 7
Research Methodology PAGE 8
Systematic Literature Review (SLR) SLR is a means of identifying, evaluating and interpreting all available research relevant to a particular research question, topic and phenomenon of interest. Three stages in SLR: PLANNING CONDUCTING REPORTING Search string constructed: ((cloud computing) AND (security) AND (technique* OR method* OR challenge*)) Databases searched: IEEE Xplore Springerlink Science Direct Scopus PAGE 9
SLR Results Totally 43 Security challenges are indentified during the SLR and compromised attributes are: Totally 34 security techniques are indentified during the SLR and impact of these techniques are on.. PAGE 10
Survey & Survey Results A survey is a systematic method of collecting data from a population of interest. It tends to be quantitative in nature and aims to collect information from a sample of the population such that the results are representative of the population within a certain degree of error. Survey methods used: Face to face interviews Electronic survey: Survey Results:» Mailed questionnaire» Online survey Totally 16 number of partially and completed responses from security experts. Identified 21 security challenges including with future challenges. Identified 10 security techniques and 9 suggestions to handle the future security challenges. PAGE 11
Conclusion For Research Questions 1: Service Level Agreement (SLA) Secure Socket Layer (SSL) Role Based Access Control Identity based Authentication Third party Auditor Proof of retrievability For Research Questions 2: SSL Multi tenancy based access control Intrusion Detection system Virtual private network A Novel Cloud dependability model Hadoop Distribution file system PAGE 12
Conclusion For Research Questions 3: Virtual machine Security Trusted Transactions Espionage Hypervisor Viruses Risk of multiple cloud tenants Legal Interception Point For Research Questions 4: Increased efforts in risk management Ensure strong Authentication and Access controls Increased efforts to mitigate harmful codes and legal responsibility Data protection at both design and run time PAGE 13
Future Work To find an optimum security solutions for the specific services in the cloud. To work on regulatory, compliance issues and jurisdiction laws. To investigate the appropriate solutions to over come future challenges. Survey conducted can be extended. Research work can be extended by using different research methodologies. PAGE 14
Thank You Venkata Sravan Kumar Maddineni, Blekinge Institute of Technology IT Security for the Next Generation European Cup, Prague 17-19 February, 2012