Security in Changing IT Ecosystem: Virtualization and Cloud Computing

Similar documents
Architectural Implications of Cloud Computing

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Cloud Computing: Making the right choices

Security & Trust in the Cloud

Peter Zhang, Ph.D. Principal consultant, ZHTECH Corporation Adjunct Professor, Cal State University, Fullerton

White Paper on CLOUD COMPUTING

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.

CHAPTER 8 CLOUD COMPUTING

NCTA Cloud Architecture

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS


ISSN: (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012

Open Cloud System. (Integration of Eucalyptus, Hadoop and AppScale into deployment of University Private Cloud)

Hybrid Cloud Computing

Cloud Computing. Key Considerations for Adoption. Abstract. Ramkumar Dargha

SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen

NEXT-GENERATION, CLOUD-BASED SERVER MONITORING AND SYSTEMS MANAGEMENT

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

SECURE CLOUD COMPUTING

ANALYSIS OF CLOUD VENDORS IN INDIAN ENVIORNMENT

CLOUD COMPUTING An Overview

Grid Computing Vs. Cloud Computing

Introduction What is the cloud

Inside the Cloud The Supporting Architecture of Cloud Computing. Jack Hanison

Novel Network Computing Paradigms (I)

The Cisco Powered Network Cloud: An Exciting Managed Services Opportunity

A Hotel in the Cloud. Bruno Albietz

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Platforms in the Cloud

Webstore - Reselling Cloud

Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled

Program. Maria Fiore Business Development Manager Hartco. Hugo Boutet igovirtual. Introduction to MicroAge. SME and «cloud computing» 2006 MicroAge

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

CLOUD COMPUTING. When It's smarter to rent than to buy

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

TECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing

Data Centers and Cloud Computing

Security Issues in Cloud Computing

Cloud Computing in Banking

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Cloud Computing. Bringing the Cloud into Focus

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Security Issues In Cloud Computing And Their Solutions

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

What is Cloud Computing? Tackling the Challenges of Big Data. Tackling The Challenges of Big Data. Matei Zaharia. Matei Zaharia. Big Data Collection

A Gentle Introduction to Cloud Computing

Lecture 02a Cloud Computing I

The Magazine for IT Security. May issue 3. sör alex / photocase.com

BUSINESS MANAGEMENT SUPPORT

BMC Control-M for Cloud. BMC Control-M Workload Automation

Digital Forensics. Lab 10: Cloud Computing & the Future of Digital Forensics

How cloud computing can transform your business landscape

DATA SECURITY MODEL FOR CLOUD COMPUTING

Securely Outsourcing to the Cloud: Five Key Questions to Ask

Above the Clouds A Berkeley View of Cloud Computing

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management

EXIN Cloud Computing Foundation

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE

Cloud Services. More agility. More freedom. More choice.

A Comparison of PaaS clouds with a Detailed Reference to Security and Geoprocessing Services

Secure Cloud Computing through IT Auditing

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos

Abstract 1. INTRODUCTION

Security Considerations for Public Mobile Cloud Computing

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Business applications:

Vormetric Data Security Securing and Controlling Data in the Cloud

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

Leveraging Technology New Horizons Computer Learning Center of Memphis

Guideline on Implementing Cloud Identity and Access Management

How To Understand Cloud Computing

Contents. What is Cloud Computing? Why Cloud computing? Cloud Anatomy Cloud computing technology Cloud computing products and market

Cloud Computing Technology

CLOUD COMPUTING. Keywords: Cloud Computing, Data Centers, Utility Computing, Virtualization, IAAS, PAAS, SAAS.

An exploration of cloud service delivery models in a hybrid environment A new depiction to corporate computing

WOLKEN KOSTEN GELD GUSTAVO ALONSO SYSTEMS GROUP ETH ZURICH

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Security Issues in Cloud Computing

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013

IJRSET 2015 SPL Volume 2, Issue 11 Pages: 29-33

Cloud Computing Guide & Handbook. SAI USA Madhav Panwar

Prof. Luiz Fernando Bittencourt MO809L. Tópicos em Sistemas Distribuídos 1 semestre, 2015

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

The cloud - ULTIMATE GAME CHANGER ===========================================

Modeling Public Pensions with Mathematica and Python II

The Private Cloud Your Controlled Access Infrastructure

Cloud Computing and Amazon Web Services. CJUG March, 2009 Tom Malaher

Data Centers and Cloud Computing. Data Centers

What Cloud computing means in real life

Transcription:

Security in Changing IT Ecosystem: Virtualization and Cloud Computing Dr. Dhiren Patel Indian Institute of Technology Gandhinagar, India dhiren@iitgn.ac.in

Cloud Computing World is further shrinking!!! a large-scale distributed computing paradigm a pool of managed computing power, storage, and services <abstracted, virtualized, dynamically-scalable> provisioning of services - dynamically configured and delivered on demand to external customers over the Internet

Services purchase services in the form of Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), IT-as-a-Service (ITaaS), and sell value-added services (on "utility" basis) to other users Cloud clients will be able to add more capacity at peak demand, reduce costs, experiment with new services, and remove unneeded capacity

Computational and Sociological implications Delocalizing hardware and software resources Usage-based pricing model Build-Once-Run-Anywhere e.g. Google Apps a developer tool that enables you to run your web applications on Google's infrastructure allow startups to use Google's web servers, APIs, and other developer tools to build a web app on top of the pay-as-you-go pricing allows businesses on both ends of the spectrum to enjoy the "full service" Benefiting - Governments, Institutes, SMB, large Industry - to solve their ever-increasing computing and storage problems

Cloud from where?. The cloud is no longer an if but a when and the when is actually now!!! Amazon S3, EC, SimpleDB Google GAE Microsoft Azure IBM Blue cloud VMware vcloud Express Cisco - WebEx Salesforce Force.com platform, Bungee Labs, Keroku, Rackspace, Kaavo s IMOD, Go grid Morfik's Ajax platform etc.

Challenges

Challenges Network boundaries are disappearing!! There are no perimeters for defining an insider operational stability and security of critical information infrastructure higher level interoperability desires of services, to security provisions in Cloud CC shifts control over data and operations - how to ensure the confidentiality, integrity, and availability of information? Security processes, once visible, are now hidden behind layers of abstraction

Over lapping - Distributed, Cluster, Grid and Cloud Computing Scope

Specific Challenges Why would a startup want to hand over that much control and dependence to a big Internet company? Having a web app built and deployed with a specific provide makes it much easier for that provider to eventually acquire that web app!!!!!!?????? Paradigm shift - develop business processes in software, without having a clue about the processes themselves!!!! obvious influence of national policies, agencies and most of all economic risks!!!

Provider/Consumer Goals/Challenges the unpredictability of consumer demand, software and hardware failures, heterogeneity of services, power management, and conflicting signed Service Level Agreements (SLAs) between consumers and service providers Overestimating the provision of resources would lead to resource underutilization and, consequently, a decrease in revenue for the provider

Needs - Challenges The desire to continually load balance and optimize for performance, energy, availability, and other SLA-level goals that customers pay attention to, the problem becomes further complicated, creating more opportunities for misconfiguration and malicious conduct. This calls for highly automated end-to-end security with a heavier emphasis on strong isolation, integrity and resiliency

Solution Directives considerable assurances that services are highly reliable and available, as well as secure and safe, and that privacy is protected (i) encryption schema to ensure that the shared storage environment safeguards all data; (ii) stringent access controls to prevent unauthorized access to the data; and (iii) scheduled data backup and safe storage of the backup media

Trusted Computing Initiative and TPM adoption TCI important five components the specific chip, a `curtained memory' feature in the CPU, a security kernel in the operating system, a security kernel in each TC application a back-end infrastructure of online security servers maintained by hardware and software vendors to tie the whole thing together

Combined Efforts legal issues arise, such as e-discovery, regulatory compliance (including privacy), and auditing commit to storing and processing data in specific jurisdictions obey local privacy requirements on behalf of the customer national security concerns support to SAML (Security Assertion Markup Language) single sign-on - access to multiple Grid sites Privileged user access Authentication <multi factor> and Authorization RBAC model Research / Development / Implementation issues

Solution Directives Novel network addressing to virtual machine mechanics and instances Data centric security instead of protecting the containers [servers] in which the data lie, you focus on the data itself Location specific encryption/decryption Granular control and security ownership Cooperation between competing service providers!!! coordinated resource allocation, reservation

Concluding Remarks Cloud is very promising phenomenon Building implicit level of trust as well as an explicit level of vigilance to ensure success Security in an organization performs the same function as a brake for the automobile. Though it acts to stop the car, in reality it enables the car to go much faster!! When it comes to security innovation, don t ask why it might fail? Instead, imagine why it will succeed?

Thank you For your Time and Attention Dr. Dhiren Patel Professor of CSE IIT GN dhiren@iitgn.ac.in