cloud computing security

Post on 04-Nov-2014

7 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

Cloud Computing Security

Budi RahardjoSekolah Teknik Elektro

Institut Teknologi BandungOctober 2010

Security Aspects (Dimensions)

• Confidentiality• Integrity• Availability

• Authentication– Large scale identity

management

• Physical• Personnel• Compliance

– PCI DSS, HIPAA, SOX

• Legal– Audit trail

mes

sage

Possible attack in every hop; interruption, interception, modification, fabrication

mes

sage

Confidentiality

• Access to data must be protected from unauthorized entity

• Cloud computing susceptibe to– Interception– Data archived in unknown places– Traffic analysis leading to business intelligence

Confidentiality (cont.)

• Protected by cryptography– End-to-end encryption– Encrypted pipe (difficult in cloud because we

don’t have control over pipes)– Does not work if cloud needs data to process.

How to distribute keys?

• Granular encryption?

TRUST[losing control]

zrffntr

Message encrypted at the origin and decrypted in the receiving end.

But, what if cloud needs data to process? Data must be decrypted in cloud.

zrffntr = message

process?

zrffntr = message

Integrity

• Data must not be changed, modified, tampered by unauthorized entity

• Must protect data by by digital signature, message authenticated code (MAC), hashing function– Attached as part of message(s)– Granularity?

zrffntr78r731027q8sq50rq642340o7p9n63o3

message hashed & encrypted at the origin and decrypted & hashed in the receiving end

message78e731027d8fd50ed642340b7c9a63b3

Availability

• Make sure that data is available when needed

• Possible attack– Interruption, Denial of Service (DoS)

• Best effort is not good enough. Quality of Service (QoS) must be guaranteed

Availability (cont.)

• Improving availability– (Network) redundancy– Backup, data recovery– Business continuity

Concluding Remarks

• Security is still an issue for cloud computing• If cloud computing is cheaper, then people

will use it (regardless of security problems)• Solutions (perhaps not elegant) are

available• The devils are in details

top related