cloud provenance
DESCRIPTION
cloud security is very important because the shared data as well as private data suffers a lot of issuesTRANSCRIPT
1
Cloud Provenance
Minnu C Tomy13PGCS05
2
OVERVIEW Introduction Cloud Computing Characteristics Service models Deployment model Cloud Security Cloud provenance Conclusion
3
Introduction Cloud computing is the business model
of distributed computing and is considered the next generation of computing and storage platforms.
Cloud computing requires an extension of the architecture of distributed and parallel systems by using virtualization techniques
Key to this extensible architecture is to support properties such as compute on-demand and pay-as-you-go model.
4
Cloud Computing
”Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider
interaction.”
5
Cloud computing services
6
Essential Characteristics On-demand service
Get computing capabilities as needed automatically
Broad Network Access Services available over the net using
desktop, laptop, PDA, mobile phone Resource pooling Rapid Elasticity
Ability to quickly scale in/out service Measured service
control, optimize services based on metering
7
Service models
SaaS PaaS IaaS
8
Deployment Models
Public Cloud infrastructure is available to the
general public Private
Cloud infrastructure for single organization only
Community Cloud infrastructure shared by several
organizations that have shared concerns Hybrid
Combination of above models
9
Cloud Security The key barrier to widespread uptake of
cloud computing is the lack of trust in clouds by potential customers.
The cloud acts as a big black box, nothing inside the cloud is visible to the clients
Data leakages out of cloud computing environments are fundamental cloud security concerns for both The end-users and The cloud service providers
10
Top threats to cloud computing
1. Abuse and wicked use of cloud computing
2. Insecure application programming interfaces
3. Malicious insiders4. Shared technology vulnerabilities5. Data loss or leakages6. Account, service and traffic hijacking7. Unknown risk profile.
11
Provenance in Cloud
Provenance- to record ownership and process history of data objects in cloud in order for wide acceptance to the public.
Given its provenance, a data object can report who created and who modified its contents.
Secure provenance is vital to the success of data forensics in cloud computing.
12
Data Provenance The provenance of a data product
mainly consists of two parts the ancestral data products from which
the data product is derived And the process of transformation of
these ancestors that derive the data product
Provenance is an important aspect in the verification, audit trails, reproducibility, privacy and security, trust, and reliability in distributed computing.
13
Conclusion Data leakage is the main concern in
cloud. Data in the cloud should be secure. Provenance increases the value of data
on the cloud. Establishing trustworthy cloud
computing provenance is fundamental requirement to establish cloud trust models.
14
REFERENCES[1]. Kiran-Kumar Muniswamy-Reddy and
MargoSeltzer, “Provenance as First Class Cloud Data” , Harvard School of Engineering and Applied Sciences
[2]. Muhammad imran,Helmut hlavacs, “Provenance Framework for the Cloud Infrastructure:Why and How?” , University of Vienna, Austria
[3]. Ryan Ko , Peter Jagadpramana, Miranda Mowbray, Siani Pearson, “TrustCloud: A Framework for Accountability and Trust in CloudComputing” , Cloud & Security Lab Hewlett-Packard Laboratories
15
Thank u……..