cloud provenance

15

Click here to load reader

Upload: minnu-c-tomy

Post on 01-Nov-2014

28 views

Category:

Engineering


2 download

DESCRIPTION

cloud security is very important because the shared data as well as private data suffers a lot of issues

TRANSCRIPT

Page 1: Cloud provenance

1

Cloud Provenance

Minnu C Tomy13PGCS05

Page 2: Cloud provenance

2

OVERVIEW Introduction Cloud Computing Characteristics Service models Deployment model Cloud Security Cloud provenance Conclusion

Page 3: Cloud provenance

3

Introduction Cloud computing is the business model

of distributed computing and is considered the next generation of computing and storage platforms.

Cloud computing requires an extension of the architecture of distributed and parallel systems by using virtualization techniques

Key to this extensible architecture is to support properties such as compute on-demand and pay-as-you-go model.

Page 4: Cloud provenance

4

Cloud Computing

”Cloud computing is a model for enabling convenient, on-demand network access

to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider

interaction.”

Page 5: Cloud provenance

5

Cloud computing services

Page 6: Cloud provenance

6

Essential Characteristics On-demand service

Get computing capabilities as needed automatically

Broad Network Access Services available over the net using

desktop, laptop, PDA, mobile phone Resource pooling Rapid Elasticity

Ability to quickly scale in/out service Measured service

control, optimize services based on metering

Page 7: Cloud provenance

7

Service models

SaaS PaaS IaaS

Page 8: Cloud provenance

8

Deployment Models

Public Cloud infrastructure is available to the

general public Private

Cloud infrastructure for single organization only

Community Cloud infrastructure shared by several

organizations that have shared concerns Hybrid

Combination of above models

Page 9: Cloud provenance

9

Cloud Security The key barrier to widespread uptake of

cloud computing is the lack of trust in clouds by potential customers.

The cloud acts as a big black box, nothing inside the cloud is visible to the clients

Data leakages out of cloud computing environments are fundamental cloud security concerns for both The end-users and The cloud service providers

Page 10: Cloud provenance

10

Top threats to cloud computing

1. Abuse and wicked use of cloud computing

2. Insecure application programming interfaces

3. Malicious insiders4. Shared technology vulnerabilities5. Data loss or leakages6. Account, service and traffic hijacking7. Unknown risk profile.

Page 11: Cloud provenance

11

Provenance in Cloud

Provenance- to record ownership and process history of data objects in cloud in order for wide acceptance to the public.

Given its provenance, a data object can report who created and who modified its contents.

Secure provenance is vital to the success of data forensics in cloud computing.

Page 12: Cloud provenance

12

Data Provenance The provenance of a data product

mainly consists of two parts the ancestral data products from which

the data product is derived And the process of transformation of

these ancestors that derive the data product

Provenance is an important aspect in the verification, audit trails, reproducibility, privacy and security, trust, and reliability in distributed computing.

Page 13: Cloud provenance

13

Conclusion Data leakage is the main concern in

cloud. Data in the cloud should be secure. Provenance increases the value of data

on the cloud. Establishing trustworthy cloud

computing provenance is fundamental requirement to establish cloud trust models.

Page 14: Cloud provenance

14

REFERENCES[1]. Kiran-Kumar Muniswamy-Reddy and

MargoSeltzer, “Provenance as First Class Cloud Data” , Harvard School of Engineering and Applied Sciences

[2]. Muhammad imran,Helmut hlavacs, “Provenance Framework for the Cloud Infrastructure:Why and How?” , University of Vienna, Austria

[3]. Ryan Ko , Peter Jagadpramana, Miranda Mowbray, Siani Pearson, “TrustCloud: A Framework for Accountability and Trust in CloudComputing” , Cloud & Security Lab Hewlett-Packard Laboratories

Page 15: Cloud provenance

15

Thank u……..