Download - Cloud Computing Security
![Page 1: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/1.jpg)
Ninh V. [email protected]
![Page 2: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/2.jpg)
The Hype
Cluster ComputingCloud ComputingGrid Computing
![Page 3: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/3.jpg)
![Page 4: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/4.jpg)
“What the hell is Cloud Computing?”- Larry Ellison
![Page 5: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/5.jpg)
Monolithic Client-Server Web SOA Cloud Services
1970s 1980s 1990s 2000s 2009+
5th Generation of Computing
![Page 6: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/6.jpg)
Wikipedia’s DefinitionsCloud computing is a computing paradigm shift where computing is moved awayfrom personal computers or an individual server to a “cloud” of computers.
– 12/2007
Cloud computing is Internet-based ("cloud") development and use of computerTechnology ("computing"). The cloud is a metaphor for the Internet, based on
howit is depicted in computer network diagrams, and is an abstraction for the complexinfrastructure it conceals.
– 12/2008
Cloud computing is a style of computing in which dynamically scalable and oftenvirtualized resources are provided as a service over the Internet.
– 6/2009
Cloud computing is an example of computing in which dynamically scalable andoften virtualized resources are provided as a service over the Internet.
- Now
![Page 7: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/7.jpg)
Common implies multi-tenancy, not single or isolated tenancy Location-independentOnlineUtility implies pay-for-use pricingDemand implies ~infinite, ~immediate, ~invisible scalability
![Page 8: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/8.jpg)
Cloud Computing Infrastructure Models
![Page 9: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/9.jpg)
Hybrid Cloud
Connectivity(Network Access)
SME
SME
SME
Enterprise
Enterprise
Public Cloud
Public Cloud
Private CloudPrivate Cloud
The Cloud Provider
The Cloud Provider
![Page 10: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/10.jpg)
Architectural Layers of Cloud Computing
![Page 11: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/11.jpg)
Software as a Service (SaaS)
![Page 12: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/12.jpg)
Platform as a Service (PaaS)
![Page 13: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/13.jpg)
Infrastructure as a Service (IaaS)
![Page 14: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/14.jpg)
Cloud Infrastructure
IaaS
PaaS
SaaS
Infrastructure as a Service (IaaS) Architectures
Platform as a Service (PaaS)Architectures
Software as a Service (SaaS)
Architectures
Cloud Infrastructure
SaaS
Cloud Infrastructure
PaaS
SaaS
Cloud Infrastructure
IaaS
PaaS
Cloud Infrastructure
PaaS
Cloud Infrastructure
IaaS
![Page 15: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/15.jpg)
Cloud Computing Characteristics
![Page 16: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/16.jpg)
Comparisons
Grid Computing
•A form of distributed computing•A “super and virtual computer” is composed of a cluster of networked•Loosely coupled computers acting in concert to perform very large tasks
Utility Computing
•Packaging of computing resources, such as computation and storage•A metered service similar to a traditional public utility, such as electricity
Autonomy Computing
•Computer systems capable of self-management
![Page 17: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/17.jpg)
Variable Costs(OpEx)
Fixed Costs(CapEx)
Cloud Computing Economics
Variable Costs(OpEx)
Users
Cost
s
Traditional IT
Cloud Computing
![Page 18: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/18.jpg)
Pros and Cons
![Page 19: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/19.jpg)
Cloud Computing Security
![Page 20: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/20.jpg)
Your Application
Testing, Monitoring, Diagnostics
and Verification
Architectural Views
Governance
Life Cycle(Birth, Growth, Failure, Recovery, Death)
Web of MetadataCategories, Capabilities, Configuration and Dependencies
Resource Management Basic
Monitoring
Software & Hardware Infrastructure
Facilities & Logistics
Element Management
(Split Responsibility)
YourProblem
TheirProblem
A Cloud Technology Reference Model
![Page 21: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/21.jpg)
Operating System
Hypervisor
Application
Datacenter (Power, Cooling, Physical Security)
ApplicationServer Middleware Database
CPU Networking StorageYOUR DATA Backup
Software as a Service
Your Problem
Their Problem
![Page 22: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/22.jpg)
Operating System
Hypervisor
Your Application
Datacenter (Power, Cooling, Physical Security)
ApplicationServer Middleware Database
CPU Networking Storage Backup
Platform as a Service
Your Problem
Their Problem
![Page 23: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/23.jpg)
Your Operating System
Hypervisor
Your Application
Datacenter (Power, Cooling, Physical Security)
YourApplication
Server
YourMiddleware
YourDatabase
CPU Networking Storage Backup
Infrastructure as a Service
Your Problem
Their Problem
![Page 24: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/24.jpg)
Security Issues
![Page 25: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/25.jpg)
Overview
Governing in the Cloud
Governance & Enterprise Risk Management
Legal
Electronic Discovery
Compliance and Audit
Information Life Cycle Management
Portability & Interoperability
Operating in the Cloud
Traditional Security
Data Center Operations
Incident Response
Virtualization
Identity & Access Management
Storage
Application Security
Encryption & Key Management
![Page 26: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/26.jpg)
Selected Issues
Governing in the Cloud
Governance & Enterprise Risk Management
Legal
Electronic Discovery
Compliance and Audit
Information Life Cycle Management
Portability & Interoperability
Operating in the Cloud
Traditional Security
Data Center Operations
Incident Response
Virtualization
Identity & Access Management
Storage
Application Security
Encryption & Key Management
![Page 27: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/27.jpg)
Encryption & Key Management
Storage
Internet
Encryption on Storage
Encryption on TransmissionKey Management
![Page 28: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/28.jpg)
Case StudyAmazon Web Services (AWS)
![Page 29: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/29.jpg)
AWS Registration and Security
![Page 30: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/30.jpg)
X.509 Certificate
![Page 31: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/31.jpg)
AWS Multi-Factor Authentication (AWS MFA)
Multi-Factor Authentication
![Page 32: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/32.jpg)
Request Authenticationwith HMAC-SHA1 (1)
![Page 33: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/33.jpg)
Request Authenticationwith HMAC-SHA1 (2)
![Page 34: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/34.jpg)
HMAC-SHA1
![Page 35: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/35.jpg)
Summary & Predictions
.. We think everyone on the planet deserves to have their ownvirtual data center in the cloud ..
- Lew Tucker
.. Cloud Computing Will Be As Influential As E-business .. - Gartner
.. one of the most important transformations the federalgovernment will go through in the next decade ..
- Obama’s TIGR Team
.. Who knew that the concept of security in cloud computing waseven possible to imagine?..
- Scott Bradner
![Page 36: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/36.jpg)
![Page 37: Cloud Computing Security](https://reader036.vdocuments.us/reader036/viewer/2022062703/554dbf6eb4c905c2488b4be5/html5/thumbnails/37.jpg)
Thank You