尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Ninh V. Nguyen ninh.nv@gmail.com
The Hype Cluster Computing Cloud Computing Grid Computing 
“What the hell is Cloud Computing?” - Larry Ellison
5th Generation of Computing      1970s  	    1980s	   1990s	   2000s 	 2009+ Monolithic   Client-Server	    Web	                 SOA	          Cloud Services
Wikipedia’s Definitions Cloud computing is a computing paradigm shift where computing is moved away from personal computers or an individual server to a “cloud” of computers.  – 12/2007 Cloud computing is Internet-based ("cloud") development and use of computer Technology ("computing"). The cloud is a metaphor for the Internet, based on how it is depicted in computer network diagrams, and is an abstraction for the complex infrastructure it conceals.  – 12/2008 Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.  – 6/2009 Cloud computing is an example of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.  - Now
Common implies multi-tenancy, not single or isolated tenancy  Location-independent Online Utility implies pay-for-use pricing Demand implies ~infinite, ~immediate, ~invisible scalability
Cloud Computing Infrastructure Models
Public Cloud Public Cloud The Cloud Provider The Cloud Provider SME Hybrid Cloud Connectivity (Network Access) SME Enterprise Private Cloud Enterprise SME Private Cloud
Architectural Layers of Cloud Computing
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Cloud Computing Characteristics
Comparisons
Cloud Computing Economics Traditional IT Variable Costs (OpEx) Cloud Computing Fixed Costs (CapEx) Costs Variable Costs (OpEx) Users
Pros and Cons
Cloud Computing Security
A Cloud Technology Reference Model Your Application Testing, Monitoring, Diagnostics and Verification Governance Architectural Views Your Problem Life Cycle (Birth, Growth, Failure, Recovery, Death) Web of Metadata Categories, Capabilities, Configuration and Dependencies Resource Management Basic Monitoring Facilities & Logistics Element Management (Split Responsibility) Their Problem Software & Hardware Infrastructure
Software as a Service Application Application Server Middleware Database Operating System Hypervisor CPU Networking Storage YOUR DATA Backup Datacenter (Power, Cooling, Physical Security) Your Problem Their Problem
Platform as a Service Your Application Application Server Middleware Database Operating System Hypervisor CPU Networking Storage Backup Datacenter (Power, Cooling, Physical Security) Your Problem Their Problem
Infrastructure as a Service Your Application Your Application Server Your Middleware Your Database Your Operating System Hypervisor CPU Networking Storage Backup Datacenter (Power, Cooling, Physical Security) Your Problem Their Problem
Security Issues
Overview
Selected Issues
Encryption & Key Management Encryption on Storage Storage Encryption on Transmission Key Management Internet
Case Study Amazon Web Services (AWS)
AWS Registration and Security
X.509 Certificate
Multi-Factor Authentication AWS Multi-Factor Authentication (AWS MFA)
Request Authentication with HMAC-SHA1 (1)
Request Authentication with HMAC-SHA1 (2)
HMAC-SHA1
Summary & Predictions .. We think everyone on the planet deserves to have their own virtual data center in the cloud .. - Lew Tucker ..Cloud Computing Will Be As Influential As E-business..  - Gartner .. one of the most important transformations the federal government will go through in the next decade .. - Obama’s TIGR Team .. Who knew that the concept of security in cloud computing was even possible to imagine?.. - Scott Bradner
Thank You

More Related Content

What's hot

Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
Cloud security
Cloud securityCloud security
Cloud security
BikashPokharel3
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shiva Prasad
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
prachupanchal
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
Devyani Vaidya
 
Top 10 cloud service providers
Top 10 cloud service providersTop 10 cloud service providers
Top 10 cloud service providers
Vineet Garg
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
veena venugopal
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Animesh Chaturvedi
 
What is private cloud Explained
What is private cloud ExplainedWhat is private cloud Explained
What is private cloud Explained
jeetendra mandal
 
Cloud security
Cloud security Cloud security
Cloud security
Mohamed Shalash
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
Muhammad Usama Zuberi
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its Implementation
Sai P Mishra
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
Aleem Mohammed
 
IBM Cloud Introduction
IBM Cloud IntroductionIBM Cloud Introduction
IBM Cloud Introduction
Ravi Pandit
 
Public cloud
Public cloudPublic cloud

What's hot (20)

Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Top 10 cloud service providers
Top 10 cloud service providersTop 10 cloud service providers
Top 10 cloud service providers
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
What is private cloud Explained
What is private cloud ExplainedWhat is private cloud Explained
What is private cloud Explained
 
Cloud security
Cloud security Cloud security
Cloud security
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its Implementation
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
IBM Cloud Introduction
IBM Cloud IntroductionIBM Cloud Introduction
IBM Cloud Introduction
 
Public cloud
Public cloudPublic cloud
Public cloud
 

Viewers also liked

Basic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computingBasic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computing
solarisyougood
 
Database fragmentation
Database fragmentationDatabase fragmentation
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
Dr. Ramkumar Lakshminarayanan
 
Web Security
Web SecurityWeb Security
Web Security
Tripad M
 
Fragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed DatabaseFragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed Database
Abhilasha Lahigude
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
himanshuawasthi2109
 

Viewers also liked (7)

Basic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computingBasic Technology - Module 13 cloud computing
Basic Technology - Module 13 cloud computing
 
Database fragmentation
Database fragmentationDatabase fragmentation
Database fragmentation
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Web Security
Web SecurityWeb Security
Web Security
 
Fragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed DatabaseFragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed Database
 
Web Security
Web SecurityWeb Security
Web Security
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similar to Cloud Computing Security

Cloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open SourceCloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open Source
AhmadShah Sultani
 
Karrox introduction to cloud computing
Karrox introduction to cloud computingKarrox introduction to cloud computing
Karrox introduction to cloud computing
Karrox Franchise
 
cloud computing
cloud computingcloud computing
cloud computing
Roshan Bagdiya
 
Introduction To Cloud Computing By Beant Singh Duggal
Introduction To Cloud Computing By Beant Singh DuggalIntroduction To Cloud Computing By Beant Singh Duggal
Introduction To Cloud Computing By Beant Singh Duggal
Beantsingh
 
Cloud Computing By Pankaj Sharma
Cloud Computing By Pankaj SharmaCloud Computing By Pankaj Sharma
Cloud Computing By Pankaj Sharma
Ranjan Kumar
 
Intro To Cloud Computing
Intro To Cloud ComputingIntro To Cloud Computing
Intro To Cloud Computing
prakashjjaya
 
Cloud computing
Cloud computingCloud computing
Cloud computing
karthiklreddy
 
Moving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicumMoving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicum
David Linthicum
 
Ppt cloud deployment
Ppt cloud deploymentPpt cloud deployment
Ppt cloud deployment
Virendra Ruhela
 
Cloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN KhalidCloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN Khalid
خالد اكدمون
 
The Enterprise Cloud
The Enterprise CloudThe Enterprise Cloud
The Enterprise Cloud
Mark Masterson
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Siddiq Abu Bakkar
 
Cloud computing power point presentation
Cloud computing power point presentationCloud computing power point presentation
Cloud computing power point presentation
Rituraj Azad
 
Cloud Computing
Cloud  ComputingCloud  Computing
Cloud Computing
ThoughtWorks
 
Emerging Technology in the Cloud! Real Life Examples. Pol Mac Aonghusa
Emerging Technology in the Cloud! Real Life Examples.  Pol Mac AonghusaEmerging Technology in the Cloud! Real Life Examples.  Pol Mac Aonghusa
Emerging Technology in the Cloud! Real Life Examples. Pol Mac Aonghusa
catherinewall
 
Cloud Deployment
Cloud DeploymentCloud Deployment
Cloud Deployment
Tushar Choudhary
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
Ahmed Abdisalan
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
Nouriddin BEN ZEKRI
 
Cloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno MelandriCloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno Melandri
Manuela Moroncini
 
Building Private Clouds for HPC with OpenNebula: Reference Deployments & Less...
Building Private Clouds for HPC with OpenNebula: Reference Deployments & Less...Building Private Clouds for HPC with OpenNebula: Reference Deployments & Less...
Building Private Clouds for HPC with OpenNebula: Reference Deployments & Less...
Ruben S. Montero
 

Similar to Cloud Computing Security (20)

Cloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open SourceCloud Computing & CloudStack Open Source
Cloud Computing & CloudStack Open Source
 
Karrox introduction to cloud computing
Karrox introduction to cloud computingKarrox introduction to cloud computing
Karrox introduction to cloud computing
 
cloud computing
cloud computingcloud computing
cloud computing
 
Introduction To Cloud Computing By Beant Singh Duggal
Introduction To Cloud Computing By Beant Singh DuggalIntroduction To Cloud Computing By Beant Singh Duggal
Introduction To Cloud Computing By Beant Singh Duggal
 
Cloud Computing By Pankaj Sharma
Cloud Computing By Pankaj SharmaCloud Computing By Pankaj Sharma
Cloud Computing By Pankaj Sharma
 
Intro To Cloud Computing
Intro To Cloud ComputingIntro To Cloud Computing
Intro To Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Moving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicumMoving to cloud computing step by step linthicum
Moving to cloud computing step by step linthicum
 
Ppt cloud deployment
Ppt cloud deploymentPpt cloud deployment
Ppt cloud deployment
 
Cloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN KhalidCloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN Khalid
 
The Enterprise Cloud
The Enterprise CloudThe Enterprise Cloud
The Enterprise Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing power point presentation
Cloud computing power point presentationCloud computing power point presentation
Cloud computing power point presentation
 
Cloud Computing
Cloud  ComputingCloud  Computing
Cloud Computing
 
Emerging Technology in the Cloud! Real Life Examples. Pol Mac Aonghusa
Emerging Technology in the Cloud! Real Life Examples.  Pol Mac AonghusaEmerging Technology in the Cloud! Real Life Examples.  Pol Mac Aonghusa
Emerging Technology in the Cloud! Real Life Examples. Pol Mac Aonghusa
 
Cloud Deployment
Cloud DeploymentCloud Deployment
Cloud Deployment
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno MelandriCloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno Melandri
 
Building Private Clouds for HPC with OpenNebula: Reference Deployments & Less...
Building Private Clouds for HPC with OpenNebula: Reference Deployments & Less...Building Private Clouds for HPC with OpenNebula: Reference Deployments & Less...
Building Private Clouds for HPC with OpenNebula: Reference Deployments & Less...
 

More from Ninh Nguyen

Startup Survival Guide
Startup Survival GuideStartup Survival Guide
Startup Survival Guide
Ninh Nguyen
 
Future of digital content
Future of digital contentFuture of digital content
Future of digital content
Ninh Nguyen
 
Late 2000s Recession
Late 2000s RecessionLate 2000s Recession
Late 2000s Recession
Ninh Nguyen
 
Social Media In Vietnam
Social Media In VietnamSocial Media In Vietnam
Social Media In Vietnam
Ninh Nguyen
 
BarCamp for Enterprise
BarCamp for EnterpriseBarCamp for Enterprise
BarCamp for Enterprise
Ninh Nguyen
 
BarCamp Introduction
BarCamp IntroductionBarCamp Introduction
BarCamp Introduction
Ninh Nguyen
 

More from Ninh Nguyen (6)

Startup Survival Guide
Startup Survival GuideStartup Survival Guide
Startup Survival Guide
 
Future of digital content
Future of digital contentFuture of digital content
Future of digital content
 
Late 2000s Recession
Late 2000s RecessionLate 2000s Recession
Late 2000s Recession
 
Social Media In Vietnam
Social Media In VietnamSocial Media In Vietnam
Social Media In Vietnam
 
BarCamp for Enterprise
BarCamp for EnterpriseBarCamp for Enterprise
BarCamp for Enterprise
 
BarCamp Introduction
BarCamp IntroductionBarCamp Introduction
BarCamp Introduction
 

Recently uploaded

DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
UmmeSalmaM1
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
Cynthia Thomas
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
Larry Smarr
 
An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
Safe Software
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
UiPathCommunity
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
dipikamodels1
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Fuxnet [EN] .pdf
Fuxnet [EN]                                   .pdfFuxnet [EN]                                   .pdf
Fuxnet [EN] .pdf
Overkill Security
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
Enterprise Knowledge
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
ScyllaDB
 

Recently uploaded (20)

DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
 
An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Fuxnet [EN] .pdf
Fuxnet [EN]                                   .pdfFuxnet [EN]                                   .pdf
Fuxnet [EN] .pdf
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
 

Cloud Computing Security

  • 1. Ninh V. Nguyen ninh.nv@gmail.com
  • 2. The Hype Cluster Computing Cloud Computing Grid Computing 
  • 3.
  • 4. “What the hell is Cloud Computing?” - Larry Ellison
  • 5. 5th Generation of Computing 1970s 1980s 1990s 2000s 2009+ Monolithic Client-Server Web SOA Cloud Services
  • 6. Wikipedia’s Definitions Cloud computing is a computing paradigm shift where computing is moved away from personal computers or an individual server to a “cloud” of computers. – 12/2007 Cloud computing is Internet-based ("cloud") development and use of computer Technology ("computing"). The cloud is a metaphor for the Internet, based on how it is depicted in computer network diagrams, and is an abstraction for the complex infrastructure it conceals. – 12/2008 Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. – 6/2009 Cloud computing is an example of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. - Now
  • 7. Common implies multi-tenancy, not single or isolated tenancy Location-independent Online Utility implies pay-for-use pricing Demand implies ~infinite, ~immediate, ~invisible scalability
  • 9. Public Cloud Public Cloud The Cloud Provider The Cloud Provider SME Hybrid Cloud Connectivity (Network Access) SME Enterprise Private Cloud Enterprise SME Private Cloud
  • 10. Architectural Layers of Cloud Computing
  • 11. Software as a Service (SaaS)
  • 12. Platform as a Service (PaaS)
  • 13. Infrastructure as a Service (IaaS)
  • 14.
  • 17. Cloud Computing Economics Traditional IT Variable Costs (OpEx) Cloud Computing Fixed Costs (CapEx) Costs Variable Costs (OpEx) Users
  • 20. A Cloud Technology Reference Model Your Application Testing, Monitoring, Diagnostics and Verification Governance Architectural Views Your Problem Life Cycle (Birth, Growth, Failure, Recovery, Death) Web of Metadata Categories, Capabilities, Configuration and Dependencies Resource Management Basic Monitoring Facilities & Logistics Element Management (Split Responsibility) Their Problem Software & Hardware Infrastructure
  • 21. Software as a Service Application Application Server Middleware Database Operating System Hypervisor CPU Networking Storage YOUR DATA Backup Datacenter (Power, Cooling, Physical Security) Your Problem Their Problem
  • 22. Platform as a Service Your Application Application Server Middleware Database Operating System Hypervisor CPU Networking Storage Backup Datacenter (Power, Cooling, Physical Security) Your Problem Their Problem
  • 23. Infrastructure as a Service Your Application Your Application Server Your Middleware Your Database Your Operating System Hypervisor CPU Networking Storage Backup Datacenter (Power, Cooling, Physical Security) Your Problem Their Problem
  • 27. Encryption & Key Management Encryption on Storage Storage Encryption on Transmission Key Management Internet
  • 28. Case Study Amazon Web Services (AWS)
  • 31. Multi-Factor Authentication AWS Multi-Factor Authentication (AWS MFA)
  • 35. Summary & Predictions .. We think everyone on the planet deserves to have their own virtual data center in the cloud .. - Lew Tucker ..Cloud Computing Will Be As Influential As E-business.. - Gartner .. one of the most important transformations the federal government will go through in the next decade .. - Obama’s TIGR Team .. Who knew that the concept of security in cloud computing was even possible to imagine?.. - Scott Bradner
  • 36.

Editor's Notes

  1. Hello everybody, I am Ninh Nguyen, a CS student. My seminar topic today is Cloud Computing Security.
  2. First of all, just take a look how people concern about cloud computing. As you can see in this graph, people has been searching a lot for cloud computing in Google since 2007 especially since the first months of 2009. And other kind of computing such as grid computing is falling and cluster computing is still the same for years.
  3. At the same time, cloud computing also attracts a lot attention of media and news volume still growing over the time.
  4. So what is cloud computing? I take a quote from Larry Ellison – CEO of Oracle: “What the hell is Cloud Computing?” Why did he say that? Actually, cloud computing is too new and has a standard.
  5. Look at history, we can say Cloud Computing is the 5th generation of computing, after monolithic, client-server, web, service-oriented architecture and now it’s cloud service.
  6. I have to say that there is not any formal definition and you can find out many different definitions of cloud computing out there. Here I took definitions on Wikipedia through out the time, since 12/2007. You can see people define cloud computing quite differently through the evolution of it.
  7. Simply, I can summarize some characteristics of cloud computing. The first characters build up the word CLOUD and it’s very easy to remember. They’re Common, Location-independent, Online, Utility implies and Demand implies.The on-demand, self-service, pay-by-use modelInfrastructure is programmableApplications are composed and are built to be composableServices are delivered over the network
  8. Then, I want to introduce about infrastructure models of cloud computing.
  9. Basically there are three types of models. Public Cloud, Private Cloud and another type that mixes of public cloud and private cloud is hybrid cloud.Public clouds are run by third parties, and applications from different customers are likely to be mixed together on the cloud’s servers, storage systems, and networks. Public clouds are most often hosted away from customer premises, and they provide a way to reduce customer risk and cost by providing a flexible, even temporary extension to enterprise infrastructure.Private clouds are built for the exclusive use of one client, providing the utmost control over data, security, and quality of service. The company owns the infrastructure and has control over how applications are deployed on it. Private clouds may be deployed in an enterprise datacenter, and they also may be deployed at a co-location facility.Hybrid clouds combine both public and private cloud models. They can help to provide on-demand, externally provisioned scale. The ability to augment a private cloud with the resources of a public cloud can be used to maintain service levels in the face of rapid workload fluctuations.
  10. Now I will talk about architectural layers of cloud computing. There are also 3 types SaaS, PaaS and IaaS.
  11. Software as a service features a complete application offered as a service on demand. A single instance of the software runs on the cloud and services multiple end users or client organizations.
  12. Platform as a service encapsulates a layer of software and provides it as a service that can be used to build higher-level services.Someone producing PaaS might produce a platform by integrating an OS,middleware, application software, and even a development environment that is then provided to a customer as a serviceSomeone using PaaS would see an encapsulated service that is presented to them through an API. The customer interacts with the platform through the API, and the platform does what is necessary to manage and scale itself to provide a given level of service.
  13. Infrastructure as a service delivers basic storage and compute capabilities as standardized services over the network. Servers, storage systems, switches, routers, and other systems are pooled and made available to handle workloads that range from application components to high-performance computing applications.
  14. To summarize, here is a diagram cover relationships among SaaS, PaaS, IaaS.
  15. To clarify, I will talk about characteristics of cloud computing including of some comparisons, benefits – disadvantages and goal of cloud computing.
  16. Grid computing has been used in environments where users make few but large allocation requestsCloud computing really is about lots of small allocation requests.
  17. Diagram showing economics of cloud computing versus traditional IT, including capital expenditure (CapEx) and operational expenditure (OpEx)Cloud computing users can avoid capital expenditure (CapEx) on hardware, software, and services when they pay a provider only for what they use. Consumption is usually billed on a utility (e.g. resources consumed, like electricity) or subscription (e.g. time based, like a newspaper) basis with little or no upfront cost.
  18. And now I can sum up pros and cons of cloud computing. One of cons is Security which I will talk about right now.
  19. Now this is the second part of my talk: cloud computing security.
  20. First of all, I will describe an overview about a cloud technology reference model. You never can control everything with cloud computing. There are always two problems, yours and theirs.
  21. In SaaS, it’s your data.
  22. In PaaS, it’s your whole application.
  23. With IaaS, it’s a lot of things.
  24. Now I will list here some security issues in cloud computing.
  25. There’re two broad categories of issues: governing in the cloud and operating in the cloud.
  26. Due to limit of time, I only choose 1 selected issue which has relations with my course: cryptography to present today. It’s encryption and Key Management.
  27. Cloud computing changes the way we think about computing by removing the specifics of location from its resources. In other word, it abstracts all computing and networking resources. However, in divorcing components from location, this creates security issues that result from this lack of any perimeter. In such a world, there is only one way to secure the computing resources: strong encryption and scalable key management.From a risk management perspective, unencrypted data existent in the cloud may be considered “lost” by the customer. Application providers who are not controlling backend systems should assure that data is encrypted when being stored on the backend. Use encryption to separate data holding from data usage. Segregate the key management from the cloud provider hosting the data, creating a chain of separation. This protects both the cloud provider and customer from conflict when being compelled to provide data due to a legal mandate and can potentially solve some problems.When stipulating encryption in contract language, assure that the encryption is adhering to existing industry or government standards, as applicable.
  28. Now I will talk about a case-study: Amazon Web Service or AWS. Amazon provides 2 kinds of service: Cloud Computing Service and Support Services.Amazon Simple Storage Service (S3)Amazon Elastic Compute Cloud (EC2)Amazon SimpleDBAmazon CloudFrontAmazon Simple Queue Service (SQS)Amazon Flexible Payments Service (FPS)Amazon Mechanical Turk
  29. An X.509 Certificate consists of Public Key and a Private Key. The file containing the public key, the certificate file, must contain a base64-encoded DER certificate body. The file containing the private key, the Private Key file, must contain a base64-encoded PKCS#8 private key. The Private Key is used to authenticate requests to AWS.AWS accepts any syntactically and cryptographically valid X.509 certificates. They do not need to be from a formal Certificate Authority (CA).
  30. Here is a diagram of SHA-1 HMAC Generation.In cryptography, a keyed-Hash Message Authentication Code (HMAC or KHMAC), is a type of message authentication code (MAC) calculated using a specific algorithm involving a cryptographic hash function in combination with a secret key. Any iterative cryptographic hash function, such as MD5 or SHA-1, may be used in the calculation of an HMAC.The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm.SHA-1 (as well as SHA-0) produces a 160-bit digest from a message with a maximum length of (264 − 1) bits. SHA-1 is based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.
  31. To summary and predict, I take some quote here:Cloud Computing is more and more popular but Cloud Computing Security is a very important problem everybody or company going to use CC should be concern.
  翻译: