SlideShare uma empresa Scribd logo
1 de 6
Security in the Clouds Service Wave 2010 Panel Discussion Chair: Mike Surridge, IT Innovation ms@it-innovation.soton.ac.uk
Clouds: Pros and Cons Pros of Cloud-based ICT low up-front investment cost low maintenance costs elastic and scalable Cons of Cloud-based ICT legal, financial and societal risks operational security, continuity, user management, federation management, etc technical security: authentication, access control, accountability, user isolation, etc
Edutain@Grid Project (2006-2009)
Edutain@Grid Business Models Hosters Customers Coordinators
Edutain@Grid Architecture Cm Cm Cm Cm C C C C Co Co Co H H H H B D A D A A H H A Client layer user-friendly single sign-on Business layer business trust and security federation Management layer access to resources linked to business trust accounting and billing Real-time layer secure app protocols hoster-hoster client-hoster The Client layer The Business layer The Management layer The real-time layer
The Panel Philippe Massonet, CETIC cloud trust and security research challenges Martine Lapierre, Thales secure clouds in practice Peter Burgess, PRIO social/ethical issues Jesus Villesante, CEC the current and future European research programme

Mais conteúdo relacionado

Semelhante a Security in the Clouds Panel Chair: Mike Surridge

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET Journal
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case StudyAngie Miller
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
Tutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moranTutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moranegovernment
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...FinTech Belgium
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudPaaSword EU Project
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Mark Skilton
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranE-Government Center Moldova
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 

Semelhante a Security in the Clouds Panel Chair: Mike Surridge (20)

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Tutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moranTutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moran
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
4 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_20134 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_2013
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moran
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 

Mais de ServiceWave 2010

Massonet Philippe Panel - Security in the clouds: An Academic Perspective
Massonet Philippe Panel - Security in the clouds: An Academic PerspectiveMassonet Philippe Panel - Security in the clouds: An Academic Perspective
Massonet Philippe Panel - Security in the clouds: An Academic PerspectiveServiceWave 2010
 
Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...ServiceWave 2010
 
Usman Wajid: Service-based Application Development by Ordinary End Users and ...
Usman Wajid: Service-based Application Development by Ordinary End Users and ...Usman Wajid: Service-based Application Development by Ordinary End Users and ...
Usman Wajid: Service-based Application Development by Ordinary End Users and ...ServiceWave 2010
 
D. Meiländer, S. Gorlatch, C. Cappiello, V. Mazza, R. Kazhamiakin, and A. Buc...
D. Meiländer, S. Gorlatch, C. Cappiello,V. Mazza, R. Kazhamiakin, and A. Buc...D. Meiländer, S. Gorlatch, C. Cappiello,V. Mazza, R. Kazhamiakin, and A. Buc...
D. Meiländer, S. Gorlatch, C. Cappiello, V. Mazza, R. Kazhamiakin, and A. Buc...ServiceWave 2010
 
Maryam Razavian: A Frame of Reference for SOA Migration
Maryam Razavian: A Frame of Reference for SOA MigrationMaryam Razavian: A Frame of Reference for SOA Migration
Maryam Razavian: A Frame of Reference for SOA MigrationServiceWave 2010
 
Martine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resourcesMartine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resourcesServiceWave 2010
 
Chen Wang, Pazat, Di Napoli, Giordano: A Chemical Based Middleware for Workf...
Chen Wang, Pazat, Di Napoli, Giordano:  A Chemical Based Middleware for Workf...Chen Wang, Pazat, Di Napoli, Giordano:  A Chemical Based Middleware for Workf...
Chen Wang, Pazat, Di Napoli, Giordano: A Chemical Based Middleware for Workf...ServiceWave 2010
 
Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...
Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...
Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...ServiceWave 2010
 
Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...
Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...
Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...ServiceWave 2010
 
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...ServiceWave 2010
 
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...ServiceWave 2010
 
Scott Kirkpatrick (Hebrew University): OneLab: Federation and Testbeds
Scott Kirkpatrick (Hebrew University): OneLab: Federation and TestbedsScott Kirkpatrick (Hebrew University): OneLab: Federation and Testbeds
Scott Kirkpatrick (Hebrew University): OneLab: Federation and TestbedsServiceWave 2010
 
Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...
Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...
Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...ServiceWave 2010
 
Orestis Terzidis - Taking the Internet of Services to the Next Level
Orestis Terzidis - Taking the Internet of Services to the Next LevelOrestis Terzidis - Taking the Internet of Services to the Next Level
Orestis Terzidis - Taking the Internet of Services to the Next LevelServiceWave 2010
 
Martine Lapierre - Security & Privacy trends for Urban & transport applications
Martine Lapierre - Security & Privacy trends for Urban & transport applications Martine Lapierre - Security & Privacy trends for Urban & transport applications
Martine Lapierre - Security & Privacy trends for Urban & transport applications ServiceWave 2010
 
Mário Campolargo - Services and clouds as cornerstones of the Digital Agenda
Mário Campolargo - Services and clouds as cornerstones of the Digital AgendaMário Campolargo - Services and clouds as cornerstones of the Digital Agenda
Mário Campolargo - Services and clouds as cornerstones of the Digital AgendaServiceWave 2010
 

Mais de ServiceWave 2010 (20)

03 v pevtschin
03 v pevtschin03 v pevtschin
03 v pevtschin
 
03 v pevtschin
03 v pevtschin03 v pevtschin
03 v pevtschin
 
Massonet Philippe Panel - Security in the clouds: An Academic Perspective
Massonet Philippe Panel - Security in the clouds: An Academic PerspectiveMassonet Philippe Panel - Security in the clouds: An Academic Perspective
Massonet Philippe Panel - Security in the clouds: An Academic Perspective
 
Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...Rainer Zimmermann (European Commission): The role of the European Commission ...
Rainer Zimmermann (European Commission): The role of the European Commission ...
 
Usman Wajid: Service-based Application Development by Ordinary End Users and ...
Usman Wajid: Service-based Application Development by Ordinary End Users and ...Usman Wajid: Service-based Application Development by Ordinary End Users and ...
Usman Wajid: Service-based Application Development by Ordinary End Users and ...
 
D. Meiländer, S. Gorlatch, C. Cappiello, V. Mazza, R. Kazhamiakin, and A. Buc...
D. Meiländer, S. Gorlatch, C. Cappiello,V. Mazza, R. Kazhamiakin, and A. Buc...D. Meiländer, S. Gorlatch, C. Cappiello,V. Mazza, R. Kazhamiakin, and A. Buc...
D. Meiländer, S. Gorlatch, C. Cappiello, V. Mazza, R. Kazhamiakin, and A. Buc...
 
Maryam Razavian: A Frame of Reference for SOA Migration
Maryam Razavian: A Frame of Reference for SOA MigrationMaryam Razavian: A Frame of Reference for SOA Migration
Maryam Razavian: A Frame of Reference for SOA Migration
 
Martine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resourcesMartine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resources
 
Chen Wang, Pazat, Di Napoli, Giordano: A Chemical Based Middleware for Workf...
Chen Wang, Pazat, Di Napoli, Giordano:  A Chemical Based Middleware for Workf...Chen Wang, Pazat, Di Napoli, Giordano:  A Chemical Based Middleware for Workf...
Chen Wang, Pazat, Di Napoli, Giordano: A Chemical Based Middleware for Workf...
 
Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...
Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...
Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...
 
Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...
Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...
Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...
 
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
 
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
 
Scott Kirkpatrick (Hebrew University): OneLab: Federation and Testbeds
Scott Kirkpatrick (Hebrew University): OneLab: Federation and TestbedsScott Kirkpatrick (Hebrew University): OneLab: Federation and Testbeds
Scott Kirkpatrick (Hebrew University): OneLab: Federation and Testbeds
 
Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...
Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...
Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...
 
1 sw2010 testbeds-panel
1  sw2010 testbeds-panel1  sw2010 testbeds-panel
1 sw2010 testbeds-panel
 
Orestis Terzidis - Taking the Internet of Services to the Next Level
Orestis Terzidis - Taking the Internet of Services to the Next LevelOrestis Terzidis - Taking the Internet of Services to the Next Level
Orestis Terzidis - Taking the Internet of Services to the Next Level
 
Martine Lapierre - Security & Privacy trends for Urban & transport applications
Martine Lapierre - Security & Privacy trends for Urban & transport applications Martine Lapierre - Security & Privacy trends for Urban & transport applications
Martine Lapierre - Security & Privacy trends for Urban & transport applications
 
Mário Campolargo - Services and clouds as cornerstones of the Digital Agenda
Mário Campolargo - Services and clouds as cornerstones of the Digital AgendaMário Campolargo - Services and clouds as cornerstones of the Digital Agenda
Mário Campolargo - Services and clouds as cornerstones of the Digital Agenda
 
Fire Demos
Fire DemosFire Demos
Fire Demos
 

Security in the Clouds Panel Chair: Mike Surridge

  • 1. Security in the Clouds Service Wave 2010 Panel Discussion Chair: Mike Surridge, IT Innovation ms@it-innovation.soton.ac.uk
  • 2. Clouds: Pros and Cons Pros of Cloud-based ICT low up-front investment cost low maintenance costs elastic and scalable Cons of Cloud-based ICT legal, financial and societal risks operational security, continuity, user management, federation management, etc technical security: authentication, access control, accountability, user isolation, etc
  • 4. Edutain@Grid Business Models Hosters Customers Coordinators
  • 5. Edutain@Grid Architecture Cm Cm Cm Cm C C C C Co Co Co H H H H B D A D A A H H A Client layer user-friendly single sign-on Business layer business trust and security federation Management layer access to resources linked to business trust accounting and billing Real-time layer secure app protocols hoster-hoster client-hoster The Client layer The Business layer The Management layer The real-time layer
  • 6. The Panel Philippe Massonet, CETIC cloud trust and security research challenges Martine Lapierre, Thales secure clouds in practice Peter Burgess, PRIO social/ethical issues Jesus Villesante, CEC the current and future European research programme