SlideShare a Scribd company logo
1 of 30
Security and Privacy in Cloud Computing Ragib HasanJohns Hopkins Universityen.600.412 Spring 2010 Lecture 1 01/25/2010
Welcome to the class Administrative details When? : Monday 3pm-3.50pm Where?: Shaffer 202 Web: http://www.cs.jhu.edu/~ragib/sp10/cs412 Instructor: Ragib Hasan, 324NEB, rhasan7@jhu.edu Office hours: Monday 4pm-5pm (more TBA) 1/25/2010 2 en.600.412 Spring 2010
Goals of the course Identify the cloud computing security issues Explore cloud computing security issues Learn about latest research 1/25/2010 3 en.600.412 Spring 2010
Plan Each week, we will Pick a different cloud computing security topic Discuss general issues on the topic Read one or two latest research paper on that topic 1/25/2010 4 en.600.412 Spring 2010
Evaluations Based on paper reviews Students taking the course for credit will have to submit 1 paper review per week The reviews will be short, 1 page discussion of the paper’s pros and cons (format will be posted on the class webpage) 1/25/2010 5 en.600.412 Spring 2010
What is Cloud Computing? 1/25/2010 6 en.600.412 Spring 2010 Let’s hear from the “experts”
What is Cloud Computing? 1/25/2010 en.600.412 Spring 2010 7 The infinite wisdom of the crowds (via Google Suggest)
What is Cloud Computing? 1/25/2010 en.600.412 Spring 2010 8 We’ve redefined Cloud Computing to include everything that we already do. . . . I don’t understand what we would do differently in the light of Cloud Computing other than change the wording of some of our ads. Larry Ellison,  founder of Oracle
What is Cloud Computing? 1/25/2010 en.600.412 Spring 2010 9 It’s stupidity. It’s worse than stupidity: it’s a marketing hype campaign Richard Stallman GNU
What is Cloud Computing? 1/25/2010 en.600.412 Spring 2010 10 Cloud Computing will become a focal point of our work in security. I’m optimistic … Ron Rivest The R of RSA
So, What really is Cloud Computing? Cloud computing is a new computing paradigm, involving data and/or computation outsourcing, with Infinite and elastic resource scalability On demand “just-in-time” provisioning No upfront cost … pay-as-you-go 1/25/2010 en.600.412 Spring 2010 11 That is, use as much or as less you need, use only when you want, and pay only what you use,
The real story “Computing Utility” – holy grail of computer science in the 1960s. Code name: MULTICS 1/25/2010 en.600.412 Spring 2010 12 Why it failed? ,[object Object]
And personal computer became cheaper and stronger,[object Object]
The real story … continued 1/25/2010 en.600.412 Spring 2010 14 Post-dot-com bust, big companies ended up with large data centers, with low utilization Solution: Throw in virtualization technology, and sell the excess computing power And thus, Cloud Computing was born …
Cloud computing provides numerous economic advantages For clients: No upfront commitment in buying/leasing hardware Can scale usage according to demand Barriers to entry lowered for startups For providers: Increased utilization of datacenter resources 1/25/2010 en.600.412 Spring 2010 15
Cloud computing means selling “X as a service” IaaS: Infrastructure as a Service Selling virtualized hardware PaaS: Platform as a service Access to a configurable platform/API SaaS: Software as a service Software that runs on top of a cloud 1/25/2010 en.600.412 Spring 2010 16
Cloud computing architecture 1/25/2010 en.600.412 Spring 2010 17 e.g., Web browser SaaS, e.g., Google Docs PaaS, e.g., Google AppEngine IaaS, e.g., Amazon EC2
Different types of cloud computing 1/25/2010 en.600.412 Spring 2010 18 PaaS IaaS Microsoft Azure Clients can choose languages, but can’t change the operating system or runtime Amazon EC2 Clients can rent virtualized hardware, can control the software stack on the rented machines Google AppEngine Provides a programmable platform that can scale easily
So, if cloud computing is so great, why aren’t everyone doing it? 1/25/2010 en.600.412 Spring 2010 19 Clouds are still subject to traditional data confidentiality, integrity, availability, and privacy issues, plus some additional attacks
Companies are still afraidto use clouds 1/25/2010 en.600.412 Spring 2010 20 [Chow09ccsw]
Anatomy of fear … Confidentiality Will the sensitive data stored on a cloud remain confidential? Will cloud compromises leak confidential client data (i.e., fear of loss of control over data) Will the cloud provider itself be honest and won’t peek into the data? 1/25/2010 en.600.412 Spring 2010 21
Anatomy of fear … Integrity How do I know that the cloud provider is doing the computations correctly? How do I ensure that the cloud provider really stored my data without tampering with it? 1/25/2010 en.600.412 Spring 2010 22
Anatomy of fear … Availability Will critical systems go down at the client, if the provider is attacked in a Denial of Service attack? What happens if cloud provider goes out of business? 1/25/2010 en.600.412 Spring 2010 23
Anatomy of fear … Privacy issues raised via massive data mining Cloud now stores data from a lot of clients, and can run data mining algorithms to get large amounts of information on clients 1/25/2010 en.600.412 Spring 2010 24
Anatomy of fear … Increased attack surface Entity outside the organization now stores and computes data, and so Attackers can now target the communication link between cloud provider and client Cloud provider employees can be phished 1/25/2010 en.600.412 Spring 2010 25
Anatomy of fear … Auditability and forensics Difficult to audit data held outside organization in a cloud Forensics also made difficult since now clients don’t maintain data locally 1/25/2010 en.600.412 Spring 2010 26
Anatomy of fear … Legal quagmire and transitive trust issues Who is responsible for complying with regulations (e.g., SOX, HIPAA, GLBA)? If cloud provider subcontracts to third party clouds, will the data still be secure? 1/25/2010 en.600.412 Spring 2010 27
What we need is to … Adapt well known techniques for resolving some cloud security issues Perform new research and innovate to make clouds secure 1/25/2010 en.600.412 Spring 2010 28
Final quote 1/25/2010 en.600.412 Spring 2010 29 [Cloud Computing] is a security nightmare and it can't be handled in traditional ways. John Chambers CISCO CEO
1/25/2010 30 en.600.412 Spring 2010 Further Reading Armbrust et al., Above the Clouds: A Berkeley View of Cloud Computing, UC Berkeley Tech Report UCB/EECS-2009-28, February 2009. Chow et al., Cloud Computing: Outsourcing Computation without Outsourcing Control, 1st ACM Cloud Computing Security Workshop, November 2009.

More Related Content

What's hot

Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Client Centric Consistency Model
Client Centric Consistency ModelClient Centric Consistency Model
Client Centric Consistency ModelRajat Kumar
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architectureMohammad Ilyas Malik
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing riskssripriya78
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloudsolarisyourep
 
Chapter 5 Database Transaction Management
Chapter 5 Database Transaction ManagementChapter 5 Database Transaction Management
Chapter 5 Database Transaction ManagementEddyzulham Mahluzydde
 
Naming in Distributed Systems
Naming in Distributed SystemsNaming in Distributed Systems
Naming in Distributed SystemsNandakumar P
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsDr. Sunil Kr. Pandey
 
Unit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed SystemsUnit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed SystemsNandakumar P
 
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...Majid Hajibaba
 
Public vs private vs hybrid cloud what is best for your business-
Public vs private vs hybrid cloud  what is best for your business-Public vs private vs hybrid cloud  what is best for your business-
Public vs private vs hybrid cloud what is best for your business-Everdata Technologies
 

What's hot (20)

Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Client Centric Consistency Model
Client Centric Consistency ModelClient Centric Consistency Model
Client Centric Consistency Model
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architecture
 
BIGDATA ANALYTICS LAB MANUAL final.pdf
BIGDATA  ANALYTICS LAB MANUAL final.pdfBIGDATA  ANALYTICS LAB MANUAL final.pdf
BIGDATA ANALYTICS LAB MANUAL final.pdf
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing risks
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
 
Distributed Systems Naming
Distributed Systems NamingDistributed Systems Naming
Distributed Systems Naming
 
Chapter 5 Database Transaction Management
Chapter 5 Database Transaction ManagementChapter 5 Database Transaction Management
Chapter 5 Database Transaction Management
 
Naming in Distributed Systems
Naming in Distributed SystemsNaming in Distributed Systems
Naming in Distributed Systems
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Unit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed SystemsUnit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed Systems
 
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Public vs private vs hybrid cloud what is best for your business-
Public vs private vs hybrid cloud  what is best for your business-Public vs private vs hybrid cloud  what is best for your business-
Public vs private vs hybrid cloud what is best for your business-
 
Cloud security
Cloud securityCloud security
Cloud security
 

Viewers also liked

Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computingsaurabh soni
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingJohn D. Johnson
 
Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...PRISMACLOUD Project
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingAnkit Singh
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewragibhasan
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudChris Swan
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to BottomIstiyak Siddiquee
 
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...acinfotec
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computingAhmed Nour
 
Addictive manufacturing
Addictive manufacturingAddictive manufacturing
Addictive manufacturingRudi Pivetta
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
TẦM QUAN TRỌNG CỦA SOCIAL MEDIA MARKETING
TẦM QUAN TRỌNG CỦA SOCIAL MEDIA MARKETINGTẦM QUAN TRỌNG CỦA SOCIAL MEDIA MARKETING
TẦM QUAN TRỌNG CỦA SOCIAL MEDIA MARKETINGInternetMarketing_hn
 
Sheffield Hallam Degree
Sheffield Hallam DegreeSheffield Hallam Degree
Sheffield Hallam DegreeTong Chong Yee
 
About gate entrance exam 2016
About gate entrance exam 2016About gate entrance exam 2016
About gate entrance exam 2016meghasingh812
 
mcjunkin_studies-compendium_web
mcjunkin_studies-compendium_webmcjunkin_studies-compendium_web
mcjunkin_studies-compendium_webJonathon McJunkin
 
Analisis de articulos- (2)
Analisis de articulos- (2)Analisis de articulos- (2)
Analisis de articulos- (2)Ana Perez
 

Viewers also liked (20)

Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
 
Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloud
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to Bottom
 
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
Addictive manufacturing
Addictive manufacturingAddictive manufacturing
Addictive manufacturing
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
TẦM QUAN TRỌNG CỦA SOCIAL MEDIA MARKETING
TẦM QUAN TRỌNG CỦA SOCIAL MEDIA MARKETINGTẦM QUAN TRỌNG CỦA SOCIAL MEDIA MARKETING
TẦM QUAN TRỌNG CỦA SOCIAL MEDIA MARKETING
 
D004 nuovo-obbligo-formativo
D004 nuovo-obbligo-formativoD004 nuovo-obbligo-formativo
D004 nuovo-obbligo-formativo
 
Sheffield Hallam Degree
Sheffield Hallam DegreeSheffield Hallam Degree
Sheffield Hallam Degree
 
About gate entrance exam 2016
About gate entrance exam 2016About gate entrance exam 2016
About gate entrance exam 2016
 
mcjunkin_studies-compendium_web
mcjunkin_studies-compendium_webmcjunkin_studies-compendium_web
mcjunkin_studies-compendium_web
 
Fondo Professioni per Argi
Fondo Professioni per ArgiFondo Professioni per Argi
Fondo Professioni per Argi
 
Analisis de articulos- (2)
Analisis de articulos- (2)Analisis de articulos- (2)
Analisis de articulos- (2)
 

Similar to Security and Privacy Issues in Cloud Computing

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Securitysyrinxtech
 
Above the Clouds: A View From Academia
Above the Clouds: A View From AcademiaAbove the Clouds: A View From Academia
Above the Clouds: A View From AcademiaEduserv
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud ComputingJulie May
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
云计算及其应用
云计算及其应用云计算及其应用
云计算及其应用lantianlcdx
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...AJASTJournal
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Associate Professor in VSB Coimbatore
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
 
Paper id 21201458
Paper id 21201458Paper id 21201458
Paper id 21201458IJRAT
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...Claire Webber
 

Similar to Security and Privacy Issues in Cloud Computing (20)

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Ppt On Cc
Ppt On CcPpt On Cc
Ppt On Cc
 
Above the Clouds: A View From Academia
Above the Clouds: A View From AcademiaAbove the Clouds: A View From Academia
Above the Clouds: A View From Academia
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud Computing
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
云计算及其应用
云计算及其应用云计算及其应用
云计算及其应用
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Slides 530 a2
Slides 530 a2Slides 530 a2
Slides 530 a2
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Paper id 21201458
Paper id 21201458Paper id 21201458
Paper id 21201458
 
cloud
cloudcloud
cloud
 
Cloud security
Cloud security Cloud security
Cloud security
 
Handout1o
Handout1oHandout1o
Handout1o
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
 
Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
 

More from ragibhasan

Dw bobs-shikkhok
Dw bobs-shikkhokDw bobs-shikkhok
Dw bobs-shikkhokragibhasan
 
600.412.Lecture02
600.412.Lecture02600.412.Lecture02
600.412.Lecture02ragibhasan
 
600.412.Lecture03
600.412.Lecture03600.412.Lecture03
600.412.Lecture03ragibhasan
 
600.412.Lecture05
600.412.Lecture05600.412.Lecture05
600.412.Lecture05ragibhasan
 
600.412.Lecture07
600.412.Lecture07600.412.Lecture07
600.412.Lecture07ragibhasan
 
600.412.Lecture06
600.412.Lecture06600.412.Lecture06
600.412.Lecture06ragibhasan
 
600.412.Lecture08
600.412.Lecture08600.412.Lecture08
600.412.Lecture08ragibhasan
 
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...ragibhasan
 

More from ragibhasan (8)

Dw bobs-shikkhok
Dw bobs-shikkhokDw bobs-shikkhok
Dw bobs-shikkhok
 
600.412.Lecture02
600.412.Lecture02600.412.Lecture02
600.412.Lecture02
 
600.412.Lecture03
600.412.Lecture03600.412.Lecture03
600.412.Lecture03
 
600.412.Lecture05
600.412.Lecture05600.412.Lecture05
600.412.Lecture05
 
600.412.Lecture07
600.412.Lecture07600.412.Lecture07
600.412.Lecture07
 
600.412.Lecture06
600.412.Lecture06600.412.Lecture06
600.412.Lecture06
 
600.412.Lecture08
600.412.Lecture08600.412.Lecture08
600.412.Lecture08
 
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealog...
 

Recently uploaded

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 

Recently uploaded (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 

Security and Privacy Issues in Cloud Computing

  • 1. Security and Privacy in Cloud Computing Ragib HasanJohns Hopkins Universityen.600.412 Spring 2010 Lecture 1 01/25/2010
  • 2. Welcome to the class Administrative details When? : Monday 3pm-3.50pm Where?: Shaffer 202 Web: http://www.cs.jhu.edu/~ragib/sp10/cs412 Instructor: Ragib Hasan, 324NEB, rhasan7@jhu.edu Office hours: Monday 4pm-5pm (more TBA) 1/25/2010 2 en.600.412 Spring 2010
  • 3. Goals of the course Identify the cloud computing security issues Explore cloud computing security issues Learn about latest research 1/25/2010 3 en.600.412 Spring 2010
  • 4. Plan Each week, we will Pick a different cloud computing security topic Discuss general issues on the topic Read one or two latest research paper on that topic 1/25/2010 4 en.600.412 Spring 2010
  • 5. Evaluations Based on paper reviews Students taking the course for credit will have to submit 1 paper review per week The reviews will be short, 1 page discussion of the paper’s pros and cons (format will be posted on the class webpage) 1/25/2010 5 en.600.412 Spring 2010
  • 6. What is Cloud Computing? 1/25/2010 6 en.600.412 Spring 2010 Let’s hear from the “experts”
  • 7. What is Cloud Computing? 1/25/2010 en.600.412 Spring 2010 7 The infinite wisdom of the crowds (via Google Suggest)
  • 8. What is Cloud Computing? 1/25/2010 en.600.412 Spring 2010 8 We’ve redefined Cloud Computing to include everything that we already do. . . . I don’t understand what we would do differently in the light of Cloud Computing other than change the wording of some of our ads. Larry Ellison, founder of Oracle
  • 9. What is Cloud Computing? 1/25/2010 en.600.412 Spring 2010 9 It’s stupidity. It’s worse than stupidity: it’s a marketing hype campaign Richard Stallman GNU
  • 10. What is Cloud Computing? 1/25/2010 en.600.412 Spring 2010 10 Cloud Computing will become a focal point of our work in security. I’m optimistic … Ron Rivest The R of RSA
  • 11. So, What really is Cloud Computing? Cloud computing is a new computing paradigm, involving data and/or computation outsourcing, with Infinite and elastic resource scalability On demand “just-in-time” provisioning No upfront cost … pay-as-you-go 1/25/2010 en.600.412 Spring 2010 11 That is, use as much or as less you need, use only when you want, and pay only what you use,
  • 12.
  • 13.
  • 14. The real story … continued 1/25/2010 en.600.412 Spring 2010 14 Post-dot-com bust, big companies ended up with large data centers, with low utilization Solution: Throw in virtualization technology, and sell the excess computing power And thus, Cloud Computing was born …
  • 15. Cloud computing provides numerous economic advantages For clients: No upfront commitment in buying/leasing hardware Can scale usage according to demand Barriers to entry lowered for startups For providers: Increased utilization of datacenter resources 1/25/2010 en.600.412 Spring 2010 15
  • 16. Cloud computing means selling “X as a service” IaaS: Infrastructure as a Service Selling virtualized hardware PaaS: Platform as a service Access to a configurable platform/API SaaS: Software as a service Software that runs on top of a cloud 1/25/2010 en.600.412 Spring 2010 16
  • 17. Cloud computing architecture 1/25/2010 en.600.412 Spring 2010 17 e.g., Web browser SaaS, e.g., Google Docs PaaS, e.g., Google AppEngine IaaS, e.g., Amazon EC2
  • 18. Different types of cloud computing 1/25/2010 en.600.412 Spring 2010 18 PaaS IaaS Microsoft Azure Clients can choose languages, but can’t change the operating system or runtime Amazon EC2 Clients can rent virtualized hardware, can control the software stack on the rented machines Google AppEngine Provides a programmable platform that can scale easily
  • 19. So, if cloud computing is so great, why aren’t everyone doing it? 1/25/2010 en.600.412 Spring 2010 19 Clouds are still subject to traditional data confidentiality, integrity, availability, and privacy issues, plus some additional attacks
  • 20. Companies are still afraidto use clouds 1/25/2010 en.600.412 Spring 2010 20 [Chow09ccsw]
  • 21. Anatomy of fear … Confidentiality Will the sensitive data stored on a cloud remain confidential? Will cloud compromises leak confidential client data (i.e., fear of loss of control over data) Will the cloud provider itself be honest and won’t peek into the data? 1/25/2010 en.600.412 Spring 2010 21
  • 22. Anatomy of fear … Integrity How do I know that the cloud provider is doing the computations correctly? How do I ensure that the cloud provider really stored my data without tampering with it? 1/25/2010 en.600.412 Spring 2010 22
  • 23. Anatomy of fear … Availability Will critical systems go down at the client, if the provider is attacked in a Denial of Service attack? What happens if cloud provider goes out of business? 1/25/2010 en.600.412 Spring 2010 23
  • 24. Anatomy of fear … Privacy issues raised via massive data mining Cloud now stores data from a lot of clients, and can run data mining algorithms to get large amounts of information on clients 1/25/2010 en.600.412 Spring 2010 24
  • 25. Anatomy of fear … Increased attack surface Entity outside the organization now stores and computes data, and so Attackers can now target the communication link between cloud provider and client Cloud provider employees can be phished 1/25/2010 en.600.412 Spring 2010 25
  • 26. Anatomy of fear … Auditability and forensics Difficult to audit data held outside organization in a cloud Forensics also made difficult since now clients don’t maintain data locally 1/25/2010 en.600.412 Spring 2010 26
  • 27. Anatomy of fear … Legal quagmire and transitive trust issues Who is responsible for complying with regulations (e.g., SOX, HIPAA, GLBA)? If cloud provider subcontracts to third party clouds, will the data still be secure? 1/25/2010 en.600.412 Spring 2010 27
  • 28. What we need is to … Adapt well known techniques for resolving some cloud security issues Perform new research and innovate to make clouds secure 1/25/2010 en.600.412 Spring 2010 28
  • 29. Final quote 1/25/2010 en.600.412 Spring 2010 29 [Cloud Computing] is a security nightmare and it can't be handled in traditional ways. John Chambers CISCO CEO
  • 30. 1/25/2010 30 en.600.412 Spring 2010 Further Reading Armbrust et al., Above the Clouds: A Berkeley View of Cloud Computing, UC Berkeley Tech Report UCB/EECS-2009-28, February 2009. Chow et al., Cloud Computing: Outsourcing Computation without Outsourcing Control, 1st ACM Cloud Computing Security Workshop, November 2009.