SlideShare a Scribd company logo
Research Supervisor: Dr. Kazi Sakib
  Associate Professor and BIT Program Chair, IIT, DU




              Asif Imran :BIT0119


                          Provenance Research presentation   1
• Proposed Research


• Existing Research Work


• Cloud Provenance Detection: Background
  Study


• Experimental Environment

                      Provenance Research presentation   2
How can an effective provenance model from
system logs be derived that will ensure improved
management of cloud data forensics?




                       Provenance Research presentation   3
Provenance Research presentation   4
Existing Research




         Provenance Research presentation   5
   Provenance Detection: Scientific Workflows
    [1], [2], [3], [4]

   Accountability as a Service (AaaS) [5], [6],
    [7]

   Hidden Provenance information [8]




                         Provenance Research presentation   6
   Cloud Security Alliance (CSA) [9], [10]

    ◦ Abuse and nefarious use of cloud computing

    ◦ Insecure application programming interfaces

    ◦ Malicious insiders

    ◦ Data loss and leakages

    ◦ Unknown risk profile


                               Provenance Research presentation   7
   Provenance for secure cloud administration:
    limited availability



   System,     file-centric  provenance                   data
    capturing: limited extent




                        Provenance Research presentation          8
   Log-based provenance detection: minimal
    effort



   Provenance storage and representation




                       Provenance Research presentation   9
Cloud Provenance:
Background Study




        Provenance Research presentation   10
Service          Reason of Failure (Assumed)                     Duration



Amazon S3   Authentication mechanisms overloaded by               2 hours
            remote attacks (no action taken)


 Google     Error from the end of the maintenance                 4.6 hours
AppEngine   engineer’s program (no action taken)


  Gmail     The contact list mechanism crashed (tested            1.4 hours
            for bugs)




                               Provenance Research presentation               11
Provenance Research presentation   12
Provenance Research presentation   13
   Cloud Environment

   Network Infrastructure

   Database Management System

   Servers



                        Provenance Research presentation   14
Experimental Environment for
 Cloud Provenance Detection




             Provenance Research presentation   15
Server                                             Hardware
Cloud Controller node which runs the following:    Processor: 64-bit x86
        Network,                                   Memory: 16 GB RAM
        Volume                                     Disk space: 1900 GB (SATA or SAS or SSD)
        API                                        Volume storage: 100 GB (SATA) for volumes attached to the
        Scheduler                                  compute nodes
        Image services                             Network: one 1 GB Network Interface Card
                                                   (NIC) minimum
Compute node which runs the following:             Processor: 64-bit x86
        Virtual instances                          Memory: 16 GB RAM (32 GB minimum)
        System log information                     Disk space: 2 TB GB (SATA)
        Communication with the Compute             Network: two 1 GB NICs




                                                  Provenance Research presentation                         16
   Compute

   Nova-Network

   Nova-Scheduler

   Glance



                     Provenance Research presentation   17
Glance


                         Keystone


                            Nova




Provenance Research presentation    18
Images: Windows,
                    CentOS



Provenance Research presentation       19
Provenance Research presentation   20
   [1] A. Haeberlen, ―A case for the accountable cloud,‖ ACM SIGOPS, Operating
    Systems Review, vol. 44, no. 2, 2010, pp. 52-57.

   [2] S. Pearson and A. Benameur, ―Privacy, Security and Trust Issues Arising from
    Cloud Computing,‖ Proc. The 2nd International Conference on Cloud Computing
    2010, IEEE, 2010, pp. 693-702.

   [3] M. Vouk, ―Cloud computing—Issues, research and implementations,‖ Proc. 30th
    International Conference on Information Technology Interfaces, 2008 (ITI 2008)
    IEEE, 2008, pp. 31-40.

   [4] S.B. Davidson, S. Khanna, S. Roy, J. Stoyanovich, V. Tannen and Y. Chen, ―On
    provenance and privacy,‖ Proc. Proceedings of the 14th International Conference on
    Database Theory (ICDT), ACM, 2011, pp. 3-10.

   [5] J. Yao, S. Chen, C. Wang, D. Levy and J. Zic, ―Accountability as a Service for the
    Cloud,‖ Proc. IEEE Service Computing Conference 2010 (SCC 2010), IEEE, 2010, pp.
    81-88.

   [6] J. Wei, X. Zhang, G. Ammons, V. Bala and P. Ning, ―Managing security of virtual
    machine images in a cloud environment,‖ ACM, 2009, pp. 91-96.




                                           Provenance Research presentation                  21
   [7] W.Z.P. Ning, X.Z.G. Ammons, R. Wang and V. Bala, ―Always Upto- date–Scalable Offline
    Patching of VM Images in a Compute Cloud,‖ IBM Technical Papers, no. RC24956, 2010.


   [8] R.K.L. Ko, B.S. Lee and S. Pearson, ―Towards Achieving Accountability, Auditability and
    Trust in Cloud Computing,‖ Proc. International workshop on Cloud Computing: Architecture,
    Algorithms and Applications (CloudComp2011), Springer, 2011, pp. 5.

   [9] Cloud Security Alliance, ―Top Threats to Cloud Computing                  (V1.0),‖   2010;
    https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf.

   [10] J. Brodkin, ―Gartner: Seven cloud-computing security risks,‖ Infoworld, 2008, pp. 1–3.

   [11] W. Zhou, M. Sherr, T. Tao, X. Li, B.T. Loo and Y. Mao, ―Efficient querying and
    maintenance of network provenance at internet-scale,‖ Proc. 2010 International Conference
    on Management of Data (SIGMOD 2010), ACM, 2010, pp. 615-626.

   [12] M. Mowbray, S. Pearson and Y. Shen, ―Enhancing privacy in cloud computing via
    policy-based obfuscation,‖ The Journal of Supercomputing, 2010, pp. 1-25.

   [13] ―OpenStack Compute Administration Guide‖ 2011




                                               Provenance Research presentation                      22
(asifimran33@gmail.com)



   Provenance Research presentation   23

More Related Content

What's hot

SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...Nexgen Technology
 
Big Data Visualization Problem in IT Management
Big Data Visualization Problem in IT ManagementBig Data Visualization Problem in IT Management
Big Data Visualization Problem in IT Managementbigdataviz_bay
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationLeMeniz Infotech
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPapitha Velumani
 
Ieee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsIeee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsHarish PG
 
Open Science Data Cloud (IEEE Cloud 2011)
Open Science Data Cloud (IEEE Cloud 2011)Open Science Data Cloud (IEEE Cloud 2011)
Open Science Data Cloud (IEEE Cloud 2011)Robert Grossman
 
Interactive Latency in Big Data Visualization
Interactive Latency in Big Data VisualizationInteractive Latency in Big Data Visualization
Interactive Latency in Big Data Visualizationbigdataviz_bay
 
Tees an efficient search scheme over
Tees an efficient search scheme overTees an efficient search scheme over
Tees an efficient search scheme overKumar Dlk
 
Modeling and Provisioning IoT Cloud Systems for Testing Uncertainties
Modeling and Provisioning IoT Cloud Systems for Testing UncertaintiesModeling and Provisioning IoT Cloud Systems for Testing Uncertainties
Modeling and Provisioning IoT Cloud Systems for Testing UncertaintiesHong-Linh Truong
 
An Overview of Bionimbus (March 2010)
An Overview of Bionimbus (March 2010)An Overview of Bionimbus (March 2010)
An Overview of Bionimbus (March 2010)Robert Grossman
 
Visual cryptography for hybrid approach
Visual cryptography for hybrid approachVisual cryptography for hybrid approach
Visual cryptography for hybrid approachSuprajareddy Allu
 
Searchable Symmetric Encryption with Forward Search Privacy
Searchable Symmetric Encryption with Forward Search PrivacySearchable Symmetric Encryption with Forward Search Privacy
Searchable Symmetric Encryption with Forward Search PrivacyJAYAPRAKASH JPINFOTECH
 
Open Science Data Cloud - CCA 11
Open Science Data Cloud - CCA 11Open Science Data Cloud - CCA 11
Open Science Data Cloud - CCA 11Robert Grossman
 
Bionimbus - Northwestern CGI Workshop 4-21-2011
Bionimbus - Northwestern CGI Workshop 4-21-2011Bionimbus - Northwestern CGI Workshop 4-21-2011
Bionimbus - Northwestern CGI Workshop 4-21-2011Robert Grossman
 
Bionimbus Cambridge Workshop (3-28-11, v7)
Bionimbus Cambridge Workshop (3-28-11, v7)Bionimbus Cambridge Workshop (3-28-11, v7)
Bionimbus Cambridge Workshop (3-28-11, v7)Robert Grossman
 
Large Scale On-Demand Image Processing For Disaster Relief
Large Scale On-Demand Image Processing For Disaster ReliefLarge Scale On-Demand Image Processing For Disaster Relief
Large Scale On-Demand Image Processing For Disaster ReliefRobert Grossman
 
Big data visualization frameworks and applications at Kitware
Big data visualization frameworks and applications at KitwareBig data visualization frameworks and applications at Kitware
Big data visualization frameworks and applications at Kitwarebigdataviz_bay
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualizationbigdataviz_bay
 

What's hot (20)

SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
 
V cnsms
V cnsmsV cnsms
V cnsms
 
Big Data Visualization Problem in IT Management
Big Data Visualization Problem in IT ManagementBig Data Visualization Problem in IT Management
Big Data Visualization Problem in IT Management
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Ieee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsIeee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projects
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Open Science Data Cloud (IEEE Cloud 2011)
Open Science Data Cloud (IEEE Cloud 2011)Open Science Data Cloud (IEEE Cloud 2011)
Open Science Data Cloud (IEEE Cloud 2011)
 
Interactive Latency in Big Data Visualization
Interactive Latency in Big Data VisualizationInteractive Latency in Big Data Visualization
Interactive Latency in Big Data Visualization
 
Tees an efficient search scheme over
Tees an efficient search scheme overTees an efficient search scheme over
Tees an efficient search scheme over
 
Modeling and Provisioning IoT Cloud Systems for Testing Uncertainties
Modeling and Provisioning IoT Cloud Systems for Testing UncertaintiesModeling and Provisioning IoT Cloud Systems for Testing Uncertainties
Modeling and Provisioning IoT Cloud Systems for Testing Uncertainties
 
An Overview of Bionimbus (March 2010)
An Overview of Bionimbus (March 2010)An Overview of Bionimbus (March 2010)
An Overview of Bionimbus (March 2010)
 
Visual cryptography for hybrid approach
Visual cryptography for hybrid approachVisual cryptography for hybrid approach
Visual cryptography for hybrid approach
 
Searchable Symmetric Encryption with Forward Search Privacy
Searchable Symmetric Encryption with Forward Search PrivacySearchable Symmetric Encryption with Forward Search Privacy
Searchable Symmetric Encryption with Forward Search Privacy
 
Open Science Data Cloud - CCA 11
Open Science Data Cloud - CCA 11Open Science Data Cloud - CCA 11
Open Science Data Cloud - CCA 11
 
Bionimbus - Northwestern CGI Workshop 4-21-2011
Bionimbus - Northwestern CGI Workshop 4-21-2011Bionimbus - Northwestern CGI Workshop 4-21-2011
Bionimbus - Northwestern CGI Workshop 4-21-2011
 
Bionimbus Cambridge Workshop (3-28-11, v7)
Bionimbus Cambridge Workshop (3-28-11, v7)Bionimbus Cambridge Workshop (3-28-11, v7)
Bionimbus Cambridge Workshop (3-28-11, v7)
 
Large Scale On-Demand Image Processing For Disaster Relief
Large Scale On-Demand Image Processing For Disaster ReliefLarge Scale On-Demand Image Processing For Disaster Relief
Large Scale On-Demand Image Processing For Disaster Relief
 
Big data visualization frameworks and applications at Kitware
Big data visualization frameworks and applications at KitwareBig data visualization frameworks and applications at Kitware
Big data visualization frameworks and applications at Kitware
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
 

Viewers also liked

5 facets of cloud computing - Presentation to AGBC
5 facets of cloud computing - Presentation to AGBC5 facets of cloud computing - Presentation to AGBC
5 facets of cloud computing - Presentation to AGBCRaymond Gao
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentationPriyanka Sharma
 
Howest presentation "Cloud computing"
Howest presentation "Cloud computing"Howest presentation "Cloud computing"
Howest presentation "Cloud computing"Philippe Creytens
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storageIGEEKS TECHNOLOGIES
 
Cloud computing presentation
Cloud computing  presentationCloud computing  presentation
Cloud computing presentationAkshra Gurav
 
What is cloud backup?
What is cloud backup?What is cloud backup?
What is cloud backup?Asigra
 
My Presentation on Cloud Computing
My Presentation on Cloud ComputingMy Presentation on Cloud Computing
My Presentation on Cloud ComputingPravin Sable
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentationWilliam Mann
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing PptAnjoum .
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised PresentationMayank Aggarwal
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing PresentationVivek Ravindran
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentationWael Chaa
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing BasicsSagar Sane
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 

Viewers also liked (17)

5 facets of cloud computing - Presentation to AGBC
5 facets of cloud computing - Presentation to AGBC5 facets of cloud computing - Presentation to AGBC
5 facets of cloud computing - Presentation to AGBC
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Howest presentation "Cloud computing"
Howest presentation "Cloud computing"Howest presentation "Cloud computing"
Howest presentation "Cloud computing"
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
Cloud computing presentation
Cloud computing  presentationCloud computing  presentation
Cloud computing presentation
 
What is cloud backup?
What is cloud backup?What is cloud backup?
What is cloud backup?
 
My Presentation on Cloud Computing
My Presentation on Cloud ComputingMy Presentation on Cloud Computing
My Presentation on Cloud Computing
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentation
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing Ppt
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Présentation cloud computing
Présentation cloud computingPrésentation cloud computing
Présentation cloud computing
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 

Similar to Provenance based presentation on cloud computing security

Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudSwapnil Salunke
 
Computing Outside The Box June 2009
Computing Outside The Box June 2009Computing Outside The Box June 2009
Computing Outside The Box June 2009Ian Foster
 
Openstack Pakistan intro
Openstack Pakistan introOpenstack Pakistan intro
Openstack Pakistan introAffan Syed
 
Challenges in Cloud Forensics
Challenges in Cloud ForensicsChallenges in Cloud Forensics
Challenges in Cloud ForensicsGayan Weerarathna
 
Openstack Pakistan Workshop (intro)
Openstack Pakistan Workshop (intro)Openstack Pakistan Workshop (intro)
Openstack Pakistan Workshop (intro)Affan Syed
 
Cloud Achitecture and Security.pptx
Cloud Achitecture and Security.pptxCloud Achitecture and Security.pptx
Cloud Achitecture and Security.pptxIssahakukuwereJalilu
 
Cloud computing and bioinformatics
Cloud computing and bioinformaticsCloud computing and bioinformatics
Cloud computing and bioinformaticsEnis Afgan
 
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...Jorge Cardoso
 
Cloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsCloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsSandeep Saxena
 
Advanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest FiresAdvanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest FiresIvo Andreev
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
 
Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...dhanarajp
 
CPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge ProgrammingCPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge ProgrammingStephan Haller
 
Computing Outside The Box
Computing Outside The BoxComputing Outside The Box
Computing Outside The BoxIan Foster
 
Computing Outside The Box September 2009
Computing Outside The Box September 2009Computing Outside The Box September 2009
Computing Outside The Box September 2009Ian Foster
 
Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Amazon Web Services
 

Similar to Provenance based presentation on cloud computing security (20)

Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the Cloud
 
Computing Outside The Box June 2009
Computing Outside The Box June 2009Computing Outside The Box June 2009
Computing Outside The Box June 2009
 
Openstack Pakistan intro
Openstack Pakistan introOpenstack Pakistan intro
Openstack Pakistan intro
 
Challenges in Cloud Forensics
Challenges in Cloud ForensicsChallenges in Cloud Forensics
Challenges in Cloud Forensics
 
Paper444012-4014
Paper444012-4014Paper444012-4014
Paper444012-4014
 
Openstack Pakistan Workshop (intro)
Openstack Pakistan Workshop (intro)Openstack Pakistan Workshop (intro)
Openstack Pakistan Workshop (intro)
 
A Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVMA Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVM
 
Cloud Achitecture and Security.pptx
Cloud Achitecture and Security.pptxCloud Achitecture and Security.pptx
Cloud Achitecture and Security.pptx
 
Cloud computing and bioinformatics
Cloud computing and bioinformaticsCloud computing and bioinformatics
Cloud computing and bioinformatics
 
Dice presents-feb2014
Dice presents-feb2014Dice presents-feb2014
Dice presents-feb2014
 
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
 
Cloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsCloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security Metrics
 
Advanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest FiresAdvanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest Fires
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...
 
Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...
 
CPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge ProgrammingCPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge Programming
 
Computing Outside The Box
Computing Outside The BoxComputing Outside The Box
Computing Outside The Box
 
Computing Outside The Box September 2009
Computing Outside The Box September 2009Computing Outside The Box September 2009
Computing Outside The Box September 2009
 
Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 

More from Asif Anik

Monte carlo presentation for analysis of business growth
Monte carlo presentation for analysis of business growthMonte carlo presentation for analysis of business growth
Monte carlo presentation for analysis of business growthAsif Anik
 
Analysis of mysql and postgresql
Analysis of mysql and postgresqlAnalysis of mysql and postgresql
Analysis of mysql and postgresqlAsif Anik
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysisAsif Anik
 
Panacea presentation for teh institute of information technology (2)
Panacea presentation for teh institute of information technology (2)Panacea presentation for teh institute of information technology (2)
Panacea presentation for teh institute of information technology (2)Asif Anik
 
Core values of IIT
Core values of IITCore values of IIT
Core values of IITAsif Anik
 
Internship report presentation on cloud computing
Internship report presentation on cloud computingInternship report presentation on cloud computing
Internship report presentation on cloud computingAsif Anik
 
Midterm presentation
Midterm presentationMidterm presentation
Midterm presentationAsif Anik
 
Cloud presentation for marketing purpose
Cloud presentation for marketing purposeCloud presentation for marketing purpose
Cloud presentation for marketing purposeAsif Anik
 
Cloud presentation for marketing purpose
Cloud presentation for marketing purposeCloud presentation for marketing purpose
Cloud presentation for marketing purposeAsif Anik
 

More from Asif Anik (9)

Monte carlo presentation for analysis of business growth
Monte carlo presentation for analysis of business growthMonte carlo presentation for analysis of business growth
Monte carlo presentation for analysis of business growth
 
Analysis of mysql and postgresql
Analysis of mysql and postgresqlAnalysis of mysql and postgresql
Analysis of mysql and postgresql
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysis
 
Panacea presentation for teh institute of information technology (2)
Panacea presentation for teh institute of information technology (2)Panacea presentation for teh institute of information technology (2)
Panacea presentation for teh institute of information technology (2)
 
Core values of IIT
Core values of IITCore values of IIT
Core values of IIT
 
Internship report presentation on cloud computing
Internship report presentation on cloud computingInternship report presentation on cloud computing
Internship report presentation on cloud computing
 
Midterm presentation
Midterm presentationMidterm presentation
Midterm presentation
 
Cloud presentation for marketing purpose
Cloud presentation for marketing purposeCloud presentation for marketing purpose
Cloud presentation for marketing purpose
 
Cloud presentation for marketing purpose
Cloud presentation for marketing purposeCloud presentation for marketing purpose
Cloud presentation for marketing purpose
 

Recently uploaded

Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024TopCSSGallery
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 

Recently uploaded (20)

Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 

Provenance based presentation on cloud computing security

  • 1. Research Supervisor: Dr. Kazi Sakib Associate Professor and BIT Program Chair, IIT, DU Asif Imran :BIT0119 Provenance Research presentation 1
  • 2. • Proposed Research • Existing Research Work • Cloud Provenance Detection: Background Study • Experimental Environment Provenance Research presentation 2
  • 3. How can an effective provenance model from system logs be derived that will ensure improved management of cloud data forensics? Provenance Research presentation 3
  • 5. Existing Research Provenance Research presentation 5
  • 6. Provenance Detection: Scientific Workflows [1], [2], [3], [4]  Accountability as a Service (AaaS) [5], [6], [7]  Hidden Provenance information [8] Provenance Research presentation 6
  • 7. Cloud Security Alliance (CSA) [9], [10] ◦ Abuse and nefarious use of cloud computing ◦ Insecure application programming interfaces ◦ Malicious insiders ◦ Data loss and leakages ◦ Unknown risk profile Provenance Research presentation 7
  • 8. Provenance for secure cloud administration: limited availability  System, file-centric provenance data capturing: limited extent Provenance Research presentation 8
  • 9. Log-based provenance detection: minimal effort  Provenance storage and representation Provenance Research presentation 9
  • 10. Cloud Provenance: Background Study Provenance Research presentation 10
  • 11. Service Reason of Failure (Assumed) Duration Amazon S3 Authentication mechanisms overloaded by 2 hours remote attacks (no action taken) Google Error from the end of the maintenance 4.6 hours AppEngine engineer’s program (no action taken) Gmail The contact list mechanism crashed (tested 1.4 hours for bugs) Provenance Research presentation 11
  • 14. Cloud Environment  Network Infrastructure  Database Management System  Servers Provenance Research presentation 14
  • 15. Experimental Environment for Cloud Provenance Detection Provenance Research presentation 15
  • 16. Server Hardware Cloud Controller node which runs the following: Processor: 64-bit x86 Network, Memory: 16 GB RAM Volume Disk space: 1900 GB (SATA or SAS or SSD) API Volume storage: 100 GB (SATA) for volumes attached to the Scheduler compute nodes Image services Network: one 1 GB Network Interface Card (NIC) minimum Compute node which runs the following: Processor: 64-bit x86 Virtual instances Memory: 16 GB RAM (32 GB minimum) System log information Disk space: 2 TB GB (SATA) Communication with the Compute Network: two 1 GB NICs Provenance Research presentation 16
  • 17. Compute  Nova-Network  Nova-Scheduler  Glance Provenance Research presentation 17
  • 18. Glance Keystone Nova Provenance Research presentation 18
  • 19. Images: Windows, CentOS Provenance Research presentation 19
  • 21. [1] A. Haeberlen, ―A case for the accountable cloud,‖ ACM SIGOPS, Operating Systems Review, vol. 44, no. 2, 2010, pp. 52-57.  [2] S. Pearson and A. Benameur, ―Privacy, Security and Trust Issues Arising from Cloud Computing,‖ Proc. The 2nd International Conference on Cloud Computing 2010, IEEE, 2010, pp. 693-702.  [3] M. Vouk, ―Cloud computing—Issues, research and implementations,‖ Proc. 30th International Conference on Information Technology Interfaces, 2008 (ITI 2008) IEEE, 2008, pp. 31-40.  [4] S.B. Davidson, S. Khanna, S. Roy, J. Stoyanovich, V. Tannen and Y. Chen, ―On provenance and privacy,‖ Proc. Proceedings of the 14th International Conference on Database Theory (ICDT), ACM, 2011, pp. 3-10.  [5] J. Yao, S. Chen, C. Wang, D. Levy and J. Zic, ―Accountability as a Service for the Cloud,‖ Proc. IEEE Service Computing Conference 2010 (SCC 2010), IEEE, 2010, pp. 81-88.  [6] J. Wei, X. Zhang, G. Ammons, V. Bala and P. Ning, ―Managing security of virtual machine images in a cloud environment,‖ ACM, 2009, pp. 91-96. Provenance Research presentation 21
  • 22. [7] W.Z.P. Ning, X.Z.G. Ammons, R. Wang and V. Bala, ―Always Upto- date–Scalable Offline Patching of VM Images in a Compute Cloud,‖ IBM Technical Papers, no. RC24956, 2010.  [8] R.K.L. Ko, B.S. Lee and S. Pearson, ―Towards Achieving Accountability, Auditability and Trust in Cloud Computing,‖ Proc. International workshop on Cloud Computing: Architecture, Algorithms and Applications (CloudComp2011), Springer, 2011, pp. 5.  [9] Cloud Security Alliance, ―Top Threats to Cloud Computing (V1.0),‖ 2010; https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf.  [10] J. Brodkin, ―Gartner: Seven cloud-computing security risks,‖ Infoworld, 2008, pp. 1–3.  [11] W. Zhou, M. Sherr, T. Tao, X. Li, B.T. Loo and Y. Mao, ―Efficient querying and maintenance of network provenance at internet-scale,‖ Proc. 2010 International Conference on Management of Data (SIGMOD 2010), ACM, 2010, pp. 615-626.  [12] M. Mowbray, S. Pearson and Y. Shen, ―Enhancing privacy in cloud computing via policy-based obfuscation,‖ The Journal of Supercomputing, 2010, pp. 1-25.  [13] ―OpenStack Compute Administration Guide‖ 2011 Provenance Research presentation 22
  • 23. (asifimran33@gmail.com) Provenance Research presentation 23