Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha...

Preview:

DESCRIPTION

CLOUD COMPUTING

Citation preview

Controlling Data in the CloudOutsourcing Computation without Outsourcing Control

By:Wirayudha Rohandi

AGENDA

Cloud Computing & ControlFear of The CloudNew DirectionsConclusion

CLOUD COMPUTING

CLOUD CONTROL

FEAR OF THE CLOUD

CLOUD CHALLANGES / ISSUES

TRADITIONAL SECURITYVM-level AttacksCloud Provider VulnerabilitiesPhishing Cloud ProviderExpanded Network Attack SurfaceAuthentication and AuthorizationForensics in the Cloud

AVAILABILITY

UptimeSingle Point of FailureAssurance of Computational Integrity

THIRD-PARTY DATA CONTROLDue DiligenceAuditabilityContractual ObligationsCloud Provider EspionageData Lock-inTransitive Nature

NEW DIRECTIONS

INFORMATION-CENTRIC SECURITYUnprotected Data Information Centric

HIGH-ASSURANCE REMOTE SERVER ATTESTATION

TrustedComputing

PRIVACY-ENHANCED BUSINESS INTELEGENCE

CONCLUSION

Solutions are not applicable just yet.If the data are not confidential (enough), use public cloud.If the data are confidential and tight budget, use traditional server/hybrid cloud.If the data are confidential and enough budget, use private cloud.

Recommended