Upload
shanna-williams
View
219
Download
0
Embed Size (px)
DESCRIPTION
CLOUD COMPUTING
Citation preview
Controlling Data in the CloudOutsourcing Computation without Outsourcing Control
By:Wirayudha Rohandi
AGENDA
Cloud Computing & ControlFear of The CloudNew DirectionsConclusion
CLOUD COMPUTING
CLOUD CONTROL
FEAR OF THE CLOUD
CLOUD CHALLANGES / ISSUES
TRADITIONAL SECURITYVM-level AttacksCloud Provider VulnerabilitiesPhishing Cloud ProviderExpanded Network Attack SurfaceAuthentication and AuthorizationForensics in the Cloud
AVAILABILITY
UptimeSingle Point of FailureAssurance of Computational Integrity
THIRD-PARTY DATA CONTROLDue DiligenceAuditabilityContractual ObligationsCloud Provider EspionageData Lock-inTransitive Nature
NEW DIRECTIONS
INFORMATION-CENTRIC SECURITYUnprotected Data Information Centric
HIGH-ASSURANCE REMOTE SERVER ATTESTATION
TrustedComputing
PRIVACY-ENHANCED BUSINESS INTELEGENCE
CONCLUSION
Solutions are not applicable just yet.If the data are not confidential (enough), use public cloud.If the data are confidential and tight budget, use traditional server/hybrid cloud.If the data are confidential and enough budget, use private cloud.