Security Framework For Cloud Computing -Sharath Reddy Gajjala.

  • Published on

  • View

  • Download

Embed Size (px)


<ul><li> Slide 1 </li> <li> Security Framework For Cloud Computing -Sharath Reddy Gajjala </li> <li> Slide 2 </li> <li> INTRODUCTION Cloud computing emerged as modern technology and considered as next big thing to come. It has grown up from just being a concept to a major part of IT industry. So requires new security issues and new challenges Changed the entire process of distributed computing. </li> <li> Slide 3 </li> <li> INTRODUCTION Generally works on three type of architecture namely. SaaS (Software as a Service) PaaS (Platform as a Service) IaaS (Infrastructure as a Service) Different issue and challenges with each technology. </li> <li> Slide 4 </li> <li> Software as a Service (SaaS) Hosts and manages a given application in their data center. Makes it available to multiple users over the web. Examples: Oracles CRM on Demand, </li> <li> Slide 5 </li> <li> Platform as a Service (PaaS) Application development and deployment platform for developers. No cost and complexity of buying and managing the infrastructure. All the facilities required for lifecycle are entirely available. Includes Database, Middleware, development tools and infrastructure software. Google App engine and Engine yard </li> <li> Slide 6 </li> <li> Infrastructure as a Service (IaaS) Delivery of hardware and software as a service. Does not require any long-term commitment. Allows users to provision resourses on demand. </li> <li> Slide 7 </li> <li> Cloud Computing Environment </li> <li> Slide 8 </li> <li> Security Challenges Cloud Service Security Accidents in Recent Years: March 2009 Google leaked a large no of documents. Microsoft Azure stopped working for 22 hours. April 2011 Amazon EC2 service disruptions Influences on the service of Quora, Reddit etc. Caused a great loss even devastating blow. </li> <li> Slide 9 </li> <li> Threats To Cloud Computing Changes to business model Abusive use of cloud computing Insecure interfaces and API Malicious insiders Shared technology issues Data loss and leakage Service hijacking Risk profiling Identity theft </li> <li> Slide 10 </li> <li> Attacks on Cloud Computing Zombie Attack Service injection attack Attacks on virtualization Man-in-the Middle attack Metadata spoofing Phishing Backdoor channel attack </li> <li> Slide 11 </li> <li> Proposed Security Model User can be certified by 3 rd party CA Issued token for service by End User Service Portal. User can use services provided by single service provider. EUSP provides secure access control using VPN (Virtual Private Network) and cloud service managing and configuration. </li> <li> Slide 12 </li> <li> Proposed Security Model </li> <li> Slide 13 </li> <li> Framework For Secure Cloud Computing Based on security model Describes each component Apply needed technologies for implementation between components. Access control process is done on each component for providing flexible service. </li> <li> Slide 14 </li> <li> Framework Components Client End-User Service Portal Single sign-on (SSO) Service Configuration Service Gateway, Service Broker Security Control Security Management Trust Management Service Monitoring </li> <li> Slide 15 </li> <li> Framework </li> <li> Slide 16 </li> <li> Conclusion Cloud computing is a technology of rapid development. Security is the main obstacle which must be solved. security is not just a technical problem it also involves standardization, Supervising mode, laws and regulations and many other aspects. Future research should be directed towards management of risks, developing risk assessment. </li> <li> Slide 17 </li> <li> Thank You </li> </ul>