11
Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control

This paper states that one of the major problem to the adoption of cloud computing is that of security. Existing cloud computing problem or concerns

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

Page 1: This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns

Controlling Data in the Cloud: Outsourcing Computation without

Outsourcing Control

Page 2: This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns

This paper states that one of the major problem to the adoption of cloud computing is that of security.

Existing cloud computing problem or concerns.New problem areas in security arising from the trend towards

cloud computing.

Traditional security

Availability

Third-party data control

Page 3: This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns

Traditional security These concerns involve computer and network intrusions or attacks that will be made possible or at least easier by moving to the cloud.

VM-level attacks. Potential vulnerabilities in the hypervisor or VM technology used by cloud vendors are a potential problem.

Cloud provider vulnerabilities. Such as cross-site scripting vulnerability.

Page 4: This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns

Traditional security Phishing cloud provider. Phishers and other

social engineers have a new attack vector.Expanded network attack surface. The cloud

user must protect the infrastructure used to connect and interact with the cloud.

Authentication and Authorization. The enterprise authentication and authorization framework does notnaturally extend into the cloud.

Page 5: This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns

Availability

Uptime. Single point of failure. Cloud services are thought of as

providing more availability, but there are more single points of failure and attack.

Assurance of computational integrity. Can an enterprise be assured that a cloud provider is faithfully running a hosted application and giving valid results?

Page 6: This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns

Third Party data control

Auditability. Audit difficulty is another side effect of the lack of control in the cloud.

Data Lock-in. Transitive nature. Another possible concern is that the

contracted cloud provider might itself use subcontractors, over whom the cloud user has even less control, and who also must be trusted.

Page 7: This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns

NEW PROBLEMS New problem areas in security that arise from cloud computing.

Cheap data and data analysis. The rise of cloud computing has created enormous data sets that can be monetized by applications such as advertising.

Increased authentication demands. The development of cloud computing may, in the extreme, allow the use of thin clients on the client side.

Mash-up authorization.

Page 8: This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns

Solution Proposed Information-centric Security

Tactical Vs Information-centric Security

Page 9: This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns

Solution Proposed Information-centric security

Data needs to be encrypted and packaged with a usage policy. When accessed, data should consult its policy and attempt to re-create a secure environment using virtualization and reveal itself only if the environment is verified as trustworthy (using Trusted Computing).

High-Assurance Remote Server Attestation

The lack of transparency is discouraging businesses from moving their data to the cloud. Data owners wish to audit how their data is being handled at the cloud, and in particular, ensure that their data is not being abused or leaked.

Page 10: This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns

Privacy-Enhanced Business Intelligence

In case of encryption, cloud data searching and indexing the data becomes problematic. Cryptographers have recently invented versatile encryption schemes that allow operation and computation on the ciphertext.

Page 11: This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns

THANKS