Upload
shafzonly
View
149
Download
0
Embed Size (px)
Citation preview
Cloud Computing Security
Threats & ResponsesPresented by:
Shefee Munees TK
1
Introduction
• What is Cloud Computing?
• Cloud computing is a network-based environment
that focuses on sharing computations or resources.
• In cloud, costumers must only pay for what they use
and have not to pay for local resources which they
need to such as storage or infrastructure.
2
Types of Cloud
• The three types of cloud environments:
1.Public Cloud
2.Private Cloud
3.Hybrid Cloud
3
Service Environments
• The three major types of service in the cloud environment:
1.SaaS(Software as a Service)
2.PaaS(Platform as a Service)
3.IaaS(Infrastructure as a Service)
4
RAS
RAS : Reliability Availability Security
For having good and high performance
Providers must meet features such as:
1.Availability management
2.Access control management
3.Vulnerability and problem management
4.Patch and configuration management
5.Countermeasure
6.Cloud system using and access monitoring
5
Information Security Policies
In cloud computing technology there are a set
of important policy issues, which include issues of
privacy, security, anonymity, government
surveillance, reliability, and liability, among
others .
But the most important between them is security
and how cloud provider assures it.
6
Security Issues
1. Privileged user access
2. Regulatory compliance
3. Data location
4. Data segregation
5. Recovery
6. Investigative support
7. Long-term viability
7
Cloud RAS Issues
Using Cloud results applications and data will
move under third-party control.
Shared responsibility model will bring new
security management challenges to the
organization's IT operations staff .
8
Data Leakage
First, the data will store away from the customer's
local machine.
Second, the data is moving from a single-tenant
to a multi-tenant environment.
These changes can raise an important concern
that called data leakage.
9
Cloud Security Issues
All of users who use same virtual machine as
infrastructure, if a hacker steals a virtual machine
or take control over it, he will be able to access to
all users' data within it.
The hacker can copy them into his local machine
before cloud provider detect that virtual machine
is in out of control then the hacker with analysis
the data may be find valuable data afterward
10
DDOS Attacks Against Cloud
DDoS: Distributed Denial of Service
Serious problem is when a malicious user
deliberately done a DDoS attacks using botnet.
Unfortunately, similar to IPS(Intrusion Prevention
Systems) solutions, firewalls are vulnerable and
ineffective against DDoS attacks.
11
Solutions Against Cloud
Security Problems
There are several traditional solutions to mitigate
security problems that exist in the Internet
environment, as a cloud infrastructure, but
nature of cloud causes some security problem
that they are especially exist in cloud
environment.
12
Access Control
Control access to information.
Manage user access rights.
Encourage good access practices.
Control access to network services.
Control access to operating systems.
Control access to applications and systems.
13
Incident Countermeasure and
Response
1. Partitioning
2. Migration
3. Workload Analysis and Allocation
14
Conclusion
As a solution, cloud providers can add more
resource to protect themselves from malicious
attacks but unfortunately there is no defense
against a powerful DDoS attack which has good
sapience. Certain countermeasures can be
implemented to increase reliability to some
extend.
15
THANK YOU
16