6
1 A Layered Security Approach for Cloud Computing Infrastructure Dr. Mehmet Yildiz Certified Executive IT Architect IBM Australia and New Zealand Melbourne, Australia I-SPAN09 – IASM Proposed Abstract: This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope. A/Prof Jemal Abawajy School of Engineering and Information Technology, Deakin University Melbourne, Australia A/Prof Tuncay Ercan Faculty of Engineering Department of Computer Engineering, Yaşar University, Izmir, TURKEY 10th International Symposium on Pervasive Systems, Algorithms, and Networks Mr. Andrew Bernoth Senior IT Architect and Security SME in IBM Australia and New Zealand Melbourne, Australia

Cloud Computing Security V1.2

Embed Size (px)

DESCRIPTION

This is an introduction of a paper with the same title submitted and presented at the 10th International Symposium on Pervasive Systems, Algorithms, and Networks. The paper is available in the conference proceedings.

Citation preview

Page 1: Cloud Computing Security V1.2

1

A Layered Security Approach for Cloud Computing InfrastructureDr. Mehmet YildizCertified Executive IT Architect IBM Australia and New ZealandMelbourne, Australia

I-SPAN09 – IASM

Proposed Abstract: This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system developmentlife cycle focusing on the plan-built-run scope.

A/Prof Jemal AbawajySchool of Engineering and Information Technology, Deakin UniversityMelbourne, Australia

A/Prof Tuncay ErcanFaculty of EngineeringDepartment of Computer Engineering, Yaşar University, Izmir, TURKEY

10th International Symposium on Pervasive Systems, Algorithms, and Networks

Mr. Andrew BernothSenior IT Architect and Security SME in IBM Australia and New ZealandMelbourne, Australia

Page 2: Cloud Computing Security V1.2

2

IASM ���

Agenda

-Methodology

-Dynamic Security model for cloud infrastructure

-Conclusion

-Introduction

Page 3: Cloud Computing Security V1.2

3

IASM ���

Cloud Computing Trends in Google

Page 4: Cloud Computing Security V1.2

4

IASM ���

Cloud Computing Trends by Gartner

Page 5: Cloud Computing Security V1.2

5

IASM ���

Dynamic Infrastructure Security Model

1. Vertical Configuration Minimum Level

2. Vertical Configuration Maximum Level

3. Network Policy Configuration

4. Storage Policy Configuration

5. Servers Policy Configuration

6. Systems Management Policy Configuration

7. Application Policy Configuration (Excluded

8. Enterprise Security Principles

Page 6: Cloud Computing Security V1.2

6

IASM ���

Conclusion of paper

- A well established dynamic security model for the infrastructure of cloud computing solution is essential.

-The dynamic model introduced in this paper offers a horizontallyand vertically configurable and policy based security approach covering all known security issues in a typical implementation of Cloud infrastructure

-Applying dynamic security policies using automated tools and processes contribute to the security of cloud computing in a positive manner: i.e.

-cost, -systems management-end user satisfaction.