cloud computing security

37
Ninh V. Nguyen [email protected]

Upload: ninh-nguyen

Post on 09-May-2015

18.936 views

Category:

Technology


0 download

DESCRIPTION

Cloud Computing with Encryption & Key Management.

TRANSCRIPT

Page 1: Cloud Computing Security

Ninh V. [email protected]

Page 2: Cloud Computing Security

The Hype

Cluster ComputingCloud ComputingGrid Computing

Page 3: Cloud Computing Security
Page 4: Cloud Computing Security

“What the hell is Cloud Computing?”- Larry Ellison

Page 5: Cloud Computing Security

Monolithic Client-Server Web SOA Cloud Services

1970s 1980s 1990s 2000s 2009+

5th Generation of Computing

Page 6: Cloud Computing Security

Wikipedia’s DefinitionsCloud computing is a computing paradigm shift where computing is moved awayfrom personal computers or an individual server to a “cloud” of computers.

– 12/2007

Cloud computing is Internet-based ("cloud") development and use of computerTechnology ("computing"). The cloud is a metaphor for the Internet, based on

howit is depicted in computer network diagrams, and is an abstraction for the complexinfrastructure it conceals.

– 12/2008

Cloud computing is a style of computing in which dynamically scalable and oftenvirtualized resources are provided as a service over the Internet.

– 6/2009

Cloud computing is an example of computing in which dynamically scalable andoften virtualized resources are provided as a service over the Internet.

- Now

Page 7: Cloud Computing Security

Common implies multi-tenancy, not single or isolated tenancy Location-independentOnlineUtility implies pay-for-use pricingDemand implies ~infinite, ~immediate, ~invisible scalability

Page 8: Cloud Computing Security

Cloud Computing Infrastructure Models

Page 9: Cloud Computing Security

Hybrid Cloud

Connectivity(Network Access)

SME

SME

SME

Enterprise

Enterprise

Public Cloud

Public Cloud

Private CloudPrivate Cloud

The Cloud Provider

The Cloud Provider

Page 10: Cloud Computing Security

Architectural Layers of Cloud Computing

Page 11: Cloud Computing Security

Software as a Service (SaaS)

Page 12: Cloud Computing Security

Platform as a Service (PaaS)

Page 13: Cloud Computing Security

Infrastructure as a Service (IaaS)

Page 14: Cloud Computing Security

Cloud Infrastructure

IaaS

PaaS

SaaS

Infrastructure as a Service (IaaS) Architectures

Platform as a Service (PaaS)Architectures

Software as a Service (SaaS)

Architectures

Cloud Infrastructure

SaaS

Cloud Infrastructure

PaaS

SaaS

Cloud Infrastructure

IaaS

PaaS

Cloud Infrastructure

PaaS

Cloud Infrastructure

IaaS

Page 15: Cloud Computing Security

Cloud Computing Characteristics

Page 16: Cloud Computing Security

Comparisons

Grid Computing

•A form of distributed computing•A “super and virtual computer” is composed of a cluster of networked•Loosely coupled computers acting in concert to perform very large tasks

Utility Computing

•Packaging of computing resources, such as computation and storage•A metered service similar to a traditional public utility, such as electricity

Autonomy Computing

•Computer systems capable of self-management

Page 17: Cloud Computing Security

Variable Costs(OpEx)

Fixed Costs(CapEx)

Cloud Computing Economics

Variable Costs(OpEx)

Users

Cost

s

Traditional IT

Cloud Computing

Page 18: Cloud Computing Security

Pros and Cons

Page 19: Cloud Computing Security

Cloud Computing Security

Page 20: Cloud Computing Security

Your Application

Testing, Monitoring, Diagnostics

and Verification

Architectural Views

Governance

Life Cycle(Birth, Growth, Failure, Recovery, Death)

Web of MetadataCategories, Capabilities, Configuration and Dependencies

Resource Management Basic

Monitoring

Software & Hardware Infrastructure

Facilities & Logistics

Element Management

(Split Responsibility)

YourProblem

TheirProblem

A Cloud Technology Reference Model

Page 21: Cloud Computing Security

Operating System

Hypervisor

Application

Datacenter (Power, Cooling, Physical Security)

ApplicationServer Middleware Database

CPU Networking StorageYOUR DATA Backup

Software as a Service

Your Problem

Their Problem

Page 22: Cloud Computing Security

Operating System

Hypervisor

Your Application

Datacenter (Power, Cooling, Physical Security)

ApplicationServer Middleware Database

CPU Networking Storage Backup

Platform as a Service

Your Problem

Their Problem

Page 23: Cloud Computing Security

Your Operating System

Hypervisor

Your Application

Datacenter (Power, Cooling, Physical Security)

YourApplication

Server

YourMiddleware

YourDatabase

CPU Networking Storage Backup

Infrastructure as a Service

Your Problem

Their Problem

Page 24: Cloud Computing Security

Security Issues

Page 25: Cloud Computing Security

Overview

Governing in the Cloud

Governance & Enterprise Risk Management

Legal

Electronic Discovery

Compliance and Audit

Information Life Cycle Management

Portability & Interoperability

Operating in the Cloud

Traditional Security

Data Center Operations

Incident Response

Virtualization

Identity & Access Management

Storage

Application Security

Encryption & Key Management

Page 26: Cloud Computing Security

Selected Issues

Governing in the Cloud

Governance & Enterprise Risk Management

Legal

Electronic Discovery

Compliance and Audit

Information Life Cycle Management

Portability & Interoperability

Operating in the Cloud

Traditional Security

Data Center Operations

Incident Response

Virtualization

Identity & Access Management

Storage

Application Security

Encryption & Key Management

Page 27: Cloud Computing Security

Encryption & Key Management

Storage

Internet

Encryption on Storage

Encryption on TransmissionKey Management

Page 28: Cloud Computing Security

Case StudyAmazon Web Services (AWS)

Page 29: Cloud Computing Security

AWS Registration and Security

Page 30: Cloud Computing Security

X.509 Certificate

Page 31: Cloud Computing Security

AWS Multi-Factor Authentication (AWS MFA)

Multi-Factor Authentication

Page 32: Cloud Computing Security

Request Authenticationwith HMAC-SHA1 (1)

Page 33: Cloud Computing Security

Request Authenticationwith HMAC-SHA1 (2)

Page 34: Cloud Computing Security

HMAC-SHA1

Page 35: Cloud Computing Security

Summary & Predictions

.. We think everyone on the planet deserves to have their ownvirtual data center in the cloud ..

- Lew Tucker

.. Cloud Computing Will Be As Influential As E-business .. - Gartner

.. one of the most important transformations the federalgovernment will go through in the next decade ..

- Obama’s TIGR Team

.. Who knew that the concept of security in cloud computing waseven possible to imagine?..

- Scott Bradner

Page 36: Cloud Computing Security
Page 37: Cloud Computing Security

Thank You