gsaw presentation on cloud security v2.1

13
Secure Cloud Computing: An Architecture Ontology Approach KEVIN J ACKSON

Upload: cloudtek-university

Post on 08-Jun-2015

944 views

Category:

Technology


1 download

DESCRIPTION

Ground System Architecture Workshop (GSAW) presentation on cloud computing security.

TRANSCRIPT

Page 1: GSAW Presentation on Cloud Security V2.1

Secure Cloud Computing:An Architecture Ontology Approach

KEVIN JACKSON

Page 2: GSAW Presentation on Cloud Security V2.1

Forces Driving Cloud Computing - The New IT Era

rev date 3/25/2009 slide 2

Page 3: GSAW Presentation on Cloud Security V2.1

Cloud Computing Value

rev date 3/25/2009 slide 3

Page 4: GSAW Presentation on Cloud Security V2.1

Cloud Computing Challenge

rev date 3/25/2009 slide 4

Page 5: GSAW Presentation on Cloud Security V2.1

Cloud Application(SaaS)

Cloud Software Environment(PaaS)

Cloud Software Infrastructure

Software Kernal

Firmware / Hardware (HaaS)

Computational Resources (IaaS)

Storage(DaaS)

Communications (CaaS)

Unified Ontology of Cloud Computing(http://www.cs.ucsb.edu/~lyouseff/CCOntology/CloudOntology.pdf)

Lamia Youseff

University of California, Santa Barbara

Maria Butrico, Dilma Da Silva

IBM T.J. Watson Research Center

Page 6: GSAW Presentation on Cloud Security V2.1

Internet connectivity assumed

SOA platform

• Security management

• Application service discovery and management

• Workflow orchestration

Access management

Tactical Employment Issues

Page 7: GSAW Presentation on Cloud Security V2.1

Ontology Modifications for Tactical Cloud Computing

Cloud Application(SaaS)

Cloud Software Environment(PaaS)

Cloud Software Infrastructure

Software Kernal

Firmware / Hardware (HaaS)

Computational Resources (IaaS)

Storage(DaaS)

Communications (CaaS)

Cloud Application(SaaS)

Cloud Software Environment(PaaS)

Cloud Software Infrastructure

Software Kernal

Firmware / Hardware (HaaS)

Computational Resources (IaaS)

Storage(DaaS)

Communications (CaaS)

Access Management

Cloud Application (SaaS)

Workflow Orchestration

Security API

Services / Services Discovery

Service Management

Cloud Software Environment(PaaS)

Cloud Software Infrastructure

Software Kernal

Firmware / Hardware (HaaS)

Computational Resources (IaaS)

Storage(DaaS)

Communications (CaaS)

Access Management

Cloud Application (SaaS)

Workflow Orchestration – Policy Engine

Security API

Services / Services Discovery

Service Management

Cloud Software Environment(PaaS)

Cloud Software Infrastructure

Software Kernal

Firmware / Hardware (HaaS)

Computational Resources (IaaS)

Storage(DaaS)

Communications (CaaS)

Access Management

Network Connectivity

Network Security

Network Security

Page 8: GSAW Presentation on Cloud Security V2.1

Tactical Cloud Computing Ontology

Cloud Application (SaaS)

Workflow Orchestration – Policy Engine

Security API

Services / Services Discovery

Service Management

Cloud Software Environment(PaaS)

Cloud Software Infrastructure

Software Kernal

Firmware / Hardware (HaaS)

Computational Resources (IaaS)

Storage(DaaS)

Communications (CaaS)

Access Management

Network Connectivity

Network Security

Network Security

Page 9: GSAW Presentation on Cloud Security V2.1

Cloud Application (SaaS)

Workflow Orchestration – Policy Engine

Security API

Services / Services Discovery

Service Management

Cloud Software Environment(PaaS)

Cloud Software Infrastructure

Software Kernal

Firmware / Hardware (HaaS)

Computational Resources (IaaS)Storage(DaaS)

Communications (CaaS)

Access Management

Network Connectivity

Network Security

Network Security

Cloud Application (SaaS)

Workflow Orchestration – Policy Engine

Security API

Services / Services Discovery

Service Management

Cloud Software Environment(PaaS)

Cloud Software Infrastructure

Software Kernal

Firmware / Hardware (HaaS)

Computational Resources (IaaS)Storage(DaaS)

Communications (CaaS)

Access Management

Network Connectivity

Network Security

Network Security

Global Governance

Dynamic Tasking

Ontology Modification – Federated SOA

Page 10: GSAW Presentation on Cloud Security V2.1

Cloud Application (SaaS)

Workflow Orchestration – Policy Engine

Security API

Services / Services Discovery

Service Management

Cloud Software Environment(PaaS)

Cloud Software Infrastructure

Software Kernal

Firmware / Hardware (HaaS)

Computational Resources (IaaS)

Storage(DaaS)

Communications (CaaS)

Access Management

Network Connectivity

Network Security

Network Security

Secure Cloud Computing – An Approach

•Access Management

• “Out of Band”

authentication

•Security API

• Use of services

• Binding of service

• COI driven

management

•Network Security

• No VPN

• “Data in Motion”

security

•Computational Resources

• VM management

• Data-centric security

model

• Storage

• “Data at Rest” security

• COI driven access

Page 11: GSAW Presentation on Cloud Security V2.1

Mission Our mission is to facilitate global realization of the benefit inherent in

Network Centric Operations. To that end, we seek to enable continuously increasing levels of interoperability across the spectrum of joint, interagency, intergovernmental, and multinational industrial and commercial operations. We will execute this mission in good faith as a global organization with membership open to all enterprises in quest of applying the vast potential of network centric technology to the operational challenges faced by our nations and their citizens.

Past successes◦ Network Centric Analysis Tool (NCAT)◦ NCOIC Interoperability Framework (NIF)

Future◦ Develop “operational art” in support of netcentric operations◦ Support operational art advances through collaboration (Government,

Industry, Non-profits, Interest Groups)◦ Provide value to members Use of NCOIC developed process provided differentiator in recent

European procurement for a member company NCOIC Patterns addressing interoperability concerns of member

government agencies

Network Centric Operations Industry Consortium

Page 12: GSAW Presentation on Cloud Security V2.1

Embrace collaboration

• OSD – tactical Cloud Computing

• TIGR – Government Cloud Computing

• Cloud Interoperability Forum

Use Operational and Capability pattern process to develop Cloud Computing Technical Patterns

Identify key netcentric operations interoperability requirements and preferences within identified technical patterns

Iterate with NCOIC stakeholder companies and government organizations

Use Capability and Operational patterns to validate operational impact of reduced cloud interoperability

Leverage analysis to drive cloud interoperability recommendations and best practices

Cloud Computing Operational Art