1 / 11

Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control

Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. This paper states that one of the major problem to the adoption of cloud computing is that of security. Existing cloud computing problem or concerns.

laban
Download Presentation

Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control

  2. This paper states that one of the major problem to the adoption of cloud computing is that of security. • Existing cloud computing problem or concerns. • New problem areas in security arising from the trend towards cloud computing. • Traditional security • Availability • Third-party data control

  3. Traditional security These concerns involve computer and network intrusions or attacks that will be made possible or at least easier by moving to the cloud. • VM-level attacks. Potential vulnerabilities in the hypervisor or VM technology used by cloud vendors are a potential problem. • Cloud provider vulnerabilities. Such as cross-site scripting vulnerability.

  4. Traditional security • Phishing cloud provider. Phishers and other social engineers have a new attack vector. • Expanded network attack surface. The cloud user must protect the infrastructure used to connect and interact with the cloud. • Authentication and Authorization. The enterprise authentication and authorization framework does not naturally extend into the cloud.

  5. Availability • Uptime. • Single point of failure. Cloud services are thought of as providing more availability, but there are more single points of failure and attack. • Assurance of computational integrity. Can an enterprise be assured that a cloud provider is faithfully running a hosted application and giving valid results?

  6. Third Party data control • Auditability. Audit difficulty is another side effect of the lack of control in the cloud. • Data Lock-in. • Transitive nature. Another possible concern is that the contracted cloud provider might itself use subcontractors, over whom the cloud user has even less control, and who also must be trusted.

  7. NEW PROBLEMS New problem areas in security that arise from cloud computing. Cheap data and data analysis. The rise of cloud computing has created enormous data sets that can be monetized by applications such as advertising. Increased authentication demands. The development of cloud computing may, in the extreme, allow the use of thin clients on the client side. Mash-up authorization.

  8. Solution Proposed Information-centric Security Tactical Vs Information-centric Security

  9. Solution Proposed Information-centric security Data needs to be encrypted and packaged with a usage policy. When accessed, data should consult its policy and attempt to re-create a secure environment using virtualization and reveal itself only if the environment is verified as trustworthy (using Trusted Computing). High-Assurance Remote Server Attestation The lack of transparency is discouraging businesses from moving their data to the cloud. Data owners wish to audit how their data is being handled at the cloud, and in particular, ensure that their data is not being abused or leaked.

  10. Privacy-Enhanced Business Intelligence In case of encryption, cloud data searching and indexing the data becomes problematic. Cryptographers have recently invented versatile encryption schemes that allow operation and computation on the ciphertext.

  11. THANKS

More Related