1 / 14

Enduring security in clouding databases

Enduring security in clouding databases. CSCE 824, Spring 2013, Ahmad Almadhor. Cloud Computing . It is the mother of databases in clouds More comprehensive structure contains various information technology subcategories

hoai
Download Presentation

Enduring security in clouding databases

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Enduring security in clouding databases CSCE 824, Spring 2013, Ahmad Almadhor

  2. Cloud Computing • It is the mother of databases in clouds • More comprehensive structure contains various information technology subcategories • Usually viewed as a complete virtual enlivenment of services within networks “mainly the internet” • High availability, scalability, multi-tenancy and effective resources are the plain four aims. The following are the main four models of CC: • Infrastructure as a service (IaaS) • Platform as a service (PaaS) • Software as a service (SaaS) • Network as a service (NaaS) Ahmad Almadhor

  3. Cloud computing illustration source: https://devcentral.f5.com/blogs/us/is-your-cloud-opaque-or-transparent Ahmad Almadhor

  4. Databases in the cloud • subcategory of the cloud computing platform architecture as Amazon EC2 • related topographies in the plain databases converted in a form of cloud silhouette • Two main forms: • virtual machine usage by users self-reliantly • accessing remunerated managed databases by vendors for customers • both models either performs SQL (Oracle, NuoDB, etc.) or non-relational databases (CouchDB, Apache casandra, etc.). Ahmad Almadhor

  5. Databases in the cloud example source: http://www.ibm.com/developerworks/data/library/dmmag/DMMag_2011_Issue2/cloudDBaaS/1102-FeCloud_figure1.gif Ahmad Almadhor

  6. Oops, Security matters! • Same concerns every where: • availability, privacy, authentication, and integrity are the pillars again of clouding database security • More on the integrity and privacy side though • Authentication is a serious issue • However: • Availably is typically seen as basic requirement for clouding in general; so it is not a problematic here • Data loss could be prevented because backups are characteristic of data bases in the cloud infrastructure Ahmad Almadhor

  7. Scorching solutions • distributed detecting system to latch misbehaving servers via homomorphictoken and distributed verification via Data error localization • Accordingly; any abnormal coded-data, which are noticed by the distributed algorithmic spots all over the designated database network, will raise a red flag for the system administrators • (source: Ensuring Data Storage Security in Cloud Computing) Ahmad Almadhor

  8. homomorphic token and distributed verification Ahmad Almadhor • Source: C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," in Proc. of IWQoS'09, July 2009

  9. Cloud databases in smart grid • Smart grid is employment of information technology toward more reliable power and electrical networks uses bidirectional communication with end users that assists for disseminated energy management. • clouding databases are appropriate methodologies to be exploited for smart grid to provide adaptability, ample availability and efficient computerized infrastructure. • However; same security issues in the cloud platforms are still extremely immense apprehensions for being set out in smart grids Ahmad Almadhor

  10. Smart grid ecosystem and data security challenges Ahmad Almadhor Simmhan, Y.; Kumbhare, A.G.; Baohua Cao; Prasanna, V., "An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds," Cloud Computing (CLOUD), 2011 IEEE International Conference on , vol., no., pp.582,589, 4-9 July 2011

  11. limitations • Data are out of hand controlling methods; so still hard to be completely secured • Untrustworthy service handlers • Fears of data integrity breaches are high • Expensive to deploy new infrastructures • providing real time responsive schemes • And above of all, unfortunately classical known security subjects are migrated to cloud databases Ahmad Almadhor

  12. Conclusion and future work • Clouding databases new technology; thus necessities more experimentations on securing them efficiently • Robust and suitable access control highly on demand • Fast cryptosystems needed, AES as an example • Multilevel security mechanisms are “in my opinion” are the best solutions according to the nature of clouding Ahmad Almadhor

  13. References • C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," in Proc. of IWQoS'09, July 2009 • Wenchao Zhou, Micah Sherr, William R. Marczak, Zhuoyao Zhang, Tao Tao, Boon Thau Loo, and Insup Lee. 2010. “Towards a data-centric view of cloud security.” In Proceedings of the second international workshop on Cloud data management • < http://www.mcafee.com/us/resources/white-papers/wp-database-security-virtualization-cloud.pdf> • Simmhan, Y.; Kumbhare, A.G.; Baohua Cao; Prasanna, V., "An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds," Cloud Computing (CLOUD), 2011 IEEE International Conference on , vol., no., pp.582,589, 4-9 July 2011 • Wikipedia <http://en.wikipedia.org> • Maheshwari, Ketan; Lim, Marcus; Wang, Lydia; Birman, Ken; van Renesse, Robbert, "Toward a reliable, secure and fault tolerant smart grid state estimation in the cloud," Innovative Smart Grid Technologies (ISGT), 2013 IEEE PES , vol., no., pp.1,6, 24-27 Feb. 2013 • Mohamed, E.M.; Abdelkader, H.S.; El-Etriby, S., "Enhanced data security model for cloud computing," Informatics and Systems (INFOS), 2012 8th International Conference on , vol., no., pp.CC-12,CC-17, 14-16 May 2012 Ahmad Almadhor

  14. Questions Ahmad Almadhor

More Related