1 / 11

Security in Cloud Computing

Security in Cloud Computing. Zac Douglass Chris Kahn. Mission Statement. To provide a detailed assessment on the security concerns of cloud computing Specifically in relation to: Infrastructure as a Service Public cloud. Background. Cloud computing is separated into three service models:

Download Presentation

Security in Cloud Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security in Cloud Computing Zac Douglass Chris Kahn

  2. Mission Statement • To provide a detailed assessment on the security concerns of cloud computing • Specifically in relation to: • Infrastructure as a Service • Public cloud

  3. Background • Cloud computing is separated into three service models: • Infrastructure as a Service • Platform as a Service • Software as a Service • And four deployment models: • Public cloud • Private cloud • Community cloud

  4. Significance • Cloud computing is becoming a major aspect in the IT environment • Many businesses, organizations, and agencies all implement the cloud • Becoming more popular for hackers/organized crime • While in its infancy, now is the perfect time to shape the cloud around a secure environment • Major losses can happen • Must take preventative action!

  5. Monitoring • The act of starting, stopping, pausing, restarting, or modifying a Virtual Machine • Usually controlled by the Host (Privileged Control) • Wide range of effect • Threat based on trust

  6. Communication • All network traffic routes through the host • Allows host to read all network traffic • Compromise of the Host means compromise of the system • Virtual machine data bleed • Results from multiple VMs using the same application on shared resources

  7. DDoS • Very serious security risk • Cloud Systems must be available 24/7 • Would delimit a Cloud System's main function • One interrupted Virtual Machine can wreak havoc

  8. Solutions • Focus on Virtual Machines because they are the backbone • For a DDOS you can restart the malicious virtual machine • Allows reallocation of resources • Firewalls are crucial • Allows disabling all non-essential connections • Needs highly specific IP tables for maximum security

  9. Security Virtual Machine (SVM) • Provides a detailed analysis of virtual network traffic • Intrusion Prevention System detects and prevents: • Known attacks • Unknown attacks • Catch that rootkit! • Recently used as malicious software to gain access to privileged data

  10. Anti-DDoS Virtualized Operating System (ADVOS) • Secure network computers against DDoS attacks • Packet filtering from the source machine to signify malicious traffic • Moved from the machine itself to an independent domain • Allows this tool to properly function if machine is misbehaving due to malicious code

  11. Conclusion • Cloud computing is the future of the IT world • By understanding how the cloud works we can properly secure it • Companies rely on the cloud to: • Conduct efficient business practices • Minimize cost associated with resources • Rid IT systems of duplicate software/hardware • Security risks compromise these aspects

More Related