160 likes | 560 Views
Security in Cloud Computing. Zac Douglass Chris Kahn. Mission Statement. To provide a detailed assessment on the security concerns of cloud computing Specifically in relation to: Infrastructure as a Service Public cloud. Background. Cloud computing is separated into three service models:
E N D
Security in Cloud Computing Zac Douglass Chris Kahn
Mission Statement • To provide a detailed assessment on the security concerns of cloud computing • Specifically in relation to: • Infrastructure as a Service • Public cloud
Background • Cloud computing is separated into three service models: • Infrastructure as a Service • Platform as a Service • Software as a Service • And four deployment models: • Public cloud • Private cloud • Community cloud
Significance • Cloud computing is becoming a major aspect in the IT environment • Many businesses, organizations, and agencies all implement the cloud • Becoming more popular for hackers/organized crime • While in its infancy, now is the perfect time to shape the cloud around a secure environment • Major losses can happen • Must take preventative action!
Monitoring • The act of starting, stopping, pausing, restarting, or modifying a Virtual Machine • Usually controlled by the Host (Privileged Control) • Wide range of effect • Threat based on trust
Communication • All network traffic routes through the host • Allows host to read all network traffic • Compromise of the Host means compromise of the system • Virtual machine data bleed • Results from multiple VMs using the same application on shared resources
DDoS • Very serious security risk • Cloud Systems must be available 24/7 • Would delimit a Cloud System's main function • One interrupted Virtual Machine can wreak havoc
Solutions • Focus on Virtual Machines because they are the backbone • For a DDOS you can restart the malicious virtual machine • Allows reallocation of resources • Firewalls are crucial • Allows disabling all non-essential connections • Needs highly specific IP tables for maximum security
Security Virtual Machine (SVM) • Provides a detailed analysis of virtual network traffic • Intrusion Prevention System detects and prevents: • Known attacks • Unknown attacks • Catch that rootkit! • Recently used as malicious software to gain access to privileged data
Anti-DDoS Virtualized Operating System (ADVOS) • Secure network computers against DDoS attacks • Packet filtering from the source machine to signify malicious traffic • Moved from the machine itself to an independent domain • Allows this tool to properly function if machine is misbehaving due to malicious code
Conclusion • Cloud computing is the future of the IT world • By understanding how the cloud works we can properly secure it • Companies rely on the cloud to: • Conduct efficient business practices • Minimize cost associated with resources • Rid IT systems of duplicate software/hardware • Security risks compromise these aspects