140 likes | 255 Views
Enduring security in clouding databases. CSCE 824, Spring 2013, Ahmad Almadhor. Cloud Computing . It is the mother of databases in clouds More comprehensive structure contains various information technology subcategories
E N D
Enduring security in clouding databases CSCE 824, Spring 2013, Ahmad Almadhor
Cloud Computing • It is the mother of databases in clouds • More comprehensive structure contains various information technology subcategories • Usually viewed as a complete virtual enlivenment of services within networks “mainly the internet” • High availability, scalability, multi-tenancy and effective resources are the plain four aims. The following are the main four models of CC: • Infrastructure as a service (IaaS) • Platform as a service (PaaS) • Software as a service (SaaS) • Network as a service (NaaS) Ahmad Almadhor
Cloud computing illustration source: https://devcentral.f5.com/blogs/us/is-your-cloud-opaque-or-transparent Ahmad Almadhor
Databases in the cloud • subcategory of the cloud computing platform architecture as Amazon EC2 • related topographies in the plain databases converted in a form of cloud silhouette • Two main forms: • virtual machine usage by users self-reliantly • accessing remunerated managed databases by vendors for customers • both models either performs SQL (Oracle, NuoDB, etc.) or non-relational databases (CouchDB, Apache casandra, etc.). Ahmad Almadhor
Databases in the cloud example source: http://www.ibm.com/developerworks/data/library/dmmag/DMMag_2011_Issue2/cloudDBaaS/1102-FeCloud_figure1.gif Ahmad Almadhor
Oops, Security matters! • Same concerns every where: • availability, privacy, authentication, and integrity are the pillars again of clouding database security • More on the integrity and privacy side though • Authentication is a serious issue • However: • Availably is typically seen as basic requirement for clouding in general; so it is not a problematic here • Data loss could be prevented because backups are characteristic of data bases in the cloud infrastructure Ahmad Almadhor
Scorching solutions • distributed detecting system to latch misbehaving servers via homomorphictoken and distributed verification via Data error localization • Accordingly; any abnormal coded-data, which are noticed by the distributed algorithmic spots all over the designated database network, will raise a red flag for the system administrators • (source: Ensuring Data Storage Security in Cloud Computing) Ahmad Almadhor
homomorphic token and distributed verification Ahmad Almadhor • Source: C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," in Proc. of IWQoS'09, July 2009
Cloud databases in smart grid • Smart grid is employment of information technology toward more reliable power and electrical networks uses bidirectional communication with end users that assists for disseminated energy management. • clouding databases are appropriate methodologies to be exploited for smart grid to provide adaptability, ample availability and efficient computerized infrastructure. • However; same security issues in the cloud platforms are still extremely immense apprehensions for being set out in smart grids Ahmad Almadhor
Smart grid ecosystem and data security challenges Ahmad Almadhor Simmhan, Y.; Kumbhare, A.G.; Baohua Cao; Prasanna, V., "An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds," Cloud Computing (CLOUD), 2011 IEEE International Conference on , vol., no., pp.582,589, 4-9 July 2011
limitations • Data are out of hand controlling methods; so still hard to be completely secured • Untrustworthy service handlers • Fears of data integrity breaches are high • Expensive to deploy new infrastructures • providing real time responsive schemes • And above of all, unfortunately classical known security subjects are migrated to cloud databases Ahmad Almadhor
Conclusion and future work • Clouding databases new technology; thus necessities more experimentations on securing them efficiently • Robust and suitable access control highly on demand • Fast cryptosystems needed, AES as an example • Multilevel security mechanisms are “in my opinion” are the best solutions according to the nature of clouding Ahmad Almadhor
References • C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," in Proc. of IWQoS'09, July 2009 • Wenchao Zhou, Micah Sherr, William R. Marczak, Zhuoyao Zhang, Tao Tao, Boon Thau Loo, and Insup Lee. 2010. “Towards a data-centric view of cloud security.” In Proceedings of the second international workshop on Cloud data management • < http://www.mcafee.com/us/resources/white-papers/wp-database-security-virtualization-cloud.pdf> • Simmhan, Y.; Kumbhare, A.G.; Baohua Cao; Prasanna, V., "An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds," Cloud Computing (CLOUD), 2011 IEEE International Conference on , vol., no., pp.582,589, 4-9 July 2011 • Wikipedia <http://en.wikipedia.org> • Maheshwari, Ketan; Lim, Marcus; Wang, Lydia; Birman, Ken; van Renesse, Robbert, "Toward a reliable, secure and fault tolerant smart grid state estimation in the cloud," Innovative Smart Grid Technologies (ISGT), 2013 IEEE PES , vol., no., pp.1,6, 24-27 Feb. 2013 • Mohamed, E.M.; Abdelkader, H.S.; El-Etriby, S., "Enhanced data security model for cloud computing," Informatics and Systems (INFOS), 2012 8th International Conference on , vol., no., pp.CC-12,CC-17, 14-16 May 2012 Ahmad Almadhor
Questions Ahmad Almadhor