Challenges and Solutions in Elastic Cloud Security

Slide Note
Embed
Share

Elastic clouds bring benefits like rapid scalability, but also pose security challenges. These include issues with data storage, processing, virtual networks, and overall cloud security. Key challenges involve multi-tenancy, data mobility, and privacy. Solutions entail easy deployment, secure key management, and industry-standard encryption. Elasticity of resources is crucial for success, with different providers offering varying levels of scalability. Ensuring secure cloud networking is essential for optimal performance of applications hosted in the cloud.


Uploaded on Sep 29, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Security Issues in Elastic Clouds Mojdeh Feyzi 89191134 Prof : Dr. Salimi feyzi1366@gmail.com

  2. Elasticity Definition NIST s definition of elasticity is : Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time. 2

  3. Elastic Elements Storage Processing Virtual Networks Security Relevant Cloud Components Cloud Data Storage Services Cloud Processing Infrastructure Cloud Network and Perimeter Security 3

  4. Cloud Security = SOA Security + Virtualization Security 4

  5. Cloud Data Storage Services Challenges Data multi-tenancy Data Mobility and Control Data Remanence Data Privacy 5

  6. Solving The Cloud Security Challenges Easy deployment Secure key management Industry standard encryption Granular control Custody of encryption keys Reporting 6

  7. An Elastic Data Store Elasticity of resources is major factors to success Underlying database is not very elastic and scalable 2 spectrum: IaaS providers - Compute cycles, storage, network bandwidth , . PaaS providers : - Microsoft s Azure and Google s AppEngine 7

  8. Overview of the ElasTraS system Distributed Storage Owning Transaction Managers Metadata Manager and Master Higher level Transaction Managers 8

  9. Cloud Processing Infrastructure Challenges Application multi-tenancy Reliance on hypervisors Process isolation 9

  10. Challenges for Cloud Networking Security performance of some applications running in the cloud depends heavily on the : network connecting the different cloud sites connecting the user to the cloud number of known vulnerabilities obtain computing services for free steal information from cloud users penetrate the infrastructure remaining in client premises Information Security in Clouds: Confidentiality , Integrity , availability 10

  11. Cloud Physical Infrastructure Architecture 11

  12. Dynamic Virtual Networks Connecting a Distributed Service 12

  13. Cloud Network and Perimeter Security Challenges 1. Isolation between Virtual Machines 2. Information Theft through Malicious Use of Hypervisor 3. Untrusted Hypervisors 4. Untrusted Virtual Machines 5. Untrusted Virtual Machines Misusing Hardware Virtualization Functionality 6. Unsecure Network Transfer on Inter Device Migrations 13

  14. Cloud Network and Perimeter Security 14

  15. Elasticity Securing Challenges 15

  16. Solving Security issues with ACPS One of the key issues of cloud computing is loss of control Some of the security issues Of a cloud are: - Privileged user access - Data segregation - Privacy - Bug Exploitation - Recovery - Accountability 16

  17. Advanced Cloud Protection System Possible attacks against cloud systems are : - Resource attacks against CPs - Resource attacks against SPs - Data attacks against CPs - Data attacks against SPs - Data attacks against Sus Advanced Cloud Protection System (ACPS) 17

  18. Other Elasticity Securing Challenges one is able to traverse from one VM (virtual machine) client environment to other client environments being managed by the same hypervisor ability to provide fine-grained access and predefined security controls across the entirety of a virtual customer environment how to enforce proper configuration and change management in this more dynamic and elastic model 18

  19. Elasticity Securing Challenges-cont Encryption for data-at-rest 19

  20. Requirements for Building Elastic Cloud Services Heterogeneous Systems Support Service Management Dynamic Workload and Resource Management Reliability, Availability and Security Integration with Datacenter Management Tools Visibility and Reporting Administrator, Developer and End User Interfaces 20

  21. References Chiu, B. D. Elasticity in the Cloud. www.acm.org/crossroads, City, 2010. Micro, T. Addressing Data Security Challenges in the Cloud(july 2010 2010.) Peter Schoo, V. F., Victor Souza, M rcio Melo, Paul Murray,Herv Debar, Houssem Medhioub, Djamal Zeghlache Challenges for Cloud Networking Security. ICST Conference on Mobile Networks and Management(October 6, 2010 2010), 17. Dustin Owens, B. A. Securing Elasticity in the Cloud. City, 2010. Sudipto Das, D. A., Amr El Abbadi ElasTraS: An Elastic Transactional Data Store in the Cloud2010), 5. VMOps Cloud Computing:Elastic, Scalable, On-Demand IT Services for Everyone(April 2010 2010), 7. 21

  22. Thanks 22

Related