SlideShare a Scribd company logo
Security in Cloud computing:
sharing more than resources

Martine Lapierre, THALES DSC, Technical Director



23-27 November 2009
Growing need of IaaS - Cloud would help:


 Smart         Environment        Smart cities   Smart transport   Smart energy
 healthcare    monitoring

Cloud computing implies
   loss of control
Choices of cloud offering                   Private
   based on:                                              Hybrid
– reputation to ensure                                                 Public
  protection and
  confidentiality
– ability of the cloud provider
  to prove that there is ‘no’
  loss of control
eHealth cloud example
         Data processing
                                    Journalisation of acts
         must satisfy
                                    (legal proof),
                            Dedicated network infra
         European data
                                    Journalisation of
         protection
Monitoring   Iaas                 Health (cyber defense Iaas
                                    access
                                    traces)                               Patients
 center                           Private
                                   cloud                 Sensitive data
                    Network
                                                         should be
                    transactions
                                                         destroyed at a Make
                    encryption,
                                                    Is available to timeavailable to
                                                         specified
       Doctors,
                  IsData storage
                     available to
        nurses      protection/ Medical
                    content        data
                                           Data should not External eHealth
                    driven
                                           leave the original service providers
                    security
                                           country of
                                           collection at any
– Satisfy strict  regulatory requirements  time

– Very sensitive to negative public perception
Customer’s view on security
Are my data secure in the Cloud ?
  Who can access the data ?
  Can I access my data at any time ? What is the SLA ?
  Can I stop my contract at any time ? (reversibility)


Can I comply with laws and regulation ?
  Where are my data ? What about if disclosure ?
  How long are my data kept if I ask for suppression ?
  How is managed the requisition process ?


Who is responsible?
  Loss of control while maintaining accountability even if operational
  responsibility falls upon 3rd parties
  In case of failure in services outsourced to the cloud, the customer cannot
  meet his duty to his own customers and is exposed to liability
Legal and regulatory challenges
  Understand the consequences of decoupling data from infrastructure.

 Regulation of cross-border data flows
      cloud providers operate datacenters in
      multiple locations and transfer data among
      them.
 Coherent regulations on privacy, data
   retention
      EU member states have divergent views as
      to whether cloud providers need to retain
      data and for how long.
 Enhance criminal enforcement of crimes
      Aggregation of data in cloud data centers
      are attractive targets for hackers.
      Incident response.
 Compliant storage certification
 Interoperability standards in cloud
Security challenges
Quality of service guaranties         Multi-tenancy issues and isolation
Certification and                     Insecure interfaces in federation
   accreditation                         context
Compliance to regulations             Data protection
ID management, RBAC                   Cloud infrastructure protection
Logging, audit                        Portability, reversibility




                                From Randy Marchany
THANK YOU!




ICSOC-ServiceWave 2009

More Related Content

PPT
Maarten Stultjens (Elephant Security) @ PIDS seminar
PDF
Document Security
PDF
Cyber security providers adopt strategic defences
PPTX
Why EHR in the Cloud is a good Idea
PDF
Attributable Networks - Guardtime Whitepaper
PDF
Symantec Data Insight
PPTX
Dynamic access control sbc12 - thuan nguyen
PPTX
What is a secure enterprise architecture roadmap?
Maarten Stultjens (Elephant Security) @ PIDS seminar
Document Security
Cyber security providers adopt strategic defences
Why EHR in the Cloud is a good Idea
Attributable Networks - Guardtime Whitepaper
Symantec Data Insight
Dynamic access control sbc12 - thuan nguyen
What is a secure enterprise architecture roadmap?

What's hot (18)

PDF
Veritas-Information-Governance-Solution-Brochure-EN
PDF
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
PDF
Cloud Security POV_Final (by KM)
PPT
Legal And Regulatory Issues Cloud Computing...V2.0
PDF
Security of the Cloud
PDF
Whitepaper: Security of the Cloud
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
Cloud centric multi-level authentication as a service for secure public safet...
PDF
11.cyber forensics in cloud computing
PDF
An extensive research survey on data integrity and deduplication towards priv...
DOC
Hybrid attribute and re-encryption-based key management for secure and scala...
DOC
Hybrid attribute and re-encryption-based key management for secure and scala...
PPTX
Securing data today and in the future - Oracle NYC
PPT
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
PDF
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
PDF
Cloud Computing: legal issues
PDF
Encryption Technique for a Trusted Cloud Computing Environment
PDF
New Solutions for Security and Compliance in the Cloud
Veritas-Information-Governance-Solution-Brochure-EN
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Cloud Security POV_Final (by KM)
Legal And Regulatory Issues Cloud Computing...V2.0
Security of the Cloud
Whitepaper: Security of the Cloud
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
Cloud centric multi-level authentication as a service for secure public safet...
11.cyber forensics in cloud computing
An extensive research survey on data integrity and deduplication towards priv...
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
Securing data today and in the future - Oracle NYC
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Cloud Computing: legal issues
Encryption Technique for a Trusted Cloud Computing Environment
New Solutions for Security and Compliance in the Cloud
Ad

Viewers also liked (7)

PPT
03 v pevtschin
PPT
Rainer Zimmermann (European Commission): The role of the European Commission ...
PPT
Massonet Philippe Panel - Security in the clouds: An Academic Perspective
PDF
03 v pevtschin
PPSX
Reuters: Pictures of the Year 2016 (Part 2)
PDF
The impact of innovation on travel and tourism industries (World Travel Marke...
PDF
Open Source Creativity
03 v pevtschin
Rainer Zimmermann (European Commission): The role of the European Commission ...
Massonet Philippe Panel - Security in the clouds: An Academic Perspective
03 v pevtschin
Reuters: Pictures of the Year 2016 (Part 2)
The impact of innovation on travel and tourism industries (World Travel Marke...
Open Source Creativity
Ad

Similar to Martine Lapierre - Security in Cloud computing: sharing more than resources (20)

PDF
The Data Distribution Service
PDF
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
PDF
High Performance Distributed Computing with DDS and Scala
PDF
PPTX
Stealth solution for healthcare
PPT
Vormetric data security complying with pci dss encryption rules
PDF
Cloud Computing Using Encryption and Intrusion Detection
PPTX
Brave new world of encryption v1
PDF
eHealth ….. How to trust a cloud?
PPTX
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
PDF
PDF
PDF
Data protection in cloud computing - Data Protection Conference 2011
PPT
Trend micro - Your journey to the cloud, where are you
PDF
Protocols for Wireless Sensor Networks and Its Security
PDF
Resarch paper i cloud computing
PPTX
Cloud assisted mobile-access of health data with privacy and auditability
PPTX
Practical Security for the Cloud
PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
PDF
Top Journals
The Data Distribution Service
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
High Performance Distributed Computing with DDS and Scala
Stealth solution for healthcare
Vormetric data security complying with pci dss encryption rules
Cloud Computing Using Encryption and Intrusion Detection
Brave new world of encryption v1
eHealth ….. How to trust a cloud?
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
Data protection in cloud computing - Data Protection Conference 2011
Trend micro - Your journey to the cloud, where are you
Protocols for Wireless Sensor Networks and Its Security
Resarch paper i cloud computing
Cloud assisted mobile-access of health data with privacy and auditability
Practical Security for the Cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
Top Journals

More from ServiceWave 2010 (20)

PPT
Usman Wajid: Service-based Application Development by Ordinary End Users and ...
PPT
D. Meiländer, S. Gorlatch, C. Cappiello, V. Mazza, R. Kazhamiakin, and A. Buc...
PPTX
Maryam Razavian: A Frame of Reference for SOA Migration
PPTX
Security in the Clouds Panel Chair: Mike Surridge
PPTX
Chen Wang, Pazat, Di Napoli, Giordano: A Chemical Based Middleware for Workf...
PDF
Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...
PPT
Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...
PPTX
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
PPTX
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
PPTX
Scott Kirkpatrick (Hebrew University): OneLab: Federation and Testbeds
PPT
Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...
PPT
1 sw2010 testbeds-panel
PDF
Orestis Terzidis - Taking the Internet of Services to the Next Level
PDF
Martine Lapierre - Security & Privacy trends for Urban & transport applications
PPTX
Mário Campolargo - Services and clouds as cornerstones of the Digital Agenda
PPTX
Fire Demos
PPT
Demonstration Evening ServiceWave 2010, FIA and FIRE
PPT
Dr Berre - Service Modelling and Representation Techniques
PPTX
Empowering Citizens in Public Service Design and Delivery: A reference model ...
PPT
The Hunt for Leading Indicators
Usman Wajid: Service-based Application Development by Ordinary End Users and ...
D. Meiländer, S. Gorlatch, C. Cappiello, V. Mazza, R. Kazhamiakin, and A. Buc...
Maryam Razavian: A Frame of Reference for SOA Migration
Security in the Clouds Panel Chair: Mike Surridge
Chen Wang, Pazat, Di Napoli, Giordano: A Chemical Based Middleware for Workf...
Pablo Chacin (Polytechnic University of Catalonia, Spain): Utility Driven Ser...
Roman Khazankin (Vienna University of Technology): Providence: A Framework fo...
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
Andreas Wolke: TwoSpot. A Cloud Platform for Scaling out Web Applications dyn...
Scott Kirkpatrick (Hebrew University): OneLab: Federation and Testbeds
Jacques Magen (FIRESTATION): Testbeds for Service Deployment. FIRESTATION’s v...
1 sw2010 testbeds-panel
Orestis Terzidis - Taking the Internet of Services to the Next Level
Martine Lapierre - Security & Privacy trends for Urban & transport applications
Mário Campolargo - Services and clouds as cornerstones of the Digital Agenda
Fire Demos
Demonstration Evening ServiceWave 2010, FIA and FIRE
Dr Berre - Service Modelling and Representation Techniques
Empowering Citizens in Public Service Design and Delivery: A reference model ...
The Hunt for Leading Indicators

Martine Lapierre - Security in Cloud computing: sharing more than resources

  • 1. Security in Cloud computing: sharing more than resources Martine Lapierre, THALES DSC, Technical Director 23-27 November 2009
  • 2. Growing need of IaaS - Cloud would help: Smart Environment Smart cities Smart transport Smart energy healthcare monitoring Cloud computing implies loss of control Choices of cloud offering Private based on: Hybrid – reputation to ensure Public protection and confidentiality – ability of the cloud provider to prove that there is ‘no’ loss of control
  • 3. eHealth cloud example Data processing Journalisation of acts must satisfy (legal proof), Dedicated network infra European data Journalisation of protection Monitoring Iaas Health (cyber defense Iaas access traces) Patients center Private cloud Sensitive data Network should be transactions destroyed at a Make encryption, Is available to timeavailable to specified Doctors, IsData storage available to nurses protection/ Medical content data Data should not External eHealth driven leave the original service providers security country of collection at any – Satisfy strict regulatory requirements time – Very sensitive to negative public perception
  • 4. Customer’s view on security Are my data secure in the Cloud ? Who can access the data ? Can I access my data at any time ? What is the SLA ? Can I stop my contract at any time ? (reversibility) Can I comply with laws and regulation ? Where are my data ? What about if disclosure ? How long are my data kept if I ask for suppression ? How is managed the requisition process ? Who is responsible? Loss of control while maintaining accountability even if operational responsibility falls upon 3rd parties In case of failure in services outsourced to the cloud, the customer cannot meet his duty to his own customers and is exposed to liability
  • 5. Legal and regulatory challenges Understand the consequences of decoupling data from infrastructure. Regulation of cross-border data flows cloud providers operate datacenters in multiple locations and transfer data among them. Coherent regulations on privacy, data retention EU member states have divergent views as to whether cloud providers need to retain data and for how long. Enhance criminal enforcement of crimes Aggregation of data in cloud data centers are attractive targets for hackers. Incident response. Compliant storage certification Interoperability standards in cloud
  • 6. Security challenges Quality of service guaranties Multi-tenancy issues and isolation Certification and Insecure interfaces in federation accreditation context Compliance to regulations Data protection ID management, RBAC Cloud infrastructure protection Logging, audit Portability, reversibility From Randy Marchany