SlideShare a Scribd company logo
Cloud computing security
Cloud Computing
Network/Security
Threats
Aung Thu Rha Hein(g5536871)
Agenda
Cloud Computing
• What is cloud computing?
• Cloud Computing Infrastructure Models
• Architecture layers of Cloud Computing
• Cloud Computing characteristics

Network/Security Aspects of Cloud Computing
• Network/Security issues based on architecture types
• Network issues on cloud computing
• Security issues on cloud computing
What is Cloud Computing?

• services that provide common business applications online,
  which are accessed from a Web browser, while the
  software and data are stored on the servers; a style of
  computing in which dynamically scalable and often
  virtualized resources are provided as a service over the
  Internet
        Source: Wolfram Alpha

• Cloud computing is the use of computing resources
  (hardware and software) that are delivered as a service
  over a network (typically the Internet).
        Source: Wikipedia
5th generation of Computing

   1970s   •Monolithic
  1980s    •Client-Server
  1990s    •Web-based
  2000s    •SOA
   2010    •Cloud Computing
Cloud Computing
Infrastructure Models
• Public Cloud
   • AWS, Google App Engine
     Win Azure

• Private Cloud
   • Premised or external hosted
   • For one client
   • Control data, security & QoS

• Hybrid Cloud
   • Cloud Bursting
   • Provide on-demand, externaly provisioned scale
Architectural Layers of
 Cloud Computing
• Saas (Software As A Service)
   • Provides resources (apps or storage)
   • Free or pay-per–usage model
   • Gmail, Github, Dropbox
• PaaS (Platform As A Service)
   • Provides development platform
   • Heroku, OpenShift, Google App Engine, Win Azure
• IaaS (Infrastructure As A Service)
   • Offer hardware related services
   • Amazon EC2, Rackspace, Flexiscale
Cloud Computing
Characteristics
Network/Security Aspects of
Cloud Computing
Software As A Service
                          Application


  Application
                          Middleware                Database
    Server


                       Operating System

                          Hypervisor


                                     Storage
  CPU            Networking                               Backup
                                    YOUR DATA


         Datacenter (Power, Cooling, Physical Security)

                  Your                   Their
                Problem                 Problem
Platform As A Service
                       Your Application


  Application
                          Middleware                Database
    Server


                       Operating System

                          Hypervisor



  CPU            Networking            Storage            Backup



         Datacenter (Power, Cooling, Physical Security)

                  Your                  Their
                Problem                Problem
Infrastructure As A Service
                       Your Application

     Your
                             Your                     Your
  Application
                          Middleware                Database
    Server

                    Your Operating System

                          Hypervisor



  CPU            Networking            Storage            Backup



         Datacenter (Power, Cooling, Physical Security)

                  Your                  Their
                Problem                Problem
Network Issues
• DoS ( Denial of Service or Distributed denial-of-attack)
   • overflows a server with
      frequent request of services
   Methods
   - Smurf attack
   - SYN flood
   - Teardrop attacks
Network Issues(cont.)
• Man in the Middle Attack
   • An attacker splits connection and rejoin with the
     attackers own computer system
   • SSL is not properly configured
Network Issues(cont.)
• Network Sniffing
   • hack passwords that are not properly encrypted during
     communication
   • a self contained software program or a hardware device
Network Issues(cont.)
• Port Scanning
   • sends client requests to a range of server port addresses
     on a host
   • To search an active port and vulnerable services
Security Issues
• XML Signature Element Wrapping (Wrapper attack)
   • Attacker rewrite SOAP request that already signed by using a
     wrapper block
   • Well known web service attack
Security Issues(cont.)
• Cloud Malware Injection Attack
   • Upload virus
     Program to the cloud
Security Issues(cont.)

• Data Stealing Problems
   • User account and password are stolen by any means
• Accountability Check Problem
   • “No use No bill” payment method
   • an attacker has engaged the cloud with a malicious
     service or runs malicious code
Conclusion &
 Thank You!

More Related Content

PDF
Cloud Computing Security
PDF
Data mining & column stores
PPTX
Chap 5 software as a service (saass)
PPTX
Cloud computing and data security
PPTX
Security in Cloud Computing
PPT
Cloud Computing Security Issues in Infrastructure as a Service”
PPT
security Issues of cloud computing
PPTX
Data Confidentiality in Cloud Computing
Cloud Computing Security
Data mining & column stores
Chap 5 software as a service (saass)
Cloud computing and data security
Security in Cloud Computing
Cloud Computing Security Issues in Infrastructure as a Service”
security Issues of cloud computing
Data Confidentiality in Cloud Computing

What's hot (20)

PPTX
SaaS Challenges & Security Concerns
PPTX
Chap 6 cloud security
PPT
Cloud Computing Security Challenges
PPTX
Cloud Computing security issues
PPT
Cloud Computing & Security Concerns
PPTX
Authentication cloud
PPTX
Cloud Security ("securing the cloud")
PPTX
Security in cloud computing
PPTX
Cloud Security
PDF
Cloud Computing Security Organization Assessments Service Categories Responsi...
PPTX
Ensuring data storage security in cloud computing
PPTX
Cloud Encryption
PPT
Security & Privacy In Cloud Computing
PPTX
Security issues in cloud database
PPT
Cloud Computing - Security Benefits and Risks
PDF
Cloud Security Standards: What to Expect and What to Negotiate V2.0
PDF
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
PPT
Cloud computing-security-issues
PDF
Cloud Computing v.s. Cyber Security
PPTX
Cloud Reference Model
SaaS Challenges & Security Concerns
Chap 6 cloud security
Cloud Computing Security Challenges
Cloud Computing security issues
Cloud Computing & Security Concerns
Authentication cloud
Cloud Security ("securing the cloud")
Security in cloud computing
Cloud Security
Cloud Computing Security Organization Assessments Service Categories Responsi...
Ensuring data storage security in cloud computing
Cloud Encryption
Security & Privacy In Cloud Computing
Security issues in cloud database
Cloud Computing - Security Benefits and Risks
Cloud Security Standards: What to Expect and What to Negotiate V2.0
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Cloud computing-security-issues
Cloud Computing v.s. Cyber Security
Cloud Reference Model
Ad

Viewers also liked (20)

PDF
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
PPTX
Cloud Computing Security
PPTX
Transforming cloud security into an advantage
PPTX
Security challenges of cloud computing
PDF
Cloud computing & Security presentation
PPT
Cloud computing security - Insights
PDF
Malware detection in cloud computing infrastructures
PPTX
Security in cloud computing
PDF
Cloud computing security
PPT
Cloud computing security
PPT
Cloud Computing Security Issues
PDF
Cloud Security - Security Aspects of Cloud Computing
PDF
2013 State of Cloud Survey SMB Results
PDF
Breaking through the Clouds
PPTX
2013 Future of Cloud Computing - 3rd Annual Survey Results
PDF
Intro to cloud computing — MegaCOMM 2013, Jerusalem
PPTX
Cloud security ppt
PDF
Can we hack open source #cloud platforms to help reduce emissions?
PDF
Summer School Scale Cloud Across the Enterprise
PPTX
Simplifying The Cloud Top 10 Questions By SMBs
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing Security
Transforming cloud security into an advantage
Security challenges of cloud computing
Cloud computing & Security presentation
Cloud computing security - Insights
Malware detection in cloud computing infrastructures
Security in cloud computing
Cloud computing security
Cloud computing security
Cloud Computing Security Issues
Cloud Security - Security Aspects of Cloud Computing
2013 State of Cloud Survey SMB Results
Breaking through the Clouds
2013 Future of Cloud Computing - 3rd Annual Survey Results
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Cloud security ppt
Can we hack open source #cloud platforms to help reduce emissions?
Summer School Scale Cloud Across the Enterprise
Simplifying The Cloud Top 10 Questions By SMBs
Ad

Similar to Cloud computing security (20)

PPT
Introduction to Cloud Computing
PPTX
Bright and Gray areas of Clound Computing
PPTX
Presentation on cloud computing
PPTX
Windows Azure Uzerinden Alinabilen Hizmetler
PPTX
Windows Azure Üzerinden Alınabilecek Hizmetler
PDF
Choosing Your Windows Azure Platform Strategy
PPTX
Cloud computing 101
PDF
2010 09-24-闕志克老師-cloud computing where do we go
PPTX
Cloud computing
PDF
Virtualization for Development
PPT
Intro cloud-1
PPT
Intro cloud-1
PPTX
What is Cloud computing?
PPTX
Windows Azure Platform
PPTX
A Biological Smart Platform for the Environmental Risk Assessment
PDF
Windows Azure: Is Azure right for you?
PPTX
Virtualization and cloud computing
PDF
Building Applications with AWS
PDF
13h00 p duff-building-applications-with-aws-final
PPTX
Security on AWS
Introduction to Cloud Computing
Bright and Gray areas of Clound Computing
Presentation on cloud computing
Windows Azure Uzerinden Alinabilen Hizmetler
Windows Azure Üzerinden Alınabilecek Hizmetler
Choosing Your Windows Azure Platform Strategy
Cloud computing 101
2010 09-24-闕志克老師-cloud computing where do we go
Cloud computing
Virtualization for Development
Intro cloud-1
Intro cloud-1
What is Cloud computing?
Windows Azure Platform
A Biological Smart Platform for the Environmental Risk Assessment
Windows Azure: Is Azure right for you?
Virtualization and cloud computing
Building Applications with AWS
13h00 p duff-building-applications-with-aws-final
Security on AWS

More from Aung Thu Rha Hein (18)

PPTX
Writing with ease
PDF
Bioinformatics for Computer Scientists
PPTX
Analysis of hybrid image with FFT (Fast Fourier Transform)
PPTX
Introduction to Common Weakness Enumeration (CWE)
PDF
Private Browsing: A Window of Forensic Opportunity
PDF
Network switching
PDF
Digital Forensic: Brief Intro & Research Challenge
PDF
Survey & Review of Digital Forensic
PPTX
Partitioned Based Regression Verification
PDF
CRAXweb: Automatic Exploit Generation for Web Applications
PPTX
Botnets 101
PPTX
Session initiation protocol
PPTX
TPC-H in MongoDB
PPTX
Web application security: Threats & Countermeasures
PPTX
Can the elephants handle the no sql onslaught
PPTX
Fuzzy logic based students’ learning assessment
PPTX
Link state routing protocol
PPTX
Chat bot analysis
Writing with ease
Bioinformatics for Computer Scientists
Analysis of hybrid image with FFT (Fast Fourier Transform)
Introduction to Common Weakness Enumeration (CWE)
Private Browsing: A Window of Forensic Opportunity
Network switching
Digital Forensic: Brief Intro & Research Challenge
Survey & Review of Digital Forensic
Partitioned Based Regression Verification
CRAXweb: Automatic Exploit Generation for Web Applications
Botnets 101
Session initiation protocol
TPC-H in MongoDB
Web application security: Threats & Countermeasures
Can the elephants handle the no sql onslaught
Fuzzy logic based students’ learning assessment
Link state routing protocol
Chat bot analysis

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Cloud computing and distributed systems.
PDF
Modernizing your data center with Dell and AMD
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Monthly Chronicles - July 2025
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Machine learning based COVID-19 study performance prediction
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Encapsulation theory and applications.pdf
cuic standard and advanced reporting.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
Cloud computing and distributed systems.
Modernizing your data center with Dell and AMD
MYSQL Presentation for SQL database connectivity
NewMind AI Monthly Chronicles - July 2025
“AI and Expert System Decision Support & Business Intelligence Systems”
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Encapsulation theory and applications.pdf

Cloud computing security

  • 3. Agenda Cloud Computing • What is cloud computing? • Cloud Computing Infrastructure Models • Architecture layers of Cloud Computing • Cloud Computing characteristics Network/Security Aspects of Cloud Computing • Network/Security issues based on architecture types • Network issues on cloud computing • Security issues on cloud computing
  • 4. What is Cloud Computing? • services that provide common business applications online, which are accessed from a Web browser, while the software and data are stored on the servers; a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet Source: Wolfram Alpha • Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). Source: Wikipedia
  • 5. 5th generation of Computing 1970s •Monolithic 1980s •Client-Server 1990s •Web-based 2000s •SOA 2010 •Cloud Computing
  • 6. Cloud Computing Infrastructure Models • Public Cloud • AWS, Google App Engine Win Azure • Private Cloud • Premised or external hosted • For one client • Control data, security & QoS • Hybrid Cloud • Cloud Bursting • Provide on-demand, externaly provisioned scale
  • 7. Architectural Layers of Cloud Computing • Saas (Software As A Service) • Provides resources (apps or storage) • Free or pay-per–usage model • Gmail, Github, Dropbox • PaaS (Platform As A Service) • Provides development platform • Heroku, OpenShift, Google App Engine, Win Azure • IaaS (Infrastructure As A Service) • Offer hardware related services • Amazon EC2, Rackspace, Flexiscale
  • 10. Software As A Service Application Application Middleware Database Server Operating System Hypervisor Storage CPU Networking Backup YOUR DATA Datacenter (Power, Cooling, Physical Security) Your Their Problem Problem
  • 11. Platform As A Service Your Application Application Middleware Database Server Operating System Hypervisor CPU Networking Storage Backup Datacenter (Power, Cooling, Physical Security) Your Their Problem Problem
  • 12. Infrastructure As A Service Your Application Your Your Your Application Middleware Database Server Your Operating System Hypervisor CPU Networking Storage Backup Datacenter (Power, Cooling, Physical Security) Your Their Problem Problem
  • 13. Network Issues • DoS ( Denial of Service or Distributed denial-of-attack) • overflows a server with frequent request of services Methods - Smurf attack - SYN flood - Teardrop attacks
  • 14. Network Issues(cont.) • Man in the Middle Attack • An attacker splits connection and rejoin with the attackers own computer system • SSL is not properly configured
  • 15. Network Issues(cont.) • Network Sniffing • hack passwords that are not properly encrypted during communication • a self contained software program or a hardware device
  • 16. Network Issues(cont.) • Port Scanning • sends client requests to a range of server port addresses on a host • To search an active port and vulnerable services
  • 17. Security Issues • XML Signature Element Wrapping (Wrapper attack) • Attacker rewrite SOAP request that already signed by using a wrapper block • Well known web service attack
  • 18. Security Issues(cont.) • Cloud Malware Injection Attack • Upload virus Program to the cloud
  • 19. Security Issues(cont.) • Data Stealing Problems • User account and password are stolen by any means • Accountability Check Problem • “No use No bill” payment method • an attacker has engaged the cloud with a malicious service or runs malicious code

Editor's Notes

  • #4: First part- intro about the architecture, infrastructure, characteristic of cloud computing.After that, explain about the security concerns of cloud computing
  • #5: CC & Virtualization-buzz word in the world of web technologyCan access anywhere without no installationCentralized data storage and bandwidth
  • #6: 1-monotholic2.Client server3.Web based4.SOA-serice oriented architecture: application to communicate over standard-based web protocols 2006-amazon web services 2007-resarch by google and ibm 2010-MS azure5.CC
  • #7: Public clouds are run by third parties, and applications from different customers are likely to be mixed together on the cloud’s servers, storage systems, and networks. Public clouds are most often hosted away from customer premises, and they provide a way to reduce customer risk and cost by providing a flexible, even temporary extension to enterprise infrastructure.Private clouds are built for the exclusive use of one client, providing the utmost control over data, security, and quality of service. The company owns the infrastructure and has control over how applications are deployed on it. Private clouds may be deployed in an enterprise datacenter, and they also may be deployed at a co-location facility.Hybrid clouds combine both public and private cloud models. They can help to provide on-demand, externally provisioned scale. The ability to augment a private cloud with the resources of a public cloud can be used to maintain service levels in the face of rapid workload fluctuations.
  • #8: Saas-broad market, most of the stuffs use by browser- SaaSUsers can access a software application hosted by the cloud vendor on pay-per-use basisIaas- hardware-server, storage
  • #10: interxion1.Preventing data loss2. preventing outages3. keeping security up to dateAttack in cloudsMulti tanency and resource pooling modelsBased on the deployment models we choose, the problems or the component you have control over is different.Cloud computing runs on network infrastructure.so, it is open to network attack. some of the wellknown attacks are
  • #14: Dos-Server can’t respond to normal userspurpose is to decrease server performance by using computational resources,Smurf attack- icmpflooding broadcast to a victim’s network using broadcast addressSyn- flood tcp/syn packets with a faked address, half-open connectionTeardrop-sending invalidpackets with overlapped ip fragment and crash the systemPrevent-setup firewall,IPS,switches,routers ,reduce the privileges of users
  • #15: Man In the Middle attack refers to a technique where a malicious attacker splits a connection between two computers and rejoins the connections with the attackers own computer systemin this attack, the attacker takes over the role of a device between you and the system you are talking to. This device could be a router, where the attacker confuses the switch ARP table and has data destined for the router to be sent to her. Then she relays the data to the router.To prevent-use mutual authentication techniques such as PKI, one-time pads
  • #16: It’s a diagnosis tool for network engineersmethods-install sniffing tool to network devices or programTo prevent: anti-sniffer software to find
  • #17: Purpose is to find an active port Countermeasure -port scan attack detector and firewall
  • #18: SOAP- envelope structured First, envelope with plain header and body requesting serverServer reply with header info and signatureHTTPS is hardly ever used when these methods of securing the data in transit are in place. It is also not very common for the whole request to be encrypted or signed because it can have an effect on performance.To fix this,  apply W3C’s “XML Signature Best Practices” and STAMP bit
  • #19: Counter measure for this attack isauthenticity check for received messages.
  • #20: Send email to customer every session ends with next login password