SlideShare a Scribd company logo
Cloud Computing Security and Privacy to gain Trust SMARTEVENT 2010 September 23 Sophia Antipolis Christian GOIRE
Cloud Computing Definition(s) 06/01/11 Cloud computing   is a model for enabling convenient,  on-demand network   access  to a  shared  pool of configurable  computing  resources (e.g., networks, servers, storage, applications, and services) that can be  rapidly provisioned  and released with  minimal   management effort  or  service provider interaction .  This cloud model promotes availability and is composed of five essential  characteristics,  three  service models , and four  deployment models . NIST Definition Built on  compute and storage virtualization ,  provides  scalable ,  network-centric, abstracted IT infrastructure ,  platforms , and  applications   as on-demand services   that are billed by  consumption . Gartner’s  definition :  "a style of computing where  scalable  and  elastic  IT-related capabilities are provided 'as a service' to external customers using Internet technologies."
The NIST Cloud Definition Framework 06/01/11 Deployment Models Service Models Essential Character-istics Common  Character-istics Homogeneity Massive Scale Resilient Computing Geographic Distribution Community Cloud Private Cloud Public Cloud Hybrid Clouds Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Resource Pooling Broad Network Access Rapid Elasticity Measured Service On Demand Self-Service Low Cost Software Virtualization Service Orientation Advanced Security
3 main  Services Models 06/01/11
Cloud Providers – A Birds Eye View 06/01/11 Infrastructure  as a Service Platform  as a Service Software  as a Service
Main aspects forming a cloud system 06/01/11
Expert group report (Excerpts) Non- functional aspects Elasticity Reliability Quality of Service Agility and adaptability Availability 06/01/11
Continued (2) Economic aspects Cost reduction Pay per use Improved time to market Return of investment  Turning CAPEX into OPEX Going Green 06/01/11
Continued (3) Technological Aspects Virtualisation Multi- tenancy Security, Privacy and compliance Data Management API’s and / or Programming Enhancements Metering Tools 06/01/11
Research time line (in year) of the individual topics  06/01/11
Security and Privacy Challenges The massive concentrations of resources and data present a more attractive target to attackers The challenges are not new but Cloud computing intensifies them 06/01/11
Technical risks Resource exhaustion Isolation failure Cloud provider malicious insider, abuse of high privilege Management interface compromise Intercepting data in transit Data leakage on up /download, intra- cloud Insecure or ineffective deletion of data  Distributed Denial of service DDoS Economic denial of service EDOS Loss of encryption keys Undertaking malicious probes and scans Compromise service engine Conflicts between customer procedures and cloud 06/01/11
Policy and organizational risks Lock -in Loss of governance Compliance challenges Loss of business reputation due to co -tenant activities Cloud service termination or failure Cloud provider acquisition Supply chain failure 06/01/11
Legal risk Subpoena and e- discovery Risk from change of jurisdiction Data protection risk Licensing risks 06/01/11
Research recommendations Certification processes and standards for the Cloud 06/01/11
Research recommendations Metrics for security in cloud computing Return on security investments Effects of different forms reporting breaches on security Techniques for increasing transparency /level of security Location tagging, data type tagging, policy tagging Privacy (data provenance) tracing data end to end End to end data confidentiality in the cloud and beyond: Encrypted search (long term) Encrypted processing schemes (long term) Encryption and confidentiality tools for social applications in the cloud Trusted computing in clouds, trusted boot sequence for virtual machine stack Standardization etc. 06/01/11
Legal recommendations Legal issues to be resolved during the evaluation of the contracts (ULA User Licensing Agreement, SLA Service Level Agreement) Data protection Data security Data Transfer Law enforcement access Confidentiality and non disclosure Intellectual property Risk allocation and limitation of liability Change of control 06/01/11
Conclusion Technology solutions ; privacy by design Compliance with transparency provisions vis-à-vis individuals Ensure that customers know about the location of their data Ensure that they properly understand the risks so that they make informed choices Current review process of the existing Data Protection Directive 06/01/11

More Related Content

PDF
Managing sensitive applications in the public cloud
ODP
OUGF - OSAmI - OSGi Ubiquity
PDF
Atmosphere: project objctives
PPTX
EOSC-hub Week - Cloud Lightning Talks: Atmosphere
PPT
Data Intensive Services
PPT
Design Principles for a Service-Aware Future Internet
PDF
Cloud computing 4
PPTX
Cloud computing
Managing sensitive applications in the public cloud
OUGF - OSAmI - OSGi Ubiquity
Atmosphere: project objctives
EOSC-hub Week - Cloud Lightning Talks: Atmosphere
Data Intensive Services
Design Principles for a Service-Aware Future Internet
Cloud computing 4
Cloud computing

What's hot (20)

PPTX
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
PPT
Addressing and routing services
PDF
2016 02-04-gingell-iot
PPTX
Cloud computing
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PDF
Workshop summary software assurance and trust
PDF
Effect splus systems-and-network-cluster-results-draft-v1
DOC
Integrity for join queries in the cloud
PDF
PaaSword's main idea, technical architecture and scientific challenges
PPTX
Kaseya Connect 2013: Kaseya Keynote
PPTX
Cloud security
PPT
eChallenges_e2011_JS
DOCX
Design and operation of secure cyber physical systems
PPTX
Cloud computing
PDF
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
PDF
Protect customer's personal information eng 191018
PDF
Cloud Solutions Collateral
PPT
Cloud computing
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
Addressing and routing services
2016 02-04-gingell-iot
Cloud computing
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Workshop summary software assurance and trust
Effect splus systems-and-network-cluster-results-draft-v1
Integrity for join queries in the cloud
PaaSword's main idea, technical architecture and scientific challenges
Kaseya Connect 2013: Kaseya Keynote
Cloud security
eChallenges_e2011_JS
Design and operation of secure cyber physical systems
Cloud computing
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
Protect customer's personal information eng 191018
Cloud Solutions Collateral
Cloud computing
Ad

Viewers also liked (7)

PDF
EduFester
PPT
Supporting clinicians and helping to feed the beast
PDF
Cloud congress 2012_herbert_wanner_cisco_v3
PPT
Assistive technology webquest
DOC
Using web technologies for the lactation professional
DOC
LIBROS
PPT
pengenalan Tapak Suci
EduFester
Supporting clinicians and helping to feed the beast
Cloud congress 2012_herbert_wanner_cisco_v3
Assistive technology webquest
Using web technologies for the lactation professional
LIBROS
pengenalan Tapak Suci
Ad

Similar to Cloud computing security and privacy christian goire (20)

PPT
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
PPT
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
PDF
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
PDF
1376843836 94879193
PDF
1376843836 94879193
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PPT
Exploring Cloud Computing Technologies For GIS (Location Based) Applications
PDF
YURY_CHEMERKIN__ITA_2013_Proceedings.pdf
PPT
Software Association of Oregon Cloud Computing Presentation
PDF
(Pdf) yury chemerkin _ita_2013 proceedings
PDF
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
PDF
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
PPSX
Cloud Computing - A Primer
PPT
Ahearn Cloud Presentation
PPT
Cloud Ecosystems A Perspective
PDF
Why CCSK with InfosecTrain (1).pdf
PPT
Cloud Computing & Security Concerns
PPT
08 message and_queues_dieter_gawlick
PDF
Security of Data in Cloud Environment Using DPaaS
PPT
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
1376843836 94879193
1376843836 94879193
Effectively and Securely Using the Cloud Computing Paradigm
Exploring Cloud Computing Technologies For GIS (Location Based) Applications
YURY_CHEMERKIN__ITA_2013_Proceedings.pdf
Software Association of Oregon Cloud Computing Presentation
(Pdf) yury chemerkin _ita_2013 proceedings
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Cloud Computing - A Primer
Ahearn Cloud Presentation
Cloud Ecosystems A Perspective
Why CCSK with InfosecTrain (1).pdf
Cloud Computing & Security Concerns
08 message and_queues_dieter_gawlick
Security of Data in Cloud Environment Using DPaaS

Cloud computing security and privacy christian goire

  • 1. Cloud Computing Security and Privacy to gain Trust SMARTEVENT 2010 September 23 Sophia Antipolis Christian GOIRE
  • 2. Cloud Computing Definition(s) 06/01/11 Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction . This cloud model promotes availability and is composed of five essential characteristics, three service models , and four deployment models . NIST Definition Built on compute and storage virtualization , provides scalable , network-centric, abstracted IT infrastructure , platforms , and applications as on-demand services that are billed by consumption . Gartner’s definition : "a style of computing where scalable and elastic IT-related capabilities are provided 'as a service' to external customers using Internet technologies."
  • 3. The NIST Cloud Definition Framework 06/01/11 Deployment Models Service Models Essential Character-istics Common Character-istics Homogeneity Massive Scale Resilient Computing Geographic Distribution Community Cloud Private Cloud Public Cloud Hybrid Clouds Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Resource Pooling Broad Network Access Rapid Elasticity Measured Service On Demand Self-Service Low Cost Software Virtualization Service Orientation Advanced Security
  • 4. 3 main Services Models 06/01/11
  • 5. Cloud Providers – A Birds Eye View 06/01/11 Infrastructure as a Service Platform as a Service Software as a Service
  • 6. Main aspects forming a cloud system 06/01/11
  • 7. Expert group report (Excerpts) Non- functional aspects Elasticity Reliability Quality of Service Agility and adaptability Availability 06/01/11
  • 8. Continued (2) Economic aspects Cost reduction Pay per use Improved time to market Return of investment Turning CAPEX into OPEX Going Green 06/01/11
  • 9. Continued (3) Technological Aspects Virtualisation Multi- tenancy Security, Privacy and compliance Data Management API’s and / or Programming Enhancements Metering Tools 06/01/11
  • 10. Research time line (in year) of the individual topics 06/01/11
  • 11. Security and Privacy Challenges The massive concentrations of resources and data present a more attractive target to attackers The challenges are not new but Cloud computing intensifies them 06/01/11
  • 12. Technical risks Resource exhaustion Isolation failure Cloud provider malicious insider, abuse of high privilege Management interface compromise Intercepting data in transit Data leakage on up /download, intra- cloud Insecure or ineffective deletion of data Distributed Denial of service DDoS Economic denial of service EDOS Loss of encryption keys Undertaking malicious probes and scans Compromise service engine Conflicts between customer procedures and cloud 06/01/11
  • 13. Policy and organizational risks Lock -in Loss of governance Compliance challenges Loss of business reputation due to co -tenant activities Cloud service termination or failure Cloud provider acquisition Supply chain failure 06/01/11
  • 14. Legal risk Subpoena and e- discovery Risk from change of jurisdiction Data protection risk Licensing risks 06/01/11
  • 15. Research recommendations Certification processes and standards for the Cloud 06/01/11
  • 16. Research recommendations Metrics for security in cloud computing Return on security investments Effects of different forms reporting breaches on security Techniques for increasing transparency /level of security Location tagging, data type tagging, policy tagging Privacy (data provenance) tracing data end to end End to end data confidentiality in the cloud and beyond: Encrypted search (long term) Encrypted processing schemes (long term) Encryption and confidentiality tools for social applications in the cloud Trusted computing in clouds, trusted boot sequence for virtual machine stack Standardization etc. 06/01/11
  • 17. Legal recommendations Legal issues to be resolved during the evaluation of the contracts (ULA User Licensing Agreement, SLA Service Level Agreement) Data protection Data security Data Transfer Law enforcement access Confidentiality and non disclosure Intellectual property Risk allocation and limitation of liability Change of control 06/01/11
  • 18. Conclusion Technology solutions ; privacy by design Compliance with transparency provisions vis-à-vis individuals Ensure that customers know about the location of their data Ensure that they properly understand the risks so that they make informed choices Current review process of the existing Data Protection Directive 06/01/11