SlideShare a Scribd company logo
Managing sensitive applications in the public cloud
Abstract:
Protecting the security and privacy of data is a paramount concern of enterprises
in medical, educational, financial, and other highly regulated industries. While
some industries have moved rapidly to take advantage of the cost savings,
innovations in data analysis, and many benefits provided bycloud platforms,
regulated enterprises with sensitive data have proceeded with caution. In this
paper, we explore a fully public cloud-based architecture that is able to handle
both service requirements and security requirements. In such a
public cloud environment, the traditional notion of static perimeter-based
reactive security can leave internal system components vulnerable to accidental
data disclosures or malicious attacks originating from within the perimeter.
Therefore, ensuring security and compliance of such a solution requires
innovation and new approaches in several directions, including proactive log
monitoring and analysis of virtually all parts of the cloud-based solution, full end-
to-end data encryption from the client through Internet transmission to data
storage and analytics in the solution, and robust firewall and network-intrusion
detection systems. We discuss many of these techniques as applied to a specific
real-world application known as the Watson Genomic Analytics Prototype.

More Related Content

PPT
Cloud computing security and privacy christian goire
PDF
Leveraging a big data model in the IT domain
PDF
Security Metrics Resources File
PDF
Effect splus systems-and-network-cluster-results-draft-v1
PDF
Workshop summary software assurance and trust
PPTX
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
PPTX
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
PDF
Requirements for Implementing Data-Centric ABAC
Cloud computing security and privacy christian goire
Leveraging a big data model in the IT domain
Security Metrics Resources File
Effect splus systems-and-network-cluster-results-draft-v1
Workshop summary software assurance and trust
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Requirements for Implementing Data-Centric ABAC

What's hot (20)

PDF
Science Distributed's Chain Event: Distributed Science Pilot - Lauren Long
PPTX
TSSG Security research unit May11_zdooly
PPTX
Block chain Vs Analytics
PDF
Logical Data Fabric: An Introduction
PDF
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
PDF
Toward a global data infrastructure
PDF
Atmosphere: project objctives
PPTX
EOSC-hub Week - Cloud Lightning Talks: Atmosphere
PPTX
A brief intro to cloud9
PDF
Data Virtualization enabled Data Fabric: Operationalize the Data Lake (APAC)
PDF
ConsilX Product Information
PDF
Accelerate Self-service Analytics with Universal Semantic Model
PPTX
PhD Projects in Information Security Research Assistance
PDF
e-SIDES presentation at WISP 2018, San Francisco 13/12/2018
PDF
Atlas teaser #12
PDF
11th International conference on Database Management Systems (DMS 2020)
PPTX
KATS 4th Industrial Revolution Forum Seoul , Korea
DOCX
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
PPTX
Myths About Cloud Storage In Healthcare
PDF
Annual Report-MDPI May Portuguez Castro.pdf
Science Distributed's Chain Event: Distributed Science Pilot - Lauren Long
TSSG Security research unit May11_zdooly
Block chain Vs Analytics
Logical Data Fabric: An Introduction
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
Toward a global data infrastructure
Atmosphere: project objctives
EOSC-hub Week - Cloud Lightning Talks: Atmosphere
A brief intro to cloud9
Data Virtualization enabled Data Fabric: Operationalize the Data Lake (APAC)
ConsilX Product Information
Accelerate Self-service Analytics with Universal Semantic Model
PhD Projects in Information Security Research Assistance
e-SIDES presentation at WISP 2018, San Francisco 13/12/2018
Atlas teaser #12
11th International conference on Database Management Systems (DMS 2020)
KATS 4th Industrial Revolution Forum Seoul , Korea
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
Myths About Cloud Storage In Healthcare
Annual Report-MDPI May Portuguez Castro.pdf
Ad

Viewers also liked (20)

PDF
Final Report
PDF
Arte2000 brochure
PPTX
Ve interactive
PDF
Civil 2016- projects list
PDF
Hadoop performance modeling for job estimation and resource provisioning
PDF
Cloud Computing Projects in Chandigarh
PPTX
Challenges for family farming and small-scale agriculture production in ACP c...
PPTX
RapidMiner: Introduction To Rapid Miner
PPTX
XL Miner: Classification
PDF
Ieee 2016 cs project topics list mtech
PDF
Isaca new delhi india - privacy and big data
PPT
What is cyberbullying
PDF
Sociologie de l'obésité
PPTX
Comment changer les comportements alimentaires ?
PPT
Food Studies
PPTX
Web Mining Presentation Final
Final Report
Arte2000 brochure
Ve interactive
Civil 2016- projects list
Hadoop performance modeling for job estimation and resource provisioning
Cloud Computing Projects in Chandigarh
Challenges for family farming and small-scale agriculture production in ACP c...
RapidMiner: Introduction To Rapid Miner
XL Miner: Classification
Ieee 2016 cs project topics list mtech
Isaca new delhi india - privacy and big data
What is cyberbullying
Sociologie de l'obésité
Comment changer les comportements alimentaires ?
Food Studies
Web Mining Presentation Final
Ad

Similar to Managing sensitive applications in the public cloud (20)

PDF
Cloud Security
PDF
Carestream white paper_cloud-security 2016
PDF
Whitepaper: Security of the Cloud
PDF
Security of the Cloud
PDF
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
PDF
TRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARE
PDF
Cloud Security: Techniques and frameworks for ensuring the security and priva...
PDF
Data Privacy And Security Issues In Cloud Computing.pdf
DOCX
7132019 Originality Reporthttpsucumberlands.blackboar.docx
PDF
Guidelines on Security and Privacy in Public Cloud Computing
PDF
Enabling Cloud Analytics with Data-Level Security
PDF
Security and privacy approach of cloud computing
PDF
User-Centric Privacy Control in Identity Management and Access Control within...
PDF
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
PDF
Security policy enforcement in cloud infrastructure
PPTX
CSO CXO Series Breakfast
PDF
Cloud security issues and concerns
PPTX
Cloud computing 10 cloud security advantages and challenges
PDF
Where data security and value of data meet in the cloud brighttalk webinar ...
PDF
Towards secure cloud data management
Cloud Security
Carestream white paper_cloud-security 2016
Whitepaper: Security of the Cloud
Security of the Cloud
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
TRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARE
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Data Privacy And Security Issues In Cloud Computing.pdf
7132019 Originality Reporthttpsucumberlands.blackboar.docx
Guidelines on Security and Privacy in Public Cloud Computing
Enabling Cloud Analytics with Data-Level Security
Security and privacy approach of cloud computing
User-Centric Privacy Control in Identity Management and Access Control within...
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
Security policy enforcement in cloud infrastructure
CSO CXO Series Breakfast
Cloud security issues and concerns
Cloud computing 10 cloud security advantages and challenges
Where data security and value of data meet in the cloud brighttalk webinar ...
Towards secure cloud data management

More from ieeepondy (20)

PDF
Demand aware network function placement
PDF
Service description in the nfv revolution trends, challenges and a way forward
PDF
Secure optimization computation outsourcing in cloud computing a case study o...
PDF
Spatial related traffic sign inspection for inventory purposes using mobile l...
PDF
Standards for hybrid clouds
PDF
Rfhoc a random forest approach to auto-tuning hadoop's configuration
PDF
Resource and instance hour minimization for deadline constrained dag applicat...
PDF
Reliable and confidential cloud storage with efficient data forwarding functi...
PDF
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
PDF
Scalable cloud–sensor architecture for the internet of things
PDF
Scalable algorithms for nearest neighbor joins on big trajectory data
PDF
Robust workload and energy management for sustainable data centers
PDF
Privacy preserving deep computation model on cloud for big data feature learning
PDF
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
PDF
Protection of big data privacy
PDF
Power optimization with bler constraint for wireless fronthauls in c ran
PDF
Performance aware cloud resource allocation via fitness-enabled auction
PDF
Performance limitations of a text search application running in cloud instances
PDF
Performance analysis and optimal cooperative cluster size for randomly distri...
PDF
Predictive control for energy aware consolidation in cloud datacenters
Demand aware network function placement
Service description in the nfv revolution trends, challenges and a way forward
Secure optimization computation outsourcing in cloud computing a case study o...
Spatial related traffic sign inspection for inventory purposes using mobile l...
Standards for hybrid clouds
Rfhoc a random forest approach to auto-tuning hadoop's configuration
Resource and instance hour minimization for deadline constrained dag applicat...
Reliable and confidential cloud storage with efficient data forwarding functi...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Scalable cloud–sensor architecture for the internet of things
Scalable algorithms for nearest neighbor joins on big trajectory data
Robust workload and energy management for sustainable data centers
Privacy preserving deep computation model on cloud for big data feature learning
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Protection of big data privacy
Power optimization with bler constraint for wireless fronthauls in c ran
Performance aware cloud resource allocation via fitness-enabled auction
Performance limitations of a text search application running in cloud instances
Performance analysis and optimal cooperative cluster size for randomly distri...
Predictive control for energy aware consolidation in cloud datacenters

Recently uploaded (20)

PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Cell Structure & Organelles in detailed.
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Classroom Observation Tools for Teachers
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Pre independence Education in Inndia.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Insiders guide to clinical Medicine.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Institutional Correction lecture only . . .
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Cell Structure & Organelles in detailed.
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
O7-L3 Supply Chain Operations - ICLT Program
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Classroom Observation Tools for Teachers
VCE English Exam - Section C Student Revision Booklet
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Pre independence Education in Inndia.pdf
Cell Types and Its function , kingdom of life
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
TR - Agricultural Crops Production NC III.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Insiders guide to clinical Medicine.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Complications of Minimal Access Surgery at WLH
Institutional Correction lecture only . . .
human mycosis Human fungal infections are called human mycosis..pptx

Managing sensitive applications in the public cloud

  • 1. Managing sensitive applications in the public cloud Abstract: Protecting the security and privacy of data is a paramount concern of enterprises in medical, educational, financial, and other highly regulated industries. While some industries have moved rapidly to take advantage of the cost savings, innovations in data analysis, and many benefits provided bycloud platforms, regulated enterprises with sensitive data have proceeded with caution. In this paper, we explore a fully public cloud-based architecture that is able to handle both service requirements and security requirements. In such a public cloud environment, the traditional notion of static perimeter-based reactive security can leave internal system components vulnerable to accidental data disclosures or malicious attacks originating from within the perimeter. Therefore, ensuring security and compliance of such a solution requires innovation and new approaches in several directions, including proactive log monitoring and analysis of virtually all parts of the cloud-based solution, full end- to-end data encryption from the client through Internet transmission to data storage and analytics in the solution, and robust firewall and network-intrusion detection systems. We discuss many of these techniques as applied to a specific real-world application known as the Watson Genomic Analytics Prototype.