SlideShare a Scribd company logo
3/11/2013   Security in Cloud Computing          1




   SECURITY IN CLOUD COMPUTING




                                ABHISHEK KUMAR SINHA
                                MIT,Manipal University
3/11/2013               Security in Cloud Computing   2




                                 Content
Introduction to Cloud Computing

Cloud Storage

Cloud Services

Who Consume Cloud Services?

Why protection against Cloud?

Cloud computing and Security

Privacy in Cloud Computing

Survey on Cloud Infrastructure

Cloud Cryptography

Examine the IBM Security Framework

Guide to implementing a secure cloud

Conclusion
3/11/2013     Security in Cloud Computing             3




Introduction to Cloud Computing
• Cloud computing is a model for enabling ubiquitous,
  convenient, on-demand network access to a shared pool
  of configurable computing resources (e.g., networks,
  servers, storage, applications, and services) that can be
  rapidly provisioned and released with minima
  management effort or service provider interaction [1].
3/11/2013   4
3/11/2013   5
3/11/2013   6
3/11/2013   7
3/11/2013   8
3/11/2013   9
3/11/2013      Security in Cloud Computing             10




Cloud computing and Security [3]
• Cloud computing presents an added level of risk because

  essential services are often outsourced to a third party.

• The externalized aspect of outsourcing makes it harder to

  maintain data integrity and privacy, support data and ser-
  vice availability, and demonstrate compliance.

• Inside the cloud, it is difficult to physically locate where

  data is stored.
3/11/2013    Security in Cloud Computing               11




Cloud computing and Security…
• In addition, the massive sharing of infrastructure with
  cloud computing creates a significant difference between
  cloud security and security in more traditional IT
  environments.
• Users spanning different corporations and trust levels
  often interact with the same set of compute resources.
• At the same time, workload balancing, changing service-
  level agreements (SLAs) and other aspects of todays
  dynamic IT environments create even more opportunities
  for misconfiguration, data compromise and malicious
  conduct.
3/11/2013                                       12



            Privacy in Cloud Computing

• Search history (Google, Yahoo, AOL)

• Emails (Yahoo, Microsoft, Google)

• Documents, Medical history! (Google)

• Photos (Flickr, Google)

• Video watching history (YouTube, Google)

• Web browsing history (DoubleClick, Google)

• Social networks (Facebook, MySpace, Google)
3/11/2013   13
3/11/2013                            14




            Cloud Cryptography
• Homomorphic encryption

• Searchable/Structured encryption

• Proofs of storage

• Server-aided secure computation
3/11/2013                                               15




            Homomorphic encryption
• Homomorphic encryption is a form of encryption which
  allows specific types of computations to be carried out on
  ciphertext and obtain an encrypted result which is the
  ciphertext of the result of operations performed on the
  plaintext.
• E.g.one person could add two encrypted numbers and
  then another person could decrypt the result, without
  either of them being able to find the value of the individual
  numbers.
3/11/2013   16
3/11/2013                                             17




            Searchable Encryption
• Encryption that supports search on encrypted text
  Symmetric key [SWP01,Goh03,CM05,CGKO06]
  Public key [BDOP06, BKOS07,…]
• Guarantees that:
  Cloud never sees documents
  Cloud never sees search keywords
• Pros
  Symmetric variant is very efficient!
• Cons
  Reveals access and search patterns
  Shows how to hide this but it is expensive
3/11/2013   18
3/11/2013                                               19


             Proofs of Storage

•Tamper detection without knowing original file:
  Symmetric-key
  Public-key
 •Guarantees that:
  Cloud will be caught if it tampers with data
• Pros
  Symmetric variant is efficient!
  Verification does not require copy of original data
3/11/2013   20
3/11/2013                                           21


       Server-aided secure computation

• Joint computation w/o revealing inputs
(plain) secure computation
•Guarantees that:
  Parties will not learn each other’s inputs
  Cloud will not learn parties’ inputs
• Pros
 General-purpose (e.g., data mining,voting,negotiations,…)
 Efficient
3/11/2013   22
3/11/2013      Security in Cloud Computing           23




Examine the IBM Security Framework [3]
• The IBM Security Framework was developed to describe
  security in terms of the business resources that need to
  be protected, and it looks at the different resource
  domains from a business point of view.
• Based on the IBM Security Framework and informed by
  extensive discussions with IBM clients,IBM provide a host
  of major security requirements in enterprise-class cloud
  computing.
3/11/2013   Security in Cloud Computing   24
3/11/2013     Security in Cloud Computing               25




Cont’d…
• People and identity: Cloud environments usually support
  a large and diverse community of users, so these controls
  are even more critical. In addition, clouds introduce a new
  tier of privileged users: administrators working for the
  cloud provider.
  Privileged-user monitoring, including logging activities,
  becomes an important requirement. This monitoring
  should include physical monitoring and background
  checking.
3/11/2013          Security in Cloud Computing                       26




Cont’d…
• Data and information: Most organizations cite data protection as their

  most important security issue. Typical concerns include the way in
  which data is stored and accessed, compliance and audit
  requirements, and business issues involving the cost of data
  breaches, notification requirements, and damage to brand value.

• All sensitive or regulated data needs to be properly segregated on

  the cloud storage infrastructure, including archived data.

• Encrypting and managing encryption keys of data in transit to the

  cloud or data at rest in the service provider's data center is critical to
  protecting data privacy and complying with compliance mandates.
3/11/2013       Security in Cloud Computing               27




Cont’d…
• Application and process: Clients typically consider cloud

  application security requirements in terms of image
  security.

• All of the typical application security requirements still

  apply to the applications in the cloud,but they also carry
  over to the images that host those applications

• The cloud provider needs to follow and support a secure

  development process.
3/11/2013         Security in Cloud Computing                    28




Cont’d…
• Network, server, and endpoint: In the shared cloud
  environment, clients want to ensure that all tenant domains are
  properly isolated and that no possibility exists for data or
  transactions to leak from one tenant domain into the next.
• To help achieve this, clients need the ability to configure
  trusted virtual domains or policy-based security zones.
• As data moves further from the client's control, they expect
  capabilities like Intrusion
• Detection and Prevention systems to be built into the
  environment.
3/11/2013      Security in Cloud Computing               29




Cont’d…
• Physical infrastructure: The cloud's infrastructure,

  including servers, routers, storage devices, power
  supplies, and other components that support operations,
  should be physically secure.

• Safeguards include the adequate control and monitoring

  of physical access using biometric access control
  measures and closed circuit television (CCTV) monitoring.
3/11/2013      Security in Cloud Computing             30




Guide to implementing a secure cloud
• Implement and maintain a security program:

• A security program can provide the structure for

  managing information security, and the risks and threats
  to the target environment.

• In the event of a security breach, the security program can

  provide crucial information as to how the cloud is
  protected, responses to threats, and a line of
  accountability for management of events.
3/11/2013       Security in Cloud Computing                31




Cont’d…
• Build and maintain a secure cloud infrastructure:

• A secure infrastructure helps provide cloud resiliency and the

  confidence that the information stored in the cloud is
  adequately protected.

• Organizations must ensure that the vendor can meet all

  business requirements, demonstrates an understanding of all
  legal, regulatory, industry, and customer specific requirements,
  and has the capacity to meet those requirements in a
  satisfactory manner.
3/11/2013         Security in Cloud Computing                 32




Cont’d…
• Ensure confidential data protection:

• Data protection is a core principle of information security. All of

  the prevalent information security regulations and standards,
  as well as the majority of industry best practices, require that
  sensitive information be adequately protected in order to
  preserve confidentiality.

• Confidentiality of such data is required no matter where that

  data is resident in the chain of custody, including the cloud
  environment.
3/11/2013         Security in Cloud Computing                          33




Cont’d…
• Implement strong access and identity management:

• Access and identity management are critical to cloud security.

• They limit access to data and applications to authorized and appropriate

  users.

• Establish application and environment provisioning:

• In a centrally managed cloud environment, it is essential to have automated

  provisioning functionality in place.
3/11/2013    Security in Cloud Computing              34




Cont’d…
• Implement a governance and audit management

  program:

• To be prepared for regulatory or internal audits, you need

  to have a program in place that defines when, how, and
  where to collect log and audit information.
3/11/2013       Security in Cloud Computing           35




Cont’d…
• Implement a vulnerability and intrusion management
  program:
• In a trusted cloud environment, you have to implement a
  strict vulnerability management program and mechanisms
  such as intrusion detection systems (IDS) and intrusion
  prevention systems (IPS) to ensure that IT resources
  (servers, network, infrastructure components, and
  endpoints) are constantly monitored for vulnerabilities and
  breaches.
3/11/2013   Security in Cloud Computing               36




Cont’d…
• Maintain environment testing and validation:
• In order to maintain an intact cloud IT environment, you
  have to employ different mechanisms
• for testing and validation.
3/11/2013     Security in Cloud Computing                 37




Conclusion
• Cloud computing provides an efficient, scalable, and cost-

  effective way for today’s organizations to deliver business
  or consumer IT services over the Internet.

• Cloud computing is often provided as a service, so control

  over data and operations is shifted to third-party service
  providers, requiring their clients to establish trust
  relationships with their providers and develop security
  solutions that take this relationship into account.
3/11/2013   Security in Cloud Computing              38




Reference
[1] “The NIST Definition of Cloud Computing”, Reports on
Computer Systems Technology, National Institute of
Standards and Technology Special Publication 800-
145,September 2011.

[2] “IBM Point of View: Security and Cloud Computing”,
Cloud computing White paper, November 2009.

[3] “Cloud Security Guidance IBM Recommendations for
the Implementation of Cloud Security”, IBM RedBooks.

More Related Content

PDF
Cloud computing security
PPTX
Cloud computing security from single to multiple
PPT
Security Issues of Cloud Computing
PPTX
Ryan_Holt_MS_Thesis_Project_Presentation
PDF
Data protection in cloud computing - Data Protection Conference 2011
PPTX
Security Issues in Cloud Computing
PPTX
Cloud Computing Security Issues
PPT
security Issues of cloud computing
Cloud computing security
Cloud computing security from single to multiple
Security Issues of Cloud Computing
Ryan_Holt_MS_Thesis_Project_Presentation
Data protection in cloud computing - Data Protection Conference 2011
Security Issues in Cloud Computing
Cloud Computing Security Issues
security Issues of cloud computing

What's hot (20)

PPTX
Data security using rsa
PPT
On technical security issues in cloud computing
PPTX
Ensuring data storage security in cloud computing
PDF
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
PDF
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
PPTX
Cloud Encryption
PDF
Evaluation Of The Data Security Methods In Cloud Computing Environments
PDF
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
PPTX
Data storage security in cloud computing
PPTX
Ensuring data security in cloud computing. - Anusha Tuke
PDF
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
PDF
SecRBAC: Secure data in the Clouds
PPT
Cloud Computing Security Issues
PPTX
Cloud computing and its security issues
PPTX
Cloud Computing Security
PPT
Cloud computing security
PPTX
Data security in cloud computing
PDF
G0314043
PDF
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
PPT
Data security in the cloud
Data security using rsa
On technical security issues in cloud computing
Ensuring data storage security in cloud computing
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Cloud Encryption
Evaluation Of The Data Security Methods In Cloud Computing Environments
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Data storage security in cloud computing
Ensuring data security in cloud computing. - Anusha Tuke
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
SecRBAC: Secure data in the Clouds
Cloud Computing Security Issues
Cloud computing and its security issues
Cloud Computing Security
Cloud computing security
Data security in cloud computing
G0314043
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
Data security in the cloud
Ad

Viewers also liked (20)

PPT
Cloud computing-security-issues
PPTX
Cloud Computing Security
PDF
Cloud Computing Security
PDF
Cloud computing & Security presentation
PPT
Cloud computing security - Insights
PPT
Cloud Computing - Security Benefits and Risks
PPTX
Cloud computing security
PPT
Cloud Computing & Security Concerns
PDF
Cloud Security - Security Aspects of Cloud Computing
PDF
Cloud Computing Security
PDF
2013 State of Cloud Survey SMB Results
PDF
Breaking through the Clouds
PPTX
2013 Future of Cloud Computing - 3rd Annual Survey Results
PDF
Intro to cloud computing — MegaCOMM 2013, Jerusalem
PPTX
Cloud security ppt
PDF
Can we hack open source #cloud platforms to help reduce emissions?
PDF
Summer School Scale Cloud Across the Enterprise
PPTX
Simplifying The Cloud Top 10 Questions By SMBs
PPTX
Penetrating the Cloud: Opportunities & Challenges for Businesses
PPTX
The Inevitable Cloud Outage
Cloud computing-security-issues
Cloud Computing Security
Cloud Computing Security
Cloud computing & Security presentation
Cloud computing security - Insights
Cloud Computing - Security Benefits and Risks
Cloud computing security
Cloud Computing & Security Concerns
Cloud Security - Security Aspects of Cloud Computing
Cloud Computing Security
2013 State of Cloud Survey SMB Results
Breaking through the Clouds
2013 Future of Cloud Computing - 3rd Annual Survey Results
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Cloud security ppt
Can we hack open source #cloud platforms to help reduce emissions?
Summer School Scale Cloud Across the Enterprise
Simplifying The Cloud Top 10 Questions By SMBs
Penetrating the Cloud: Opportunities & Challenges for Businesses
The Inevitable Cloud Outage
Ad

Similar to Security in cloud computing (20)

PPTX
Unit -3.pptx cloud Security unit -3 notes
PDF
Cloud security issues and concerns
PPTX
Data_Security_inrefef_CloudComputing.pptx
PDF
Security Issues in Cloud Computing - A Review
PPTX
chapitre1-cloud security basics-23 (1).pptx
PPTX
Cloud security
PPT
legal and ethical.ppt
PDF
International journal of computer science and innovation vol 2015-n2-paper4
PDF
Solutions of cloud computing security issues
DOC
Security Issues in Cloud Computing by rahul abhishek
PDF
C017421624
PDF
G033030035
PPTX
Cloud slide
PDF
CLOUD COMPUTING.pdf
PDF
CLOUD COMPUTING.pdf
PDF
CLOUD STEGANOGRAPHY- A REVIEW
PDF
Security Issues in Cloud Computing by rahul abhishek
PDF
Encryption Technique for a Trusted Cloud Computing Environment
PDF
H017155360
PDF
Encryption Technique for a Trusted Cloud Computing Environment
Unit -3.pptx cloud Security unit -3 notes
Cloud security issues and concerns
Data_Security_inrefef_CloudComputing.pptx
Security Issues in Cloud Computing - A Review
chapitre1-cloud security basics-23 (1).pptx
Cloud security
legal and ethical.ppt
International journal of computer science and innovation vol 2015-n2-paper4
Solutions of cloud computing security issues
Security Issues in Cloud Computing by rahul abhishek
C017421624
G033030035
Cloud slide
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
CLOUD STEGANOGRAPHY- A REVIEW
Security Issues in Cloud Computing by rahul abhishek
Encryption Technique for a Trusted Cloud Computing Environment
H017155360
Encryption Technique for a Trusted Cloud Computing Environment

Recently uploaded (20)

PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Classroom Observation Tools for Teachers
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
master seminar digital applications in india
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Business Ethics Teaching Materials for college
PPTX
Institutional Correction lecture only . . .
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Insiders guide to clinical Medicine.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Microbial disease of the cardiovascular and lymphatic systems
Classroom Observation Tools for Teachers
Module 4: Burden of Disease Tutorial Slides S2 2025
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
O5-L3 Freight Transport Ops (International) V1.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
master seminar digital applications in india
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Microbial diseases, their pathogenesis and prophylaxis
Business Ethics Teaching Materials for college
Institutional Correction lecture only . . .
VCE English Exam - Section C Student Revision Booklet
Renaissance Architecture: A Journey from Faith to Humanism
FourierSeries-QuestionsWithAnswers(Part-A).pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf

Security in cloud computing

  • 1. 3/11/2013 Security in Cloud Computing 1 SECURITY IN CLOUD COMPUTING ABHISHEK KUMAR SINHA MIT,Manipal University
  • 2. 3/11/2013 Security in Cloud Computing 2 Content Introduction to Cloud Computing Cloud Storage Cloud Services Who Consume Cloud Services? Why protection against Cloud? Cloud computing and Security Privacy in Cloud Computing Survey on Cloud Infrastructure Cloud Cryptography Examine the IBM Security Framework Guide to implementing a secure cloud Conclusion
  • 3. 3/11/2013 Security in Cloud Computing 3 Introduction to Cloud Computing • Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minima management effort or service provider interaction [1].
  • 10. 3/11/2013 Security in Cloud Computing 10 Cloud computing and Security [3] • Cloud computing presents an added level of risk because essential services are often outsourced to a third party. • The externalized aspect of outsourcing makes it harder to maintain data integrity and privacy, support data and ser- vice availability, and demonstrate compliance. • Inside the cloud, it is difficult to physically locate where data is stored.
  • 11. 3/11/2013 Security in Cloud Computing 11 Cloud computing and Security… • In addition, the massive sharing of infrastructure with cloud computing creates a significant difference between cloud security and security in more traditional IT environments. • Users spanning different corporations and trust levels often interact with the same set of compute resources. • At the same time, workload balancing, changing service- level agreements (SLAs) and other aspects of todays dynamic IT environments create even more opportunities for misconfiguration, data compromise and malicious conduct.
  • 12. 3/11/2013 12 Privacy in Cloud Computing • Search history (Google, Yahoo, AOL) • Emails (Yahoo, Microsoft, Google) • Documents, Medical history! (Google) • Photos (Flickr, Google) • Video watching history (YouTube, Google) • Web browsing history (DoubleClick, Google) • Social networks (Facebook, MySpace, Google)
  • 13. 3/11/2013 13
  • 14. 3/11/2013 14 Cloud Cryptography • Homomorphic encryption • Searchable/Structured encryption • Proofs of storage • Server-aided secure computation
  • 15. 3/11/2013 15 Homomorphic encryption • Homomorphic encryption is a form of encryption which allows specific types of computations to be carried out on ciphertext and obtain an encrypted result which is the ciphertext of the result of operations performed on the plaintext. • E.g.one person could add two encrypted numbers and then another person could decrypt the result, without either of them being able to find the value of the individual numbers.
  • 16. 3/11/2013 16
  • 17. 3/11/2013 17 Searchable Encryption • Encryption that supports search on encrypted text Symmetric key [SWP01,Goh03,CM05,CGKO06] Public key [BDOP06, BKOS07,…] • Guarantees that: Cloud never sees documents Cloud never sees search keywords • Pros Symmetric variant is very efficient! • Cons Reveals access and search patterns Shows how to hide this but it is expensive
  • 18. 3/11/2013 18
  • 19. 3/11/2013 19 Proofs of Storage •Tamper detection without knowing original file: Symmetric-key Public-key •Guarantees that: Cloud will be caught if it tampers with data • Pros Symmetric variant is efficient! Verification does not require copy of original data
  • 20. 3/11/2013 20
  • 21. 3/11/2013 21 Server-aided secure computation • Joint computation w/o revealing inputs (plain) secure computation •Guarantees that: Parties will not learn each other’s inputs Cloud will not learn parties’ inputs • Pros General-purpose (e.g., data mining,voting,negotiations,…) Efficient
  • 22. 3/11/2013 22
  • 23. 3/11/2013 Security in Cloud Computing 23 Examine the IBM Security Framework [3] • The IBM Security Framework was developed to describe security in terms of the business resources that need to be protected, and it looks at the different resource domains from a business point of view. • Based on the IBM Security Framework and informed by extensive discussions with IBM clients,IBM provide a host of major security requirements in enterprise-class cloud computing.
  • 24. 3/11/2013 Security in Cloud Computing 24
  • 25. 3/11/2013 Security in Cloud Computing 25 Cont’d… • People and identity: Cloud environments usually support a large and diverse community of users, so these controls are even more critical. In addition, clouds introduce a new tier of privileged users: administrators working for the cloud provider. Privileged-user monitoring, including logging activities, becomes an important requirement. This monitoring should include physical monitoring and background checking.
  • 26. 3/11/2013 Security in Cloud Computing 26 Cont’d… • Data and information: Most organizations cite data protection as their most important security issue. Typical concerns include the way in which data is stored and accessed, compliance and audit requirements, and business issues involving the cost of data breaches, notification requirements, and damage to brand value. • All sensitive or regulated data needs to be properly segregated on the cloud storage infrastructure, including archived data. • Encrypting and managing encryption keys of data in transit to the cloud or data at rest in the service provider's data center is critical to protecting data privacy and complying with compliance mandates.
  • 27. 3/11/2013 Security in Cloud Computing 27 Cont’d… • Application and process: Clients typically consider cloud application security requirements in terms of image security. • All of the typical application security requirements still apply to the applications in the cloud,but they also carry over to the images that host those applications • The cloud provider needs to follow and support a secure development process.
  • 28. 3/11/2013 Security in Cloud Computing 28 Cont’d… • Network, server, and endpoint: In the shared cloud environment, clients want to ensure that all tenant domains are properly isolated and that no possibility exists for data or transactions to leak from one tenant domain into the next. • To help achieve this, clients need the ability to configure trusted virtual domains or policy-based security zones. • As data moves further from the client's control, they expect capabilities like Intrusion • Detection and Prevention systems to be built into the environment.
  • 29. 3/11/2013 Security in Cloud Computing 29 Cont’d… • Physical infrastructure: The cloud's infrastructure, including servers, routers, storage devices, power supplies, and other components that support operations, should be physically secure. • Safeguards include the adequate control and monitoring of physical access using biometric access control measures and closed circuit television (CCTV) monitoring.
  • 30. 3/11/2013 Security in Cloud Computing 30 Guide to implementing a secure cloud • Implement and maintain a security program: • A security program can provide the structure for managing information security, and the risks and threats to the target environment. • In the event of a security breach, the security program can provide crucial information as to how the cloud is protected, responses to threats, and a line of accountability for management of events.
  • 31. 3/11/2013 Security in Cloud Computing 31 Cont’d… • Build and maintain a secure cloud infrastructure: • A secure infrastructure helps provide cloud resiliency and the confidence that the information stored in the cloud is adequately protected. • Organizations must ensure that the vendor can meet all business requirements, demonstrates an understanding of all legal, regulatory, industry, and customer specific requirements, and has the capacity to meet those requirements in a satisfactory manner.
  • 32. 3/11/2013 Security in Cloud Computing 32 Cont’d… • Ensure confidential data protection: • Data protection is a core principle of information security. All of the prevalent information security regulations and standards, as well as the majority of industry best practices, require that sensitive information be adequately protected in order to preserve confidentiality. • Confidentiality of such data is required no matter where that data is resident in the chain of custody, including the cloud environment.
  • 33. 3/11/2013 Security in Cloud Computing 33 Cont’d… • Implement strong access and identity management: • Access and identity management are critical to cloud security. • They limit access to data and applications to authorized and appropriate users. • Establish application and environment provisioning: • In a centrally managed cloud environment, it is essential to have automated provisioning functionality in place.
  • 34. 3/11/2013 Security in Cloud Computing 34 Cont’d… • Implement a governance and audit management program: • To be prepared for regulatory or internal audits, you need to have a program in place that defines when, how, and where to collect log and audit information.
  • 35. 3/11/2013 Security in Cloud Computing 35 Cont’d… • Implement a vulnerability and intrusion management program: • In a trusted cloud environment, you have to implement a strict vulnerability management program and mechanisms such as intrusion detection systems (IDS) and intrusion prevention systems (IPS) to ensure that IT resources (servers, network, infrastructure components, and endpoints) are constantly monitored for vulnerabilities and breaches.
  • 36. 3/11/2013 Security in Cloud Computing 36 Cont’d… • Maintain environment testing and validation: • In order to maintain an intact cloud IT environment, you have to employ different mechanisms • for testing and validation.
  • 37. 3/11/2013 Security in Cloud Computing 37 Conclusion • Cloud computing provides an efficient, scalable, and cost- effective way for today’s organizations to deliver business or consumer IT services over the Internet. • Cloud computing is often provided as a service, so control over data and operations is shifted to third-party service providers, requiring their clients to establish trust relationships with their providers and develop security solutions that take this relationship into account.
  • 38. 3/11/2013 Security in Cloud Computing 38 Reference [1] “The NIST Definition of Cloud Computing”, Reports on Computer Systems Technology, National Institute of Standards and Technology Special Publication 800- 145,September 2011. [2] “IBM Point of View: Security and Cloud Computing”, Cloud computing White paper, November 2009. [3] “Cloud Security Guidance IBM Recommendations for the Implementation of Cloud Security”, IBM RedBooks.