SlideShare a Scribd company logo
Data Security in the cloud :
  Tactics and Practices
       INSPIRON-2011
      Bangalore , Karnataka


       Kashyap Kunal(BE-ISE)
SAMBHRAM INSTITUTE OF TECHNOLOGY
           BANGALORE
What is Cloud Computing?
   According to AT&T ,CLOUD is:
     Common
     Location-independent
     Online
     Utility
     available on-Demand Service.

 Cloud Computing is internet -based computing where shared resources,
  software and information are provided to the computer.

 It promises not just cheaper IT, but also faster, easier, more flexible, and
  more effective IT . It is also versatile and flexible application of internet.

 Cloud Computing is not immune to risks and ethical objections,
  but the fact is that it promises big changes.

 Consider an example of Hotmail.com , Yahoo.com or Gmail.com where no
  installation of server or software is required. All you need to acess them is an
  internet connection .These are simple examples of Cloud Computing.
Terminology:

Types of Cloud:

 SaaS
  (Software as a Service)



 PaaS
  (Platform as a Service )


 IaaS
  (Infrastructure as a
    service)
Deployment Type:

 Private Cloud (Low Security Risk):
    -Typically owned by the respective
Enterprise.
    -Functionalities are not directly exposed to
customers.

 Public Cloud(More Security Risk):
   -Enterprises may use Cloud functionalities
from others.
   -Scope of functionalities may differ.

 Hybrid Cloud(High Security Risk):
    -Mixed employment of private & Public
cloud.
    -Provide highly customized, enhanced
offerings to local
      companies & world class application
Security Advantages in Cloud Computing:

   Data Centralization
   Password Assurance Testing
   Improve the state of Security Software
   Security Testing
   Incident Response
   Forensic Image verification time
   Logging

Security Disadvantages in Cloud Computing:
   Data Location
   Investigation
   Data Segregation
   Long-term Viability
   Compromised Servers
   Regulatory Compliance
   Recovery
Major security Issues(Threats) & Challenges:

    Two Question arise??

 How secure is the Data??????
 How secure is the Code??????



Top Threats in Cloud Environment according to CSA(Cloud Security Alliance):


   Abuse and Nefarious Use of Cloud Computing
   Insecure Application Programming Interfaces
   Malicious Insiders
   Shared Technology Vulnerabilities
   Data Loss/Leakage
   Account, Service & Traffic Hijacking
   Unknown Risk Profile
Security issues in Virtualization:

  Virtualization is an essential technological characteristic of
clouds which hides the technological complexity from the user
and enables enhanced flexibility (through Aggregation, Routing
and Translation).

Types of Virtualization:

 Full Virtualization: Entire H/W Architecture Replicated Virtually.
 Para Virtualization: Modified OS that can run concurrently with other OS.

 More concretely, virtualization supports the following features:

   Ease of Use
   Infrastructure Independency
   Flexibility & Adaptability
   Location Independence
Security in cloud computing  kashyap kunal
RISK ANALYSIS APPROACH:
     The cloud computing service providers use various security mechanisms to ensure that
all the security risks are fully taken care of.

  However, there are two broad questions:???

 How to estimate the risk to data security before putting a job into the cloud?

 How to ensure customers that their data and programs are safe in provider’s
  premises?

   If a cloud service user is able to estimate the risk of his data security then he can have a
level of trust with the service provider. If there is a high risk about the data security
then it leads to a decrease in trust and vice-versa.

   Current security technology provides us with some capability to build a certain level of
trust in cloud computing in order to analyze Security risks.

   For example, SSL (Secure Socket Layer), digital signatures, and authentication
protocols for proving authentication and access control methods for managing
authorization.
CONCLUSION:
   Data security dimensions will continuously increase.
   The security analysis approach will help service providers to ensure their
    customers about the data security.
   Risk analysis can be performed.
   At present, there is a lack of structured analysis approaches .

       And hence, The security problem in cloud paradigm can be
                handled frequently and effectively.
THANK
 YOU

More Related Content

PPTX
Security challenges of cloud computing
PPTX
Security Issues in Cloud Computing
PDF
Cloud Computing Security Organization Assessments Service Categories Responsi...
PPTX
Cloud with Cyber Security
PDF
Data security in cloud environment
PPTX
Cloud computing
PPT
Cloud computing security
PPT
Cloud Computing Security Challenges
Security challenges of cloud computing
Security Issues in Cloud Computing
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud with Cyber Security
Data security in cloud environment
Cloud computing
Cloud computing security
Cloud Computing Security Challenges

What's hot (20)

PPTX
Security on Cloud Computing
PPT
On technical security issues in cloud computing
PDF
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
PDF
Cloud Computing Security - Cloud Controls Security
PPTX
Intel SaaS Security Playbook
PPTX
Zero Trust 20211105
PDF
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
PPTX
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
PDF
SECURING THE CLOUD DATA LAKES
PPT
Cloud Computing & Security Concerns
DOCX
Cloud Computing Security Issues in Infrastructure as a Service” report
PPTX
Cloud Security
PPSX
The security of SAAS and private cloud
PDF
Best-Practices-Web-Usability
PDF
Cloud Computing v.s. Cyber Security
PPTX
Security as a Service Model for Cloud Environment
PPT
Cloud computing-security-issues
PPTX
Security in the cloud Workshop HSTC 2014
PPTX
SaaS (Software-as-a-Service) as-a-secure-service
PDF
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
Security on Cloud Computing
On technical security issues in cloud computing
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Cloud Computing Security - Cloud Controls Security
Intel SaaS Security Playbook
Zero Trust 20211105
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
SECURING THE CLOUD DATA LAKES
Cloud Computing & Security Concerns
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Security
The security of SAAS and private cloud
Best-Practices-Web-Usability
Cloud Computing v.s. Cyber Security
Security as a Service Model for Cloud Environment
Cloud computing-security-issues
Security in the cloud Workshop HSTC 2014
SaaS (Software-as-a-Service) as-a-secure-service
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
Ad

Similar to Security in cloud computing kashyap kunal (20)

PPT
Presentation copy
PDF
Design and implement a new cloud security method based on multi clouds on ope...
PDF
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
PDF
Ijaprr vol1-1-1-5dr tejinder
PDF
Ijaprr vol1-1-1-5dr tejinder
PDF
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
DOCX
UNIT -V.docx
PDF
Module 5-cloud computing-SECURITY IN THE CLOUD
PDF
IRJET- A Survey on SaaS-Attacks and Digital Forensic
PDF
Securing The Journey To The Cloud
PDF
Cloud technology to ensure the protection of fundamental methods and use of i...
PDF
Investigative analysis of security issues and challenges in cloud computing a...
PDF
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
PDF
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PDF
Single Sign-on Authentication Model for Cloud Computing using Kerberos
PPT
Cloud Ecosystems A Perspective
PPT
htcia-5-2015
PDF
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
PDF
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
Presentation copy
Design and implement a new cloud security method based on multi clouds on ope...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
UNIT -V.docx
Module 5-cloud computing-SECURITY IN THE CLOUD
IRJET- A Survey on SaaS-Attacks and Digital Forensic
Securing The Journey To The Cloud
Cloud technology to ensure the protection of fundamental methods and use of i...
Investigative analysis of security issues and challenges in cloud computing a...
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Effectively and Securely Using the Cloud Computing Paradigm
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Cloud Ecosystems A Perspective
htcia-5-2015
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
Ad

Security in cloud computing kashyap kunal

  • 1. Data Security in the cloud : Tactics and Practices INSPIRON-2011 Bangalore , Karnataka Kashyap Kunal(BE-ISE) SAMBHRAM INSTITUTE OF TECHNOLOGY BANGALORE
  • 2. What is Cloud Computing?  According to AT&T ,CLOUD is: Common Location-independent Online Utility available on-Demand Service.  Cloud Computing is internet -based computing where shared resources, software and information are provided to the computer.  It promises not just cheaper IT, but also faster, easier, more flexible, and more effective IT . It is also versatile and flexible application of internet.  Cloud Computing is not immune to risks and ethical objections, but the fact is that it promises big changes.  Consider an example of Hotmail.com , Yahoo.com or Gmail.com where no installation of server or software is required. All you need to acess them is an internet connection .These are simple examples of Cloud Computing.
  • 3. Terminology: Types of Cloud:  SaaS (Software as a Service)  PaaS (Platform as a Service )  IaaS (Infrastructure as a service)
  • 4. Deployment Type:  Private Cloud (Low Security Risk): -Typically owned by the respective Enterprise. -Functionalities are not directly exposed to customers.  Public Cloud(More Security Risk): -Enterprises may use Cloud functionalities from others. -Scope of functionalities may differ.  Hybrid Cloud(High Security Risk): -Mixed employment of private & Public cloud. -Provide highly customized, enhanced offerings to local companies & world class application
  • 5. Security Advantages in Cloud Computing:  Data Centralization  Password Assurance Testing  Improve the state of Security Software  Security Testing  Incident Response  Forensic Image verification time  Logging Security Disadvantages in Cloud Computing:  Data Location  Investigation  Data Segregation  Long-term Viability  Compromised Servers  Regulatory Compliance  Recovery
  • 6. Major security Issues(Threats) & Challenges: Two Question arise??  How secure is the Data??????  How secure is the Code?????? Top Threats in Cloud Environment according to CSA(Cloud Security Alliance):  Abuse and Nefarious Use of Cloud Computing  Insecure Application Programming Interfaces  Malicious Insiders  Shared Technology Vulnerabilities  Data Loss/Leakage  Account, Service & Traffic Hijacking  Unknown Risk Profile
  • 7. Security issues in Virtualization: Virtualization is an essential technological characteristic of clouds which hides the technological complexity from the user and enables enhanced flexibility (through Aggregation, Routing and Translation). Types of Virtualization:  Full Virtualization: Entire H/W Architecture Replicated Virtually.  Para Virtualization: Modified OS that can run concurrently with other OS. More concretely, virtualization supports the following features:  Ease of Use  Infrastructure Independency  Flexibility & Adaptability  Location Independence
  • 9. RISK ANALYSIS APPROACH: The cloud computing service providers use various security mechanisms to ensure that all the security risks are fully taken care of. However, there are two broad questions:???  How to estimate the risk to data security before putting a job into the cloud?  How to ensure customers that their data and programs are safe in provider’s premises? If a cloud service user is able to estimate the risk of his data security then he can have a level of trust with the service provider. If there is a high risk about the data security then it leads to a decrease in trust and vice-versa. Current security technology provides us with some capability to build a certain level of trust in cloud computing in order to analyze Security risks. For example, SSL (Secure Socket Layer), digital signatures, and authentication protocols for proving authentication and access control methods for managing authorization.
  • 10. CONCLUSION:  Data security dimensions will continuously increase.  The security analysis approach will help service providers to ensure their customers about the data security.  Risk analysis can be performed.  At present, there is a lack of structured analysis approaches . And hence, The security problem in cloud paradigm can be handled frequently and effectively.