SlideShare a Scribd company logo
Cloud Computing Services & Security Concerns for Data Storage
AGENDA What is Cloud Computing? Cloud Services and Deployment Models  Why all the hype?? Security risks Future of the Cloud Computing Summary
What is Cloud Computing According to NIST ‘ Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.’ According to Gartner ‘ Gartner defines cloud computing as a style of computing in which massively scalable IT-related capabilities are provided "as a service" using Internet technologies to multiple external customers’
Cloud Service Models The Cloud Service models are Cloud Software as a Service (SaaS)  – no purchase of software, rent it and pay per use model Cloud Platform as a Service (PaaS) –  development platform is offered as service  Cloud Infrastructure as a Service (IaaS)  – provides entire infrastructure, storage, networking, backup.  Other type of models according to Juniper Networks Cloud Data as a Service (Daas) Identity and Policy Management as a Service (IPMaas) Cloud Network as a Service (Naas)
Cloud Computing Providers Copyright © 2009 Juniper Networks, Inc.  http://www.ists.dartmouth.edu/docs/HannaCloudComputingv2.pdf
Cloud Deployment Models Private Cloud Internal cloud solely dedicated to single Organization. Security management managed by internal IT  Public Cloud Owned by vendor, available to the public. Offered to multiple customers from common infrastructure  Hybrid Cloud Runs non-core application in public cloud and sensitive data in private cloud
Why all the hype? Cloud Computing is internet based, real-time service and can access solution regardless of location It is massively scalable with flexible business model Provides a flexible pricing model, with a low upfront cost for both infrastructure and software End up being less maintenance, promoting energy efficiency (Green IT) and cost benefits. A recent survey conducted by Pew Internet showed that 69% of all Americans use cloud-based software to store pictures, videos, emails, calendars and other various data online http://www.pewinternet.org
Security Risks Security, timely availability and reliability of the data on cloud computing is the main concern Unplanned outages (Amazon S3 cloud service went down, 2008) Data recovery refer SLA’s / Cloud provider Google’s Apps users faced slow service, April 2009 Data location and Storage, there are jurisdictions involved  Is it secured properly all the private and confidential information. Located in different geographic location, what are the ramification of laws for foreign entity.
Security Risk Management According to Mather, Kumaraswamy & Latif, 2009, research some of the standards to be used for Security Management in Cloud Computing Services: ITIL  ISO/IEC 27001 and 27002. Cloud Services secure areas covered are: Availability management, Vulnerability Management, Access Control, Patch management, Configuration management, Incident response & System use and access monitoring
According to Gartner 25 Percent of new business Software will be delivered as Software as a Service (Saas) by 2011. http://www.gartner.com/it/page.jsp?id=496886 Cloud Security Alliance is a not-for-profit organization providing security assurance for Cloud Service. Jericho Forum working on getting secure collaboration for cloud computing for individual business needs. Federal CIO is a huge cloud Proponent. Many Cloud pilot programs with in the govt.Washington DC uses Google apps, twitter, you tube
Summary Cloud Computing is going to be around, accept it! Always understand the Service level agreements (SLAs) of Cloud Service providers, to understand the uptime and downtime Cloud Service is in IT security department and be due diligent. Users should consider what type of data to be used for cloud storage Cost savings can be huge, but be aware of security and governance issues
References Issues related to Cloud Computing arrangements  http://www.seyfarth.com/index.cfm/fuseaction/publications.publications_detail/object_id/9275a22b-3998-494c-84d8-7d234e503d82/IssuesRelatedToCloudComputingArrangements.cfm Proposed 2010  Budget, Section 9  http://www.whitehouse.gov/omb/budget/fy2010/assets/crosscutting.pdf Security Guidance for Critical areas of focus in Cloud Computing, Cloud Security Alliance, April 2009  http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Gartner Newsroom, Stamford, Conn., September 29, 2008  http://www.gartner.com/it/page.jsp?id=766215 Waxer, C.  (2009). Can  you trust the Cloud?  Computer World. May 25/June1, 2009, 23-26 Lamb,  J. (2009). The Greening of IT: How Companies Can Make a Difference for the Environment,  IBM Press, April 2009 Mather, T.,  Kumaraswamy, S.,  and Latif, S. (2009) Cloud Security and Privacy, 1st Edition. 1005 Gravenstein Highway North, Sebastopol, CA 95472:  O'Reilly Media, Inc.,

More Related Content

What's hot (20)

PPT
Cloud Computing Security Challenges
Yateesh Yadav
 
PPTX
Cloud computing security
Gahya Pandian
 
PPTX
Cloud Computing Security
Ninh Nguyen
 
PPTX
Authentication cloud
vidhya dharmarajan
 
PPTX
PhD Projects in Cloud Computing Security Research Topics
PhD Services
 
PDF
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
 
PDF
Cloud Computing v.s. Cyber Security
Bahtiyar Bircan
 
PPT
CLOUD COMPUTING AND STORAGE
Shalini Toluchuri
 
PDF
The Security and Privacy Threats to Cloud Computing
Ankit Singh
 
PPTX
Security Issues in Cloud Computing
Jyotika Pandey
 
PDF
SECURE CLOUD ARCHITECTURE
acijjournal
 
PPTX
Ensuring data storage security in cloud computing
Uday Wankar
 
PPTX
Cloud computing and data security
Mohammed Fazuluddin
 
PPTX
Cloud computing and its security issues
Jyoti Srivastava
 
PDF
Cloud Computing Security Organization Assessments Service Categories Responsi...
SlideTeam
 
PDF
Cloud computing security issues and challenges
Kresimir Popovic
 
PDF
Cloud computing security and privacy
Adeel Javaid
 
DOC
Cloud security
Mohamed Shalash
 
PPT
Cloud Computing - Security Benefits and Risks
William McBorrough
 
PPTX
Lecture01: Introduction to Security and Privacy in Cloud Computing
ragibhasan
 
Cloud Computing Security Challenges
Yateesh Yadav
 
Cloud computing security
Gahya Pandian
 
Cloud Computing Security
Ninh Nguyen
 
Authentication cloud
vidhya dharmarajan
 
PhD Projects in Cloud Computing Security Research Topics
PhD Services
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
 
Cloud Computing v.s. Cyber Security
Bahtiyar Bircan
 
CLOUD COMPUTING AND STORAGE
Shalini Toluchuri
 
The Security and Privacy Threats to Cloud Computing
Ankit Singh
 
Security Issues in Cloud Computing
Jyotika Pandey
 
SECURE CLOUD ARCHITECTURE
acijjournal
 
Ensuring data storage security in cloud computing
Uday Wankar
 
Cloud computing and data security
Mohammed Fazuluddin
 
Cloud computing and its security issues
Jyoti Srivastava
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
SlideTeam
 
Cloud computing security issues and challenges
Kresimir Popovic
 
Cloud computing security and privacy
Adeel Javaid
 
Cloud security
Mohamed Shalash
 
Cloud Computing - Security Benefits and Risks
William McBorrough
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
ragibhasan
 

Viewers also liked (20)

PDF
Privacy Concerns and Cloud Computing
AIIM International
 
PDF
Grow your business by shaping the human impacts of technology
Michael Siepmann, Ph.D.
 
PPTX
Data security in cloud computing
Prince Chandu
 
PPTX
How to Overcome Content Security Concerns in the Cloud
Synotive - Software Development Company
 
PDF
10 security concerns cloud computing
Hossam Zein
 
PDF
Addictive manufacturing
Rudi Pivetta
 
PPTX
Cloud Computing Security Issues
Stelios Krasadakis
 
PPTX
Security and Privacy in Cloud Computing - a High-level view
ragibhasan
 
PPTX
Addictive printing or 3d printing
SHUBHAM MORGAONKAR
 
PDF
Cloud primer
Zeno Idzerda
 
PPT
Security & Privacy In Cloud Computing
saurabh soni
 
PDF
Concerns with cloud computing
Ulf Mattsson
 
PDF
The shortest path to cloud success - your roadmap
Gabe Akisanmi
 
PPTX
Cloud Computing Security
neicher
 
PPTX
Security in cloud computing
Abhishek Kumar Sinha
 
PDF
Cloud computing security
Antonio Sanz Alcober
 
PPT
Cloud computing-security-issues
Aleem Mohammed
 
PDF
Cloud Computing Security
Dhaval Dave
 
PPT
Cloud computing
Sreehari820
 
PPTX
Cloud computing & security basics
Rahul Gurnani
 
Privacy Concerns and Cloud Computing
AIIM International
 
Grow your business by shaping the human impacts of technology
Michael Siepmann, Ph.D.
 
Data security in cloud computing
Prince Chandu
 
How to Overcome Content Security Concerns in the Cloud
Synotive - Software Development Company
 
10 security concerns cloud computing
Hossam Zein
 
Addictive manufacturing
Rudi Pivetta
 
Cloud Computing Security Issues
Stelios Krasadakis
 
Security and Privacy in Cloud Computing - a High-level view
ragibhasan
 
Addictive printing or 3d printing
SHUBHAM MORGAONKAR
 
Cloud primer
Zeno Idzerda
 
Security & Privacy In Cloud Computing
saurabh soni
 
Concerns with cloud computing
Ulf Mattsson
 
The shortest path to cloud success - your roadmap
Gabe Akisanmi
 
Cloud Computing Security
neicher
 
Security in cloud computing
Abhishek Kumar Sinha
 
Cloud computing security
Antonio Sanz Alcober
 
Cloud computing-security-issues
Aleem Mohammed
 
Cloud Computing Security
Dhaval Dave
 
Cloud computing
Sreehari820
 
Cloud computing & security basics
Rahul Gurnani
 
Ad

Similar to Cloud Computing & Security Concerns (20)

PPT
Moving to cloud computing step by step linthicum
David Linthicum
 
PPTX
Cloud Computing Security
syrinxtech
 
PPTX
Cloud Computing FUNDAMENTAL TUTORIAL FOR YOU
azzu6
 
PPTX
Cloud Computing - Is It Right For You?
Shaping Cloud
 
PDF
Cloud computing
Learnbay Datascience
 
PDF
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
PPT
Cloud Computing Webinar
TechSoup
 
PDF
MUCLecture_2022_52127829.pdf
bigbull8577
 
PDF
cloudcomputingsimpleppt-141114085742-conversion-gate01.pdf
BSEMF20119Unknown
 
PPTX
Cloud computing
Monika Kumari
 
PPTX
Cloud computing
Tushar Jain
 
PPTX
Demystifying Cloud Computing
Fazle Abbas Luqmani
 
PPT
cloud computing
Roshan Bagdiya
 
PDF
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
ikanow
 
PDF
What is Cloud Computing? A Complete Guide
Alaina Carter
 
PPTX
Cloud Computing for college presenation project.
Mahesh Tibrewal
 
PPT
Cloud Computing
Saket Sourav
 
PPT
Cloud computing simple ppt
Agarwaljay
 
PPT
cloudcomputingsimpleppt-141114085742-conversion-gate01
Mudassir Farman
 
PDF
Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)
MukeshKrActivelylook
 
Moving to cloud computing step by step linthicum
David Linthicum
 
Cloud Computing Security
syrinxtech
 
Cloud Computing FUNDAMENTAL TUTORIAL FOR YOU
azzu6
 
Cloud Computing - Is It Right For You?
Shaping Cloud
 
Cloud computing
Learnbay Datascience
 
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
Cloud Computing Webinar
TechSoup
 
MUCLecture_2022_52127829.pdf
bigbull8577
 
cloudcomputingsimpleppt-141114085742-conversion-gate01.pdf
BSEMF20119Unknown
 
Cloud computing
Monika Kumari
 
Cloud computing
Tushar Jain
 
Demystifying Cloud Computing
Fazle Abbas Luqmani
 
cloud computing
Roshan Bagdiya
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
ikanow
 
What is Cloud Computing? A Complete Guide
Alaina Carter
 
Cloud Computing for college presenation project.
Mahesh Tibrewal
 
Cloud Computing
Saket Sourav
 
Cloud computing simple ppt
Agarwaljay
 
cloudcomputingsimpleppt-141114085742-conversion-gate01
Mudassir Farman
 
Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)
MukeshKrActivelylook
 
Ad

Recently uploaded (20)

PDF
Lesson 2 - WATER,pH, BUFFERS, AND ACID-BASE.pdf
marvinnbustamante1
 
PDF
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
PPT
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
PPT
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PDF
The-Ever-Evolving-World-of-Science (1).pdf/7TH CLASS CURIOSITY /1ST CHAPTER/B...
Sandeep Swamy
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PDF
The dynastic history of the Chahmana.pdf
PrachiSontakke5
 
PDF
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
PPTX
SPINA BIFIDA: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PDF
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
PDF
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PDF
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
PPTX
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
PPTX
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
PPTX
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
PDF
Dimensions of Societal Planning in Commonism
StefanMz
 
PPTX
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
Lesson 2 - WATER,pH, BUFFERS, AND ACID-BASE.pdf
marvinnbustamante1
 
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
The-Ever-Evolving-World-of-Science (1).pdf/7TH CLASS CURIOSITY /1ST CHAPTER/B...
Sandeep Swamy
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
The dynastic history of the Chahmana.pdf
PrachiSontakke5
 
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
SPINA BIFIDA: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
Dimensions of Societal Planning in Commonism
StefanMz
 
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 

Cloud Computing & Security Concerns

  • 1. Cloud Computing Services & Security Concerns for Data Storage
  • 2. AGENDA What is Cloud Computing? Cloud Services and Deployment Models Why all the hype?? Security risks Future of the Cloud Computing Summary
  • 3. What is Cloud Computing According to NIST ‘ Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.’ According to Gartner ‘ Gartner defines cloud computing as a style of computing in which massively scalable IT-related capabilities are provided "as a service" using Internet technologies to multiple external customers’
  • 4. Cloud Service Models The Cloud Service models are Cloud Software as a Service (SaaS) – no purchase of software, rent it and pay per use model Cloud Platform as a Service (PaaS) – development platform is offered as service Cloud Infrastructure as a Service (IaaS) – provides entire infrastructure, storage, networking, backup. Other type of models according to Juniper Networks Cloud Data as a Service (Daas) Identity and Policy Management as a Service (IPMaas) Cloud Network as a Service (Naas)
  • 5. Cloud Computing Providers Copyright © 2009 Juniper Networks, Inc. http://www.ists.dartmouth.edu/docs/HannaCloudComputingv2.pdf
  • 6. Cloud Deployment Models Private Cloud Internal cloud solely dedicated to single Organization. Security management managed by internal IT Public Cloud Owned by vendor, available to the public. Offered to multiple customers from common infrastructure Hybrid Cloud Runs non-core application in public cloud and sensitive data in private cloud
  • 7. Why all the hype? Cloud Computing is internet based, real-time service and can access solution regardless of location It is massively scalable with flexible business model Provides a flexible pricing model, with a low upfront cost for both infrastructure and software End up being less maintenance, promoting energy efficiency (Green IT) and cost benefits. A recent survey conducted by Pew Internet showed that 69% of all Americans use cloud-based software to store pictures, videos, emails, calendars and other various data online http://www.pewinternet.org
  • 8. Security Risks Security, timely availability and reliability of the data on cloud computing is the main concern Unplanned outages (Amazon S3 cloud service went down, 2008) Data recovery refer SLA’s / Cloud provider Google’s Apps users faced slow service, April 2009 Data location and Storage, there are jurisdictions involved Is it secured properly all the private and confidential information. Located in different geographic location, what are the ramification of laws for foreign entity.
  • 9. Security Risk Management According to Mather, Kumaraswamy & Latif, 2009, research some of the standards to be used for Security Management in Cloud Computing Services: ITIL ISO/IEC 27001 and 27002. Cloud Services secure areas covered are: Availability management, Vulnerability Management, Access Control, Patch management, Configuration management, Incident response & System use and access monitoring
  • 10. According to Gartner 25 Percent of new business Software will be delivered as Software as a Service (Saas) by 2011. http://www.gartner.com/it/page.jsp?id=496886 Cloud Security Alliance is a not-for-profit organization providing security assurance for Cloud Service. Jericho Forum working on getting secure collaboration for cloud computing for individual business needs. Federal CIO is a huge cloud Proponent. Many Cloud pilot programs with in the govt.Washington DC uses Google apps, twitter, you tube
  • 11. Summary Cloud Computing is going to be around, accept it! Always understand the Service level agreements (SLAs) of Cloud Service providers, to understand the uptime and downtime Cloud Service is in IT security department and be due diligent. Users should consider what type of data to be used for cloud storage Cost savings can be huge, but be aware of security and governance issues
  • 12. References Issues related to Cloud Computing arrangements http://www.seyfarth.com/index.cfm/fuseaction/publications.publications_detail/object_id/9275a22b-3998-494c-84d8-7d234e503d82/IssuesRelatedToCloudComputingArrangements.cfm Proposed 2010 Budget, Section 9 http://www.whitehouse.gov/omb/budget/fy2010/assets/crosscutting.pdf Security Guidance for Critical areas of focus in Cloud Computing, Cloud Security Alliance, April 2009 http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Gartner Newsroom, Stamford, Conn., September 29, 2008 http://www.gartner.com/it/page.jsp?id=766215 Waxer, C. (2009). Can you trust the Cloud? Computer World. May 25/June1, 2009, 23-26 Lamb, J. (2009). The Greening of IT: How Companies Can Make a Difference for the Environment, IBM Press, April 2009 Mather, T., Kumaraswamy, S., and Latif, S. (2009) Cloud Security and Privacy, 1st Edition. 1005 Gravenstein Highway North, Sebastopol, CA 95472: O'Reilly Media, Inc.,

Editor's Notes

  • #4: IT services – on demand, pay per service, internet delivery, etc
  • #5: For IaaS model. Consumer must be in complete control of the geographic location of infrastructure and what runs on the server
  • #6: From “ Characterizing Intrusion Detection Sensors” by Shaikh, A. S., Chivers, H., Nobles. P., & Clark. A.J. 2008, Network Security p.10 Copyright 2008
  • #7: Customer have higher degree of control and transparency, comply with security standards, regulatory compliance Customer of public cloud has a low degree of degree, since security management are done by vendors Hybrid cloud combination of two or more type of clouds
  • #8: -Scalability, as in flexible business model according to the size of the organization -Pay for use model. -less maintenance as in patches and updates, in this virtualized environment. Increased automation also saves cost. Flexibility and the ownership /operation of hardware all getting outsourced. . If you’ve ever used MySpace, Facebook, LinkedIn, Picasa, Flickr, Hotmail, or Gmail, then you’ve used cloud computing
  • #9: concern is to trust that a company's or an individual's information is both secure and private Unplanned outages - Understanding the cloud provider’s disaster recovery and business continuity measures, negotiating strong service level agreements and disaster recovery commitments, A major concern with cloud computing is the difficulty of determining where data will be stored, and, thus, what courts have jurisdiction and what law governs the use and treatment of such data (i.e., local, state, federal, foreign, etc.). For the location of data you wouldn’t know where it is located too
  • #11: Jericho Forum and CSA joined forces to push for technology to allow business , to collaborate securely in the cloud.
  • #12: - Categorize data for private and public cloud – basic usage of data and requirement.