SlideShare a Scribd company logo
Data Security in the cloud :
  Tactics and Practices
       INSPIRON-2011
      Bangalore , Karnataka


       Kashyap Kunal(BE-ISE)
SAMBHRAM INSTITUTE OF TECHNOLOGY
           BANGALORE
What is Cloud Computing?
   According to AT&T ,CLOUD is:
     Common
     Location-independent
     Online
     Utility
     available on-Demand Service.

 Cloud Computing is internet -based computing where shared resources,
  software and information are provided to the computer.

 It promises not just cheaper IT, but also faster, easier, more flexible, and
  more effective IT . It is also versatile and flexible application of internet.

 Cloud Computing is not immune to risks and ethical objections,
  but the fact is that it promises big changes.

 Consider an example of Hotmail.com , Yahoo.com or Gmail.com where no
  installation of server or software is required. All you need to acess them is an
  internet connection .These are simple examples of Cloud Computing.
Terminology:

Types of Cloud:

 SaaS
  (Software as a Service)



 PaaS
  (Platform as a Service )


 IaaS
  (Infrastructure as a
    service)
Deployment Type:

 Private Cloud (Low Security Risk):
    -Typically owned by the respective
Enterprise.
    -Functionalities are not directly exposed to
customers.

 Public Cloud(More Security Risk):
   -Enterprises may use Cloud functionalities
from others.
   -Scope of functionalities may differ.

 Hybrid Cloud(High Security Risk):
    -Mixed employment of private & Public
cloud.
    -Provide highly customized, enhanced
offerings to local
      companies & world class application
Security Advantages in Cloud Computing:

   Data Centralization
   Password Assurance Testing
   Improve the state of Security Software
   Security Testing
   Incident Response
   Forensic Image verification time
   Logging

Security Disadvantages in Cloud Computing:
   Data Location
   Investigation
   Data Segregation
   Long-term Viability
   Compromised Servers
   Regulatory Compliance
   Recovery
Major security Issues(Threats) & Challenges:

    Two Question arise??

 How secure is the Data??????
 How secure is the Code??????



Top Threats in Cloud Environment according to CSA(Cloud Security Alliance):


   Abuse and Nefarious Use of Cloud Computing
   Insecure Application Programming Interfaces
   Malicious Insiders
   Shared Technology Vulnerabilities
   Data Loss/Leakage
   Account, Service & Traffic Hijacking
   Unknown Risk Profile
Security issues in Virtualization:

  Virtualization is an essential technological characteristic of
clouds which hides the technological complexity from the user
and enables enhanced flexibility (through Aggregation, Routing
and Translation).

Types of Virtualization:

 Full Virtualization: Entire H/W Architecture Replicated Virtually.
 Para Virtualization: Modified OS that can run concurrently with other OS.

 More concretely, virtualization supports the following features:

   Ease of Use
   Infrastructure Independency
   Flexibility & Adaptability
   Location Independence
Security in cloud computing  kashyap kunal
RISK ANALYSIS APPROACH:
     The cloud computing service providers use various security mechanisms to ensure that
all the security risks are fully taken care of.

  However, there are two broad questions:???

 How to estimate the risk to data security before putting a job into the cloud?

 How to ensure customers that their data and programs are safe in provider’s
  premises?

   If a cloud service user is able to estimate the risk of his data security then he can have a
level of trust with the service provider. If there is a high risk about the data security
then it leads to a decrease in trust and vice-versa.

   Current security technology provides us with some capability to build a certain level of
trust in cloud computing in order to analyze Security risks.

   For example, SSL (Secure Socket Layer), digital signatures, and authentication
protocols for proving authentication and access control methods for managing
authorization.
CONCLUSION:
   Data security dimensions will continuously increase.
   The security analysis approach will help service providers to ensure their
    customers about the data security.
   Risk analysis can be performed.
   At present, there is a lack of structured analysis approaches .

       And hence, The security problem in cloud paradigm can be
                handled frequently and effectively.
THANK
 YOU

More Related Content

What's hot (20)

PPTX
Security on Cloud Computing
Reza Pahlava
 
PPT
On technical security issues in cloud computing
sashi799
 
PDF
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Hoang Nguyen
 
PDF
Cloud Computing Security - Cloud Controls Security
Hari Kumar
 
PPTX
Intel SaaS Security Playbook
Intel IT Center
 
PPTX
Zero Trust 20211105
Thomas Treml
 
PDF
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
Marco Balduzzi
 
PPTX
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU
 
PDF
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
 
PPT
Cloud Computing & Security Concerns
University of San Francisco
 
DOCX
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
 
PPTX
Cloud Security
AWS User Group Bengaluru
 
PPSX
The security of SAAS and private cloud
Azure Group
 
PDF
Best-Practices-Web-Usability
Larry Wilson
 
PDF
Cloud Computing v.s. Cyber Security
Bahtiyar Bircan
 
PPTX
Security as a Service Model for Cloud Environment
KaashivInfoTech Company
 
PPT
Cloud computing-security-issues
Aleem Mohammed
 
PPTX
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
PPTX
SaaS (Software-as-a-Service) as-a-secure-service
Tayyaba Farhat
 
PDF
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
EC-Council
 
Security on Cloud Computing
Reza Pahlava
 
On technical security issues in cloud computing
sashi799
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Hoang Nguyen
 
Cloud Computing Security - Cloud Controls Security
Hari Kumar
 
Intel SaaS Security Playbook
Intel IT Center
 
Zero Trust 20211105
Thomas Treml
 
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
Marco Balduzzi
 
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU
 
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
 
Cloud Computing & Security Concerns
University of San Francisco
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
 
Cloud Security
AWS User Group Bengaluru
 
The security of SAAS and private cloud
Azure Group
 
Best-Practices-Web-Usability
Larry Wilson
 
Cloud Computing v.s. Cyber Security
Bahtiyar Bircan
 
Security as a Service Model for Cloud Environment
KaashivInfoTech Company
 
Cloud computing-security-issues
Aleem Mohammed
 
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
SaaS (Software-as-a-Service) as-a-secure-service
Tayyaba Farhat
 
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
EC-Council
 

Similar to Security in cloud computing kashyap kunal (20)

PPT
Presentation copy
Adel Zalok
 
PDF
Design and implement a new cloud security method based on multi clouds on ope...
csandit
 
PDF
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
cscpconf
 
PDF
Ijaprr vol1-1-1-5dr tejinder
ijaprr_editor
 
PDF
Ijaprr vol1-1-1-5dr tejinder
ijaprr
 
PDF
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
DOCX
UNIT -V.docx
Revathiparamanathan
 
PDF
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
PDF
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
 
PDF
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
PDF
Cloud technology to ensure the protection of fundamental methods and use of i...
SubmissionResearchpa
 
PDF
Investigative analysis of security issues and challenges in cloud computing a...
IAEME Publication
 
PDF
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
 
PDF
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
PPT
Effectively and Securely Using the Cloud Computing Paradigm
fanc1985
 
PDF
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Deepak Bagga
 
PPT
Cloud Ecosystems A Perspective
jmcdaniel650
 
PPT
htcia-5-2015
Tony Godfrey
 
PDF
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
PDF
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
Presentation copy
Adel Zalok
 
Design and implement a new cloud security method based on multi clouds on ope...
csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
cscpconf
 
Ijaprr vol1-1-1-5dr tejinder
ijaprr_editor
 
Ijaprr vol1-1-1-5dr tejinder
ijaprr
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
UNIT -V.docx
Revathiparamanathan
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
 
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
Cloud technology to ensure the protection of fundamental methods and use of i...
SubmissionResearchpa
 
Investigative analysis of security issues and challenges in cloud computing a...
IAEME Publication
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
Effectively and Securely Using the Cloud Computing Paradigm
fanc1985
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Deepak Bagga
 
Cloud Ecosystems A Perspective
jmcdaniel650
 
htcia-5-2015
Tony Godfrey
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
Ad

Security in cloud computing kashyap kunal

  • 1. Data Security in the cloud : Tactics and Practices INSPIRON-2011 Bangalore , Karnataka Kashyap Kunal(BE-ISE) SAMBHRAM INSTITUTE OF TECHNOLOGY BANGALORE
  • 2. What is Cloud Computing?  According to AT&T ,CLOUD is: Common Location-independent Online Utility available on-Demand Service.  Cloud Computing is internet -based computing where shared resources, software and information are provided to the computer.  It promises not just cheaper IT, but also faster, easier, more flexible, and more effective IT . It is also versatile and flexible application of internet.  Cloud Computing is not immune to risks and ethical objections, but the fact is that it promises big changes.  Consider an example of Hotmail.com , Yahoo.com or Gmail.com where no installation of server or software is required. All you need to acess them is an internet connection .These are simple examples of Cloud Computing.
  • 3. Terminology: Types of Cloud:  SaaS (Software as a Service)  PaaS (Platform as a Service )  IaaS (Infrastructure as a service)
  • 4. Deployment Type:  Private Cloud (Low Security Risk): -Typically owned by the respective Enterprise. -Functionalities are not directly exposed to customers.  Public Cloud(More Security Risk): -Enterprises may use Cloud functionalities from others. -Scope of functionalities may differ.  Hybrid Cloud(High Security Risk): -Mixed employment of private & Public cloud. -Provide highly customized, enhanced offerings to local companies & world class application
  • 5. Security Advantages in Cloud Computing:  Data Centralization  Password Assurance Testing  Improve the state of Security Software  Security Testing  Incident Response  Forensic Image verification time  Logging Security Disadvantages in Cloud Computing:  Data Location  Investigation  Data Segregation  Long-term Viability  Compromised Servers  Regulatory Compliance  Recovery
  • 6. Major security Issues(Threats) & Challenges: Two Question arise??  How secure is the Data??????  How secure is the Code?????? Top Threats in Cloud Environment according to CSA(Cloud Security Alliance):  Abuse and Nefarious Use of Cloud Computing  Insecure Application Programming Interfaces  Malicious Insiders  Shared Technology Vulnerabilities  Data Loss/Leakage  Account, Service & Traffic Hijacking  Unknown Risk Profile
  • 7. Security issues in Virtualization: Virtualization is an essential technological characteristic of clouds which hides the technological complexity from the user and enables enhanced flexibility (through Aggregation, Routing and Translation). Types of Virtualization:  Full Virtualization: Entire H/W Architecture Replicated Virtually.  Para Virtualization: Modified OS that can run concurrently with other OS. More concretely, virtualization supports the following features:  Ease of Use  Infrastructure Independency  Flexibility & Adaptability  Location Independence
  • 9. RISK ANALYSIS APPROACH: The cloud computing service providers use various security mechanisms to ensure that all the security risks are fully taken care of. However, there are two broad questions:???  How to estimate the risk to data security before putting a job into the cloud?  How to ensure customers that their data and programs are safe in provider’s premises? If a cloud service user is able to estimate the risk of his data security then he can have a level of trust with the service provider. If there is a high risk about the data security then it leads to a decrease in trust and vice-versa. Current security technology provides us with some capability to build a certain level of trust in cloud computing in order to analyze Security risks. For example, SSL (Secure Socket Layer), digital signatures, and authentication protocols for proving authentication and access control methods for managing authorization.
  • 10. CONCLUSION:  Data security dimensions will continuously increase.  The security analysis approach will help service providers to ensure their customers about the data security.  Risk analysis can be performed.  At present, there is a lack of structured analysis approaches . And hence, The security problem in cloud paradigm can be handled frequently and effectively.