html5-img
1 / 14

Information Security and Cloud Computing

Information Security and Cloud Computing. Naresh K. Sehgal, Sohum Sohoni, Ying Xiong, David Fritz, Wira Mulia , and John M. Acken. Contents. Background and Problem Statement Cloud Computing Trends Information Security Background Internet Security Issues

carina
Télécharger la présentation

Information Security and Cloud Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Security and Cloud Computing Naresh K. Sehgal, Sohum Sohoni, Ying Xiong, David Fritz, WiraMulia, and John M. Acken NKS

  2. Contents • Background and Problem Statement • Cloud Computing Trends • Information Security Background • Internet Security Issues • Security Issues with Cloud Computing • Scenarios • Challenges related to Virtualization • Future Needs NKS

  3. Background • Cloud Computing (CC) refers to • Providing IT Services, Applications and Data • Using dynamically scalable pool(s), • Remotely residing Resources • CC provides financial benefits to users and providers • CC amplifies Information security issues NKS

  4. Are we there yet? What do you think is the future of EDA in Clouds? NKS

  5. Problem Statements • Access Control • Who can rightfully access a computer system • CC shares the same computer between multiple users • May compromise the integrity of run-time programs • How to ensure a timely completion of jobs? • Who is using the EDA license installed in the Cloud? • Secure Communications • Data transfer via open channels • Large amounts of files transferred over public nodes • Large Transfer time will increase customer cost • Data Protection in Cloud • Design IP theft • Fake login or indirect access • Unauthorized access in a 3rd party data-center • Footprints after the job is done, e.g., erasing tax data on old disk drives • Overdoing the security so it comes in the way of cost & performance NKS

  6. Internet Security Levels NKS

  7. Internet Security Levels 7 NKS

  8. Information Security Background Traditional Computing Security depends upon Firewalls and Physical Security NKS

  9. Communication Issues between the Islands of Security NKS

  10. Cloud Computing Environment with No central Island of security NKS

  11. Security Issues with Cloud Computing NKS

  12. Security Issues with Cloud Computing But at what Cost? NKS 12

  13. Bottoms up Security inside a Cloud Data-center NKS

  14. Future Research on Security Gaps Security will drive broader adoption of Cloud Computing • Trust and confidentiality of consumers’ data • Competitors sharing the same disks or servers • Accidental or intentional data-trashing activity that can go un-noticed • Regular Integrity checks • Cost of security vs. performance • Need a holistic approach for end-to-end security NKS

More Related