Top Banner
20

Cloud computing security

Nov 02, 2014

Download

Technology

network and security aspects related to cloud computing!!
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cloud computing security
Page 2: Cloud computing security

Cloud Computing Network/Security ThreatsAung Thu Rha Hein(g5536871)

Page 3: Cloud computing security

AgendaCloud Computing

• What is cloud computing?

• Cloud Computing Infrastructure Models

• Architecture layers of Cloud Computing

• Cloud Computing characteristics

Network/Security Aspects of Cloud Computing

• Network/Security issues based on architecture types

• Network issues on cloud computing

• Security issues on cloud computing

Page 4: Cloud computing security

What is Cloud Computing?

• services that provide common business applications online, which are accessed from a Web browser, while the software and data are stored on the servers; a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet

Source: Wolfram Alpha

• Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet).

Source: Wikipedia

Page 5: Cloud computing security

5th generation of Computing

• Monolithic1970s

• Client-Server1980s

• Web-based1990s

• SOA2000s

• Cloud Computing

2010

Page 6: Cloud computing security

Cloud Computing Infrastructure Models• Public Cloud

• AWS, Google App Engine

Win Azure

• Private Cloud

• Premised or external hosted

• For one client

• Control data, security & QoS

• Hybrid Cloud

• Cloud Bursting

• Provide on-demand, externaly provisioned scale

Page 7: Cloud computing security

Architectural Layers of Cloud Computing

• Saas (Software As A Service)

• Provides resources (apps or storage)

• Free or pay-per–usage model

• Gmail, Github, Dropbox

• PaaS (Platform As A Service)

• Provides development platform

• Heroku, OpenShift, Google App Engine, Win Azure

• IaaS (Infrastructure As A Service)

• Offer hardware related services

• Amazon EC2, Rackspace, Flexiscale

Page 8: Cloud computing security

Cloud Computing Characteristics

Page 9: Cloud computing security

Network/Security Aspects of Cloud Computing

Page 10: Cloud computing security

Software As A Service

Operating System

Hypervisor

Application

Datacenter (Power, Cooling, Physical Security)

ApplicationServer

Middleware Database

CPU NetworkingStorage

YOUR DATABackup

Your Problem

Their Problem

Page 11: Cloud computing security

Platform As A Service

Operating System

Hypervisor

Your Application

Datacenter (Power, Cooling, Physical Security)

ApplicationServer

Middleware Database

CPU Networking Storage Backup

Your Problem

Their Problem

Page 12: Cloud computing security

Infrastructure As A Service

Your Operating System

Hypervisor

Your Application

Datacenter (Power, Cooling, Physical Security)

YourApplication

Server

YourMiddleware

YourDatabase

CPU Networking Storage Backup

Your Problem

Their Problem

Page 13: Cloud computing security

Network Issues• DoS ( Denial of Service or Distributed

denial-of-attack)

• overflows a server with

frequent request of services

Methods

- Smurf attack

- SYN flood

- Teardrop attacks

Page 14: Cloud computing security

Network Issues(cont.)• Man in the Middle Attack

• An attacker splits connection and rejoin with the attackers own computer system

• SSL is not properly configured

Page 15: Cloud computing security

Network Issues(cont.)• Network Sniffing

• hack passwords that are not properly encrypted during communication

• a self contained software program or a hardware device

Page 16: Cloud computing security

Network Issues(cont.)• Port Scanning

• sends client requests to a range of server port addresses on a host

• To search an active port and vulnerable services

Page 17: Cloud computing security

Security Issues• XML Signature Element Wrapping (Wrapper

attack)

• Attacker rewrite SOAP request that already signed by using a wrapper block

• Well known web service attack

Page 18: Cloud computing security

Security Issues(cont.)

• Cloud Malware Injection Attack

• Upload virus

Program to the cloud

Page 19: Cloud computing security

Security Issues(cont.)

• Data Stealing Problems

• User account and password are stolen by any means

• Accountability Check Problem

• “No use No bill” payment method

• an attacker has engaged the cloud with a malicious service or runs malicious code

Page 20: Cloud computing security

Conclusion & Thank You!