ENDURING SECURITY IN CLOUDING DATABASES CSCE 824, Spring 2013, Ahmad Almadhor
Feb 24, 2016
ENDURING SECURITY IN CLOUDING DATABASESCSCE 824, Spring 2013, Ahmad Almadhor
Ahmad Almadhor
2
Cloud Computing It is the mother of databases in clouds More comprehensive structure contains various
information technology subcategories Usually viewed as a complete virtual enlivenment of
services within networks “mainly the internet” High availability, scalability, multi-tenancy and
effective resources are the plain four aims. The following are the main four models of CC:
Infrastructure as a service (IaaS) Platform as a service (PaaS) Software as a service (SaaS) Network as a service (NaaS)
Ahmad Almadhor
3
Cloud computing illustration
source: https://devcentral.f5.com/blogs/us/is-your-cloud-opaque-or-transparent
Ahmad Almadhor
4
Databases in the cloud subcategory of the cloud computing
platform architecture as Amazon EC2 related topographies in the plain databases
converted in a form of cloud silhouette Two main forms:
virtual machine usage by users self-reliantly accessing remunerated managed databases by
vendors for customers both models either performs SQL (Oracle,
NuoDB, etc.) or non-relational databases (CouchDB, Apache casandra, etc.).
Ahmad Almadhor
5
Databases in the cloud example
source: http://www.ibm.com/developerworks/data/library/dmmag/DMMag_2011_Issue2/cloudDBaaS/1102-FeCloud_figure1.gif
Ahmad Almadhor
6
Oops, Security matters! Same concerns every where:
availability, privacy, authentication, and integrity are the pillars again of clouding database security
More on the integrity and privacy side though Authentication is a serious issue
However: Availably is typically seen as basic requirement for
clouding in general; so it is not a problematic here Data loss could be prevented because backups
are characteristic of data bases in the cloud infrastructure
Ahmad Almadhor
7
Scorching solutions distributed detecting system to latch
misbehaving servers via homomorphic token and distributed verification via Data error localization
Accordingly; any abnormal coded-data, which are noticed by the distributed algorithmic spots all over the designated database network, will raise a red flag for the system administrators
(source: Ensuring Data Storage Security in Cloud Computing)
Ahmad Almadhor
8
homomorphic token and distributed verification
Source: C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," in Proc. of IWQoS'09, July 2009
Ahmad Almadhor
9
Cloud databases in smart grid Smart grid is employment of information
technology toward more reliable power and electrical networks uses bidirectional communication with end users that assists for disseminated energy management.
clouding databases are appropriate methodologies to be exploited for smart grid to provide adaptability, ample availability and efficient computerized infrastructure.
However; same security issues in the cloud platforms are still extremely immense apprehensions for being set out in smart grids
Ahmad Almadhor
10
Smart grid ecosystem and data security challenges
Simmhan, Y.; Kumbhare, A.G.; Baohua Cao; Prasanna, V., "An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds," Cloud Computing (CLOUD), 2011 IEEE International Conference on , vol., no., pp.582,589, 4-9 July 2011
Ahmad Almadhor
11
limitations Data are out of hand controlling
methods; so still hard to be completely secured
Untrustworthy service handlers Fears of data integrity breaches are high Expensive to deploy new infrastructures providing real time responsive schemes And above of all, unfortunately classical
known security subjects are migrated to cloud databases
Ahmad Almadhor
12
Conclusion and future work Clouding databases new technology;
thus necessities more experimentations on securing them efficiently
Robust and suitable access control highly on demand
Fast cryptosystems needed, AES as an example
Multilevel security mechanisms are “in my opinion” are the best solutions according to the nature of clouding
Ahmad Almadhor
13
References C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud
Computing," in Proc. of IWQoS'09, July 2009 Wenchao Zhou, Micah Sherr, William R. Marczak, Zhuoyao Zhang, Tao Tao, Boon Thau
Loo, and Insup Lee. 2010. “Towards a data-centric view of cloud security.” In Proceedings of the second international workshop on Cloud data management
< http://www.mcafee.com/us/resources/white-papers/wp-database-security-virtualization-cloud.pdf>
Simmhan, Y.; Kumbhare, A.G.; Baohua Cao; Prasanna, V., "An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds," Cloud Computing (CLOUD), 2011 IEEE International Conference on , vol., no., pp.582,589, 4-9 July 2011
Wikipedia <http://en.wikipedia.org> Maheshwari, Ketan; Lim, Marcus; Wang, Lydia; Birman, Ken; van Renesse, Robbert,
"Toward a reliable, secure and fault tolerant smart grid state estimation in the cloud," Innovative Smart Grid Technologies (ISGT), 2013 IEEE PES , vol., no., pp.1,6, 24-27 Feb. 2013
Mohamed, E.M.; Abdelkader, H.S.; El-Etriby, S., "Enhanced data security model for cloud computing," Informatics and Systems (INFOS), 2012 8th International Conference on , vol., no., pp.CC-12,CC-17, 14-16 May 2012
Ahmad Almadhor
14
Questions