An Overview of Cloud Security and Privacy.ppt
《An Overview of Cloud Security and Privacy.ppt》由会员分享,可在线阅读,更多相关《An Overview of Cloud Security and Privacy.ppt(46页珍藏版)》请在麦多课文档分享上搜索。
1、An Overview of Cloud Security and Privacy,CS 590, Fall 2010,Presenter: YounSun ChoSep. 9, 2010,What we are going to do today,A high-level discussion of the fundamental challenges and issues of cloud computing security and privacy It is impossible to consider all issues today The goal is to give you
2、a big picture rather than focus on a particular topic or a paper Note that some of these slides, especially part I, re-used/modified some slides in the Internet (References are in the last slides),2,Part1: Introduction,Why do you still hesitate to use cloud computing? Threat Model,3,Cloud services d
3、elivery model,4,While cloud-based software services are maturing, Cloud platform and infrastructure offering are still in their early stages !,Impact of cloud computing on the governance structure of IT organizations,5,If cloud computing is so great, why arent everyone doing it?,The cloud acts as a
4、big black box, nothing inside the cloud is visible to the clients Clients have no idea or control over what happens inside a cloud Even if the cloud provider is honest, it can have malicious system admins who can tamper with the VMs and violate confidentiality and integrity Clouds are still subject
5、to traditional data confidentiality, integrity, availability, and privacy issues, plus some additional attacks,6,Companies are still afraid to use clouds,7,Chow09ccsw,Taxonomy of Fear,Confidentiality Fear of loss of control over data Will the sensitive data stored on a cloud remain confidential? Wil
6、l cloud compromises leak confidential client data Will the cloud provider itself be honest and wont peek into the data? Integrity How do I know that the cloud provider is doing the computations correctly? How do I ensure that the cloud provider really stored my data without tampering with it?,8,Taxo
7、nomy of Fear (cont.),Availability Will critical systems go down at the client, if the provider is attacked in a Denial of Service attack? What happens if cloud provider goes out of business? Would cloud scale well-enough? Often-voiced concern Although cloud providers argue their downtime compares we
8、ll with cloud users own data centers,9,Taxonomy of Fear (cont.),Privacy issues raised via massive data mining Cloud now stores data from a lot of clients, and can run data mining algorithms to get large amounts of information on clients Increased attack surface Entity outside the organization now st
9、ores and computes data, and so Attackers can now target the communication link between cloud provider and client Cloud provider employees can be phished,10,Taxonomy of Fear (cont.),Auditability and forensics (out of control of data) Difficult to audit data held outside organization in a cloud Forens
10、ics also made difficult since now clients dont maintain data locally Legal quagmire and transitive trust issues Who is responsible for complying with regulations? e.g., SOX, HIPAA, GLBA ? If cloud provider subcontracts to third party clouds, will the data still be secure?,11,Taxonomy of Fear (cont.)
11、,12,Cloud Computing is a security nightmare and it cant be handled in traditional ways. John Chambers CISCO CEO,Security is one of the most difficult task to implement in cloud computing. Different forms of attacks in the application side and in the hardware components Attacks with catastrophic effe
12、cts only needs one security flaw (http:/ Model,A threat model helps in analyzing a security problem, design mitigation strategies, and evaluate solutions Steps: Identify attackers, assets, threats and other components Rank the threats Choose mitigation strategies Build solutions based on the strateg
13、ies,13,Threat Model,Basic components Attacker modeling Choose what attacker to consider insider vs. outsider? single vs. collaborator? Attacker motivation and capabilities Attacker goals Vulnerabilities / threats,14,What is the issue?,The core issue here is the levels of trust Many cloud computing p
14、roviders trust their customers Each customer is physically commingling its data with data from anybody else using the cloud while logically and virtually you have your own space The way that the cloud provider implements security is typically focused on they fact that those outside of their cloud ar
15、e evil, and those inside are good. But what if those inside are also evil?,15,Attacker Capability: Malicious Insiders,At client Learn passwords/authentication information Gain control of the VMs At cloud provider Log client communication Can read unencrypted data Can possibly peek into VMs, or make
16、copies of VMs Can monitor network communication, application patterns Why? Gain information about client data Gain information on client behavior Sell the information or use itself,16,Attacker Capability: Outside attacker,What? Listen to network traffic (passive) Insert malicious traffic (active) Pr
17、obe cloud structure (active) Launch DoS Goal? Intrusion Network analysis Man in the middle Cartography,17,Why Cloud Computing brings new threats?,Clouds allow co-tenancy Multiple independent users share the same physical infrastructureThus an attacker can legitimately be in the same physical machine
18、 as the target,18,Challenges for the attacker,How to find out where the target is located? How to be co-located with the target in the same (physical) machine? How to gather information about the target?,19,Part2: Considerations - Big Picture,Infrastructure Security Data Security and Storage Identit
19、y and Access Management (IAM) PrivacyAnd more,20,Infrastructure Security,Infrastructure Security,Network Level Host Level Application Level,22,The Network Level,Ensuring confidentiality and integrity of your organizations data-in-transit to and from your public cloud provider Ensuring proper access
20、control (authentication, authorization, and auditing) to whatever resources you are using at your public cloud provider Ensuring availability of the Internet-facing resources in a public cloud that are being used by your organization, or have been assigned to your organization by your public cloud p
21、roviders Replacing the established model of network zones and tiers with domains,23,The Network Level - Mitigation,Note that network-level risks exist regardless of what aspects of “cloud computing” services are being used The primary determination of risk level is therefore not which *aaS is being
22、used, But rather whether your organization intends to use or is using a public, private, or hybrid cloud.,24,The Host Level,SaaS/PaaS Both the PaaS and SaaS platforms abstract and hide the host OS from end users Host security responsibilities are transferred to the CSP (Cloud Service Provider) You d
23、o not have to worry about protecting hosts However, as a customer, you still own the risk of managing information hosted in the cloud services.,25,The Host Level (cont.),IaaS Host Security Virtualization Software Security Hypervisor (also called Virtual Machine Manager (VMM) security is a key a smal
24、l application that runs on top of the physical machine H/W layer implements and manages the virtual CPU, virtual memory, event channels, and memory shared by the resident VMs Also controls I/O and memory access to devices. Bigger problem in multitenant architectures Customer guest OS or Virtual Serv
25、er Security The virtual instance of an OS Vulnerabilities have appeared in virtual instance of an OS e.g., VMWare, Xen, and Microsofts Virtual PC and Virtual Server Customers have full access to virtual servers.,26,Case study: Amazons EC2 infrastructure,“Hey, You, Get Off of My Cloud: Exploring Info
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANOVERVIEWOFCLOUDSECURITYANDPRIVACYPPT
