controlling data in the cloud outsourcing computation without outsourcing control by: wirayudha...
DESCRIPTION
CLOUD COMPUTINGTRANSCRIPT
![Page 1: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi](https://reader035.vdocument.in/reader035/viewer/2022062412/5a4d1ae97f8b9ab05997a226/html5/thumbnails/1.jpg)
Controlling Data in the CloudOutsourcing Computation without Outsourcing Control
By:Wirayudha Rohandi
![Page 2: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi](https://reader035.vdocument.in/reader035/viewer/2022062412/5a4d1ae97f8b9ab05997a226/html5/thumbnails/2.jpg)
AGENDA
Cloud Computing & ControlFear of The CloudNew DirectionsConclusion
![Page 3: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi](https://reader035.vdocument.in/reader035/viewer/2022062412/5a4d1ae97f8b9ab05997a226/html5/thumbnails/3.jpg)
CLOUD COMPUTING
![Page 4: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi](https://reader035.vdocument.in/reader035/viewer/2022062412/5a4d1ae97f8b9ab05997a226/html5/thumbnails/4.jpg)
CLOUD CONTROL
![Page 5: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi](https://reader035.vdocument.in/reader035/viewer/2022062412/5a4d1ae97f8b9ab05997a226/html5/thumbnails/5.jpg)
FEAR OF THE CLOUD
![Page 6: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi](https://reader035.vdocument.in/reader035/viewer/2022062412/5a4d1ae97f8b9ab05997a226/html5/thumbnails/6.jpg)
CLOUD CHALLANGES / ISSUES
![Page 7: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi](https://reader035.vdocument.in/reader035/viewer/2022062412/5a4d1ae97f8b9ab05997a226/html5/thumbnails/7.jpg)
TRADITIONAL SECURITYVM-level AttacksCloud Provider VulnerabilitiesPhishing Cloud ProviderExpanded Network Attack SurfaceAuthentication and AuthorizationForensics in the Cloud
![Page 8: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi](https://reader035.vdocument.in/reader035/viewer/2022062412/5a4d1ae97f8b9ab05997a226/html5/thumbnails/8.jpg)
AVAILABILITY
UptimeSingle Point of FailureAssurance of Computational Integrity
![Page 9: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi](https://reader035.vdocument.in/reader035/viewer/2022062412/5a4d1ae97f8b9ab05997a226/html5/thumbnails/9.jpg)
THIRD-PARTY DATA CONTROLDue DiligenceAuditabilityContractual ObligationsCloud Provider EspionageData Lock-inTransitive Nature
![Page 10: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi](https://reader035.vdocument.in/reader035/viewer/2022062412/5a4d1ae97f8b9ab05997a226/html5/thumbnails/10.jpg)
NEW DIRECTIONS
![Page 11: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi](https://reader035.vdocument.in/reader035/viewer/2022062412/5a4d1ae97f8b9ab05997a226/html5/thumbnails/11.jpg)
INFORMATION-CENTRIC SECURITYUnprotected Data Information Centric
![Page 12: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi](https://reader035.vdocument.in/reader035/viewer/2022062412/5a4d1ae97f8b9ab05997a226/html5/thumbnails/12.jpg)
HIGH-ASSURANCE REMOTE SERVER ATTESTATION
TrustedComputing
![Page 13: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi](https://reader035.vdocument.in/reader035/viewer/2022062412/5a4d1ae97f8b9ab05997a226/html5/thumbnails/13.jpg)
PRIVACY-ENHANCED BUSINESS INTELEGENCE
![Page 14: Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control By: Wirayudha Rohandi](https://reader035.vdocument.in/reader035/viewer/2022062412/5a4d1ae97f8b9ab05997a226/html5/thumbnails/14.jpg)
CONCLUSION
Solutions are not applicable just yet.If the data are not confidential (enough), use public cloud.If the data are confidential and tight budget, use traditional server/hybrid cloud.If the data are confidential and enough budget, use private cloud.