Download - A Security Approach In The Cloud
![Page 1: A Security Approach In The Cloud](https://reader036.vdocument.in/reader036/viewer/2022062409/568150c4550346895dbee569/html5/thumbnails/1.jpg)
A Security Approach In The Cloud
Rick Rodin
Dwight Bygrave
Evgeni Sadovski
Maria Azua
DPS Class of 2012 – Team 2
1
![Page 2: A Security Approach In The Cloud](https://reader036.vdocument.in/reader036/viewer/2022062409/568150c4550346895dbee569/html5/thumbnails/2.jpg)
Decreasing cost of Information
Two Key Trends
Time to 60M Users
Radio
Internet
Farmville
40 years
3 years
20 years TV
4 months!
Acceleration of technology adoption
* Figueres from The Social Factor by Maria Azua 2
![Page 3: A Security Approach In The Cloud](https://reader036.vdocument.in/reader036/viewer/2022062409/568150c4550346895dbee569/html5/thumbnails/3.jpg)
Virtualization, Images
Service CatalogProvisioning,
Management/Billing System
Virtual NetworkElasticity.
•Diagram from IBM cloud presentation
What is Cloud Computing and how we got here?
Clusters
Grids
Clouds
(Physical wiring of multiple computers)High Performance clustersHigh Availability clusters
(Peer-to-Peer architctue, No Abstraction layer)Compute GridData GridService GridApplication Grid
(Virtualized, Abstraction Layer, Image standardization, Services Driven, Utility model)Public CloudsPrivate ClouddsHybrid Clouds
•Diagram from Pankaj Deep Kaur, I.C.: ‘Unfolding the Distributed Computing Paradigms 3
![Page 4: A Security Approach In The Cloud](https://reader036.vdocument.in/reader036/viewer/2022062409/568150c4550346895dbee569/html5/thumbnails/4.jpg)
Scale
Unit cost
Traditional Infrastructure
InternalCloud
Service Provider Cloud(cost)
Large enterprises can significantly reduce costs for some workloads compared with traditional IT.
•Diagram from IBM cloud presentation
Cloud Computing enables economies of scale
4
![Page 5: A Security Approach In The Cloud](https://reader036.vdocument.in/reader036/viewer/2022062409/568150c4550346895dbee569/html5/thumbnails/5.jpg)
Banks use automated teller machines to improve
service and lower cost.
Manufacturers use robotics to improve quality and
lower cost.
Telcos automate traffic through switches to assure
service and lower cost.
Standardization and Automation have changed many other industries become more efficient.
… breakthroughs like these are enabled by service management systems.
•Diagram from IBM cloud presentation5
![Page 6: A Security Approach In The Cloud](https://reader036.vdocument.in/reader036/viewer/2022062409/568150c4550346895dbee569/html5/thumbnails/6.jpg)
Cloud Computing technology enables low cost IT which made possible the creation of new
Social Networking “clouds”
Social NetworksFacebook, YouTube
Informational / Services
Yahoo, MSN, Google
Yahoo MSN Google YouTube Facebook
% o
f Tim
e S
pen
t, World
wid
e
* Figuere from The Social Factor by Maria Azua 6
![Page 7: A Security Approach In The Cloud](https://reader036.vdocument.in/reader036/viewer/2022062409/568150c4550346895dbee569/html5/thumbnails/7.jpg)
The World is connected…. And more vulnerable to internet security attacks than ever before…
Byproduct of low cost communication and Cloud Computing
* Figuere from The Social Factor by Maria Azua 7
![Page 8: A Security Approach In The Cloud](https://reader036.vdocument.in/reader036/viewer/2022062409/568150c4550346895dbee569/html5/thumbnails/8.jpg)
8
Image Mangement Life Cycle Unsecure ProcessSecure Image management system
•Strict registration process.•Filter for publisher’s personal information like browser log files & cookies.•Verifies Signature•Monitors for Trojan horse and other malware patterns•Role base and ACL access control
Benefits / Value
* Diagram from Jinpeng Wei, Xiaolan Zhang, Vasanth Bala, and Ning, P.: ‘Managing Security of Virtual Machine Images in a Cloud Environment’
![Page 9: A Security Approach In The Cloud](https://reader036.vdocument.in/reader036/viewer/2022062409/568150c4550346895dbee569/html5/thumbnails/9.jpg)
9
Quantum ComputingTraditional Computing
– Computes in a linear fashion– Computation done by microprocessors one computation at a time– Push to have many tasks process at once (Parallel Computing)
Parallel Computing – Many calculations are carried out simultaneously– Major tasks are divided into smaller ones and processed at once– This would allow for enormous leaps in the world of computing
Essence of Quantum Computing – A computer must be able to store information as strings of 1’s and 0’s (Bits).– A computer must be able to manipulate the stored bits per given instructions.
• NOT OR and AND Gates. – The operating environment must be completely protected from radiation, magnetic
and electric fields as well as noise and motion.
![Page 10: A Security Approach In The Cloud](https://reader036.vdocument.in/reader036/viewer/2022062409/568150c4550346895dbee569/html5/thumbnails/10.jpg)
Quantum Key Distribution (QKD)
Classical Cryptography (becoming vulnerable)–Secret or symmetric key cryptography–Public key cryptography or asymmetric cryptography
Important Quantum Properties–Principle of Superposition–Heisenberg Uncertainty Principle–Quantum Entanglement
10
![Page 11: A Security Approach In The Cloud](https://reader036.vdocument.in/reader036/viewer/2022062409/568150c4550346895dbee569/html5/thumbnails/11.jpg)
Quantum Key Distribution (QKD)
11
1984Charles Bennett and Gilles Brassard Protocol (BB84) –Photon polarization state to encode 0’s and 1‘s at 0o or 90o in the
rectilinear base or 45o and 135o in a diagonal base.
1992 Charles Bennett (B92)
Only two of the four states mentioned are necessary for B92
![Page 12: A Security Approach In The Cloud](https://reader036.vdocument.in/reader036/viewer/2022062409/568150c4550346895dbee569/html5/thumbnails/12.jpg)
12
The most basic QKD system involves:– A sender(Alice) and receiver (Bob), – A quantum channel and a– Conventional communication channel. – Then you might encounter (Eve) the eavesdropper.
Quantum Key Distribution (QKD) System
![Page 13: A Security Approach In The Cloud](https://reader036.vdocument.in/reader036/viewer/2022062409/568150c4550346895dbee569/html5/thumbnails/13.jpg)
ITIL Service Transition
Source: ITIL Service Transition
![Page 14: A Security Approach In The Cloud](https://reader036.vdocument.in/reader036/viewer/2022062409/568150c4550346895dbee569/html5/thumbnails/14.jpg)
We need a Release Management process that leverages QKD Integrity of the modules (Cloud Images)
Track, Install, Verify and Validate deployed modules
Manage deviations
Risk: Breach in physical/information security
Security depends on VPN
Secure key exchange required
Conclusion