0% found this document useful (0 votes)
18 views

Lecture 6

Uploaded by

Abhishekh
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Lecture 6

Uploaded by

Abhishekh
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 14

APEX INSTITUTE OF TECHNOLOGY (AIT)

Bachelor of Computer Science Engineering


Subject Name- Cloud Computing Architecture
Code- 21CSH- 333
Prof. Dr. Deepti Sharma
E14308

Unit 1 DISCOVER . LEARN . EMPOWER


1
Cloud Architecture, Service Management,
CLOUD ARCHITECTURE &
SERVICE MANAGEMENT
Course Outcome

CO1 Understand the cloud computing architecture and service


management with deployment process
CO2 Learning about Cloud Multi Tenancy issues and Virtualization

CO3 Adapt the virtual machines, Security and Managing infrastructure


in MS Azure
CO4 Develop the application using SQL Azure and analyzing the
storage in azure
CO5 Analyzing the website development process with auto scaling 2
SYLLABUS
Unit No. 1
•Cloud Architecture and Service Management : Introduction to Cloud Computing Architecture,
Components of Cloud computing architecture, Benefits of cloud architecture, Reliability, availability and
security of services deployed on the cloud. Performance and scalability of services, tools and
technologies used to manage cloud services deployment;
•Multi-Tenancy Issues: Isolation of users/VMs from each other. How the cloud provider can provide this;
Virtualization System Security Issues- e.g. ESX and ESXi Security, ESX file system security.
•Virtualization : Virtualization, Hardware Virtualization, Operating system Virtualization, Server
Virtualization, Storage Virtualization.
SECURITY OF CLOUD SERVICES

• Due to the increasing popularity of cloud computing, emerging


concerns users are having to contend with include undesirable
internet invaders such as worms, viruses, hackers and financially
motivated cyberterrorists.
• As more people move into the cloud computing avenues, these
undesirables take advantage of vulnerabilities and exploit them for
personal gain.
• Providers will therefore need to up their protection systems to
ensure that their clients’ data is safe, which will in turn lead to
skyrocketing of costs of cloud computing prices.
SECURITY IN SAAS(SOFTWARE AS A SERVICE)

• The main security concern for users of SaaS is denial of service attacks that may
be made towards them directly, or that might affect them when their provider it
attacked.
• In denial of service attacks malware may be injected into the servers that
generate useless traffic to the server that slows down access of service by
genuine users.
• Another way that is done is by hackers giving multiple commands to servers that
slow it down and make it hard for other users to be able to enjoy the service
sufficiently.
SECURITY IN PAAS(PLATFORM AS A SERVICE)

• PaaS has some underlying security concerns associated with it, which emerge
mostly from the activities of the provider such as third-party relationships they
may have with other providers.
• Combinations of these elements from numerous sources create mash-ups,
whose security is suspect, and which also brings the security concerns into the
entire platform.
• Another security issue with PaaS is the requisite frequent upgrading of features
contained in the platform.
SECURITY IN PAAS(PLATFORM AS A SERVICE)

• As the providers strive to keep up with the upgrading requirements of features,


applications may get developed too quickly to give sufficient time to seal all
security loops and bugs in them.
• Once the applications have been integrated into the platform, the whole
platform becomes susceptible to the bugs
SECURITY IN IAAS(INFRASTRUCTURE AS A
SERVICE)

• IaaS providers make storage facilities, servers, networks and other computing resources
available to their users by creating virtualized systems.
• The security concerns experienced by IaaS therefore come from the virtualization feature of
their services such as the hypervisor, which oversees the performance of all virtual machines.
• The hypervisor therefore becomes a very crucial component of the IaaS that must be
secured, as its breach is passed on to the whole system.
• Other weak points of the IaaS include Virtual Machine image repositories which are made
public for all users.
• These repositories, when infected images are uploaded onto them, could potentially spread
the infection to the whole cloud.
THREATS TO CLOUD APPLICATIONS

The abuse of cloud computing by


•Third parties who might be looking to benefit from information stored in the
clouds,
•use of programming interfaces that are not fully secure,
• which might expose users to various forms of possibly catastrophic attacks,
•abuse by insiders with malicious intents and vulnerabilities that develop out of
sharing of technologies between numerous people in different places and with
different needs.
THREATS TO CLOUD APPLICATIONS

• loss or leakage of data during transit into the cloud, during transfer from one
point of the cloud to the other, such as from the provider to the cloud or from
the cloud to the user’s computers.
• Hijacking of service provisions is another detrimental threat, which is mostly
perpetrated by hackers in order to illegally access other people’s data for
personal gain;
• the last threat to cloud computing is the unknown risk factor, the ever present
factor to every business decision in a business on the unpredictability of events
out of the entrepreneur’s control.
MANAGING RISKS

• Businesses need to respond to issues that could lead to breach of confidentiality,


integrity or uninterrupted and reliable availability of an Information system
• Among businesses that have intellectual property and trade secrets stored in their
clouds, securing of this information is of critical importance, as it sustains business
activities on the day to day basis.
• Ensure that their data is segregated from other users online to prevent mix-up with
other data, which could bring about more complications in form of insecurity and
virus infections, which might turn out to be destructive.
• The service provider should demonstrate sufficient proof of encryption schemes
that actually protect user data from theft and malicious attacks from other users
QUESTIONS

• Give the factors effecting security in cloud computing


• Explain the security in IAAS
• Explain the security in PAAS
• Explain the security in SAAS
• Give the threats to the security in Cloud services
REFERENCES

• https://www.box.com/en-in/resources/what-is-cloud-security
• https://www.javatpoint.com/what-is-cloud-security
• https://www.beyondtrust.com/resources/glossary/cloud-security-cloud-
computing-security
THANK YOU

For queries
Email: [email protected]

14

You might also like