SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Research Supervisor: Dr. Kazi Sakib
  Associate Professor and BIT Program Chair, IIT, DU




              Asif Imran :BIT0119


                          Provenance Research presentation   1
• Proposed Research


• Existing Research Work


• Cloud Provenance Detection: Background
  Study


• Experimental Environment

                      Provenance Research presentation   2
How can an effective provenance model from
system logs be derived that will ensure improved
management of cloud data forensics?




                       Provenance Research presentation   3
Provenance Research presentation   4
Existing Research




         Provenance Research presentation   5
   Provenance Detection: Scientific Workflows
    [1], [2], [3], [4]

   Accountability as a Service (AaaS) [5], [6],
    [7]

   Hidden Provenance information [8]




                         Provenance Research presentation   6
   Cloud Security Alliance (CSA) [9], [10]

    ◦ Abuse and nefarious use of cloud computing

    ◦ Insecure application programming interfaces

    ◦ Malicious insiders

    ◦ Data loss and leakages

    ◦ Unknown risk profile


                               Provenance Research presentation   7
   Provenance for secure cloud administration:
    limited availability



   System,     file-centric  provenance                   data
    capturing: limited extent




                        Provenance Research presentation          8
   Log-based provenance detection: minimal
    effort



   Provenance storage and representation




                       Provenance Research presentation   9
Cloud Provenance:
Background Study




        Provenance Research presentation   10
Service          Reason of Failure (Assumed)                     Duration



Amazon S3   Authentication mechanisms overloaded by               2 hours
            remote attacks (no action taken)


 Google     Error from the end of the maintenance                 4.6 hours
AppEngine   engineer’s program (no action taken)


  Gmail     The contact list mechanism crashed (tested            1.4 hours
            for bugs)




                               Provenance Research presentation               11
Provenance Research presentation   12
Provenance Research presentation   13
   Cloud Environment

   Network Infrastructure

   Database Management System

   Servers



                        Provenance Research presentation   14
Experimental Environment for
 Cloud Provenance Detection




             Provenance Research presentation   15
Server                                             Hardware
Cloud Controller node which runs the following:    Processor: 64-bit x86
        Network,                                   Memory: 16 GB RAM
        Volume                                     Disk space: 1900 GB (SATA or SAS or SSD)
        API                                        Volume storage: 100 GB (SATA) for volumes attached to the
        Scheduler                                  compute nodes
        Image services                             Network: one 1 GB Network Interface Card
                                                   (NIC) minimum
Compute node which runs the following:             Processor: 64-bit x86
        Virtual instances                          Memory: 16 GB RAM (32 GB minimum)
        System log information                     Disk space: 2 TB GB (SATA)
        Communication with the Compute             Network: two 1 GB NICs




                                                  Provenance Research presentation                         16
   Compute

   Nova-Network

   Nova-Scheduler

   Glance



                     Provenance Research presentation   17
Glance


                         Keystone


                            Nova




Provenance Research presentation    18
Images: Windows,
                    CentOS



Provenance Research presentation       19
Provenance Research presentation   20
   [1] A. Haeberlen, ―A case for the accountable cloud,‖ ACM SIGOPS, Operating
    Systems Review, vol. 44, no. 2, 2010, pp. 52-57.

   [2] S. Pearson and A. Benameur, ―Privacy, Security and Trust Issues Arising from
    Cloud Computing,‖ Proc. The 2nd International Conference on Cloud Computing
    2010, IEEE, 2010, pp. 693-702.

   [3] M. Vouk, ―Cloud computing—Issues, research and implementations,‖ Proc. 30th
    International Conference on Information Technology Interfaces, 2008 (ITI 2008)
    IEEE, 2008, pp. 31-40.

   [4] S.B. Davidson, S. Khanna, S. Roy, J. Stoyanovich, V. Tannen and Y. Chen, ―On
    provenance and privacy,‖ Proc. Proceedings of the 14th International Conference on
    Database Theory (ICDT), ACM, 2011, pp. 3-10.

   [5] J. Yao, S. Chen, C. Wang, D. Levy and J. Zic, ―Accountability as a Service for the
    Cloud,‖ Proc. IEEE Service Computing Conference 2010 (SCC 2010), IEEE, 2010, pp.
    81-88.

   [6] J. Wei, X. Zhang, G. Ammons, V. Bala and P. Ning, ―Managing security of virtual
    machine images in a cloud environment,‖ ACM, 2009, pp. 91-96.




                                           Provenance Research presentation                  21
   [7] W.Z.P. Ning, X.Z.G. Ammons, R. Wang and V. Bala, ―Always Upto- date–Scalable Offline
    Patching of VM Images in a Compute Cloud,‖ IBM Technical Papers, no. RC24956, 2010.


   [8] R.K.L. Ko, B.S. Lee and S. Pearson, ―Towards Achieving Accountability, Auditability and
    Trust in Cloud Computing,‖ Proc. International workshop on Cloud Computing: Architecture,
    Algorithms and Applications (CloudComp2011), Springer, 2011, pp. 5.

   [9] Cloud Security Alliance, ―Top Threats to Cloud Computing                  (V1.0),‖   2010;
    https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf.

   [10] J. Brodkin, ―Gartner: Seven cloud-computing security risks,‖ Infoworld, 2008, pp. 1–3.

   [11] W. Zhou, M. Sherr, T. Tao, X. Li, B.T. Loo and Y. Mao, ―Efficient querying and
    maintenance of network provenance at internet-scale,‖ Proc. 2010 International Conference
    on Management of Data (SIGMOD 2010), ACM, 2010, pp. 615-626.

   [12] M. Mowbray, S. Pearson and Y. Shen, ―Enhancing privacy in cloud computing via
    policy-based obfuscation,‖ The Journal of Supercomputing, 2010, pp. 1-25.

   [13] ―OpenStack Compute Administration Guide‖ 2011




                                               Provenance Research presentation                      22
(asifimran33@gmail.com)



   Provenance Research presentation   23

Weitere ähnliche Inhalte

Was ist angesagt?

SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...Nexgen Technology
 
Big Data Visualization Problem in IT Management
Big Data Visualization Problem in IT ManagementBig Data Visualization Problem in IT Management
Big Data Visualization Problem in IT Managementbigdataviz_bay
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationLeMeniz Infotech
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPapitha Velumani
 
Ieee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsIeee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsHarish PG
 
Open Science Data Cloud (IEEE Cloud 2011)
Open Science Data Cloud (IEEE Cloud 2011)Open Science Data Cloud (IEEE Cloud 2011)
Open Science Data Cloud (IEEE Cloud 2011)Robert Grossman
 
Interactive Latency in Big Data Visualization
Interactive Latency in Big Data VisualizationInteractive Latency in Big Data Visualization
Interactive Latency in Big Data Visualizationbigdataviz_bay
 
Tees an efficient search scheme over
Tees an efficient search scheme overTees an efficient search scheme over
Tees an efficient search scheme overKumar Dlk
 
Modeling and Provisioning IoT Cloud Systems for Testing Uncertainties
Modeling and Provisioning IoT Cloud Systems for Testing UncertaintiesModeling and Provisioning IoT Cloud Systems for Testing Uncertainties
Modeling and Provisioning IoT Cloud Systems for Testing UncertaintiesHong-Linh Truong
 
An Overview of Bionimbus (March 2010)
An Overview of Bionimbus (March 2010)An Overview of Bionimbus (March 2010)
An Overview of Bionimbus (March 2010)Robert Grossman
 
Visual cryptography for hybrid approach
Visual cryptography for hybrid approachVisual cryptography for hybrid approach
Visual cryptography for hybrid approachSuprajareddy Allu
 
Searchable Symmetric Encryption with Forward Search Privacy
Searchable Symmetric Encryption with Forward Search PrivacySearchable Symmetric Encryption with Forward Search Privacy
Searchable Symmetric Encryption with Forward Search PrivacyJAYAPRAKASH JPINFOTECH
 
Open Science Data Cloud - CCA 11
Open Science Data Cloud - CCA 11Open Science Data Cloud - CCA 11
Open Science Data Cloud - CCA 11Robert Grossman
 
Bionimbus - Northwestern CGI Workshop 4-21-2011
Bionimbus - Northwestern CGI Workshop 4-21-2011Bionimbus - Northwestern CGI Workshop 4-21-2011
Bionimbus - Northwestern CGI Workshop 4-21-2011Robert Grossman
 
Bionimbus Cambridge Workshop (3-28-11, v7)
Bionimbus Cambridge Workshop (3-28-11, v7)Bionimbus Cambridge Workshop (3-28-11, v7)
Bionimbus Cambridge Workshop (3-28-11, v7)Robert Grossman
 
Large Scale On-Demand Image Processing For Disaster Relief
Large Scale On-Demand Image Processing For Disaster ReliefLarge Scale On-Demand Image Processing For Disaster Relief
Large Scale On-Demand Image Processing For Disaster ReliefRobert Grossman
 
Big data visualization frameworks and applications at Kitware
Big data visualization frameworks and applications at KitwareBig data visualization frameworks and applications at Kitware
Big data visualization frameworks and applications at Kitwarebigdataviz_bay
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualizationbigdataviz_bay
 

Was ist angesagt? (20)

SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
 
V cnsms
V cnsmsV cnsms
V cnsms
 
Big Data Visualization Problem in IT Management
Big Data Visualization Problem in IT ManagementBig Data Visualization Problem in IT Management
Big Data Visualization Problem in IT Management
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Ieee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsIeee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projects
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Open Science Data Cloud (IEEE Cloud 2011)
Open Science Data Cloud (IEEE Cloud 2011)Open Science Data Cloud (IEEE Cloud 2011)
Open Science Data Cloud (IEEE Cloud 2011)
 
Interactive Latency in Big Data Visualization
Interactive Latency in Big Data VisualizationInteractive Latency in Big Data Visualization
Interactive Latency in Big Data Visualization
 
Tees an efficient search scheme over
Tees an efficient search scheme overTees an efficient search scheme over
Tees an efficient search scheme over
 
Modeling and Provisioning IoT Cloud Systems for Testing Uncertainties
Modeling and Provisioning IoT Cloud Systems for Testing UncertaintiesModeling and Provisioning IoT Cloud Systems for Testing Uncertainties
Modeling and Provisioning IoT Cloud Systems for Testing Uncertainties
 
An Overview of Bionimbus (March 2010)
An Overview of Bionimbus (March 2010)An Overview of Bionimbus (March 2010)
An Overview of Bionimbus (March 2010)
 
Visual cryptography for hybrid approach
Visual cryptography for hybrid approachVisual cryptography for hybrid approach
Visual cryptography for hybrid approach
 
Searchable Symmetric Encryption with Forward Search Privacy
Searchable Symmetric Encryption with Forward Search PrivacySearchable Symmetric Encryption with Forward Search Privacy
Searchable Symmetric Encryption with Forward Search Privacy
 
Open Science Data Cloud - CCA 11
Open Science Data Cloud - CCA 11Open Science Data Cloud - CCA 11
Open Science Data Cloud - CCA 11
 
Bionimbus - Northwestern CGI Workshop 4-21-2011
Bionimbus - Northwestern CGI Workshop 4-21-2011Bionimbus - Northwestern CGI Workshop 4-21-2011
Bionimbus - Northwestern CGI Workshop 4-21-2011
 
Bionimbus Cambridge Workshop (3-28-11, v7)
Bionimbus Cambridge Workshop (3-28-11, v7)Bionimbus Cambridge Workshop (3-28-11, v7)
Bionimbus Cambridge Workshop (3-28-11, v7)
 
Large Scale On-Demand Image Processing For Disaster Relief
Large Scale On-Demand Image Processing For Disaster ReliefLarge Scale On-Demand Image Processing For Disaster Relief
Large Scale On-Demand Image Processing For Disaster Relief
 
Big data visualization frameworks and applications at Kitware
Big data visualization frameworks and applications at KitwareBig data visualization frameworks and applications at Kitware
Big data visualization frameworks and applications at Kitware
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
 

Andere mochten auch

5 facets of cloud computing - Presentation to AGBC
5 facets of cloud computing - Presentation to AGBC5 facets of cloud computing - Presentation to AGBC
5 facets of cloud computing - Presentation to AGBCRaymond Gao
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentationPriyanka Sharma
 
Howest presentation "Cloud computing"
Howest presentation "Cloud computing"Howest presentation "Cloud computing"
Howest presentation "Cloud computing"Philippe Creytens
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storageIGEEKS TECHNOLOGIES
 
Cloud computing presentation
Cloud computing  presentationCloud computing  presentation
Cloud computing presentationAkshra Gurav
 
What is cloud backup?
What is cloud backup?What is cloud backup?
What is cloud backup?Asigra
 
My Presentation on Cloud Computing
My Presentation on Cloud ComputingMy Presentation on Cloud Computing
My Presentation on Cloud ComputingPravin Sable
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentationWilliam Mann
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing PptAnjoum .
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised PresentationMayank Aggarwal
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing PresentationVivek Ravindran
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentationWael Chaa
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing BasicsSagar Sane
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 

Andere mochten auch (17)

5 facets of cloud computing - Presentation to AGBC
5 facets of cloud computing - Presentation to AGBC5 facets of cloud computing - Presentation to AGBC
5 facets of cloud computing - Presentation to AGBC
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Howest presentation "Cloud computing"
Howest presentation "Cloud computing"Howest presentation "Cloud computing"
Howest presentation "Cloud computing"
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
Cloud computing presentation
Cloud computing  presentationCloud computing  presentation
Cloud computing presentation
 
What is cloud backup?
What is cloud backup?What is cloud backup?
What is cloud backup?
 
My Presentation on Cloud Computing
My Presentation on Cloud ComputingMy Presentation on Cloud Computing
My Presentation on Cloud Computing
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentation
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing Ppt
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Présentation cloud computing
Présentation cloud computingPrésentation cloud computing
Présentation cloud computing
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 

Ähnlich wie Provenance based presentation on cloud computing security

Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudSwapnil Salunke
 
Computing Outside The Box June 2009
Computing Outside The Box June 2009Computing Outside The Box June 2009
Computing Outside The Box June 2009Ian Foster
 
Openstack Pakistan intro
Openstack Pakistan introOpenstack Pakistan intro
Openstack Pakistan introAffan Syed
 
Challenges in Cloud Forensics
Challenges in Cloud ForensicsChallenges in Cloud Forensics
Challenges in Cloud ForensicsGayan Weerarathna
 
Openstack Pakistan Workshop (intro)
Openstack Pakistan Workshop (intro)Openstack Pakistan Workshop (intro)
Openstack Pakistan Workshop (intro)Affan Syed
 
Cloud Achitecture and Security.pptx
Cloud Achitecture and Security.pptxCloud Achitecture and Security.pptx
Cloud Achitecture and Security.pptxIssahakukuwereJalilu
 
Cloud computing and bioinformatics
Cloud computing and bioinformaticsCloud computing and bioinformatics
Cloud computing and bioinformaticsEnis Afgan
 
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...Jorge Cardoso
 
Cloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsCloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsSandeep Saxena
 
Advanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest FiresAdvanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest FiresIvo Andreev
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
 
Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...dhanarajp
 
CPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge ProgrammingCPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge ProgrammingStephan Haller
 
Computing Outside The Box
Computing Outside The BoxComputing Outside The Box
Computing Outside The BoxIan Foster
 
Computing Outside The Box September 2009
Computing Outside The Box September 2009Computing Outside The Box September 2009
Computing Outside The Box September 2009Ian Foster
 
Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Amazon Web Services
 

Ähnlich wie Provenance based presentation on cloud computing security (20)

Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the Cloud
 
Computing Outside The Box June 2009
Computing Outside The Box June 2009Computing Outside The Box June 2009
Computing Outside The Box June 2009
 
Openstack Pakistan intro
Openstack Pakistan introOpenstack Pakistan intro
Openstack Pakistan intro
 
Challenges in Cloud Forensics
Challenges in Cloud ForensicsChallenges in Cloud Forensics
Challenges in Cloud Forensics
 
Paper444012-4014
Paper444012-4014Paper444012-4014
Paper444012-4014
 
Openstack Pakistan Workshop (intro)
Openstack Pakistan Workshop (intro)Openstack Pakistan Workshop (intro)
Openstack Pakistan Workshop (intro)
 
A Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVMA Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVM
 
Cloud Achitecture and Security.pptx
Cloud Achitecture and Security.pptxCloud Achitecture and Security.pptx
Cloud Achitecture and Security.pptx
 
Cloud computing and bioinformatics
Cloud computing and bioinformaticsCloud computing and bioinformatics
Cloud computing and bioinformatics
 
Dice presents-feb2014
Dice presents-feb2014Dice presents-feb2014
Dice presents-feb2014
 
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
 
Cloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsCloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security Metrics
 
Advanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest FiresAdvanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest Fires
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...
 
Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...
 
CPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge ProgrammingCPaaS.io Y1 Review Meeting - Cloud & Edge Programming
CPaaS.io Y1 Review Meeting - Cloud & Edge Programming
 
Computing Outside The Box
Computing Outside The BoxComputing Outside The Box
Computing Outside The Box
 
Computing Outside The Box September 2009
Computing Outside The Box September 2009Computing Outside The Box September 2009
Computing Outside The Box September 2009
 
Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 

Mehr von Asif Anik

Monte carlo presentation for analysis of business growth
Monte carlo presentation for analysis of business growthMonte carlo presentation for analysis of business growth
Monte carlo presentation for analysis of business growthAsif Anik
 
Analysis of mysql and postgresql
Analysis of mysql and postgresqlAnalysis of mysql and postgresql
Analysis of mysql and postgresqlAsif Anik
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysisAsif Anik
 
Panacea presentation for teh institute of information technology (2)
Panacea presentation for teh institute of information technology (2)Panacea presentation for teh institute of information technology (2)
Panacea presentation for teh institute of information technology (2)Asif Anik
 
Core values of IIT
Core values of IITCore values of IIT
Core values of IITAsif Anik
 
Internship report presentation on cloud computing
Internship report presentation on cloud computingInternship report presentation on cloud computing
Internship report presentation on cloud computingAsif Anik
 
Midterm presentation
Midterm presentationMidterm presentation
Midterm presentationAsif Anik
 
Cloud presentation for marketing purpose
Cloud presentation for marketing purposeCloud presentation for marketing purpose
Cloud presentation for marketing purposeAsif Anik
 
Cloud presentation for marketing purpose
Cloud presentation for marketing purposeCloud presentation for marketing purpose
Cloud presentation for marketing purposeAsif Anik
 

Mehr von Asif Anik (9)

Monte carlo presentation for analysis of business growth
Monte carlo presentation for analysis of business growthMonte carlo presentation for analysis of business growth
Monte carlo presentation for analysis of business growth
 
Analysis of mysql and postgresql
Analysis of mysql and postgresqlAnalysis of mysql and postgresql
Analysis of mysql and postgresql
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysis
 
Panacea presentation for teh institute of information technology (2)
Panacea presentation for teh institute of information technology (2)Panacea presentation for teh institute of information technology (2)
Panacea presentation for teh institute of information technology (2)
 
Core values of IIT
Core values of IITCore values of IIT
Core values of IIT
 
Internship report presentation on cloud computing
Internship report presentation on cloud computingInternship report presentation on cloud computing
Internship report presentation on cloud computing
 
Midterm presentation
Midterm presentationMidterm presentation
Midterm presentation
 
Cloud presentation for marketing purpose
Cloud presentation for marketing purposeCloud presentation for marketing purpose
Cloud presentation for marketing purpose
 
Cloud presentation for marketing purpose
Cloud presentation for marketing purposeCloud presentation for marketing purpose
Cloud presentation for marketing purpose
 

Kürzlich hochgeladen

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Provenance based presentation on cloud computing security

  • 1. Research Supervisor: Dr. Kazi Sakib Associate Professor and BIT Program Chair, IIT, DU Asif Imran :BIT0119 Provenance Research presentation 1
  • 2. • Proposed Research • Existing Research Work • Cloud Provenance Detection: Background Study • Experimental Environment Provenance Research presentation 2
  • 3. How can an effective provenance model from system logs be derived that will ensure improved management of cloud data forensics? Provenance Research presentation 3
  • 5. Existing Research Provenance Research presentation 5
  • 6. Provenance Detection: Scientific Workflows [1], [2], [3], [4]  Accountability as a Service (AaaS) [5], [6], [7]  Hidden Provenance information [8] Provenance Research presentation 6
  • 7. Cloud Security Alliance (CSA) [9], [10] ◦ Abuse and nefarious use of cloud computing ◦ Insecure application programming interfaces ◦ Malicious insiders ◦ Data loss and leakages ◦ Unknown risk profile Provenance Research presentation 7
  • 8. Provenance for secure cloud administration: limited availability  System, file-centric provenance data capturing: limited extent Provenance Research presentation 8
  • 9. Log-based provenance detection: minimal effort  Provenance storage and representation Provenance Research presentation 9
  • 10. Cloud Provenance: Background Study Provenance Research presentation 10
  • 11. Service Reason of Failure (Assumed) Duration Amazon S3 Authentication mechanisms overloaded by 2 hours remote attacks (no action taken) Google Error from the end of the maintenance 4.6 hours AppEngine engineer’s program (no action taken) Gmail The contact list mechanism crashed (tested 1.4 hours for bugs) Provenance Research presentation 11
  • 14. Cloud Environment  Network Infrastructure  Database Management System  Servers Provenance Research presentation 14
  • 15. Experimental Environment for Cloud Provenance Detection Provenance Research presentation 15
  • 16. Server Hardware Cloud Controller node which runs the following: Processor: 64-bit x86 Network, Memory: 16 GB RAM Volume Disk space: 1900 GB (SATA or SAS or SSD) API Volume storage: 100 GB (SATA) for volumes attached to the Scheduler compute nodes Image services Network: one 1 GB Network Interface Card (NIC) minimum Compute node which runs the following: Processor: 64-bit x86 Virtual instances Memory: 16 GB RAM (32 GB minimum) System log information Disk space: 2 TB GB (SATA) Communication with the Compute Network: two 1 GB NICs Provenance Research presentation 16
  • 17. Compute  Nova-Network  Nova-Scheduler  Glance Provenance Research presentation 17
  • 18. Glance Keystone Nova Provenance Research presentation 18
  • 19. Images: Windows, CentOS Provenance Research presentation 19
  • 21. [1] A. Haeberlen, ―A case for the accountable cloud,‖ ACM SIGOPS, Operating Systems Review, vol. 44, no. 2, 2010, pp. 52-57.  [2] S. Pearson and A. Benameur, ―Privacy, Security and Trust Issues Arising from Cloud Computing,‖ Proc. The 2nd International Conference on Cloud Computing 2010, IEEE, 2010, pp. 693-702.  [3] M. Vouk, ―Cloud computing—Issues, research and implementations,‖ Proc. 30th International Conference on Information Technology Interfaces, 2008 (ITI 2008) IEEE, 2008, pp. 31-40.  [4] S.B. Davidson, S. Khanna, S. Roy, J. Stoyanovich, V. Tannen and Y. Chen, ―On provenance and privacy,‖ Proc. Proceedings of the 14th International Conference on Database Theory (ICDT), ACM, 2011, pp. 3-10.  [5] J. Yao, S. Chen, C. Wang, D. Levy and J. Zic, ―Accountability as a Service for the Cloud,‖ Proc. IEEE Service Computing Conference 2010 (SCC 2010), IEEE, 2010, pp. 81-88.  [6] J. Wei, X. Zhang, G. Ammons, V. Bala and P. Ning, ―Managing security of virtual machine images in a cloud environment,‖ ACM, 2009, pp. 91-96. Provenance Research presentation 21
  • 22. [7] W.Z.P. Ning, X.Z.G. Ammons, R. Wang and V. Bala, ―Always Upto- date–Scalable Offline Patching of VM Images in a Compute Cloud,‖ IBM Technical Papers, no. RC24956, 2010.  [8] R.K.L. Ko, B.S. Lee and S. Pearson, ―Towards Achieving Accountability, Auditability and Trust in Cloud Computing,‖ Proc. International workshop on Cloud Computing: Architecture, Algorithms and Applications (CloudComp2011), Springer, 2011, pp. 5.  [9] Cloud Security Alliance, ―Top Threats to Cloud Computing (V1.0),‖ 2010; https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf.  [10] J. Brodkin, ―Gartner: Seven cloud-computing security risks,‖ Infoworld, 2008, pp. 1–3.  [11] W. Zhou, M. Sherr, T. Tao, X. Li, B.T. Loo and Y. Mao, ―Efficient querying and maintenance of network provenance at internet-scale,‖ Proc. 2010 International Conference on Management of Data (SIGMOD 2010), ACM, 2010, pp. 615-626.  [12] M. Mowbray, S. Pearson and Y. Shen, ―Enhancing privacy in cloud computing via policy-based obfuscation,‖ The Journal of Supercomputing, 2010, pp. 1-25.  [13] ―OpenStack Compute Administration Guide‖ 2011 Provenance Research presentation 22
  • 23. (asifimran33@gmail.com) Provenance Research presentation 23