SlideShare ist ein Scribd-Unternehmen logo
1 von 24
By Pin Chang and John Gillson
Objective ,[object Object],[object Object],[object Object]
Cloud Computing Infrastructure Models ,[object Object],[object Object],[object Object]
Cloud Computing Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Architectural Considerations for IaaS
Cloud Security – Securing Data  ,[object Object],[object Object],[object Object],[object Object]
Cloud Security – Securing Data ,[object Object],[object Object],[object Object]
Cloud Security – Web Services ,[object Object],[object Object],[object Object]
Cloud Security – Web Services
Cloud Security – Web Services
Cloud Security – Security Domains ,[object Object]
Cloud Security - Common Scenario ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Cloud architecture A hierarchical design to reflect underlying resource topologies in a Cloud architecture; Client, Cloud Controller (CLC), Cluster Controller (CC), and Node Controller (NC) components  Example location of CLC, CC, and NC components running within a typical  resource environment
Sample Cloud architecture ,[object Object],[object Object],[object Object]
Sample Cloud architecture ,[object Object],[object Object],[object Object]
Sample Cloud architecture ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Cloud architecture ,[object Object],[object Object],[object Object],[object Object]
Sample Cloud architecture Overview of services that comprise the CLC.  Lines indicate the flow of messages where the dashed lines correspond to internal service messages
Cloud Security – Virtual Networking ,[object Object],[object Object],[object Object],[object Object]
Cloud Security – Virtual Networking ,[object Object],[object Object]
Cloud Security – Virtual Networking ,[object Object],[object Object]
Cloud Security – Virtual Networking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Security – Virtual Networking ,[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Jishnu Pradeep
 
Connecting mq&kafka
Connecting mq&kafkaConnecting mq&kafka
Connecting mq&kafkaMatt Leming
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET Journal
 
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentSVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentIJTET Journal
 
IRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in CloudIRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in CloudIRJET Journal
 
A survey on Improvement of virtual network communication security of trusted ...
A survey on Improvement of virtual network communication security of trusted ...A survey on Improvement of virtual network communication security of trusted ...
A survey on Improvement of virtual network communication security of trusted ...ijsrd.com
 
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...
DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...Cisco DevNet
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudSuraj Mehta
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud allan sam
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Siyabonga Masuku
 
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...IJIR JOURNALS IJIRUSA
 

Was ist angesagt? (16)

Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Connecting mq&kafka
Connecting mq&kafkaConnecting mq&kafka
Connecting mq&kafka
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
 
Final review presentation
Final review presentationFinal review presentation
Final review presentation
 
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentSVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
 
IRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in CloudIRJET- Developing an Algorithm to Detect Malware in Cloud
IRJET- Developing an Algorithm to Detect Malware in Cloud
 
A survey on Improvement of virtual network communication security of trusted ...
A survey on Improvement of virtual network communication security of trusted ...A survey on Improvement of virtual network communication security of trusted ...
A survey on Improvement of virtual network communication security of trusted ...
 
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...
DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
 
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
 

Andere mochten auch

Android With Cloud
Android With CloudAndroid With Cloud
Android With CloudAshish RAj
 
Cloud Computing and Impact Factors - An Empirical Investigation
Cloud Computing and Impact Factors - An Empirical InvestigationCloud Computing and Impact Factors - An Empirical Investigation
Cloud Computing and Impact Factors - An Empirical InvestigationNiki Kyriakou
 
A Study on:Green Cloud Computing
A Study on:Green Cloud ComputingA Study on:Green Cloud Computing
A Study on:Green Cloud ComputingVineet Garg
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computingNalini Mehta
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computingRam kumar
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computingShreyas Khare
 
Green computing ppt
Green computing  pptGreen computing  ppt
Green computing pptneenasahni
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud ComputingSeungyun Lee
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 

Andere mochten auch (11)

Android With Cloud
Android With CloudAndroid With Cloud
Android With Cloud
 
Cloud Computing and Impact Factors - An Empirical Investigation
Cloud Computing and Impact Factors - An Empirical InvestigationCloud Computing and Impact Factors - An Empirical Investigation
Cloud Computing and Impact Factors - An Empirical Investigation
 
Green cloud computing
Green  cloud computingGreen  cloud computing
Green cloud computing
 
A Study on:Green Cloud Computing
A Study on:Green Cloud ComputingA Study on:Green Cloud Computing
A Study on:Green Cloud Computing
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
 
Green computing ppt
Green computing  pptGreen computing  ppt
Green computing ppt
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud Computing
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Ähnlich wie Cloud Computing

DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKS
DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKSDEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKS
DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKScscpconf
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platformspurplesea
 
Eucalyptus - An Open-source Infrastructure for Cloud Computing
Eucalyptus - An Open-source Infrastructure for Cloud ComputingEucalyptus - An Open-source Infrastructure for Cloud Computing
Eucalyptus - An Open-source Infrastructure for Cloud Computingelliando dias
 
Azure Networking: Innovative Features and Multi-VNet Topologies
Azure Networking: Innovative Features and Multi-VNet TopologiesAzure Networking: Innovative Features and Multi-VNet Topologies
Azure Networking: Innovative Features and Multi-VNet TopologiesMarius Zaharia
 
A Trusted IaaS Environment with Hardware Security Module
 A Trusted IaaS Environment with Hardware Security Module A Trusted IaaS Environment with Hardware Security Module
A Trusted IaaS Environment with Hardware Security Modulenexgentechnology
 
A Trusted IaaS Environment with Hardware Security Module
 A Trusted IaaS Environment with Hardware Security Module A Trusted IaaS Environment with Hardware Security Module
A Trusted IaaS Environment with Hardware Security Modulenexgentechnology
 
A trusted iaa s environment
A trusted iaa s environmentA trusted iaa s environment
A trusted iaa s environmentnexgentech15
 
DEF CON 23 - Ronny Bull and Jeanna Matthews - exploring layer 2 - DOCUMENT
DEF CON 23 - Ronny Bull and Jeanna Matthews - exploring layer 2 - DOCUMENTDEF CON 23 - Ronny Bull and Jeanna Matthews - exploring layer 2 - DOCUMENT
DEF CON 23 - Ronny Bull and Jeanna Matthews - exploring layer 2 - DOCUMENTFelipe Prado
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guaranteesKamal Spring
 
AWS Virtual Private Cloud
AWS Virtual Private CloudAWS Virtual Private Cloud
AWS Virtual Private CloudWhizlabs
 
Cloud computing
Cloud computingCloud computing
Cloud computingMisha Ali
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stackSatish Chavan
 
Isolation of vm
Isolation of vmIsolation of vm
Isolation of vmHome
 
Covert Flow Confinement For Vm Coalition
Covert Flow Confinement For Vm CoalitionCovert Flow Confinement For Vm Coalition
Covert Flow Confinement For Vm CoalitionLogic Solutions, Inc.
 
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...Nico Huysamen
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
Cloud-Trust—a Security Assessment Modelfor Infrastructure as
Cloud-Trust—a Security Assessment Modelfor Infrastructure asCloud-Trust—a Security Assessment Modelfor Infrastructure as
Cloud-Trust—a Security Assessment Modelfor Infrastructure asWilheminaRossi174
 

Ähnlich wie Cloud Computing (20)

DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKS
DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKSDEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKS
DEPLOYMENT-DRIVEN SECURITY CONFIGURATION FOR VIRTUAL NETWORKS
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Eucalyptus - An Open-source Infrastructure for Cloud Computing
Eucalyptus - An Open-source Infrastructure for Cloud ComputingEucalyptus - An Open-source Infrastructure for Cloud Computing
Eucalyptus - An Open-source Infrastructure for Cloud Computing
 
Azure Networking: Innovative Features and Multi-VNet Topologies
Azure Networking: Innovative Features and Multi-VNet TopologiesAzure Networking: Innovative Features and Multi-VNet Topologies
Azure Networking: Innovative Features and Multi-VNet Topologies
 
A Trusted IaaS Environment with Hardware Security Module
 A Trusted IaaS Environment with Hardware Security Module A Trusted IaaS Environment with Hardware Security Module
A Trusted IaaS Environment with Hardware Security Module
 
A Trusted IaaS Environment with Hardware Security Module
 A Trusted IaaS Environment with Hardware Security Module A Trusted IaaS Environment with Hardware Security Module
A Trusted IaaS Environment with Hardware Security Module
 
A trusted iaa s environment
A trusted iaa s environmentA trusted iaa s environment
A trusted iaa s environment
 
DEF CON 23 - Ronny Bull and Jeanna Matthews - exploring layer 2 - DOCUMENT
DEF CON 23 - Ronny Bull and Jeanna Matthews - exploring layer 2 - DOCUMENTDEF CON 23 - Ronny Bull and Jeanna Matthews - exploring layer 2 - DOCUMENT
DEF CON 23 - Ronny Bull and Jeanna Matthews - exploring layer 2 - DOCUMENT
 
Quiz 1 cloud computing
Quiz 1 cloud computing Quiz 1 cloud computing
Quiz 1 cloud computing
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
 
AWS Virtual Private Cloud
AWS Virtual Private CloudAWS Virtual Private Cloud
AWS Virtual Private Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stack
 
Isolation of vm
Isolation of vmIsolation of vm
Isolation of vm
 
Covert Flow Confinement For Vm Coalition
Covert Flow Confinement For Vm CoalitionCovert Flow Confinement For Vm Coalition
Covert Flow Confinement For Vm Coalition
 
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Cloud-Trust—a Security Assessment Modelfor Infrastructure as
Cloud-Trust—a Security Assessment Modelfor Infrastructure asCloud-Trust—a Security Assessment Modelfor Infrastructure as
Cloud-Trust—a Security Assessment Modelfor Infrastructure as
 

Cloud Computing

  • 1. By Pin Chang and John Gillson
  • 2.
  • 3.
  • 4.
  • 6.
  • 7.
  • 8.
  • 9. Cloud Security – Web Services
  • 10. Cloud Security – Web Services
  • 11.
  • 12.
  • 13. Sample Cloud architecture A hierarchical design to reflect underlying resource topologies in a Cloud architecture; Client, Cloud Controller (CLC), Cluster Controller (CC), and Node Controller (NC) components Example location of CLC, CC, and NC components running within a typical resource environment
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Sample Cloud architecture Overview of services that comprise the CLC. Lines indicate the flow of messages where the dashed lines correspond to internal service messages
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.