14
ENDURING SECURITY IN CLOUDING DATABASES CSCE 824, Spring 2013, Ahmad Almadhor

Enduring security in clouding databases

  • Upload
    hoai

  • View
    39

  • Download
    1

Embed Size (px)

DESCRIPTION

Enduring security in clouding databases. CSCE 824, Spring 2013, Ahmad Almadhor. Cloud Computing . It is the mother of databases in clouds More comprehensive structure contains various information technology subcategories - PowerPoint PPT Presentation

Citation preview

Page 1: Enduring security in clouding databases

ENDURING SECURITY IN CLOUDING DATABASESCSCE 824, Spring 2013, Ahmad Almadhor

Page 2: Enduring security in clouding databases

Ahmad Almadhor

2

Cloud Computing It is the mother of databases in clouds More comprehensive structure contains various

information technology subcategories Usually viewed as a complete virtual enlivenment of

services within networks “mainly the internet” High availability, scalability, multi-tenancy and

effective resources are the plain four aims. The following are the main four models of CC:

Infrastructure as a service (IaaS) Platform as a service (PaaS) Software as a service (SaaS) Network as a service (NaaS)

Page 3: Enduring security in clouding databases

Ahmad Almadhor

3

Cloud computing illustration

source: https://devcentral.f5.com/blogs/us/is-your-cloud-opaque-or-transparent

Page 4: Enduring security in clouding databases

Ahmad Almadhor

4

Databases in the cloud subcategory of the cloud computing

platform architecture as Amazon EC2 related topographies in the plain databases

converted in a form of cloud silhouette Two main forms:

virtual machine usage by users self-reliantly accessing remunerated managed databases by

vendors for customers both models either performs SQL (Oracle,

NuoDB, etc.) or non-relational databases (CouchDB, Apache casandra, etc.).

Page 5: Enduring security in clouding databases

Ahmad Almadhor

5

Databases in the cloud example

source: http://www.ibm.com/developerworks/data/library/dmmag/DMMag_2011_Issue2/cloudDBaaS/1102-FeCloud_figure1.gif

Page 6: Enduring security in clouding databases

Ahmad Almadhor

6

Oops, Security matters! Same concerns every where:

availability, privacy, authentication, and integrity are the pillars again of clouding database security

More on the integrity and privacy side though Authentication is a serious issue

However: Availably is typically seen as basic requirement for

clouding in general; so it is not a problematic here Data loss could be prevented because backups

are characteristic of data bases in the cloud infrastructure

Page 7: Enduring security in clouding databases

Ahmad Almadhor

7

Scorching solutions distributed detecting system to latch

misbehaving servers via homomorphic token and distributed verification via Data error localization

Accordingly; any abnormal coded-data, which are noticed by the distributed algorithmic spots all over the designated database network, will raise a red flag for the system administrators

(source: Ensuring Data Storage Security in Cloud Computing)

Page 8: Enduring security in clouding databases

Ahmad Almadhor

8

homomorphic token and distributed verification

Source: C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," in Proc. of IWQoS'09, July 2009

Page 9: Enduring security in clouding databases

Ahmad Almadhor

9

Cloud databases in smart grid Smart grid is employment of information

technology toward more reliable power and electrical networks uses bidirectional communication with end users that assists for disseminated energy management.

clouding databases are appropriate methodologies to be exploited for smart grid to provide adaptability, ample availability and efficient computerized infrastructure.

However; same security issues in the cloud platforms are still extremely immense apprehensions for being set out in smart grids

Page 10: Enduring security in clouding databases

Ahmad Almadhor

10

Smart grid ecosystem and data security challenges

Simmhan, Y.; Kumbhare, A.G.; Baohua Cao; Prasanna, V., "An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds," Cloud Computing (CLOUD), 2011 IEEE International Conference on , vol., no., pp.582,589, 4-9 July 2011

Page 11: Enduring security in clouding databases

Ahmad Almadhor

11

limitations Data are out of hand controlling

methods; so still hard to be completely secured

Untrustworthy service handlers Fears of data integrity breaches are high Expensive to deploy new infrastructures providing real time responsive schemes And above of all, unfortunately classical

known security subjects are migrated to cloud databases

Page 12: Enduring security in clouding databases

Ahmad Almadhor

12

Conclusion and future work Clouding databases new technology;

thus necessities more experimentations on securing them efficiently

Robust and suitable access control highly on demand

Fast cryptosystems needed, AES as an example

Multilevel security mechanisms are “in my opinion” are the best solutions according to the nature of clouding

Page 13: Enduring security in clouding databases

Ahmad Almadhor

13

References C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud

Computing," in Proc. of IWQoS'09, July 2009 Wenchao Zhou, Micah Sherr, William R. Marczak, Zhuoyao Zhang, Tao Tao, Boon Thau

Loo, and Insup Lee. 2010. “Towards a data-centric view of cloud security.” In Proceedings of the second international workshop on Cloud data management

< http://www.mcafee.com/us/resources/white-papers/wp-database-security-virtualization-cloud.pdf>

Simmhan, Y.; Kumbhare, A.G.; Baohua Cao; Prasanna, V., "An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds," Cloud Computing (CLOUD), 2011 IEEE International Conference on , vol., no., pp.582,589, 4-9 July 2011

Wikipedia <http://en.wikipedia.org> Maheshwari, Ketan; Lim, Marcus; Wang, Lydia; Birman, Ken; van Renesse, Robbert,

"Toward a reliable, secure and fault tolerant smart grid state estimation in the cloud," Innovative Smart Grid Technologies (ISGT), 2013 IEEE PES , vol., no., pp.1,6, 24-27 Feb. 2013

Mohamed, E.M.; Abdelkader, H.S.; El-Etriby, S., "Enhanced data security model for cloud computing," Informatics and Systems (INFOS), 2012 8th International Conference on , vol., no., pp.CC-12,CC-17, 14-16 May 2012

Page 14: Enduring security in clouding databases

Ahmad Almadhor

14

Questions