Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Group C008 Komas Presentation - Cloud Computing Case Study

Group C008 Komas Presentation - Cloud Computing Case Study

Dimas Ramadhani

October 14, 2014
Tweet

More Decks by Dimas Ramadhani

Other Decks in Technology

Transcript

  1. Group C008 proudly present Cloud Computing: A Case Study of

    iCloud Presented by 1106053470 - Adrian Alfarisy 1106087515 - Almer Radilatujani 1106088146 - Ananta Besty 1106008605 - Dimas Ramadhani 1106087774 - Novela Spalo 1106088120 - Tommy Anugrah 1106053552 - Yahya Eru Cakra
  2. John McCarthy Introduces Mainframe Timesharing 1960s 1969 1970 1997 1999

    ARPANET Introduces by J.C.R Licklider as “Intergalactic Computer Network” Virtualization Software Launched Cloud Computing Is defined by Prof. Ramnath Chellappa 2006 Salesforce.com launched Amazon launched Elastic Compute Cloud (EC2), Simple Storage Service (S3) 2009 Google App launched 2011 iCloud launched 2014 iCloud Vulnerability Problem Cloud Computing History
  3. “ What is Cloud Computing? Cloud computing is a model

    for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. “
  4. Cloud Computing Services Platform as a Service (PaaS) Execution Runtime,

    Database, Web server, Development Tools… Software as a Service (SaaS) CRM, Email, Virtual Desktop, Communication, Games… Infrastructure as a Service (IaaS) Virtual Machines, Servers, Storage, Load Balancer, Network…
  5. Cloud Computing Security Issues LOCK-IN there is currently little on

    offer in the way of tools, procedures or standard data formats or services interfaces that could guarantee data, application and service portability. DATA PROTECTION cloud computing poses several data protection risks for cloud customers and Providers. LOSS OF GOVERNANCE in using cloud infrastructures, the client necessarily cedes control to the Cloud Provider (CP) on a number of issues which may affect security. INSECURE OR INCOMPLETE DATA DELETION when a request to delete a cloud resource is made, as with most operating systems, this may not result in true wiping of the data.
  6. iCloud Vulnerability Issues Malware Attack can damage or disable the

    system Memory Bus-Based Side Channels Attack can lock the memory bus Caches-Based Side Channel Attack can monitor the status of shared physical resources (caches) and infer the victim’s computation and I/O activities.
  7. How to Improve? Uniform and tamper-resistant platform to deploy system

    monitoring and antimalware functions. Prevent a VM from locking the memory bus and let the hypervisor emulate the execution of atomic instructions that would otherwise require memory bus locking. Düppel, aims to disrupt cache-based side channels. In this self-defensive approach, the target VM’s guest operating system injects cache access noise (that is, flushes) so the collocated attack VM can’t infer cache access patterns. Malware Attack Memory Bus-Based Side Channels Attack Caches-Based Side Channel Attack
  8. References • Rafique, K. ; Tareen, A.W. ; Saeed, M.

    ; Jingzhu Wu ; Qureshi, S.S. “Cloud computing economics opportunities and challenges”, Broadband Network and Multimedia Technology (ICBNMT), 2011 4th IEEE International Conference on. • https://www.techinasia.com/cloud-computing-privacy-main-concern-companies-asia-pacific/ • Kapoor, Mayank. “The Rise of Cloud Computing in Indonesia”. Frost & Sullivan. 1 October 2014. https://www.frost.com/sublib/display-market-insight.do?id=284156497 • S. O. Kuyoro, Ibikunle F. and Awodele O. “Cloud Computing Security Issues and Challenges.” In International Journal of Computer Networks (IJCN), Volume (3) : Issue : (5), 2011. • Security and Privacy in Cloud Computing. ieeexplore.ieee.org, May, 2014, by: Zahir Tari • Mell, Peter and Timothy Grance. 2011. The NIST Definition of Cloud Computing. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. Special Publication 800-145. Accessed on 14 Oct 2014. • Jamil, Danish. 2011. Cloud Computing Security. http://www.ijest.info/docs/IJEST11-03-04-129.pdf. International Journal of Engineering Science and Technology (IJEST). Accessed on 14 Oct 2014