cloud computing – not all that new “… computation may someday be organized as a public...

20
Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1 Security and Cloud Computing

Upload: laura-nelson

Post on 23-Dec-2015

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

Cloud Computing – not all that new

“… computation may someday be organized as a public utility…”

– John McCarthy, 1960

1Security and Cloud Computing

Page 2: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

Cloud Today

“ a cloud is a pool of virtualized resources that can host a variety of different workloads, allow workloads to be deployed and scaled-out quickly, allocate resources when needed, and support redundancy.”

--

2Security and Cloud Computing

Page 3: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

How did we get here?

Security and Cloud Computing 3

Page 4: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

4

Security and Cloud Computing

“Cloud” is a new consumption and delivery model inspired by consumer Internet services.

Enabled by Pooling and virtualization of resources Automation of service management Standardization of workloads

Cloud enables: Self-service Sourcing options Flexible payment models Economies-of-scale

“Cloud” represents: The industrialization of delivery for

IT supported services

Cloud: Consumption & Delivery Models Optimized by Workload

Cloud Services

Cloud Computing Model

Page 5: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

5 Security and Cloud Computing

Customization, efficiency, availability, resiliency, security and privacy …

Standardization, capital preservation, flexibility and

time to deploy …

Public …• Access open to everybody,

subject to subscription• Shared resources• Multiple tenants• Delivers select set of

standardized business process, application and/or infrastructure services on a flexible price per use basis

• Always managed and hosted by 3rd party

Private …• Access limited to enterprise

and its partner network• Dedicated resources• Single tenant• Drives efficiency,

standardization and best practices while retaining greater customization and control

• Might be managed or hosted by third party

Cloud Computing Model

Cloud Services

Cloud Computing Delivery Models

Hybrid …• Private infrastructure,

integrated with public cloud

Community …• Several organizations with

similar needs and policies share a private cloud

Page 6: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

6 Security and Cloud Computing6

SECURITY

Cloud Model Applies at all Levels of the IT Stack – Resulting in Different Security Requirements, Different

Responsibilities

Curtain

SECURITY

SECURITYThe Cloud

Curtain

The CloudCurtain

Page 7: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

What about security in the cloud?

7Security and Cloud Computing

Page 8: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

Simple Example

?We Have ControlIt’s located at X.It’s stored in server’s Y, Z.We have backups in place.Our admins control access.Our uptime is sufficient.The auditors are happy.Our security team is engaged.

Who Has Control?Where is it located?Where is it stored?Who backs it up?Who has access?How resilient is it?How do auditors observe?How does our securityteam engage?What legal jurisdictions govern it?

?

?

?

??

Today’s Data Center Tomorrow’s Public Cloud

8Security and Cloud Computing

Page 9: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

9 Security and Cloud Computing

Of enterprises consider security the #1 inhibitor to cloud adoptions

80%

Of enterprises are concerned about the reliability of clouds

48%

Of respondents are concerned with cloud interfering with their ability to comply with regulations

33%

Source: Driving Profitable Growth Through Cloud Computing, IBM Study (conducted by Oliver Wyman)

“I prefer internal cloud to IaaS. When the service is kept internally, I am more comfortable with the

security that it offers.”

“Security is the biggest concern. I don’t worry much about the other “-ities” – reliability,

availability, etc.”

“How can we be assured that our data will not be leaked and that the vendors have the technology and the governance to control its employees from

stealing data?”

Security Remains the Top Concern for Cloud Adoption

Page 10: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

10 Security and Cloud Computing

Specific Customer Concerns Related to Security

Protection of intellectual property and data

Ability to enforce regulatory or contractual obligations

Unauthorized use of data

Confidentiality of data

Availability of data

Integrity of data

Ability to test or audit a provider’s environment

Other

30%21%15%12% 9% 8% 6% 3%

Source: Deloitte Enterprise@Risk: Privacy and Data Protection Survey

Page 11: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

11 Security and Cloud Computing

ComplianceComplying with SOX, HIPAA

and other regulations may prohibit the use of clouds for some applications.

ReliabilityHigh availability will be a key concern. IT departments will

worry about a loss of service should outages occur.

ControlMany companies and governments are uncomfortable

with the idea of their information located on systems they do not control.

Security ManagementEven the simplest of tasks may be behind layers of abstraction or

performed by someone else.

Data Migrating workloads to a shared network and compute infrastructure increases the potential for unauthorized

exposure.

Categories of Cloud Computing Risks

Providers must offer a high degree of security transparency to help

put customers at ease.

Providers must offer a high degree of security transparency to help

put customers at ease.

Authentication and access technologies become increasingly important.

Authentication and access technologies become increasingly important.

Mission critical applications may not run in the cloud without strong availability guarantees.

Mission critical applications may not run in the cloud without strong availability guarantees.

Comprehensive auditing capabilities are essential.Comprehensive auditing capabilities are essential.

Providers must supply easy controls to manage security settings for application and runtime environments.

Providers must supply easy controls to manage security settings for application and runtime environments.

Page 12: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

Cloud Security SummaryAs security professionals, our work is cut out for us. Especially since the security concerns related to cloud computing are extremely simple to understand.

– Losing control over data and operations is unsettling (“External” aspects of public clouds exacerbate this concern).

– Data transferred to a third party can be modified, lost, or stolen.

– A shared, multi-tenant infrastructure increases potential for unauthorized exposure.

– Service disruptions can have tremendous affects on the business.

Security and Cloud Computing 12

Page 13: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

Cloud Functionality vs. PrivacyIf we have to choose,

which do you think will win?

Security and Cloud Computing 13

Page 14: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

Illustration from American Scientist, 2012

Page 15: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

Illustration from American Scientist, 2012

Page 16: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

Illustration from American Scientist, 2012

Page 17: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

Illustration from American Scientist, 2012

Page 18: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

Performance then and now

• Prior to Gentry’s breakthrough, HE was essentially impossible

• In • Over the last four years, performance has

improved by 3 orders of magnitude (3500x)– 2010 : 2 gates in 1 hour– 2013 : 128-bit AES, 20000 gates, in 3 hours

Page 19: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

Future Thoughts• At least another order of magnitude

improvement with current techniques.• Perhaps one or two orders of magnitude more

via leveraging multi-core CPU’s• Algorithmic improvements ? Two new ideas will

appear in August at Crypto 2013.

• That would bring us to 128-bit AES in under 2 minutes, and would likely spur continuing improvements.

Page 20: Cloud Computing – not all that new “… computation may someday be organized as a public utility…” – John McCarthy, 1960 1Security and Cloud Computing

IBM’s Helib* on github April 11, 2013

HElib is a software library that implements homomorphic encryption (HE). Currently available is an implementation of the Brakerski-Gentry-Vaikuntanathan (BGV) scheme, along with many optimizations to make homomorphic evaluation runs faster, focusing mostly on effective use of the Smart-Vercauteren ciphertext packing techniques and the Gentry-Halevi-Smart optimizations.

This library is written in C++ and uses the NTL mathematical library. It is distributed under the terms of the GNU General Public License (GPL).

* Partially sponsored by IARPA SPAR and DARPA PROCEED