security in the clouds

18
Security in the Clouds 1 Professor Sadie Creese London Hopper 2010 May 2010

Upload: sheera

Post on 23-Feb-2016

55 views

Category:

Documents


0 download

DESCRIPTION

Security in the Clouds. Professor Sadie Creese London Hopper 2010 May 2010. What is cloud computing?. Service Model. Gmail, Google Docs. Google App Engine. Amazon S3/SimpleDB. VMWare/XEN. Amazon EC2. 3. Cloud Market Drivers. Enterprise Drivers Compression of deployment cycles - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Security in the Clouds

Security in the Clouds

1

Professor Sadie CreeseLondon Hopper 2010May 2010

Page 2: Security in the Clouds

What is cloud computing?

2

Page 3: Security in the Clouds

Service Model

3

Gmail, Google Docs

Google App Engine

Amazon EC2

Amazon S3/SimpleDB

VMWare/XEN

Page 4: Security in the Clouds

Cloud Market Drivers• Enterprise Drivers

• Compression of deployment cycles• Instant upgrade and try-it-out• Elasticity• Cost alignment• Reduction of IT team costs• Accessibility and sharing• Dependability• Waste reduction and carbon footprint

• Consumer drivers• Up to speed with latest apps• Pay-as-you-use• Accessibility and sharing• Dependability

4

Page 5: Security in the Clouds

Cloud Ecosystems

5

VM VMVM

Broker

VM VMVM

VM VMVM

User

Page 6: Security in the Clouds

Why are we concerned?

6

Page 7: Security in the Clouds

Significant investment

7

$$$Hosted apps market currently at $6.4b, $14.8b in 2012 (Gartner Dec 08)

Services market currently at $56b, $150b in 2013 (Gartner March 09)

Services market currently worth $16.2b, $42b in 2012 (IDC Dec 08)

Services market to be worth $160b in 2011 (Merril Lynch May 08)

Page 8: Security in the Clouds

Large Cloud Application Service Provider Space

8

Extract from slides : “Prophet a Path out of the cloud”, Best Practical, Presented at O’Reilly Open Source Conf, 2008

Page 9: Security in the Clouds

People Are WorriedKey barriers to uptake, as recognised in the community:• Data security concerns• Privacy compromise/ practice• Service dependability and QoS• Loss of control over IT and data• Management difficulties around performance, support and

maintenance• Service integration• Lock-in• Usability• Lack of market maturity

9

Page 10: Security in the Clouds

What’s different about the Cloud?

10

Page 11: Security in the Clouds

Scale and Business Models

11

• Length and depth of relationships• Mobility of data• Volumes of data• Nature of data (more sensitive)• Lack of perimeter• Global nature• Location of control

Page 12: Security in the Clouds

Futures – Scenarios

12

High Cost/Low Payback for an attacker.Most successful threat agents, likely to be insider’s within the silo

High Cost/High Payback for an attacker.Most successful threat agent, likely to be insider managing resource distribution or a malicious service provider.

Low Cost/Low Payback for an attacker.Threat agents will include external attackers utilising mixture of technology and social engineering.

Low Cost/High Payback for an attacker.External attackers using the distributed scale to attack multiple systems and users simultaneously. E.G Bot and application framework based attacks.

Page 13: Security in the Clouds

Thinking Like an Attacker

13

Page 14: Security in the Clouds

(A few) potential future attack scenarios

14

• Denial of service• resource consumption, traffic redirection, inter-cloud and user to cloud

• Trojan Clouds• Imitate providers, infiltrate supply chains, sympathetic cloud

• Inference Attacks• Due to privileged (~admin) roles, cohabiting risks (via hypervisor)

• Application Framework attacks• Repeatable, pervasive

• Sticky Clouds• Lack of responsiveness, complex portability

• Onion storage• Moving global location, fragmenting, encrypting

• Covert channels within the cloud network across services

Page 15: Security in the Clouds

And?

15

Page 16: Security in the Clouds

16

(A few) Implications for Security • Regulatory/Legislation

• Nothing is transparent about data handling in cloud, privacy protection• Investigations

• Technical forensics and legal, across borders• Monitoring/Auditing

• Mechanisms• Encryption

• At some point decryption happens for anything other than storage...• Recent IBM breakthrough indicates potential for processing encrypted

data but not practical yet..• Contracting/Due Diligence

• Service Level Agreements

Page 17: Security in the Clouds

17

Our current research directions... • Digital Forensics• Vulnerability Models / Threat Models and Cascade Effects• Service Level Agreements• Enterprise Capability Maturity Model• Designing in Privacy -> via patterns and architectures• Insider Threat Detection

Page 18: Security in the Clouds

Thank-youQuestions?

18