Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
CS 5410 - Computer and Network Security: Cloud Security
Professor Kevin Butler Fall 2015
CS 5410 - Computer and Network Security: Cloud Security Professor - - PowerPoint PPT Presentation
CS 5410 - Computer and Network Security: Cloud Security Professor Kevin Butler Fall 2015 Southeastern Security for Enterprise and Infrastructure (SENSEI) Center Imagine Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
Professor Kevin Butler Fall 2015
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
2
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
3
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
4
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
computing was the first to talk about federating these resources across multiple administrative domains.
the grid.
to coordinate the arbitrary execution of code (for a price).
5
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
roughly it is “the use of computing resources over a network connection”.
6
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
7
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
which they can run (almost) arbitrary software.
Services Platform, Rackspace Cloud, etc
instantaneously allocated or deallocated by the administrator.
expected or otherwise.
8
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
the execution of arbitrary software.
their software on a machine without worrying about the administrative details/lower layers.
Windows Azure Cloud Service...
9
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
10
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
11
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
12
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
access to your data.
“Harness”, or the application may make it easy to extract your sensitive data.
virtually the same configuration, so a weakness in one may be representative
13
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
14
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
15
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
16
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
instances on a single physical piece of hardware.
would not want to be on the same physical hardware:
private happening.
may allow you to DoS it... or at least cost them additional money to provision more services.
17
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
physical machine as that of a target customer.
located.
another user.
18
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
19
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
20
500000 1e+06 1.5e+06 2e+06 0 10 20 30 40 50 60 70 80 90100 CPU cycles Trial 1 0 10 20 30 40 50 60 70 80 90 100 Trial 2 HTTP gets No HTTP gets 0 10 20 30 40 50 60 70 80 90 100 Trial 3
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
21
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
with legal requirements.
requirement for some customers.
which should offer more protection.
Anti-Terrorism legislation) mean your data can be exposed without your knowledge.
22
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
computation on encrypted data.
blindly but meaningfully make changes to your data.
none of the risks...
23
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
significant.
someone else.
your data, exfiltration, side channels...
24