Privacy Issues in Cloud computing
Zeeshan Ali Shah System administrator PhD researcher KTH PDC Center for High Performance Computing
W-Sunday, October 28, 12
Privacy Issues in Cloud computing Zeeshan Ali Shah System - - PowerPoint PPT Presentation
Privacy Issues in Cloud computing Zeeshan Ali Shah System administrator PhD researcher KTH PDC Center for High Performance Computing W-Sunday, October 28, 12 Agenda Zeeshan Ali Shah Introduc5on to Cloud compu5ng
Zeeshan Ali Shah System administrator PhD researcher KTH PDC Center for High Performance Computing
W-Sunday, October 28, 12
– Introduc5on ¡to ¡Cloud ¡compu5ng – Privacy ¡through ¡distribu5ng ¡data ¡
– Privacy ¡in ¡Cloud ¡Compu5ng ¡Through ¡Iden5ty ¡ Management
2
W-Sunday, October 28, 12
3
FEATURES MODES LOCALITY BENEFITS COMPARES ¡TO STAKEHOLDERS
Reliability
TYPES
Elasticity Virtualisation … IaaS PaaS SaaS Public Private Hybrid … Local Remote Distributed Cost ¡Reduction Ease ¡of ¡use … Internet ¡of Services Grid Service-‑oriented Architecture Resellers Providers Adopters Users …
Cloud ¡ Systems
"Advances in Clouds" , Expert Group Report (2012), Editors Lutz Schubert, Keith Jeffery
W-Sunday, October 28, 12
Private / Internal Cloud
Public Cloud
On Premises / Internal Off Premises / Third Party
Public / External
Hybrid
W-Sunday, October 28, 12
5
Cloud Infrastructure (e.g. Physical/Virtual Hardware) Cloud Storage (e.g. Database) Cloud Platform (e.g. App Server) Cloud Services (e.g. Web Services) Cloud Application (e.g. SaaS) Cloud Clients (e.g. Browsers, Mobiles, Devices)
Armbrust, M., Fox, M., Griffith, R., et al. (2009) “Above the Clouds: A Berkeley View of Cloud Computing”, In: University of California at Berkeley Technical Report no. UCB/EECS-2009-28, pp. 6-7, February 10, 2009
W-Sunday, October 28, 12
6
Cloud Infrastructure (e.g. Physical/Virtual Hardware) Cloud Storage (e.g. Database) Cloud Platform (e.g. App Server) Cloud Services (e.g. Web Services) Cloud Application (e.g. SaaS) Cloud Clients (e.g. Browsers, Mobiles, Devices)
Lock-in
W-Sunday, October 28, 12
User Want bare metal resources Want high level tools to create my own services Want ready to go services
Web applications Utility computing
W-Sunday, October 28, 12
W-Sunday, October 28, 12
W-Sunday, October 28, 12
Fifth International Conference on Cloud Computing (see in supplement reading)
W-Sunday, October 28, 12
intensive problems on un-trusted machines..
such as homomorphic encryption ---See results
W-Sunday, October 28, 12
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 (a) 1 1 1 1 1 1 1 1 1 1 (b) 1 1 1 1 1 1 1 1 1 1 1 1 (c) 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 (d) 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 ` 1 ` 2 ` 3 ` 4 ` 5 ` 7 ` 6 ` 8 (e) 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 ` 1 ` 2 ` 3 ` 4 ` 5 ` 7 ` 6 ` 8 (f)
W-Sunday, October 28, 12
Initialization (Client) Initialization (Client) Replication (All Nodes) Replication (All Nodes) Recruitment (All Nodes) Discovery (All Nodes) Discovery (All Nodes) Solution (Client)
Figure 4. Overview of sTile algorithms.
W-Sunday, October 28, 12
intermediate
knowledge of the input
W-Sunday, October 28, 12
Prob. # of Nodes Delay Execution Time Mahjong A 11 Private Cluster 20.1 sec. HPCC 19.3 sec. PlanetLab 18.5 sec. B 11 Private Cluster 41.6 min. HPCC 41.2 min. PlanetLab 43.9 min. Simjong D 1,000,000 0ms 65 min. 10ms 57 min. 100ms 64 min. 500ms 60 min. Gaussian 68 min. Distance-based 59 min.
Figure 7. The effect of network delay on system execution time.
W-Sunday, October 28, 12
folding problem to cloud without sharing amino acid sequence private data
W-Sunday, October 28, 12
W-Sunday, October 28, 12
18
W-Sunday, October 28, 12