SlideShare una empresa de Scribd logo
1 de 18
Cloud Computing Security and Privacy to gain Trust SMARTEVENT 2010 September 23 Sophia Antipolis Christian GOIRE
Cloud Computing Definition(s) 06/01/11 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The NIST Cloud Definition Framework 06/01/11 Deployment Models Service Models Essential Character-istics Common  Character-istics Homogeneity Massive Scale Resilient Computing Geographic Distribution Community Cloud Private Cloud Public Cloud Hybrid Clouds Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Resource Pooling Broad Network Access Rapid Elasticity Measured Service On Demand Self-Service Low Cost Software Virtualization Service Orientation Advanced Security
3 main  Services Models 06/01/11
Cloud Providers – A Birds Eye View 06/01/11 Infrastructure  as a Service Platform  as a Service Software  as a Service
Main aspects forming a cloud system 06/01/11
Expert group report (Excerpts) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11
Continued (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11
Continued (3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11
Research time line (in year) of the individual topics  06/01/11
Security and Privacy Challenges ,[object Object],[object Object],06/01/11
Technical risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11
Policy and organizational risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11
Legal risk ,[object Object],[object Object],[object Object],[object Object],06/01/11
Research recommendations ,[object Object],06/01/11
Research recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11
Legal recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],06/01/11

Más contenido relacionado

La actualidad más candente

ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)ATMOSPHERE .
 
Addressing and routing services
Addressing and routing servicesAddressing and routing services
Addressing and routing servicesmbasti2
 
2016 02-04-gingell-iot
2016 02-04-gingell-iot2016 02-04-gingell-iot
2016 02-04-gingell-iotgingell
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trustfcleary
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1fcleary
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloudPapitha Velumani
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword EU Project
 
Kaseya Connect 2013: Kaseya Keynote
Kaseya Connect 2013: Kaseya KeynoteKaseya Connect 2013: Kaseya Keynote
Kaseya Connect 2013: Kaseya KeynoteKaseya
 
Design and operation of secure cyber physical systems
Design and operation of secure cyber physical systemsDesign and operation of secure cyber physical systems
Design and operation of secure cyber physical systemsI3E Technologies
 
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud SystemsICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud SystemsHong-Linh Truong
 
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018sang yoo
 
Cloud Solutions Collateral
Cloud Solutions CollateralCloud Solutions Collateral
Cloud Solutions CollateralSteve Clem
 
Cloud computing
Cloud computingCloud computing
Cloud computingInfosys
 

La actualidad más candente (20)

ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
 
Addressing and routing services
Addressing and routing servicesAddressing and routing services
Addressing and routing services
 
2016 02-04-gingell-iot
2016 02-04-gingell-iot2016 02-04-gingell-iot
2016 02-04-gingell-iot
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CSA v4 Topology
CSA v4 TopologyCSA v4 Topology
CSA v4 Topology
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges
 
Kaseya Connect 2013: Kaseya Keynote
Kaseya Connect 2013: Kaseya KeynoteKaseya Connect 2013: Kaseya Keynote
Kaseya Connect 2013: Kaseya Keynote
 
Cloud security
Cloud securityCloud security
Cloud security
 
eChallenges_e2011_JS
eChallenges_e2011_JSeChallenges_e2011_JS
eChallenges_e2011_JS
 
Design and operation of secure cyber physical systems
Design and operation of secure cyber physical systemsDesign and operation of secure cyber physical systems
Design and operation of secure cyber physical systems
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud SystemsICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
 
6
66
6
 
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
 
Cloud Solutions Collateral
Cloud Solutions CollateralCloud Solutions Collateral
Cloud Solutions Collateral
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Destacado

Supporting clinicians and helping to feed the beast
Supporting clinicians and helping to feed the beastSupporting clinicians and helping to feed the beast
Supporting clinicians and helping to feed the beastthorley1
 
Cloud congress 2012_herbert_wanner_cisco_v3
Cloud congress 2012_herbert_wanner_cisco_v3Cloud congress 2012_herbert_wanner_cisco_v3
Cloud congress 2012_herbert_wanner_cisco_v3Herbert Wanner
 
Assistive technology webquest
Assistive technology webquestAssistive technology webquest
Assistive technology webquestLana1522
 
Using web technologies for the lactation professional
Using web technologies for the lactation professionalUsing web technologies for the lactation professional
Using web technologies for the lactation professionalDenise Breheny
 
pengenalan Tapak Suci
pengenalan Tapak Sucipengenalan Tapak Suci
pengenalan Tapak Sucifarhan89
 

Destacado (7)

EduFester
EduFester EduFester
EduFester
 
Supporting clinicians and helping to feed the beast
Supporting clinicians and helping to feed the beastSupporting clinicians and helping to feed the beast
Supporting clinicians and helping to feed the beast
 
Cloud congress 2012_herbert_wanner_cisco_v3
Cloud congress 2012_herbert_wanner_cisco_v3Cloud congress 2012_herbert_wanner_cisco_v3
Cloud congress 2012_herbert_wanner_cisco_v3
 
Assistive technology webquest
Assistive technology webquestAssistive technology webquest
Assistive technology webquest
 
Using web technologies for the lactation professional
Using web technologies for the lactation professionalUsing web technologies for the lactation professional
Using web technologies for the lactation professional
 
LIBROS
LIBROSLIBROS
LIBROS
 
pengenalan Tapak Suci
pengenalan Tapak Sucipengenalan Tapak Suci
pengenalan Tapak Suci
 

Similar a Cloud computing security and privacy christian goire

Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Bill Annibell
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26TT L
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYEditor Jacotech
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
Exploring Cloud Computing Technologies For GIS (Location Based) Applications
Exploring Cloud Computing Technologies For GIS (Location Based) ApplicationsExploring Cloud Computing Technologies For GIS (Location Based) Applications
Exploring Cloud Computing Technologies For GIS (Location Based) ApplicationsChristopher Blough
 
Software Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing PresentationSoftware Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing Presentationddcarr
 
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedingsSTO STRATEGY
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 
Cloud Computing - A Primer
Cloud Computing - A PrimerCloud Computing - A Primer
Cloud Computing - A Primerbrownmestizo
 
Ahearn Cloud Presentation
Ahearn Cloud PresentationAhearn Cloud Presentation
Ahearn Cloud Presentationjohnjamesahearn
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfinfosec train
 
08 message and_queues_dieter_gawlick
08 message and_queues_dieter_gawlick08 message and_queues_dieter_gawlick
08 message and_queues_dieter_gawlickashish61_scs
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
 

Similar a Cloud computing security and privacy christian goire (20)

Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Exploring Cloud Computing Technologies For GIS (Location Based) Applications
Exploring Cloud Computing Technologies For GIS (Location Based) ApplicationsExploring Cloud Computing Technologies For GIS (Location Based) Applications
Exploring Cloud Computing Technologies For GIS (Location Based) Applications
 
Software Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing PresentationSoftware Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing Presentation
 
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
Cloud Computing - A Primer
Cloud Computing - A PrimerCloud Computing - A Primer
Cloud Computing - A Primer
 
Ahearn Cloud Presentation
Ahearn Cloud PresentationAhearn Cloud Presentation
Ahearn Cloud Presentation
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
08 message and_queues_dieter_gawlick
08 message and_queues_dieter_gawlick08 message and_queues_dieter_gawlick
08 message and_queues_dieter_gawlick
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
cloud
cloudcloud
cloud
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 

Cloud computing security and privacy christian goire

  • 1. Cloud Computing Security and Privacy to gain Trust SMARTEVENT 2010 September 23 Sophia Antipolis Christian GOIRE
  • 2.
  • 3. The NIST Cloud Definition Framework 06/01/11 Deployment Models Service Models Essential Character-istics Common Character-istics Homogeneity Massive Scale Resilient Computing Geographic Distribution Community Cloud Private Cloud Public Cloud Hybrid Clouds Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Resource Pooling Broad Network Access Rapid Elasticity Measured Service On Demand Self-Service Low Cost Software Virtualization Service Orientation Advanced Security
  • 4. 3 main Services Models 06/01/11
  • 5. Cloud Providers – A Birds Eye View 06/01/11 Infrastructure as a Service Platform as a Service Software as a Service
  • 6. Main aspects forming a cloud system 06/01/11
  • 7.
  • 8.
  • 9.
  • 10. Research time line (in year) of the individual topics 06/01/11
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.