SlideShare una empresa de Scribd logo
1 de 15
PUBLICCLOUD IN
BUSINESS:SECURITY
ISSUES
Student name:Vy QuocTran
ID: 11035624
Security issues
Solutions
approach for
Business
Security issues
PublicCloud
Overview
Security issues
PublicCloud
Overview
Security issues
 In 2013, Kris Jamsa suggested two types
of threats in Public Cloud:
Common threats
Specific threats
Security issues
Common
threats
 Human error
Social engineering
Espionage
Trespass
Sabotage
Identity theft
Software attack
…
Security issues
8Specific
threats
 Information security
Multitenant risk
Audit
Multi-countries data storage
location
Jurisdiction policy
Service-level agreement
Data lock-in andTransfer
Data ownership
Solution
approach for
business
Infrastructure as a Service
IaaS
Platform as a Service
PaaS
Software as a Service
SaaS
Application user user user Provider
Operation
System/
Middleware
user user Provider Provider
Infrastructure user Provider Provider Provider
figure 1. Cloud Computing: Responsibility Boundary between User and Provider
Private Cloud/
Traditional data
centre
Public Cloud Computing Services
Solution
approach for
business
3steps to develop a security plan for the using
of public cloud:
1.Decide what cloud service will be
use
2.Develop a Security Control
System
3.Identify Security Risk and Risk
Management
Decide what
cloud service
will be use
Security
Control
System
Risk
Management
Conclusion
Reference
 Dennis McCafferty (2010) “Cloudy Skies: Public versus Private option still up in the
air”, Baseline.
 Hofmann, P. &Woods, D. (2010), "Cloud Computing:The Limits of Public Clouds for
Business Applications", IEEE InternetComputing, vol. 14, no. 6, pp. 90-93.
 Jangwal,T. & Singh, S. (2012), "Cost breakdown of Public CloudComputing and
Private Cloud Computing and Security Issues", InternationalJournal of Computer
Science & InformationTechnology, vol. 4, pp. 17-31.
 Jared Carstensen, JP Morgenthal & Bernard Golden (2012), “CloudComputing:
Assessing the risks”, IT Governance Publishing.
 Kris Jamsa (2013), “CloudComputing: SaaS, PaaS, IaaS,Virtualization, Business
Models, Mobile, Security, and More”, Jones & Bartlett Learning.
 Malcolm, D. & Giunta, S. (2010), Cloud: Public or Private?, NetworkWorld Inc,
Southborough.
 Michael Armbrust et al. (2009), “Above theClouds: A BerkeleyView of Cloud
Computing”, Electrical Engineering and Computer Sciences, University of California,
Berkeley.
 R. Kelly Rainer & Casey G. Cegielski (2013), “Introduction to Information Systems:
International StudentVersion”, 4th Ed, JohnWiley & Sons Singapore Pte. Ltd.
 Ren, K.,Wang, C. &Wang, Q. (2012), "Security Challenges for the Public Cloud", IEEE
InternetComputing, vol. 16, no. 1, pp. 69-73.
 Simson L, Garfinkel (2011), “A Cloud over Ownership”, Technology Review.
 Zhang, H.,Ye, L., Du, X. & Guizani, M. (2013), "Protecting private cloud located within
public cloud", IEEE, , pp. 677.
Questions

Más contenido relacionado

La actualidad más candente

Rethinking Multi-Agent Systems for the World-Wide Web
Rethinking Multi-Agent Systems for the World-Wide WebRethinking Multi-Agent Systems for the World-Wide Web
Rethinking Multi-Agent Systems for the World-Wide WebAndrei Ciortea
 
3 rd International Conference on Cloud, Big Data and Web Services (CBW 2022)
3 rd International Conference on Cloud, Big Data and Web Services (CBW 2022)3 rd International Conference on Cloud, Big Data and Web Services (CBW 2022)
3 rd International Conference on Cloud, Big Data and Web Services (CBW 2022)ijait
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
Cfp ijccsa pdf
Cfp ijccsa pdfCfp ijccsa pdf
Cfp ijccsa pdfijccsa
 
Are Cloud Applications and Data more Vulnerable to Attacks?
Are Cloud Applications and Data more Vulnerable to Attacks?Are Cloud Applications and Data more Vulnerable to Attacks?
Are Cloud Applications and Data more Vulnerable to Attacks?Sonia Usih, PMP, MCPM, BSc.
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)ijwscjournal
 
Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityJohn Rhoton
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...IJNSA Journal
 
Microsoft Cloud Computing
Microsoft Cloud ComputingMicrosoft Cloud Computing
Microsoft Cloud ComputingDavid Chou
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 International Journal on Cloud Computing: Services and Architecture (IJCCSA) International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
10th International Conference on Cloud Computing: Services and Architecture (...
10th International Conference on Cloud Computing: Services and Architecture (...10th International Conference on Cloud Computing: Services and Architecture (...
10th International Conference on Cloud Computing: Services and Architecture (...acijjournal
 

La actualidad más candente (18)

Rethinking Multi-Agent Systems for the World-Wide Web
Rethinking Multi-Agent Systems for the World-Wide WebRethinking Multi-Agent Systems for the World-Wide Web
Rethinking Multi-Agent Systems for the World-Wide Web
 
3 rd International Conference on Cloud, Big Data and Web Services (CBW 2022)
3 rd International Conference on Cloud, Big Data and Web Services (CBW 2022)3 rd International Conference on Cloud, Big Data and Web Services (CBW 2022)
3 rd International Conference on Cloud, Big Data and Web Services (CBW 2022)
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Cfp ijccsa pdf
Cfp ijccsa pdfCfp ijccsa pdf
Cfp ijccsa pdf
 
Are Cloud Applications and Data more Vulnerable to Attacks?
Are Cloud Applications and Data more Vulnerable to Attacks?Are Cloud Applications and Data more Vulnerable to Attacks?
Are Cloud Applications and Data more Vulnerable to Attacks?
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
 
Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Hakfest2015-Tunisia
Hakfest2015-TunisiaHakfest2015-Tunisia
Hakfest2015-Tunisia
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...Call for Papers - International Conference on Big Data, Blockchain and Securi...
Call for Papers - International Conference on Big Data, Blockchain and Securi...
 
Microsoft Cloud Computing
Microsoft Cloud ComputingMicrosoft Cloud Computing
Microsoft Cloud Computing
 
Slides 530 a2
Slides 530 a2Slides 530 a2
Slides 530 a2
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 International Journal on Cloud Computing: Services and Architecture (IJCCSA) International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
10th International Conference on Cloud Computing: Services and Architecture (...
10th International Conference on Cloud Computing: Services and Architecture (...10th International Conference on Cloud Computing: Services and Architecture (...
10th International Conference on Cloud Computing: Services and Architecture (...
 

Similar a PUBLIC CLOUD IN BUSINESS

Cloud security: Risks and Rewards for New Entrants
Cloud security: Risks and Rewards for New EntrantsCloud security: Risks and Rewards for New Entrants
Cloud security: Risks and Rewards for New Entrantsirvinc
 
Cloud Security: Risks and Recommendations for New Entrants
Cloud Security: Risks and Recommendations for New EntrantsCloud Security: Risks and Recommendations for New Entrants
Cloud Security: Risks and Recommendations for New Entrantsirvinchoo
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxmichael591
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-Lillian Ekwosi-Egbulem
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyAIRCC Publishing Corporation
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...AIRCC Publishing Corporation
 
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research AIRCC Publishing Corporation
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing surveyIAESIJEECS
 
Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...AIRCC Publishing Corporation
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...AJASTJournal
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Associate Professor in VSB Coimbatore
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityJohn Paul Prassanna
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMHector Del Castillo, CPM, CPMM
 
New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...AIRCC Publishing Corporation
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...Claire Webber
 
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyAIRCC Publishing Corporation
 

Similar a PUBLIC CLOUD IN BUSINESS (20)

Cloud security: Risks and Rewards for New Entrants
Cloud security: Risks and Rewards for New EntrantsCloud security: Risks and Rewards for New Entrants
Cloud security: Risks and Rewards for New Entrants
 
Cloud Security: Risks and Recommendations for New Entrants
Cloud Security: Risks and Recommendations for New EntrantsCloud Security: Risks and Recommendations for New Entrants
Cloud Security: Risks and Recommendations for New Entrants
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information Technology
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
 
New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
 
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information Technology
 

PUBLIC CLOUD IN BUSINESS

  • 5. Security issues  In 2013, Kris Jamsa suggested two types of threats in Public Cloud: Common threats Specific threats
  • 6. Security issues Common threats  Human error Social engineering Espionage Trespass Sabotage Identity theft Software attack …
  • 7. Security issues 8Specific threats  Information security Multitenant risk Audit Multi-countries data storage location Jurisdiction policy Service-level agreement Data lock-in andTransfer Data ownership
  • 8. Solution approach for business Infrastructure as a Service IaaS Platform as a Service PaaS Software as a Service SaaS Application user user user Provider Operation System/ Middleware user user Provider Provider Infrastructure user Provider Provider Provider figure 1. Cloud Computing: Responsibility Boundary between User and Provider Private Cloud/ Traditional data centre Public Cloud Computing Services
  • 9. Solution approach for business 3steps to develop a security plan for the using of public cloud: 1.Decide what cloud service will be use 2.Develop a Security Control System 3.Identify Security Risk and Risk Management
  • 14. Reference  Dennis McCafferty (2010) “Cloudy Skies: Public versus Private option still up in the air”, Baseline.  Hofmann, P. &Woods, D. (2010), "Cloud Computing:The Limits of Public Clouds for Business Applications", IEEE InternetComputing, vol. 14, no. 6, pp. 90-93.  Jangwal,T. & Singh, S. (2012), "Cost breakdown of Public CloudComputing and Private Cloud Computing and Security Issues", InternationalJournal of Computer Science & InformationTechnology, vol. 4, pp. 17-31.  Jared Carstensen, JP Morgenthal & Bernard Golden (2012), “CloudComputing: Assessing the risks”, IT Governance Publishing.  Kris Jamsa (2013), “CloudComputing: SaaS, PaaS, IaaS,Virtualization, Business Models, Mobile, Security, and More”, Jones & Bartlett Learning.  Malcolm, D. & Giunta, S. (2010), Cloud: Public or Private?, NetworkWorld Inc, Southborough.  Michael Armbrust et al. (2009), “Above theClouds: A BerkeleyView of Cloud Computing”, Electrical Engineering and Computer Sciences, University of California, Berkeley.  R. Kelly Rainer & Casey G. Cegielski (2013), “Introduction to Information Systems: International StudentVersion”, 4th Ed, JohnWiley & Sons Singapore Pte. Ltd.  Ren, K.,Wang, C. &Wang, Q. (2012), "Security Challenges for the Public Cloud", IEEE InternetComputing, vol. 16, no. 1, pp. 69-73.  Simson L, Garfinkel (2011), “A Cloud over Ownership”, Technology Review.  Zhang, H.,Ye, L., Du, X. & Guizani, M. (2013), "Protecting private cloud located within public cloud", IEEE, , pp. 677.