jagomart
digital resources
picture1_Cloud Computing Ppt 82688 | Younsun


 200x       Filetype PPTX       File size 1.01 MB       Source: www.cs.purdue.edu


File: Cloud Computing Ppt 82688 | Younsun
what we are going to do today a high level discussion of the fundamental challenges and issues of cloud computing security and privacy it is impossible to consider all issues ...

icon picture PPTX Filetype Power Point PPTX | Posted on 10 Sep 2022 | 3 years ago
Partial capture of text on file.
                    What we are going to do today
     • A high-level discussion of the fundamental challenges and issues of 
       cloud computing security and privacy
     • It is impossible to consider all issues today
     • The goal is to give you a big picture rather than focus on a particular 
       topic or a paper
     • Note that some of these slides, especially part I, re-used/modified some 
       slides in the Internet (References are in the last slides)
                                                                 2
                            Part1: Introduction
     •  Why do you still hesitate to use cloud computing?
     •  Threat Model
                                                                      3
                       Cloud services delivery model
    While cloud-based software services are maturing,
    Cloud platform and infrastructure offering are still in their early stages !
                                                                     4
       Impact of cloud computing on the governance structure of IT 
                               organizations
                                                                    5
                      If cloud computing is so great, 
                       why aren’t everyone doing it?
     •  The cloud acts as a big black box, nothing inside the cloud is visible to 
        the clients
     •  Clients have no idea or control over what happens inside a cloud
     •  Even if the cloud provider is honest, it can have malicious system 
        admins who can tamper with the VMs and violate confidentiality and 
        integrity
     •  Clouds are still subject to traditional data confidentiality, integrity, 
        availability, and privacy issues, plus some additional attacks
                                                                       6
The words contained in this file might help you see if this file matches what you are looking for:

...What we are going to do today a high level discussion of the fundamental challenges and issues cloud computing security privacy it is impossible consider all goal give you big picture rather than focus on particular topic or paper note that some these slides especially part i re used modified in internet references last introduction why still hesitate use threat model services delivery while based software maturing platform infrastructure offering their early stages impact governance structure organizations if so great aren t everyone doing acts as black box nothing inside visible clients have no idea control over happens even provider honest can malicious system admins who tamper with vms violate confidentiality integrity clouds subject traditional data availability plus additional attacks...

no reviews yet
Please Login to review.