Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cloud security (Security Challenges (Multitenancy (multiple instances on…
Cloud security
Security Challenges
Data on cloud is attractive cos of low cost but doesn't guarantee data integrity and availability (Ren et al)
-
-
Confidentiality of data
People can encrypt data to ensure confidentiality even when the give the data to the cloud but this is difficult as encrypted data can make keyword searches or query over dbs difficult (Ren et al)
-
Metering
Users can't directly connect their resource consumption to their charges eg. "Although hardware virtualisation lets multiple users run tasks on the same infrastructure without explicitly interfering with each other, many shared resources such as memory, I/O and network bandwidth can't be perfectly isolated" (Ren et al)
-
Computation and data results revealed to the commercial public cloud which is problematic if the computation involves sensitive info like financial records and health info + Operational details aren't transparent to users to could return incorrect results to cover up failures, attacks or bugs for eg (Ren et al)
Need a mechanism that ensures protects sensitive workload and returns correct results + the mechanism needs to be secure and able to deal with complexity to perform at scale -> Fully Homomorphic Encryption (FHE) breakthrough but very complex so can't be use in practice yet (Ren et al)
-
-
Trustworthiness
Computation and data results revealed to the commercial public cloud which is problematic if the computation involves sensitive info like financial records and health info + Operational details aren't transparent to users to could return incorrect results to cover up failures, attacks or bugs for eg (Ren et al)
Need a mechanism that ensures protects sensitive workload and returns correct results + the mechanism needs to be secure and able to deal with complexity to perform at scale -> Fully Homomorphic Encryption (FHE) breakthrough but very complex so can't be use in practice yet (Ren et al)
Users can't directly connect their resource consumption to their charges eg. "Although hardware virtualisation lets multiple users run tasks on the same infrastructure without explicitly interfering with each other, many shared resources such as memory, I/O and network bandwidth can't be perfectly isolated" (Ren et al)
-