PPT-Trusted End Host Monitors for Securing Cloud Datacenters

Author : briana-ranney | Published Date : 2016-06-02

Alan Shieh Srikanth Kandula Albert Greenberg Cloud workload is dynamic and hostile Traditional datacenters Infrastructure supports small of internal clients

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Trusted End Host Monitors for Securing C..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Trusted End Host Monitors for Securing Cloud Datacenters: Transcript


Alan Shieh Srikanth Kandula Albert Greenberg Cloud workload is dynamic and hostile Traditional datacenters Infrastructure supports small of internal clients Software and topology change . Attestation. Dane Brandon, . Hardeep. . Uppal. CSE551. University of Washington. Overview. Motivation. Trusted Computing and Trusted Platform Modules (TPM). Trusted Software Stacks. Attestation. Measurements. Outline. Virtualization. Cloud Computing. Microsoft Azure Platform. Multi-tier Architecture. Deployment – Azure, Amazon EC2, . UAkron. CS VMs. Virtualization. Virtualization. Multiple virtual servers run on a host hardware (a server, a server farm or a data center).. Slide . 1. Google Datacenter. CS 142 Lecture Notes: Datacenters. Slide . 2. Datacenter Organization. Rack:. 50 machines. DRAM: . 800-3200GB . @ 300 . µs. Disk: 100TB @ 10ms. Single server:. 8-24 . cores. Slide . 1. Google Datacenter. CS 142 Lecture Notes: Datacenters. Slide . 2. Datacenter Organization. Rack:. 50 machines. DRAM: 800-3200GB @ 300 . µs. Disk: 100TB @ 10ms. Single server:. 8-24 cores. DRAM: 16-64GB @ 100ns. Untrusted. Cloud. Andrew Baumann, Marcus . Peinado. , and Galen Hunt. OSDI 2014.. Fall 2014. Presenter: Kun Sun, Ph.D.. Most slides are borrowed from . https://www.usenix.org/sites/default/files/conference/protected-files/osdi14_slides_baumann.pdf. Software Defined Networks. Mooly. . Sagiv. msagiv@acm.org. 03-640-7606. Tel Aviv University. Thursday . 16-18 (Physics . 105). Monday 14-16 . Schrieber. 317. Adviser: Michael . Shapira. Hebrew University. Mooly. . Sagiv. msagiv@acm.org. 03-640-7606. Tel Aviv University. Thursday . 16-18 (Physics . 105). Monday 14-16 . Schrieber. 317. Adviser: Michael . Shapira. Hebrew University. http://www.cs.tau.ac.il/~msagiv/courses/rsdn.html. Agenda. Introduction. The history of The Cloud. How virtualization allows for Cloud computing. The Cloud Security Exposures. Data in Transit from the Mainframe to the Cloud. Management of Users and Identity provisioning. Agenda. Introduction. The history of The Cloud. How virtualization allows for Cloud computing. The Cloud Security Exposures. Data in Transit from the Mainframe to the Cloud. Management of Users and Identity provisioning. Slide . 1. Google Datacenter. CS 142 Lecture Notes: Datacenters. Slide . 2. Datacenter Organization. Rack:. 50 machines. DRAM: 200-800GB @ 300 . µs. Disk: 100TB @ 10ms. Single server:. 4-8 cores. DRAM: 4-16GB @ 100ns. Take a free online course. .. http://www.microsoftvirtualacademy.com. . Microsoft Virtual Academy. Module 4. Security Improvements. Evolving security threats. Rising number of organizations suffer from breaches. Payman. . Mohassel. Yahoo Labs. 1. Do We Have the Same Person. in Mind?. Alice. Bob. Jack. . Joe. o. nly reveal . Yes/No. Solutions?. You have access to a trusted computer. You can use an airline reservation service. Effortless hybrid connectivity. Tuned for exceptional performance. Fast time-to-value with cloud flexibility. Meet your toughest demands with virtual machines optimized by the team that built SQL Server. Nuno Santos. 1. , Rodrigo Rodrigues. 2. , Krishna P. Gummadi. 1. , Stefan Saroiu. 3. MPI-SWS. 1. , . CITI / . Universidade. Nova Lisboa. 2. ,. . Microsoft Research. 3 . Managing the Cloud is Complex & Error-Prone.

Download Document

Here is the link to download the presentation.
"Trusted End Host Monitors for Securing Cloud Datacenters"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents