Providing Insight Into the Cloud Computing Security, Privacy and Related Threats

Cloud Security Journal

Subscribe to Cloud Security Journal : eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Cloud Security Journal : homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Cloud Security Journal
Load balancing and application delivery is almost always associated with scaling out interactive, web-based applications. Rarely does anyone think about load balancing and application delivery in batch processing systems even when those systems might be critical to the business they ar...
In the run of a day I get a lot of calls from hosting companies and data centers looking to roll out public cloud infrastructures using Enomaly ECP. In these discussions there are a few questions that everyone seems to ask.
When it comes to defining Cloud Computing I typically take the stance of "I know it when I see it". Although I'm half joking, being able to spot an Internet centric platform or infrastructure is fairly self evident for the most part. But when it comes to an "OpenCloud API" things get a...
Lately I've been really intrigued by the PubSubHubbub protocol (PuSH) and its potential use as an intercloud communication protocol for monitoring and auto scaling your external cloud or internal infrastructure (or both). For those of you not familiar with PuSH, it is a simple, open...
Isolation of resources in “the cloud” is moving providers toward hosted data centers and away from shared resource computing. Do we need to go back to the future and re-examine mainframe computing as a better model for isolated applications capable of sharing resources?  James Urquha...
In this post I will walk you through the high level of securing a normal tiered application running on EC2. First I will cover the basics of what EC2 provides and then briefly discuss how this can be used in a real life scenario. For Network security EC2 provides a security groups, s...
Lately I've been really intrigued by the PubSubHubbub protocol (PuSH) and its potential use as an intercloud communication protocol for monitoring and auto scaling your external cloud or internal infrastructure (or both).
As enterprise interest in cloud computing offerings and concepts continues to increase, the number of solutions in both the public and private cloud spaces increases as well. Theres been much debate over public versus private cloud, even to the point of debating whether there can be su...
With the announcement today that Adobe is acquiring Omniture, one of the largest web analytics firms -- something occurred to me. This is probably obvious to most, but the move to cloud based services has some pretty big potential ramifications when it comes to privacy and risks in unk...
I decided to build upon (or steal, however you see it) the idea with ‘26 Short Topics about Security.’ Yes, I’m a Simpsons fan (22 Short Films About Springfield) and got some inspiration. This blog series is actually an altered version of a presentation I did a few months back that I...
Last night Amazon announced the most significant cloud development of 2009 – the Amazon Virtual Private Cloud (VPC). The AWS Developer Blog version is here.  The importance of VPC cannot be overstated.  It will literally change how enterprises think about public cloud providers a...
Today RightScale did a webinar on their Cloud Business Intelligence offering with Talend, Jaspersoft and Vertica. One of the bigger objections to cloud BI in the past has been security — how can I move all of this mission critical data to a public insecure cloud? With Amazon VPC no...
I'm still digging through a backlog of news & links sent to me during from my vacation. One of which is an interesting new project announced a couple weeks ago called CloudLoop. The project is described as a universal, open-source Java API and command-line tool for cloud storage, which...
Last week a new Open vSwitch project was launched with little fan fare and even less insight into who is behind the project. The project aims to create a multilayer virtual switch licensed under the open source Apache 2 license. At first glance the project looks very promising as the b...
Lots of discussion recently on the the topic of Cloud standards and a potential Cloud standards war emerging. Thought I'd give you a quick run down.In an article written by Tom Nolle for Internet Evolution he asks if Multiple Standards Could Spoil Cloud Computing. In the post he says "...
Earlier today, Red Hat announced a new DeltaCloud Interoperability API Framework with the goal of enabling an ecosystem of developers, tools, scripts, and applications which can interoperate across the public and private clouds. The open source project is built using Ruby as described ...
Yesterday, Red Hat announced a new DeltaCloud Interoperability API Framework with the goal of enabling an ecosystem of developers, tools, scripts, and applications which can interoperate across the public and private clouds. The open source project is built using Ruby as described as a...
A fundamental challenge in creating and managing a globally decentralized cloud computing environment is that of maintaining consistent connectivity between various untrusted components that are capable of self-organization while remaining fault tolerant. In the next few years the a ke...
Recently there has been a lot of talk about private clouds, public clouds and inter clouds and the problem in attempting to define their key attributes. The problem facing all the various cloud terms is the apparent lack of quantifiable characteristics. In contrast most other areas of ...
Recently there has been a lot of talk about private clouds, public clouds and inter clouds and the problem in attempting to define their key attributes. The problem facing all the various cloud terms is the apparent lack of quantifiable characteristics. In contrast most other areas of ...
Over the last few months, I have had a number of postings that have talked about security enhanced virtual machine images that we have made available on Amazon Web Services. The goal behind this work was to look at how we could improve baseline security in both virtualized and Cloud Co...
Why would miscreants bother with other routes when they can go straight to the source? People concerned with security of the cloud are generally worried about illegitimate access of the applications and data they may deploy in the cloud. That’s a valid concern given the needs of c...
Mention cloud computing to a business hack and you’re more likely to be given a restraining order than an interview. “Not cloud computing,” they’ll groan. “But while you’re on the phone, does your client have a life-threatening illness and live in the North-West?” Or something like...
Secure, optimized tunnels to a remote site, e.g. the cloud. Haven’t we been here before? In the continuing discussion around Business Intelligence in the cloud comes a more better (yes I did, in fact, say that) discussion of the reasons why you’d want to put BI in the cloud and, appr...
National Institute of Standards and Technology, (NIST) Information Technology Laboratory has published an updated version of their Working Definition of Cloud Computing.Draft NIST Working Definition of Cloud Computing v15 Original Doc is availabl...
Over the last week I have been away on vacation so I've missed some recent debates among the clouderati. I'm home today before I leave for Europe tomorrow, before I leave I wanted to comment on these debates. In particular the one that started because of Appirio’s corporate blog post “...
If you’ve got a SAN, that’s going to mean training. If you have a ton of NAS’s, then it’s going to mean a headache for whomever is responsible. This is the part where I plug File Virtualization products like our ARX, which can aggregate security policy on your many NAS boxes into one c...
Amazon Web Services has announced a new AWS Import/Export feature. A potentially huge step forward for data portabilty when using the Amazon Cloud computing infrastructure.In a recent post by AWS Evangelist, Jeff Barr outlined the new functionality stating that "using a workflow simila...
I wanted to do a quick post before I take off for the next couple weeks. I'll be at my cottage next week and in Venice Italy the following week speaking at a private business summit at a monastery in the heart of the city. Rough life, I know. As part of this gig they even agreed to fly...
Chet Kapoor, CEO of Sonoa System used a very interesting analogy in a recent blog post. In the post he referrers to an article on wsj.com which argues that as the pace of change accelerates, trust becomes vital currency and we need rethink how we address technology.Kapoor draws paral...
For some the biggest buzz word so far in 2009 is “cloud”, for Cisco it’s “unified”. Today Cisco announced a new server centric strategy which is underpinned by the use of a “unified computing” methodology. This new unified approach to computing represents a radical shift in how we as a...
Which would you rather have? A compute job that gets done over a 12 hour period on a Supercomputer with the catch that you need to wait 7 days until the job actually runs? Or a job that runs over a 60 hour period on a lower performance public cloud infrastructure that can start immedia...
Recently I have been thinking a lot of about the concept of singularity in relation to cloud computing. Some in the industry have been pondering that the so called technological singularity is close and quite possibly being accelerated by the rise of internet centric computing (i.e. cl...
This is an incomplete thought, but I thought I'd take a moment to describe it a bit. In a recent article on Forbes a group of security researchers have brought to light one of the stranger problems that could potentially undermine cloud computing's cyber / cloud security, apparently it...
I just had an epiphany in my never ending quest to answer one of life most delicate questions -- "what the heck is cloud computing?" My sudden realization comes in the form of a grand unified theory for the term cloud computing. It's elegance is in it's simplicity ;)Cloud Computing is...
I admit it, it's taken me a while to come around to the term inter-cloud, a concept being primarily promoted by Cisco as part of their Unified Computing platform. Lately the term seems to have been picking up some steam so I thought I'd take a moment to examine it a bit further.My inte...
Over the last week I've been away at my cottage on vacation so I'm trying to catch up on my massive backlog of emails (about 5k worth). One of the more interesting was one sent earlier in the week from Masayuki Hyugaji in Japan. (I have a call with Hyugaji later this week, so I should...
Researcher has solved a thorny mathematical problem that has confounded scientists since the invention of public-key encryption several decades ago. The breakthrough, called "privacy homomorphism," or "fully homomorphic encryption," makes possible the deep and unlimited analysis of enc...
I was just reading a few articles about a series of new cyber attacks on several US government websites. According to an article by the AP, "a widespread and unusually resilient computer attack that began July 4 knocked out the Web sites of several government agencies, including some ...
I had another random thought, it might be crazy, but I thought I'd share it. I think I may have been completely wrong in describing cloud computing as a metaphor or analogy, or more simply as Internet centric infrastructure.