Security in Cloud Computing Not So Different from Security in Telco

By Leslie Guth for SCOPE Alliance

January 4, 2011

During a recent “Cloud Computing in Telecom” SCOPE workshop, presenters and attendees expressed considerable interest in cloud security. Presenter Rao Vasireddy of Alcatel-Lucent, who advocated using “secure by design” principles to secure the cloud, talked to Leslie Guth from SCOPE about his presentation.

LG: What specifically causes concern in cloud security for users and service providers?

RV: According to recent industry research, 72% of organizations are “extremely concerned” or “very concerned” about security in the cloud environment (2010 research firm TheInfoPro). Concerns range from phishing and data loss and recovery to regulatory compliance and everywhere in between.

LG: What are the security concerns when deploying a Telecom application in the cloud?
 
RV: It is often believed that security in cloud computing is completely different than security in a traditional Telco environment. But this is not necessarily true. Many security issues are the same for cloud computing as for traditional IT technologies (e.g. phishing, data loss).

LG: Could you give us a few examples of cloud computing security issues?

RV: Sure. Cloud computing security issues include shared technology vulnerabilities, data loss or leakage, malicious insiders, hijack traffic, insecure API, nefarious use of service or abuse cases and unknown risk profiles. These all pose serious threats to secure cloud computing.

LG: What security concerns are specific to the telecom environment?

RV:  Security concerns in a telecom environment range from secure management, control, and user data/sessions to secure infrastructure, services, and applications. Secure IT, operations and development along with compliance and security by design are also specific to the telecom environment.

LG: You mentioned securing the cloud can be done in much the same way that traditional Telco environments are secured. Could you elaborate on this?

RV: The complex issues of security in a cloud environment need to be simplified with an objective to establish a security baseline by leveraging current practices, standards and well-known security attributes as metrics. For example, key security attributes include access control, authentication/authorization, data confidentiality, privacy, data integrity, data confidentiality and non-repudiation. These metrics can be analyzed to determine where shortcomings or security gaps exist and how countermeasures can be applied.

The “secure by design” process has been useful in the development and maintenance of Telco equipment and solutions. The process has a proven track record in the development and operations of telecom and enterprise solutions. It can be used and adapted by leveraging cloud computing security standards and best practices and lessons learned in the telecom space, for example, leveraging practices such as implementing hardening access privileges.

LG: What are some of the specific attributes of the “secure by design” process that are important to note? 

RV: The “secure by design” process removes or reduces the risk opportunity, sets the perimeter wherever you choose, creates resilience, creates transparency in security, makes access control context-sensitive, certifies the systems and meets compliance regulations.

As an addition, telecom can also leverage traditional cloud computing configurations such as Software as a Service (SaaS), which delivers online services providing traditional and custom on-demand applications; Platforms as a Service (PaaS), an open development platform that allows application developers to build or modify SW for faster and cheaper TTM; and Infrastructure as a Service (IaaS) which facilitates the sell transport, CDN, computing resources on a pay-per-use basis.

LG: What particular aspects of telecom synergy could be leveraged?

RV: Peering, settlement, SLA’s, customer support, multi-vender interoperability, global footprint and mobility can all be leveraged.

LG: Why would the telecom industry want to enter the cloud market and how can “security by design” mitigate the risks?

RV: The telecom industry has new challenges and opportunities. Cloud computing is a new opportunity for telecom, while creating security in this environment is a new challenge.

The need for security in the cloud environment is strong due to an increased need for regulatory compliance, a need to provide a guarantee of security and privacy to protect sensitive corporate data and consumer privacy, and a need to offer a reliable, available service.

“Security by design” is attractive because standards and compliance are built in. Standards enable organizations to build security programs in a consistent and effective manner. “Security by design” standards allow for strong information security organization, unambiguous and up-to-date security policies and awareness, identification of critical assets and risk management, an adaptable information security architecture, security that is integrated in all phases of the product lifecycle, a testable business continuity program, and standards-based security programs.

“Security by design” allows the creation of resilience and transparency and it allows for secure assets, data, and users, anytime, anywhere.

LG: What steps should be taken before employing telecom security standards in cloud computing?

RV: First, it is important to identify potential impacts on standards development and priorities for standards needed to promote and facilitate cloud computing. Also, it is essential to investigate future study items and related actions for fixed and mobile networks and analyze how interoperability can be explored in cloud computing.

Potential impacts on standards development need to be identified. These may include NGN including mobile and overlaying platforms; transport layer technologies; terminals and application aspects over broadband networks; ICT and climate change; management and control including signaling; interface of networks and interoperability; quality of service and security; and distributed media-rich processing and intelligent media coding.

LG: How would you summarize the connection between telecom and security technologies?

RV: In short, telecom and security technologies have a symbiotic relationship. Telecom has a proven track record of security, scalability, reliability, operations, and customer trust. “Security by design” is key to telecom and cloud security. Synergy between cloud and telecom security is driven by common customer and business issues as well as technology and standards. 

Thanks to Rao Vasireddy of Alcatel-Lucent for participating in this interview.

SCOPE Alliance’s recent “Cloud Computing in Telecom” workshop was an important step toward what will be an ongoing security in cloud computing in telecom discussion. We look forward to continuing this discussion as we explore the opportunities that cloud computing can offer users and service providers. We invite those who are interested in this topic to visit the SCOPE website at www.scope-alliance.org and let us know your specific area of interest to help further this discussion.

SCOPE Alliance will be publishing a white paper on this topic in 2011.
 

Subscribe to HPCwire's Weekly Update!

Be the most informed person in the room! Stay ahead of the tech trends with industy updates delivered to you every week!

AI in the News: Rao in at Intel, Ng out at Baidu, Nvidia on at Tencent Cloud

March 26, 2017

Just as AI has become the leitmotif of the advanced scale computing market, infusing much of the conversation about HPC in commercial and industrial spheres, it also is impacting high-level management changes in the industry. Read more…

By Doug Black

Scalable Informatics Ceases Operations

March 23, 2017

On the same day we reported on the uncertain future for HPC compiler company PathScale, we are sad to learn that another HPC vendor, Scalable Informatics, is closing its doors. Read more…

By Tiffany Trader

‘Strategies in Biomedical Data Science’ Advances IT-Research Synergies

March 23, 2017

“Strategies in Biomedical Data Science: Driving Force for Innovation” by Jay A. Etchings is both an introductory text and a field guide for anyone working with biomedical data. Read more…

By Tiffany Trader

HPC Compiler Company PathScale Seeks Life Raft

March 23, 2017

HPCwire has learned that HPC compiler company PathScale has fallen on difficult times and is asking the community for help or actively seeking a buyer for its assets. Read more…

By Tiffany Trader

HPE Extreme Performance Solutions

HFT Firms Turn to Co-Location to Gain Competitive Advantage

High-frequency trading (HFT) is a high-speed, high-stakes world where every millisecond matters. Finding ways to execute trades faster than the competition translates directly to greater revenue for firms, brokerages, and exchanges. Read more…

Google Launches New Machine Learning Journal

March 22, 2017

On Monday, Google announced plans to launch a new peer review journal and “ecosystem” Read more…

By John Russell

Swiss Researchers Peer Inside Chips with Improved X-Ray Imaging

March 22, 2017

Peering inside semiconductor chips using x-ray imaging isn’t new, but the technique hasn’t been especially good or easy to accomplish. Read more…

By John Russell

LANL Simulation Shows Massive Black Holes Break ‘Speed Limit’

March 21, 2017

A new computer simulation based on codes developed at Los Alamos National Laboratory (LANL) is shedding light on how supermassive black holes could have formed in the early universe contrary to most prior models which impose a limit on how fast these massive ‘objects’ can form. Read more…

Quantum Bits: D-Wave and VW; Google Quantum Lab; IBM Expands Access

March 21, 2017

For a technology that’s usually characterized as far off and in a distant galaxy, quantum computing has been steadily picking up steam. Read more…

By John Russell

HPC Compiler Company PathScale Seeks Life Raft

March 23, 2017

HPCwire has learned that HPC compiler company PathScale has fallen on difficult times and is asking the community for help or actively seeking a buyer for its assets. Read more…

By Tiffany Trader

Quantum Bits: D-Wave and VW; Google Quantum Lab; IBM Expands Access

March 21, 2017

For a technology that’s usually characterized as far off and in a distant galaxy, quantum computing has been steadily picking up steam. Read more…

By John Russell

Trump Budget Targets NIH, DOE, and EPA; No Mention of NSF

March 16, 2017

President Trump’s proposed U.S. fiscal 2018 budget issued today sharply cuts science spending while bolstering military spending as he promised during the campaign. Read more…

By John Russell

CPU-based Visualization Positions for Exascale Supercomputing

March 16, 2017

In this contributed perspective piece, Intel’s Jim Jeffers makes the case that CPU-based visualization is now widely adopted and as such is no longer a contrarian view, but is rather an exascale requirement. Read more…

By Jim Jeffers, Principal Engineer and Engineering Leader, Intel

US Supercomputing Leaders Tackle the China Question

March 15, 2017

Joint DOE-NSA report responds to the increased global pressures impacting the competitiveness of U.S. supercomputing. Read more…

By Tiffany Trader

New Japanese Supercomputing Project Targets Exascale

March 14, 2017

Another Japanese supercomputing project was revealed this week, this one from emerging supercomputer maker, ExaScaler Inc., and Keio University. The partners are working on an original supercomputer design with exascale aspirations. Read more…

By Tiffany Trader

Nvidia Debuts HGX-1 for Cloud; Announces Fujitsu AI Deal

March 9, 2017

On Monday Nvidia announced a major deal with Fujitsu to help build an AI supercomputer for RIKEN using 24 DGX-1 servers. Read more…

By John Russell

HPC4Mfg Advances State-of-the-Art for American Manufacturing

March 9, 2017

Last Friday (March 3, 2017), the High Performance Computing for Manufacturing (HPC4Mfg) program held an industry engagement day workshop in San Diego, bringing together members of the US manufacturing community, national laboratories and universities to discuss the role of high-performance computing as an innovation engine for American manufacturing. Read more…

By Tiffany Trader

For IBM/OpenPOWER: Success in 2017 = (Volume) Sales

January 11, 2017

To a large degree IBM and the OpenPOWER Foundation have done what they said they would – assembling a substantial and growing ecosystem and bringing Power-based products to market, all in about three years. Read more…

By John Russell

TSUBAME3.0 Points to Future HPE Pascal-NVLink-OPA Server

February 17, 2017

Since our initial coverage of the TSUBAME3.0 supercomputer yesterday, more details have come to light on this innovative project. Of particular interest is a new board design for NVLink-equipped Pascal P100 GPUs that will create another entrant to the space currently occupied by Nvidia's DGX-1 system, IBM's "Minsky" platform and the Supermicro SuperServer (1028GQ-TXR). Read more…

By Tiffany Trader

Tokyo Tech’s TSUBAME3.0 Will Be First HPE-SGI Super

February 16, 2017

In a press event Friday afternoon local time in Japan, Tokyo Institute of Technology (Tokyo Tech) announced its plans for the TSUBAME3.0 supercomputer, which will be Japan’s “fastest AI supercomputer,” Read more…

By Tiffany Trader

IBM Wants to be “Red Hat” of Deep Learning

January 26, 2017

IBM today announced the addition of TensorFlow and Chainer deep learning frameworks to its PowerAI suite of deep learning tools, which already includes popular offerings such as Caffe, Theano, and Torch. Read more…

By John Russell

Lighting up Aurora: Behind the Scenes at the Creation of the DOE’s Upcoming 200 Petaflops Supercomputer

December 1, 2016

In April 2015, U.S. Department of Energy Undersecretary Franklin Orr announced that Intel would be the prime contractor for Aurora: Read more…

By Jan Rowell

Is Liquid Cooling Ready to Go Mainstream?

February 13, 2017

Lost in the frenzy of SC16 was a substantial rise in the number of vendors showing server oriented liquid cooling technologies. Three decades ago liquid cooling was pretty much the exclusive realm of the Cray-2 and IBM mainframe class products. That’s changing. We are now seeing an emergence of x86 class server products with exotic plumbing technology ranging from Direct-to-Chip to servers and storage completely immersed in a dielectric fluid. Read more…

By Steve Campbell

Enlisting Deep Learning in the War on Cancer

December 7, 2016

Sometime in Q2 2017 the first ‘results’ of the Joint Design of Advanced Computing Solutions for Cancer (JDACS4C) will become publicly available according to Rick Stevens. He leads one of three JDACS4C pilot projects pressing deep learning (DL) into service in the War on Cancer. Read more…

By John Russell

BioTeam’s Berman Charts 2017 HPC Trends in Life Sciences

January 4, 2017

Twenty years ago high performance computing was nearly absent from life sciences. Today it’s used throughout life sciences and biomedical research. Genomics and the data deluge from modern lab instruments are the main drivers, but so is the longer-term desire to perform predictive simulation in support of Precision Medicine (PM). There’s even a specialized life sciences supercomputer, ‘Anton’ from D.E. Shaw Research, and the Pittsburgh Supercomputing Center is standing up its second Anton 2 and actively soliciting project proposals. There’s a lot going on. Read more…

By John Russell

Leading Solution Providers

HPC Startup Advances Auto-Parallelization’s Promise

January 23, 2017

The shift from single core to multicore hardware has made finding parallelism in codes more important than ever, but that hasn’t made the task of parallel programming any easier. Read more…

By Tiffany Trader

HPC Technique Propels Deep Learning at Scale

February 21, 2017

Researchers from Baidu’s Silicon Valley AI Lab (SVAIL) have adapted a well-known HPC communication technique to boost the speed and scale of their neural network training and now they are sharing their implementation with the larger deep learning community. Read more…

By Tiffany Trader

Trump Budget Targets NIH, DOE, and EPA; No Mention of NSF

March 16, 2017

President Trump’s proposed U.S. fiscal 2018 budget issued today sharply cuts science spending while bolstering military spending as he promised during the campaign. Read more…

By John Russell

Quantum Bits: D-Wave and VW; Google Quantum Lab; IBM Expands Access

March 21, 2017

For a technology that’s usually characterized as far off and in a distant galaxy, quantum computing has been steadily picking up steam. Read more…

By John Russell

CPU Benchmarking: Haswell Versus POWER8

June 2, 2015

With OpenPOWER activity ramping up and IBM’s prominent role in the upcoming DOE machines Summit and Sierra, it’s a good time to look at how the IBM POWER CPU stacks up against the x86 Xeon Haswell CPU from Intel. Read more…

By Tiffany Trader

IDG to Be Bought by Chinese Investors; IDC to Spin Out HPC Group

January 19, 2017

US-based publishing and investment firm International Data Group, Inc. (IDG) will be acquired by a pair of Chinese investors, China Oceanwide Holdings Group Co., Ltd. Read more…

By Tiffany Trader

US Supercomputing Leaders Tackle the China Question

March 15, 2017

Joint DOE-NSA report responds to the increased global pressures impacting the competitiveness of U.S. supercomputing. Read more…

By Tiffany Trader

Intel and Trump Announce $7B for Fab 42 Targeting 7nm

February 8, 2017

In what may be an attempt by President Trump to reset his turbulent relationship with the high tech industry, he and Intel CEO Brian Krzanich today announced plans to invest more than $7 billion to complete Fab 42. Read more…

By John Russell

  • arrow
  • Click Here for More Headlines
  • arrow
Share This