ICloudSec
ICloudSec
Token: CLOUD


Blockchain Based Cloud Network Security.

ICO dates
Start date: 2018-02-26
End date: 2018-05-25

Registrated in: India

Platform: Ethereum
Type: ERC20

PREMIUM ICO

HARA

Empowering billions by utilizing a global and transparent data exchange.
Ends in 112 days 22 hours
Goal: 17,000,000 USD
Price: 1 HART = 0.059 USD

Dominium

Dominium Blockchain – The one-stop-platform for everything to do with property anywhere in the world!
Ends in 81 days 22 hours
Goal: 17,500,000 USD
Price: 1 DOM = 0.25 EUR
ICloudSec categories
Software
ICloudSec whitepaper
ICloudSec token sale
KYC passing required No | Whitelist No | Restriction for countries No
Hard cap 13500 ETH
Tokens for sale 40,000,000,000
Token distribution in ICO
80%
80%
Price 1 ETH = 11000-13000 CLOUD
Minimal investment 1 BTC
Acceppting ETH, BTC
ICloudSec news, social
ICloudSec search trends in Google
Random whitepaper excerpts

Table of Contents
1. Introduction
2
2. Motivation
3
3. Challenges
4
3.1 Security risk in form of insider-threat
4
3.2 Fault-tolerant and high-availability
4
3.3 Consistency across all layers of multi-layer cloud network system
5
3.4 Integration
5
4. Existing Solutions
5
4.1 SDN micro-segmentation
5
4.2 Software defined security
6
4.3 Software defined perimeter
6
5. Leveraging the Principles of Blockchain
7
6. Open Network Automation Platform (ONAP)
9
7. ICloudSec Cloud Security Solution using Blockchain with ONAP
10
7.1 Identity and Access Management
10
7.2 Configuration Manipulation Prevention
10
7.3 Insider attack protection
11
8. ICloudSec Step by Step solution using Blockchain
12
9. Conclusion
12
10. References
13
11. Disclaimer
13
ICloudSec
1
...

1. Introduction
Networks are the backbone of successful companies that are able to deliver
demand based high-quality services in continuously changing global marketplace.
There are multiple solutions that enable cloud-based orchestration of networks,
but each of them has their own pros and cons. One of the concepts that provide
immense flexibility and simplicity in managing networks is intent based
networking. To cut a long story short, intent-based networking is about giving
network administrators the ability to define what they want the network to do
and having an automated network management platform create the desired state
and enforce policies. Network availability and agility are achieved through a
closed-loop system that includes policy-based automation, network analytics, and
machine learning. But it also comes with some inherent challenges of multilayer
security and integrity.
There are multiple ways to address above challenges but blockchain is one of the
most effective ones...

2. Motivation
INTENT BASED NETWORK CONFIGURATION AND MANAGEMENT
Data center managers have also known as Cloud-based management systems are
significant in managing important elements of the infrastructure that typically
includes compute, storage and networking. Cloud automation is an evolved
version of DC managers that includes multi-cloud management platforms and
toolkit to provide a comprehensive picture and manage a complex and connected
cloud network.
STORAGE
NETWORKING
COMPUTE
Figure 1. Three Elements of Datacenter
Intent-based networking system (IBNS) allows IT to move from tedious traditional
processes to automating intent, making it possible to manage millions of devices
in minutes

a crucial development to help organizations navigate today's ever-
expanding technology landscape. In rapid changing networking world IBNS is
groundbreaking idea which is currently evolving around SDN and SD-WAN. IBNS
can scale data center network management a...

user policies (intent/context) to protocols, languages, and syntax which can
configure any type of networking equipment.
3. Challenges
Software-defined-network is now very matured and explored technology which
provides centralized management of networking devices, improvement in
automating the network components and enhancement to end-user usability. As
we all know it has great upside potential but at the same time some downside risk
and security venerability also. Let us examine those challenges and later we will
see how ICloudSec is using blockchain to address those challenges:
3.1 Security risk in form of insider-threat
When it comes to security, incidents caused by external hackers catch huge
publicity, but every organization knows that security breach from inside by
disgruntled employees, business partners, contractors with trusted access

can
be even more damaging. Yet the majority of businesses are unprepared for these
insider threats. In multilayer network, ma...

3.3 Consistency across all layers of multi-layer cloud network system
The three primary layers of the multilayer cloud network automation system are
network automation platform, SDN controller and network devices/elements. In
policy-based cloud network deployment, all layers must be on same page
regarding what configuration should be done, because any inconsistency between
those layers lead to misconfiguration and cause serious damage. All nodes must
apply all antivirus updates, software changes/patch from the vendor across all
layers/elements/nodes without any inconsistency otherwise it will expose entire
system to severe security risk.
3.4 Integration
Network security is also based on a principle of integration and continuous
collaboration. It helps different parties/vendors to help each other to achieve a
common goal of high efficiency in deploying and managing a network. But this
shared identity between different parties also carries huge risk of changing
network configuration and...

4.2 Software defined security
To make SDN network simple, cost-effective and secure, it requires security at
each layer of SDN rather than traditional networking security concept. There are
multiple approaches to handle security concerns

some think security is best
embedded in the network, others think it is best inside the servers, storage, and
other computing devices. SDSec provides network security by separating SDN
control plane security from SDN forwarding plane security.it enables dynamic
deployment of security policies across the layers and it can also be scaled and
managed effectively. It is still early days for SDSec but still in the current
marketplace where multiple security solutions are there, it is providing scope for
standardization and expansion.
4.3 Software defined perimeter
The software-defined perimeter is a new approach to security that mitigates
network based attacks by creating dynamically provisioned perimeters
anywhere in the world, includi...

Figure 2
5. Leveraging the Principles of Blockchain
The blockchain is one the most revolutionary innovation of modern times that has
the capability to impact many fields of technical advancement. It is still in early
stage but it has disrupted entire financial sector and information technology with
cryptocurrency. But pundits are seeing this remarkable technology with unending
potential.
After the emergence of bitcoin (a cryptocurrency based on blockchain), the idea
of blockchain has taken center stage because of its capability to create a shift in
trust from centralized to decentralized database keeping models in distributed,
complex and interlinked business environment.
Blockchain technology is complex, but the idea is simple. There are many
definitions of blockchain is available on the internet, but according to Wikipedia

A blockchain, originally blockchain, is a continuously growing list of records,
called blocks, which are linked and secured using cryptography. Each bl...

for validating new blocks. Once recorded, the data in any given block cannot be
altered retroactively without the alteration of all subsequent blocks, which
requires collusion of the network majority.
In the mid-1990s, smart managers worked hard to understand the internet and
how it would affect their businesses. Today, blockchain technology is ushering in
the second generation of the Internet, and if companies don’t want to get left
behind, they’ll need to dodge the Innovator’s dilemma and disrupt from within.
A World Economic Forum report from September 2015 predicted that by 2025
ten percent of global GDP would be stored on blockchains technology.
By understanding the huge potential of the blockchain, we in ICloudSec we are
using blockchain to address multilayer cloud network security issue and efficiently
managing complex integrity requirement. Let us first take a quick understanding
of how blockchain works with below diagram (Figure 3) and then in a later section
we will explore h...

ICloudSec Roadmap

1
November 2017
ICLOUDSEC CONCEPT CREATION.
ICLOUDSEC TEAM IS FORMED.
2
December 2017
SMART CONTRACT DEVELOPMENT BEGINS.
3
January 2018
WEBSITE & USER INTERFACE DESIGN BEGINS.
SMART CONTRACT TESTING.
WEBSITE LAUNCHES.
4
February 2018
ICLOUDSEC TOKEN SALE OPENS.
5
March 2018
ICLOUDSEC TOOL CHAIN DEVELOPEMENT.
6
April 2018
ONAP SOURCE CODE INCLUSION.
7
May 2018
ICLOUDSEC TOKEN SALE CLOSES.
8
June 2018
BLOCKCHAIN INTEGRATION WITH ICLOUDSEC FRAMEWORK.
CRYPTO EXCHANGE LISTING.
9
August 2018
ICLOUDSEC ALPHA RELEASE.
Rajesh Nayak
Rajesh Nayak Senior Architect

Rajesh Kumar
Rajesh Kumar Lead Data Analyst

Supriya Yadubansi
Supriya Yadubansi Senior Software Engineer

Ashutosh Agrawal
Ashutosh Agrawal Senior Software Engineer

Amit Joshi
Amit Joshi Senior System Engineer

Tapil Sethi
Tapil Sethi ICO Advisor

Akashdeep Singh
Akashdeep Singh Financial Advisor

Amit Joshi
Amit Joshi
Senior System Engineer
Head of Employee Experience (HR)
Rajesh Kumar
Rajesh Kumar
Lead Data Analyst
CMO & Co - Founder