Securing Your Collaborative Jupyter Notebooks in the Cloud using Container and Load Balancing Services

06/02/2020
by   Haw-minn Lu, et al.
0

Jupyter has become the go-to platform for developing data applications but data and security concerns, especially when dealing with healthcare, have become paramount for many institutions and applications dealing with sensitive information. How then can we continue to enjoy the data analysis and machine learning opportunities provided by Jupyter and the Python ecosystem while guaranteeing auditable compliance with security and privacy concerns? We will describe the architecture and implementation of a cloud based platform based on Jupyter that integrates with Amazon Web Services (AWS) and uses containerized services without exposing the platform to the vulnerabilities present in Kubernetes and JupyterHub. This architecture addresses the HIPAA requirements to ensure both security and privacy of data. The architecture uses an AWS service to provide JSON Web Tokens (JWT) for authentication as well as network control. Furthermore, our architecture enables secure collaboration and sharing of Jupyter notebooks. Even though our platform is focused on Jupyter notebooks and JupyterLab, it also supports R-Studio and bespoke applications that share the same authentication mechanisms. Further, the platform can be extended to other cloud services other than AWS.

READ FULL TEXT

page 1

page 3

page 4

page 5

page 6

page 10

page 12

page 13

research
07/27/2021

Thunder CTF: Learning Cloud Security on a Dime

Organizations have rapidly shifted infrastructure and applications over ...
research
02/26/2023

SoK: Evaluating Privacy and Security Concerns of Using Web Services for the Disabled Population

The online privacy and security of the disabled community is a complex f...
research
01/30/2018

Joint Orchestration of Cloud-Based Microservices and Virtual Network Functions

Recent studies show the increasing popularity of distributed cloud appli...
research
04/24/2022

Hardware Acceleration for Third-Generation FHE and PSI Based on It

With the expansion of cloud services, serious concerns about the privacy...
research
07/10/2020

Towards Tracking Data Flows in Cloud Architectures

As cloud services become central in an increasing number of applications...
research
08/24/2020

Who ya gonna call? (Alerting Authorities): Measuring Namespaces, Web Certificates, and DNSSEC

During disasters, crisis, and emergencies the public relies on online se...
research
05/17/2020

Lost and Found: Stopping Bluetooth Finders from Leaking Private Information

A Bluetooth finder is a small battery-powered device that can be attache...

Please sign up or login with your details

Forgot password? Click here to reset