Seminar: Security Metrics in Cloud Computing ( se)

Size: px
Start display at page:

Download "Seminar: Security Metrics in Cloud Computing (20-00-0577-se)"

Transcription

1 Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr Darmstadt Seminar: Security Metrics in Cloud Computing ( se) Topics Descriptions OVERVIEW Dealing with uncertainty in security metrics... 2 Economic-Driven Vulnerability Assessment... 2 Economy and information security risk models... 2 Enhancing security and trust in Cloud computing using secure virtualization technologies... 2 Learning from Meteorite Showers: Keeping the Cloud in the Sky... 3 Measuring Cloud's security based on the security of underlying technologies... 3 Privacy in Cloud Computing... 4 Quality of Service in Cloud Computing... 4 Reliable Cloud storage: a case study with Windows Azure... 4 Review on Comparing private cloud with public cloud in terms of privacy and security... 4 Security monitoring for Cloud computing... 5 Security Negotiation in the Cloud... 5 Specifying security parameters in Cloud s Service Level Agreements (SLA)... 5 Survey on Cloud Performance & Security Metrics... 6 Verification of cryptographic protocols... 6 Virtualization security... 6 Vulnerability Markets, a Novel Economic Perspective to approach Information Security /6

2 Dealing with uncertainty in security metrics For several years, security metrics were considered deterministic in the sense that a number/label were enough to quantify/qualify the security level of system. However, in the last few years this notion has changed dramatically because both researchers and practitioners have found that uncertainty plays a central role in security evaluations (e.g., due to the unavailability of security experts, the complexity of systems like the Cloud, etc.). The goal of this research topic is to survey techniques being proposed to deal with uncertainty in security metrics, in particular related with the use of fuzzy operators. Detection of Service Level Agreement Violations In cloud computing, service level agreements (SLAs) define the relationship between a cloud provider and its customer(s). SLAs include a description of the delivered services, and the manner in which they should be delivered, as well as the security properties of these services. Monitoring the provided service level, aids the user to verify the provider's compliance to the SLA, and is a challenging task. In this seminar work, the student shall survey and assess one or more mechanisms for SLA monitoring and detection of SLA violations. Economic-Driven Vulnerability Assessment The existing vulnerability databases such as the National Vulnerability Database (NVD) or the Open Source Vulnerability Database (OSVDB) try to assess the criticality of discovered vulnerabilities. A less explored filed is economic-driven vulnerability assessment. Within this seminar, we adopt an economic perspective to do such an assessment for selected vulnerabilities (from the Top 5 list). Economy and information security risk models Review of the most important existing credit risk models such as the Tschebyscheff-inequation, CreditRisk+, credit metrics, etc. An appropriate mapping to information security risks should be done. The objective of that exercise is to figure out how we can elaborate a preliminary information security risk model in analogy to the credit risk models. Enhancing security and trust in Cloud computing using secure virtualization technologies Cloud computing is a relatively new computing model that is characterized by providing on-demand services, rapid elasticity and multitenancy. Despite the indisputable advantages this paradigm brings to IT world, the wide adoption of the Cloud is impeded in part due to security concerns. As one of the underlying technologies that enable the cloud model is virtualization, the aim of this report is to consider different opportunities for enhancing security at the virtualization layer by the means of the underlying virtualization solution. The report should summarize the state-of-the-art considering different security mechanisms based on virtualization. 2/6

3 [1] Shakeel Butt, H. Andrés Lagar-Cavilla, Abhinav Srivastava, and Vinod Ganapathy Self-service cloud computing. In Proceedings of the 2012 ACM conference on Computer and communications security (CCS '12). ACM, New York, NY, USA, [2] McDermott, J.; Montrose, B.; Li, M.; Kirby, J.; Kang, M., "The Xenon separation VMM: Secure virtualization infrastructure for military clouds," MILITARY COMMUNICATIONS CONFERENCE, MILCOM 2012, vol., no., pp.1,6, Oct Nov [3] Fatemeh Azmandian, David R. Kaeli, Jennifer G. Dy, Javed A. Aslam, and Dana Schaa Securing cloud storage systems through a virtual machine monitor. In Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems (SRAS '12). ACM, New York, NY, USA, Learning from Meteorite Showers: Keeping the Cloud in the Sky The essence of the peer-to-peer design philosophy is to design protocols for end hosts, or peers, to work in collaboration to achieve a certain design objective, such as the sharing of a large file. From a theoretical perspective, it has been recognized that the peer-to-peer design paradigm resembles gossip protocols, and with appropriate algorithmic design, it maximizes the network flow rates in multicast sessions. Over the past ten years, research on peer-to-peer computing and systems, a unique and intriguing category of distributed systems, has received a tremendous amount of research attention from academia and industry alike. Peer-to-peer computing eventually culminated in a number of successful commercial systems, showing the viability of their design philosophy in the Internet. The peer-to-peer design paradigm has pushed all design choices of innovative protocols to the edge of the Internet, and in most cases to end hosts themselves. It represents one of the best incarnation of the end-to-end argument, one of the frequently disputed design philosophies that guided the design of the Internet. Yet, research on peer-to-peer computing has recently receded from the spotlight, and suffered from a precipitous fall that was as dramatic as its meteoric rise to the culmination of its popularity. The article proposed for review in this seminar [1] presents a cursory glimpse of existing results over the past ten years in peer-to-peer computing, with a particular focus on understanding what has stimulated its rise in popularity, what has contributed to its commercial success, and eventually, what has led to its precipitous fall in research attention. The student should elaborate about how these insights may be beneficial when developing thoughts on the design paradigm of cloud computing. [1] Rise and fall of the peer-to-peer empire, Baochun Li, Tsinghua Science and Technology, Measuring Cloud's security based on the security of underlying technologies Cloud computing is a relatively new and complex computing model which combines concepts and technologies such as Service Oriented Architecture, Web 2.0, virtualization, etc. Cloud provide many benefits to the IT world, but the uncertainty regarding the security provisioning in the Cloud model impedes its wide adoption. Estimating the provided security level of the Cloud is a positive step towards enhancing the security. However, measuring Cloud's security should take into consideration the security provided by the underlying technologies. The aimof this report is to elaborate on the components that should 3/6

4 be taken into consideration when measuring security of the Cloud and focus on the underlying virtualization technology. [1] Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra, and Diego Zamboni Cloud security is not (just) virtualization security: a short paper. In Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09). ACM, New York, NY, USA, [2] Jakub Szefer, Eric Keller, Ruby B. Lee, and Jennifer Rexford Eliminating the hypervisor attack surface for a more secure cloud. In Proceedings of the 18th ACM conference on Computer and communications security (CCS '11). ACM, New York, NY, USA, Privacy in Cloud Computing Information flow between cloud service providers raises concerns about the privacy of the user s data in the cloud. This seminar studies identity management and privacy assurance methods for cloud computing. [1] P. Angin, B. Bhargava, R. Ranchal, N. Singh, M. Linderman, L. B. Othmane, L. Lilien, "An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing," Reliable Distributed Systems, Quality of Service in Cloud Computing In this seminar we investigate the methods for ranking Cloud components according to their performance history. This helps the Cloud application developers to have a better selection of components/services to achieve their desired performance. [1] Zibin Zheng, Yilei Zhang, M. R. Lyu, "CloudRank: A QoS-Driven Component Ranking Framework for Cloud Computing," Reliable Distributed Systems, Reliable Cloud storage: a case study with Windows Azure Windows Azure is Microsoft s cloud platform that promises limitless storage for an unlimited duration. We will study Windows Azure and the techniques it uses to assure the storage reliability by employing local and geographically located replications. [1] Brad Calder et al. Windows Azure Storage: a highly available cloud storage service with strong consistency. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (SOSP '11). Review on Comparing private cloud with public cloud in terms of privacy and security Cloud computing is the product of the fusion of traditional computing technology and network technology like grid computing, distributed computing and parallel computing. The cloud providers own large data centers with massive computation and storage capacities. The service oriented, loose coupling, strong fault tolerant, business model and ease use are main characteristics of cloud computing. For Critical Infrastructure System (CIS),such as Smart Grid, having a special and rigorous demand on target, performance and safety, cloud computing platform for CIS should be different from other clouds like Amazon Elastic Compute Cloud. The report should compare between private cloud with public cloud in terms of CIS security requirements. 4/6

5 [1] Zheng, Ling, Yanxiang Hu, and Chaoran Yang. "Design and Research on Private Cloud Computing Architecture to Support Smart Grid." 2011 Third International Conference on Intelligent Human-Machine Systems and Cybernetics. IEEE, Security monitoring for Cloud computing Although Cloud computing brings a lot of advantages to the IT world due to its characteristics, such as on-demand services, rapid elasticity and pay-per-use model, its adoption is impeded because of security concerns. There exist various Cloud threat models related to the underlying virtualization technology and the multitenancy model. Recently different attacks on the Cloud have been demonstrated. As a consequence, much research has been devoted to provide security monitoring and prevention mechanisms for the Cloud. The report should summarize the state-of-the-art in this area and classify the proposed solutions in terms of different threat models and attackers. [1] Yinqian Zhang; Juels, A.; Oprea, A.; Reiter, M.K., "HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis," Security and Privacy (SP), 2011 IEEE Symposium on, vol., no., pp.313,328, May 2011 [2] Shakeel Butt, H. Andrés Lagar-Cavilla, Abhinav Srivastava, and Vinod Ganapathy Self-service cloud computing. In Proceedings of the 2012 ACM conference on Computer and communications security (CCS '12). ACM, New York, NY, USA, Security Negotiation in the Cloud The recent efforts on specification of Cloud security statements in SLAs, also known as Security Level Agreements or SecLAs is a positive development in the field of Cloud security metrics. Cloud SecLAs are the foundation to establish a common semantic among users and CSPs in order to specify and negotiate security requirements, therefore enabling informed decisions on the matter. Despite the adoption of SecLAs by many well-known CSPs, its envisioned use in -automated- negotiation processes is still latent due in part to the lack of techniques to quantitatively reason about them. The goal of this research topic is to survey the current proposals aiming to use SecLAs in order to negotiate security in Cloud systems. Specifying security parameters in Cloud s Service Level Agreements (SLA) While the many economic and technological advantages of Cloud computing are apparent, the migration of key sector applications onto it has been limited, in part, due to the lack of security assurance on the Cloud Service Provider (CSP). However, the recent efforts on specification of security parameters in Service Level Agreements, also known as Security Level Agreements or SecLAs is a positive development. This research topic seeks to perform a comprehensive survey on the real-world adoption of SecLAs for the Cloud along with an analysis of both their advantages and disadvantages. 5/6

6 Survey on Cloud Performance & Security Metrics Various articles discuss Cloud metrics to assess the performance and security of Cloud services. The student should survey these metrics according to their suitability and classify whereever possible if these relate to infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) contexts. Verification of cryptographic protocols Cryptographic protocols are of major importance for a secure communication between the user and the cloud. Model checking has been extensively used in the last two decades to verify existing cryptographic protocols and provide formal proof of their correctness. The tasks of this seminar consists of investigating different works done on the verification of cryptographic protocols and discuss to which extent it differs from conventional software model checking. [1] Jeffrey, Alan, and Ruy Ley-Wild. "Dynamic model checking of C cryptographic protocol implementations." FCS-ARSPA 06 (2006): 327. [2] Boneh, Dan, Richard A. DeMillo, and Richard J. Lipton. "On the importance of checking cryptographic protocols for faults." Advances in Cryptology EUROCRYPT 97. Springer Berlin Heidelberg, Virtualization security With the growing popularity of cloud computing, an increasing number of critical applications are based on virtualization, necessitating increased security considerations for these underlying technologies. Recent work in the area of virtualization security falls in three categories. One class of approaches attempts to improve on the isolation and protection of hypervisors from external entities, e.g. privileged management VMs. A second class of work proposes the recursive addition of additional virtualization layers, e.g. by running commodity hypervisors on top of special secure hypervisors. A third class proposes to live with the fact that hypervisors can be compromised by adversaries and therefore suggests that VM security should not depend on hypervisor security, but directly on hardware trusted platform modules (TPMs) instead. As each of these approaches relies on different mechanisms to achieve security, the assessment of their efficacy requires measurements at different locations in the hardware/software stack (hardware/tpm level, 1st/2nd hypervisor level, management/payload VMs). The goal of the seminar report is to closely investigate one or more of these approaches and to discuss their details along with requirements they impose on security assessments. Vulnerability Markets, a Novel Economic Perspective to approach Information Security Within this seminar, students are asked to review and compare the existing approaches regarding the economic perspective on information security. The focus is on the new concept of vulnerability markets. Advantages and drawbacks of different concepts for vulnerability markets, where security-related information can be traded, should be discussed. 6/6

Seminar: Security Metrics in Cloud Computing (20-00-0577-se)

Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions

More information

Seed4C: A Cloud Security Infrastructure validated on Grid 5000

Seed4C: A Cloud Security Infrastructure validated on Grid 5000 Seed4C: A Cloud Security Infrastructure validated on Grid 5000 E. Caron 1, A. Lefray 1, B. Marquet 2, and J. Rouzaud-Cornabas 1 1 Université de Lyon. LIP Laboratory. UMR CNRS - ENS Lyon - INRIA - UCBL

More information

SECURITY IN SERVICE LEVEL AGREEMENTS FOR CLOUD COMPUTING

SECURITY IN SERVICE LEVEL AGREEMENTS FOR CLOUD COMPUTING SECURITY IN SERVICE LEVEL AGREEMENTS FOR CLOUD COMPUTING Karin Bernsmed, Martin Gilje Jaatun SINTEF Information and Communication Technology, Trondheim, Norway Karin.Bernsmed@sintef.no, Martin.G.Jaatun@sintef.no

More information

Security Model for VM in Cloud

Security Model for VM in Cloud Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,

More information

Performance Gathering and Implementing Portability on Cloud Storage Data

Performance Gathering and Implementing Portability on Cloud Storage Data International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Ms. M. Subha #1, Mr. K. Saravanan *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional

More information

Allocation of Datacenter Resources Based on Demands Using Virtualization Technology in Cloud

Allocation of Datacenter Resources Based on Demands Using Virtualization Technology in Cloud Allocation of Datacenter Resources Based on Demands Using Virtualization Technology in Cloud G.Rajesh L.Bobbian Naik K.Mounika Dr. K.Venkatesh Sharma Associate Professor, Abstract: Introduction: Cloud

More information

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering

More information

Grid Computing Vs. Cloud Computing

Grid Computing Vs. Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid

More information

Security & Trust in the Cloud

Security & Trust in the Cloud Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer

More information

Cloud Courses Description

Cloud Courses Description Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition

More information

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.

More information

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

SLA-driven Dynamic Resource Provisioning for Service Provider in Cloud Computing

SLA-driven Dynamic Resource Provisioning for Service Provider in Cloud Computing IEEE Globecom 2013 Workshop on Cloud Computing Systems, Networks, and Applications SLA-driven Dynamic Resource Provisioning for Service Provider in Cloud Computing Yongyi Ran *, Jian Yang, Shuben Zhang,

More information

A Survey on Security issues in cloud computing

A Survey on Security issues in cloud computing A Survey on Security issues in cloud computing D. Anil Kumar, Y. Manasa 1 Assistant Professor, Dept of CSE, Qis Institute of Technology, Ongole, 2 Dept of IT, NRI Institute of Technology, Vijayawada. anil.dudla@gmail.com,

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem

More information

Cloud Computing Architectures and Design Issues

Cloud Computing Architectures and Design Issues Cloud Computing Architectures and Design Issues Ozalp Babaoglu, Stefano Ferretti, Moreno Marzolla, Fabio Panzieri {babaoglu, sferrett, marzolla, panzieri}@cs.unibo.it Outline What is Cloud Computing? A

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may

More information

Cloud Virtualization Specialist Certification Self-Study Kit Bundle

Cloud Virtualization Specialist Certification Self-Study Kit Bundle Cloud Virtualization Specialist Certification Bundle A Certified Cloud Virtualization Specialist has proven knowledge and proficiency with the technologies, mechanisms, platforms, and practices based upon

More information

1.1.1 Introduction to Cloud Computing

1.1.1 Introduction to Cloud Computing 1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

TECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing

TECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing TECHNOLOGY GUIDE THREE Emerging Types of Enterprise Computing TECHNOLOGY GU IDE OUTLINE TG3.1 Introduction TG3.2 Server Farms TG3.3 Virtualization TG3.4 Grid Computing TG3.5 Utility Computing TG3.6 Cloud

More information

Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=154091

Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=154091 Citation: Alhamad, Mohammed and Dillon, Tharam S. and Wu, Chen and Chang, Elizabeth. 2010. Response time for cloud computing providers, in Kotsis, G. and Taniar, D. and Pardede, E. and Saleh, I. and Khalil,

More information

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information

More information

Cloud Computing An Introduction

Cloud Computing An Introduction Cloud Computing An Introduction Distributed Systems Sistemi Distribuiti Andrea Omicini andrea.omicini@unibo.it Dipartimento di Informatica Scienza e Ingegneria (DISI) Alma Mater Studiorum Università di

More information

A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service

A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service II,III A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service I Samir.m.zaid, II Hazem.m.elbakry, III Islam.m.abdelhady I Dept. of Geology, Faculty of Sciences,

More information

Li Sheng. lsheng1@uci.edu. Nowadays, with the booming development of network-based computing, more and more

Li Sheng. lsheng1@uci.edu. Nowadays, with the booming development of network-based computing, more and more 36326584 Li Sheng Virtual Machine Technology for Cloud Computing Li Sheng lsheng1@uci.edu Abstract: Nowadays, with the booming development of network-based computing, more and more Internet service vendors

More information

Monitoring Performances of Quality of Service in Cloud with System of Systems

Monitoring Performances of Quality of Service in Cloud with System of Systems Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department

More information

Cloud Computing Security Issues And Methods to Overcome

Cloud Computing Security Issues And Methods to Overcome Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &

More information

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,

More information

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

Building Secure Cloud Applications. On the Microsoft Windows Azure platform Building Secure Cloud Applications On the Microsoft Windows Azure platform Contents 1 Security and the cloud 3 1.1 General considerations 3 1.2 Questions to ask 3 2 The Windows Azure platform 4 2.1 Inside

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Cloud Computing Binto George School of Computer Sciences, Western Illinois University, Macomb, IL 61455, United States Abstract: Cloud computing allows on-demand provisioning of computing

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

Cloud Courses Description

Cloud Courses Description Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot

More information

An Approach Towards Customized Multi- Tenancy

An Approach Towards Customized Multi- Tenancy I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy

More information

Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,

More information

A Threat Model for a Cloud Infrastructure with no Hypervisor

A Threat Model for a Cloud Infrastructure with no Hypervisor A Threat Model for a Cloud Infrastructure with no Hypervisor William A. R. de Souza, Allan Tomlinson Information Security Group Royal Holloway, University of London Egham Hill, Egham, United Kingdom Abstract

More information

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud , pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab

More information

Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis

Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis William A. R. de Souza and Allan Tomlinson Information Security Group Royal Holloway, University of London Egham Hill,

More information

Cloud Computing Architectures: A Retrospective Study

Cloud Computing Architectures: A Retrospective Study Cloud Computing Architectures: A Retrospective Study Ramakalavathi Marapareddy *, Ajay Bandi, and Satya Savithri Tirumala * Dept. of Electrical and Computer Engineering, Mississippi State University, USA

More information

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk About PaaS Security Donghoon Kim Henry E. Schaffer Mladen A. Vouk North Carolina State University, USA May 21, 2015 @ ICACON 2015 Outline Introduction Background Contribution PaaS Vulnerabilities and Countermeasures

More information

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Chandrakala Department of Computer Science and Engineering Srinivas School of Engineering, Mukka Mangalore,

More information

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security

More information

Key Research Challenges in Cloud Computing

Key Research Challenges in Cloud Computing 3rd EU-Japan Symposium on Future Internet and New Generation Networks Tampere, Finland October 20th, 2010 Key Research Challenges in Cloud Computing Ignacio M. Llorente Head of DSA Research Group Universidad

More information

Cloud Security Is Not (Just) Virtualization Security

Cloud Security Is Not (Just) Virtualization Security Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra, Diego Zamboni IBM Research Cloud Security Is Not (Just) Virtualization Security Virtualization Enables Many Security Applications

More information

Figure 1. The cloud scales: Amazon EC2 growth [2].

Figure 1. The cloud scales: Amazon EC2 growth [2]. - Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 shinji10343@hotmail.com, kwang@cs.nctu.edu.tw Abstract One of the most important issues

More information

Providing Flexible Security as a Service Model for Cloud Infrastructure

Providing Flexible Security as a Service Model for Cloud Infrastructure Providing Flexible Security as a Service Model for Cloud Infrastructure Dr. M. Newlin Rajkumar, P. Banu Priya, Dr. V. Venkatesakumar Abstract Security-as-a-Service model for cloud systems enable application

More information

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure

More information

Quality Issues in Infrastructure as a Service

Quality Issues in Infrastructure as a Service www.ijcsi.org 142 Quality Issues in Infrastructure as a Service Nikita Yadav 1 and V.B Singh 2 1 Computer Science, Singhania University Pacheri Bari, Rajasthan, India 2 Delhi College of Arts & Commerce,

More information

Information Security Management System for Cloud Computing

Information Security Management System for Cloud Computing ICT Innovations 2011 Web Proceedings ISSN 1857-7288 49 Information Security Management System for Cloud Computing Sashko Ristov, Marjan Gushev, and Magdalena Kostoska Ss. Cyril and Methodius University

More information

SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Framework

SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Framework International Journal of Computer Networks and Communications Security VOL. 1, NO. 3, AUGUST 2013, 95 101 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S SLA Based Information Security Metric

More information

Chapter 2 Cloud Computing

Chapter 2 Cloud Computing Chapter 2 Cloud Computing Cloud computing technology represents a new paradigm for the provisioning of computing resources. This paradigm shifts the location of resources to the network to reduce the costs

More information

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate

More information

Review on Virtualization for Cloud Computing

Review on Virtualization for Cloud Computing Review on Virtualization for Cloud Computing D.Kiran Kumar 1, T.P.Sarachandrica 2, B.Rajasekhar 3, P.Jayasankar 4 Assistant Professor, CSE, Vignana Bharathi Institute of Technology College, Hyderabad,

More information

IMPLEMENTING DATA SECURITY IN MULTI CLOUD

IMPLEMENTING DATA SECURITY IN MULTI CLOUD IMPLEMENTING DATA SECURITY IN MULTI CLOUD Ms. Renu Nagendra Shinde Information Technology SKNCOE Pune 41,India renunikhilp@gmail.com Prof. Mrs. Varsha Khandekar Information Technology SKNCOE Pune 41, India

More information

CS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction

CS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction CS 695 Topics in Virtualization and Cloud Computing and Storage Systems Introduction Hot or not? source: Gartner Hype Cycle for Emerging Technologies, 2014 2 Source: http://geekandpoke.typepad.com/ 3 Cloud

More information

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University Cloud computing: the state of the art and challenges Jānis Kampars Riga Technical University Presentation structure Enabling technologies Cloud computing defined Dealing with load in cloud computing Service

More information

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG Sanju5878@gmail.com Bhupesh Kumar Dewangan Assistant Professor,CSE,

More information

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud? East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management

More information

February. ISSN: 2321-8134

February. ISSN: 2321-8134 IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.

More information

CLOUD COMPUTING INTRODUCTION HISTORY

CLOUD COMPUTING INTRODUCTION HISTORY 1 CLOUD COMPUTING INTRODUCTION 1. Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from

More information

Cloud Computing and Software Agents: Towards Cloud Intelligent Services

Cloud Computing and Software Agents: Towards Cloud Intelligent Services Cloud Computing and Software Agents: Towards Cloud Intelligent Services Domenico Talia ICAR-CNR & University of Calabria Rende, Italy talia@deis.unical.it Abstract Cloud computing systems provide large-scale

More information

Security Aspects of Cloud Computing

Security Aspects of Cloud Computing Security Aspects of Cloud Computing Kunal Chadha Scholar, CSE Department University of Southern California, USA Anvita Bajpai X-Scholar, CSE Department Marist College, NY, USA ABSTRACT Cloud Computing

More information

Keywords: Cloud computing, Characteristics of Cloud computing, Models of Cloud computing, Distance learning, Higher education.

Keywords: Cloud computing, Characteristics of Cloud computing, Models of Cloud computing, Distance learning, Higher education. Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of Cloud

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Towards a New Model for the Infrastructure Grid

Towards a New Model for the Infrastructure Grid INTERNATIONAL ADVANCED RESEARCH WORKSHOP ON HIGH PERFORMANCE COMPUTING AND GRIDS Cetraro (Italy), June 30 - July 4, 2008 Panel: From Grids to Cloud Services Towards a New Model for the Infrastructure Grid

More information

Server Virtualization and Cloud Computing

Server Virtualization and Cloud Computing Server Virtualization and Cloud Computing Four hidden impacts on uptime and availability by Stratus Technologies November, 2011 1 Abstract As x86 virtualization has become established and cloud computing

More information

Towards Integrating Information of Service Level Agreement and Resources as a Services (RaaS) for Cloud Computing Environment

Towards Integrating Information of Service Level Agreement and Resources as a Services (RaaS) for Cloud Computing Environment Towards Integrating Information of Service Level Agreement and Resources as a Services (RaaS) for Cloud Computing Environment Rusli Abdullah and Amir Mohamed Talib Faculty of Computer Science & IT Information

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

REVIEW OF CLOUD TESTING, TYPES, CHALLENGES AND FUTURE SCOPE

REVIEW OF CLOUD TESTING, TYPES, CHALLENGES AND FUTURE SCOPE http:// REVIEW OF CLOUD TESTING, TYPES, CHALLENGES AND FUTURE SCOPE 1 Bhumika Maurya, 2 Chandraprabha and 3 Rashmi Patil 1,2 Research Scholar, SRMS CET, Bareilly. (India) 3 Assistant Professor, SRMS CET,

More information

CLOUD COMPUTING. When It's smarter to rent than to buy

CLOUD COMPUTING. When It's smarter to rent than to buy CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit

More information

An enhanced QoS Architecture based Framework for Ranking of Cloud Services

An enhanced QoS Architecture based Framework for Ranking of Cloud Services An enhanced QoS Architecture based Framework for Ranking of Cloud Services Mr.K.Saravanan #1, M.Lakshmi Kantham #2 1 Assistant Professor, 2 PG Scholar Department of Computer Science and Engineering Anna

More information

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos Research Challenges Overview May 3, 2010 Table of Contents I 1 What Is It? Related Technologies Grid Computing Virtualization Utility Computing Autonomic Computing Is It New? Definition 2 Business Business

More information

Service and Data Security for Multi Cloud Environment

Service and Data Security for Multi Cloud Environment Service and Data Security for Multi Cloud Environment Rajkumar B 1, Balamurugan K 2 M.Tech, Dept of IT, K.S.R. College of Engineering, Tamilnadu, India 1 Associate Professor, Dept of IT, K.S.R. College

More information

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service

More information

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

Unit 10b: Introduction to Cloud Computing

Unit 10b: Introduction to Cloud Computing ESIR SR Unit 10b: Introduction to Cloud Computing François Taïani [http://www.cheswick.com/ches/map/] 1 Session Outline n Defining cloud computing n Related technologies and precursors è Grid è Virtualisation

More information

CLOUD COMPUTING SECURITY ISSUES

CLOUD COMPUTING SECURITY ISSUES CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights

More information

How To Understand Cloud Computing

How To Understand Cloud Computing CSM 002 / Advanced Dist. Sys. Session 2.2 Cloud Computing François Taïani (heavily source from: Cloud computing: stateof-the-art and research challenges, Qi Zhang, Lu Cheng, Raouf Boutaba. J. of Internet

More information

Data management using Virtualization in Cloud Computing

Data management using Virtualization in Cloud Computing Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department

More information

Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration

Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Guopeng Zhao 1, 2 and Zhiqi Shen 1 1 Nanyang Technological University, Singapore 639798 2 HP Labs Singapore, Singapore

More information

Service allocation in Cloud Environment: A Migration Approach

Service allocation in Cloud Environment: A Migration Approach Service allocation in Cloud Environment: A Migration Approach Pardeep Vashist 1, Arti Dhounchak 2 M.Tech Pursuing, Assistant Professor R.N.C.E.T. Panipat, B.I.T. Sonepat, Sonipat, Pin no.131001 1 pardeepvashist99@gmail.com,

More information

Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing

Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing Cloud storage systems The rise of big data on cloud computing: Review and open research issues Consistency models

More information