Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing



Similar documents
Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

Design and Implementation of Techniques for Secure Virtualization in Cloud Environment

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Figure 1. The cloud scales: Amazon EC2 growth [2].

Security Model for VM in Cloud

Evasion Resistant Intrusion Detection Framework at Hypervisor Layer in Cloud

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing

Migration Improved Scheduling Approach In Cloud Environment

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING

Erasure correcting to enhance data security in cloud data storage

Secure Way of Storing Data in Cloud Using Third Party Auditor

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Grid Computing Vs. Cloud Computing

CMPS223 Final Project Virtual Machine Introspection Techniques

Distributing, Ensuring and Recovery of Data Stored in Cloud

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure


ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE

Index Terms: Data integrity, dependable distributed storage, Cloud Computing

A Road Map on Security Deliverables for Mobile Cloud Application

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Cloud Courses Description

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Dynamic resource management for energy saving in the cloud computing environment

A survey on cost effective multi-cloud storage in cloud computing

Big-Data Computing with Smart Clouds and IoT Sensing

Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture

Security Threats in Cloud Computing Environments 1

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing

Mobile Cloud Computing Security Considerations

Elastic VM for Rapid and Optimum Virtualized

Tutorial on Client-Server Architecture

Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

A Survey on Secure Storage Services in Cloud Computing

Group Based Load Balancing Algorithm in Cloud Computing Virtualization

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

CLEVER: a CLoud-Enabled Virtual EnviRonment

Secure Storage Services and Erasure Code Implementation in Cloud Servers

Survey on virtual machine security

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

A Study on Service Oriented Network Virtualization convergence of Cloud Computing

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Security Considerations for Public Mobile Cloud Computing

A Security Integrated Data Storage Model for Cloud Environment

Ant-based Load Balancing Algorithm in Structured P2P Systems

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April ISSN

Authorized data deduplication check in hybrid cloud With Cluster as a Service

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

Li Sheng. Nowadays, with the booming development of network-based computing, more and more

Load Balancing Algorithms in Cloud Environment

Research Article Cloud Platform Based on Mobile Internet Service Opportunistic Drive and Application Aware Data Mining

Review of the Techniques for User Management System

The Open Cloud Near-Term Infrastructure Trends in Cloud Computing

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES

MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2

A Survey on Load Balancing and Scheduling in Cloud Computing

Cloud Computing Security: From Single to Multi-Clouds

IEEE JAVA TITLES

Design and Implementation of Performance Guaranteed Symmetric Load Balancing Algorithm

Cryptographic Data Security over Cloud

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN:

An Architecture Model of Sensor Information System Based on Cloud Computing

Datacenters and Cloud Computing. Jia Rao Assistant Professor in CS

Index Terms: Smart phones, Malwares, security, permission violation, malware detection, mobile devices, Android, security

RED HAT CONTAINER STRATEGY

A Secure and Dependable Cloud Storage Service in Cloud Computing

A Survey on Trust Based Security and Privacy Issues of Cloud Computing Framework

Method of Fault Detection in Cloud Computing Systems

Secure Data Sharing in Cloud Computing using Hybrid cloud

Computing Service Provision in P2P Clouds

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Data Centers and Cloud Computing

Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing

Chapter 1: Introduction

CS 6343: CLOUD COMPUTING Term Project

Private Cloud Management

Performance Analysis of Resource Provisioning for Cloud Computing Frameworks

Transcription:

Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing Cloud storage systems The rise of big data on cloud computing: Review and open research issues Consistency models Conventional models, current cloud practices Do we need new models? Erasure coding Fundamentals, from RAID to Reed Solomon Practical erasure coding in the cloud Performance of erasure coding schemes Access to erasure codes: Yongtao Huang (2/6) SaaS technologies and SaaS security SaaS technologies: A short overview Access control models for SaaS Existing access control models What is the difference in SaaS and what are the access control models that are suitable for SaaS Information flow control and data provenance for SaaS Fundamental concepts in information flow control and why they are not sufficient for SaaS New models and research Taint analysis: Timothy Hoffman (2/27) Semantic based service composition in the SaaS cloud: Wei Zhu SaaS development technologies (with MDA): Nidhi Solanki and Uzma Azim Last three topics will be presented during 3/5-12 Virtualization, resource management, and security in the cloud Summary of virtualization basics CPU virtualization: Technologies evolution Memory virtualization: Shadow page and ballooning IaaS cloud resource management VM workload prediction VM placement Trusted processors and its role in cloud computing Most research on cloud security focuses on intrusion detection (IDS) What if intruder successfully compromises the system Data protection even if the system is hacked Secret sharing and homomorphic encryption for cloud data protection Cloud provider is malicious, or having insider attacks Ultimate protection to customer data Allow computation being performed on encrypted data VM security: Shuai Zhang (roughly 3/26 or 4/2) IoT Cloud and big data Cloud computing for Internet of & sensing based applications The Internet of things: A survey from the data-centric perspective

An IoT-oriented data storage framework in cloud computing platform An efficient index for massive IOT data in cloud environment IoT cloud and security: Hessam Moeini (roughly 4/2 or 4/9) IoT data management in the cloud: Anthony Opara Building an ad hoc communication infrastructure for IoT cloud: Guang Zhou (roughly 4/2 or 4/9) Back to Cloud storage systems Better erasure codes: Yongtao Huang (roughly 4/9 or 4/16) More efficient computation in the cloud MapReduce and other data parallel computation models Computer vision basics and using cloud for computer vision: Jinwei Yuan (roughly in the 4/16 or 4/23) Project demo and presentation in the last two weeks

Papers for the presentation topics (incomplete) Cloud Storage Access to erasure codes: Yongtao Huang Secure, dependable, and high performance cloud storage J. Hendricks, G.R. Ganger, M.K. Reiter, Low-overhead Byzantine fault-tolerant storage, SOSP, pp. 73-86, Oct. 2007. C. Cachin, S. Tessaro, Optimal resilience for erasure-coded Byzantine distributed storage, DSN, pp. 115, Jun. 2006. M. Abd-El-Malek, G.R. Ganger, G.R. Goodson, et al., Towards bounded waitfree PASIS, From Security to Dependability, Oct. 2007, ISDN: 1862-4405. G.R. Goodson, J.J. Wylie, G.R. Ganger, et al., Efficient Byzantine-tolerant erasure-coded storage, DSN, pp. 135, Jun. 2004. Better erasure codes: Yongtao Huang Rethinking erasure codes for cloud file systems: Minimizing I/O for recovery and degraded reads Simple regenerating codes: Network coding for cloud storage Tree-structured data regeneration with network coding in distributed storage systems Cloud load balancing: N/A A comparative study into distributed load balancing algorithms for cloud computing Ananta: Cloud scale load balancing Stochastic Models of load balancing and scheduling in cloud computing clusters S. Penmatsa and A. T. Chronopoulos, Game-theoretic static load balancing for distributed systems, Journal of Parallel and Distributed Computing, vol. 71, no. 4, pp. 537 555, 2011 Efficient, proximity-aware load balancing for DHT-based P2P systems Locality-aware and churn-resilient load-balancing algorithms in structured peerto-peer networks The server reassignment problem for load balancing in structured P2P systems SaaS Information Flow Control and Taint analysis: Timothy Hoffman A sound type system for secure flow analysis Dynamic vs. Static flow-sensitive security analysis TaintDroid: An information-flow tracking system for realtime privacy monitoring on smart phones Towards fully automatic placement of security sanitizers and declassifiers SaaS development technologies: Nidhi Solanki and Uzma Azim Model driven architecture: Principles and practice Model driven engineering: Automated code generation and beyond http://resources.sei.cmu.edu/asset_files/technicalnote/2015_004_001_435420.pdf Domain-specific modeling for full code generation https://www.csiac.org/sites/default/files/journal_files/2010_01_15_modeldriven Development.pdf

Automatic code generation by model transformation from sequence diagram of system s internal behavior A survey of model driven engineering tools for user interface design From UML diagrams to behavioral source code http://homepages.cwi.nl/~paulk/thesesmastersoftwareengineering/2006/sabrinaji m.pdf A MDA-based environment for web applications development: From conceptual models to code EasySaaS: A SaaS development framework Comparing PaaS offerings in light of SaaS development Cloud SaaS and model driven architecture Software customization based on model-driven architecture over SaaS platforms A template-based model transformation approach for deriving multi-tenant SaaS applications Enhancing cloud SaaS development with model driven architecture Semantic based service composition in the SaaS cloud: Wei Zhu Software development by crowdsourcing: N/A Two's company, three's a crowd: a case study of crowdsourcing software development Creative software crowdsourcing: from components and algorithm development to project concept formations Collaborative software development platforms for crowdsourcing Virtualization Security issues in virtualization technologies: Shuai Zhang B. Dolan-Gavitt, T. Leek, M. Zhivich, J. Giffin, and W. Lee, "Virtuoso: Narrowing the semantic gap in virtual machine introspection," IEEE Symposium on Security and Privacy, May 2011. Y. Fu, Z. Lin, Space traveling across VM: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection, IEEE Symposium on Security and Privacy, May 2012, pp. 586-600. Xuxian Jiang, Xinyuan Wang, Dongyan Xu, Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction, ACM CCS, 2007. Security for IoT cloud: Hessam Moeini Enforcing security mechanisms in the IP-based Internet of things: An algorithmic overview A capability-based security approach to manage access control in the Internet of Identity establishment and capability based access control (IECAC) scheme for Internet of Securing the IP-based Internet of with HIP and DTLS Key management systems for sensor networks in the context of the Internet of Sensor network security: A survey

Wireless sensor network security: A survey IoT data management The Internet of : A survey from the data-centric perspective Supporting streaming updates in an active data warehouse Semantics for the Internet of : Early progress and back to the future An extensible and active semantic model of information organizing for the Internet of Massive heterogeneous sensor data management in the Internet of Sensor search techniques for sensing as a service architecture for the Internet of Towards a quality-centric big data architecture for federated sensor services Ubiquitous data accessing method in IoT-based information system for emergency medical services An information framework for creating a smart city through Internet of Building ad hoc communication infrastructure in IoT cloud: Guang Zhou Container technologies and security: N/A Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors Containers and cloud: From lxc to Docker to Kubernetes Performance evaluation of container-based virtualization for high performance computing environments Virtualization: A survey on concepts, taxonomy and associated security issues Analysis of Docker security Provisioning software-defined IoT cloud systems Computation in the Cloud Computer vision basics and using cloud for computer vision: Jinwei Yuan