ACM Computing Surveys
Wei Huang, Afshar Ganjali, Beom Heyn Kim, Sukwon Oh, and David Lie
The public Infrastructure-as-a-Service (IaaS) cloud industry has reached a critical mass in the past few years, with many cloud service providers ﬁelding competing services. Despite the competition, some of the security mechanisms offered by the services to be similar, indicating that the cloud industry has established a number of “best-practices,” while other security mechanisms vary widely, indicating that there is also still room for innovation and experimentation. This papers investigates these differences and possible underlying reasons for it. It also contrasts the security mechanisms offered by public IaaS cloud offerings with security mechanisms proposed by academia over the same period.
Junyuan Zeng and Zhiqiang Lin
This paper presents ARGOS, the first system that can automatically uncover the semantics of kernel objects directly from a kernel binary. Based on the principle of data use reveals data semantics, it starts from the execution of system calls (i.e., the user level application interface) and exported kernel APIs (i.e., the kernel module development interface), and automatically tracks how an instruction accesses the kernel object and assigns a bit-vector for each observed kernel object. This bit-vector encodes which system call accesses the object and how the object is accessed (e.g., read, write, create, destroy), from which we derive the meaning of the kernel object based on a set of rules developed according to the general understanding of OS kernels.
2015 International Conference on Pervasive Computing
Deevi Radha Rani and G. Geethakumari
Cloud computing has recently emerged as a technology to allow users to access infrastructure, storage, software and deployment environment based on a pay-for-what-they-use model. Traditional digital forensics cannot handle the dynamic and multi-tenant nature of the cloud environment as it has to address various technical, legal, and organizational challenges typical to the cloud systems. The dynamic nature of cloud computing allows abundant opportunities to enable digital investigations in the cloud environment. This paper addresses the challenges of digital forensics in the cloud environment and existing solutions to ease some of the challenges. We propose an efficient approach to forensic investigation in cloud using Virtual Machine (VM) snapshots.
IEEE Security and Privacy
IEEE TRANSACTIONS ON MULTIMEDIA
Yonggang Wen, Xiaoqing Zhu, Joel J. P. C. Rodrigues, Chang Wen Chen
This paper surveys the emerging paradigm of cloud mobile media. It discusses two alternative perspectives for cloud mobile media networks: an end-to-end view and a layered view. Summaries of existing research in this area are organized according to the layered service framework.
10th International Conference on Communications, Alecsandru Patrascu and Victor-Valeriu Patriciu
Cloud computing has emerged as a paradigm that attracts more and more researchers. In this context, the need for knowing where, how and under what conditions data is either processed or stored in datacenters, becomes a prime interest due to the continuously developing field of cloud computing forensics.
Cloud Cover, Stephen P. Crago and John Paul Walters, University of Southern California Information Sciences Institute
Cloud computing developers face multiple challenges in adapting systems and applications for increasingly heterogeneous datacenter architectures. Many challenges remain, but ultimately cloud computing will both benefit from and contribute to the improved compute efficiencies and capabilities that have driven IT over the past five decades and should continue into the future.
IEEE Wireless Communications
Jingchu Liu, Tao Zhao, Sheng Zhou, Yu Cheng, and Zhisheng Niu
Cellular networks are one of the cornerstones of our information-driven society. However, existing cellular systems have been seriously challenged by the explosion of mobile data traffic, the emergence of machine-type communications, and the flourishing of mobile Internet services.
Ozalp Babaoglu and Moreno Marzolla
Today, cloud computing takes place in giant server farms owned by the likes of Amazon, Google, or Microsoft—but it doesn’t have to.
Personal improvement educator Stephen Covey originally wrote The Seven Habits of Highly Effective People back in 1989. Since that time his approach to attaining goals effectively has been reimagined and reinvented for an infinite variety of disciplines and behaviours — so why not big data analytics?
Hao Yin, Yong Jiang, Chuang Lin, Yan Luo, and Yunjie Liu
Big data opens the era of the fourth paradigm for science discovery through data-driven computing. This new paradigm applies to the design of the future Internet, which currently faces issues in supporting new applications, efficient resource use, and continuous evolvement. In this article, the authors discuss several technological transformations in network architecture, services, and applications, and point out the grand opportunities for designing future Internet architectures, communication models, and resource management mechanisms enabled by the availability of massive network data. In particular, the authors envision in the future Internet: computational complexity replacing state complexity in the control plane; data intelligence enabling user choices and rewards innovations; and correlations from data analytics to help solve inherently hard optimization problems. Finally, the authors identify the key challenges in data-driven Internet design and outline future research directions.
By: Ivan Berger
“While many conferences focus on present-day research and technologies, the IEEE Future Directions Committee (FDC)—the organization’s R&D arm—has something else in mind. It wants to explore how today’s developments will influence the direction of technology, and the world we live in, a generation out—into the year 2035 and beyond.”
By: Lauren Hockenson
When the cloud gets better, how do we use it to benefit business strategy? IEEE chair and Gigaom Analyst Joe Weinman believes the answer lies in upgrading the Value Disciplines.
By: Monica Rozenfeld
"On 23 April, representatives from 12 New Jersey universities known as the New Jersey Big Data Alliance met to discuss how to increase research in the area of big data and help drive economic development in the state."
By: Ken Chong
"A device is a device. Or is it? End users want ubiquitous, seamless access to their applications and data across all devices, but the reality is that different devices have different capabilities and application support. Similarly, IT management of devices is fragmented and inconsistent. And these problems will only grow as new devices -- watches, glasses, cars, and more -- enter the workplace."
By: Jo Napolitano
"The technology nonprofit inBloom, created to build a massive cloud-based student data system, announced it will close -- just weeks after New York ordered it to delete state student records. In an open letter posted to the group's website, inBloom chief executive Iwan Streichenberger said the Atlanta-based organization had become "a lightning rod for misdirected criticism.""
By: Noel Randewich
"Intel Corp's investment in Cloudera announced last week amounts to $740 million and gives the chipmaker an 18 percent stake in the distributor of software for crunching Big Data, Cloudera said in a press release on Monday."
By: James Niccolai
The course was developed with input from HP and other industry players
By: Lily Hay Newman
Software redistributes tasks among networked data centers to optimize energy efficiency
By: George Varghese
"Big data: you can hardly pick up a newspaper without reading about some new scientific or business acumen derived from mining some heretofore-untouched volumes of digital information. Well, I'm happy to say that genome sequence data-which certainly qualifies as big, both in volume and velocity-is joining the party, and in a most meaningful way. When combined with information from medical records, genome data can be mined for new insights into treating disease."