The State of Public Infrastructure-as-a-Service Cloud Security

ACM Computing Surveys

Wei Huang, Afshar Ganjali, Beom Heyn Kim, Sukwon Oh, and David Lie

The public Infrastructure-as-a-Service (IaaS) cloud industry has reached a critical mass in the past few years, with many cloud service providers fielding competing services. Despite the competition, some of the security mechanisms offered by the services to be similar, indicating that the cloud industry has established a number of “best-practices,” while other security mechanisms vary widely, indicating that there is also still room for innovation and experimentation. This papers investigates these differences and possible underlying reasons for it. It also contrasts the security mechanisms offered by public IaaS cloud offerings with security mechanisms proposed by academia over the same period.

Towards Automatic Inference of Kernel Object Semantics from Binary Code

Junyuan Zeng and Zhiqiang Lin

This paper presents ARGOS, the first system that can automatically uncover the semantics of kernel objects directly from a kernel binary. Based on the principle of data use reveals data semantics, it starts from the execution of system calls (i.e., the user level application interface) and exported kernel APIs (i.e., the kernel module development interface), and automatically tracks how an instruction accesses the kernel object and assigns a bit-vector for each observed kernel object. This bit-vector encodes which system call accesses the object and how the object is accessed (e.g., read, write, create, destroy), from which we derive the meaning of the kernel object based on a set of rules developed according to the general understanding of OS kernels.


An Efficient Approach to Forensic Investigation in Cloud using VM Snapshots

2015 International Conference on Pervasive Computing

Deevi Radha Rani and G. Geethakumari

Cloud computing has recently emerged as a technology to allow users to access infrastructure, storage, software and deployment environment based on a pay-for-what-they-use model. Traditional digital forensics cannot handle the dynamic and multi-tenant nature of the cloud environment as it has to address various technical, legal, and organizational challenges typical to the cloud systems. The dynamic nature of cloud computing allows abundant opportunities to enable digital investigations in the cloud environment. This paper addresses the challenges of digital forensics in the cloud environment and existing solutions to ease some of the challenges. We propose an efficient approach to forensic investigation in cloud using Virtual Machine (VM) snapshots.

Understanding Cloud Computing Vulnerabilities

IEEE Security and Privacy

Bernd Grobauer, Tobias Walloschek, and Elmar Stöcker, Siemens
Discussions about cloud computing security often fail to distinguish general issues from cloud-specific issues. To clarify the discussions regarding vulnerabilities, the authors define indicators based on sound definitions of risk factors and cloud computing. 

Cloud Mobile Media: Reflections and Outlook


Yonggang Wen, Xiaoqing Zhu, Joel J. P. C. Rodrigues, Chang Wen Chen

This paper surveys the emerging paradigm of cloud mobile media. It discusses two alternative perspectives for cloud mobile media networks: an end-to-end view and a layered view. Summaries of existing research in this area are organized according to the layered service framework.

Logging Framework for Cloud Computing Forensic Environments

10th International Conference on Communications, Alecsandru Patrascu and Victor-Valeriu Patriciu

Cloud computing has emerged as a paradigm that attracts more and more researchers. In this context, the need for knowing where, how and under what conditions data is either processed or stored in datacenters, becomes a prime interest due to the continuously developing field of cloud computing forensics.

Heterogeneous Cloud Computing: The Way Forward

Cloud Cover, Stephen P. Crago and John Paul Walters, University of Southern California Information Sciences Institute 

Cloud computing developers face multiple challenges in adapting systems and applications for increasingly heterogeneous datacenter architectures. Many challenges remain, but ultimately cloud computing will both benefit from and contribute to the improved compute efficiencies and capabilities that have driven IT over the past five decades and should continue into the future.

Concert: A Cloud-Based Architecture for Next-Generation Cellular Systems

IEEE Wireless Communications

Jingchu Liu, Tao Zhao, Sheng Zhou, Yu Cheng, and Zhisheng Niu

Cellular networks are one of the cornerstones of our information-driven society. However, existing cellular systems have been seriously challenged by the explosion of mobile data traffic, the emergence of machine-type communications, and the flourishing of mobile Internet services.

Escape From the Data Center: The Promise of Peer-to-Peer Cloud Computing

IEEE Spectrum

Ozalp Babaoglu and Moreno Marzolla

Today, cloud computing takes place in giant server farms owned by the likes of Amazon, Google, or Microsoft—but it doesn’t have to.

The Seven Habits Of Highly Effective Big Data Users


Adrian Bridgwater

Personal improvement educator Stephen Covey originally wrote The Seven Habits of Highly Effective People back in 1989. Since that time his approach to attaining goals effectively has been reimagined and reinvented for an infinite variety of disciplines and behaviours — so why not big data analytics?

Big Data: Transforming the Design Philosophy of Future Internet

IEEE Network

Hao Yin, Yong Jiang, Chuang Lin, Yan Luo, and Yunjie Liu

Big data opens the era of the fourth paradigm for science discovery through data-driven computing. This new paradigm applies to the design of the future Internet, which currently faces issues in supporting new applications, efficient resource use, and continuous evolvement. In this article, the authors discuss several technological transformations in network architecture, services, and applications, and point out the grand opportunities for designing future Internet architectures, communication models, and resource management mechanisms enabled by the availability of massive network data. In particular, the authors envision in the future Internet: computational complexity replacing state complexity in the control plane; data intelligence enabling user choices and rewards innovations; and correlations from data analytics to help solve inherently hard optimization problems. Finally, the authors identify the key challenges in data-driven Internet design and outline future research directions.

Inside the Technology Time Machine

By: Ivan Berger

“While many conferences focus on present-day research and technologies, the IEEE Future Directions Committee (FDC)—the organization’s R&D arm—has something else in mind. It wants to explore how today’s developments will influence the direction of technology, and the world we live in, a generation out—into the year 2035 and beyond.”

How the cloud reshapes smart business strategy

By: Lauren Hockenson

When the cloud gets better, how do we use it to benefit business strategy? IEEE chair and Gigaom Analyst Joe Weinman believes the answer lies in upgrading the Value Disciplines.

New Jersey Universities Meet to Discuss Big Data

By: Monica Rozenfeld

"On 23 April, representatives from 12 New Jersey universities known as the New Jersey Big Data Alliance met to discuss how to increase research in the area of big data and help drive economic development in the state."

Converging Mobile and Cloud With a Rock Star Edge

By: Ken Chong

"A device is a device. Or is it? End users want ubiquitous, seamless access to their applications and data across all devices, but the reality is that different devices have different capabilities and application support. Similarly, IT management of devices is fragmented and inconsistent. And these problems will only grow as new devices -- watches, glasses, cars, and more -- enter the workplace."

Data service inBloom calls it quits

By: Jo Napolitano

"The technology nonprofit inBloom, created to build a massive cloud-based student data system, announced it will close -- just weeks after New York ordered it to delete state student records. In an open letter posted to the group's website, inBloom chief executive Iwan Streichenberger said the Atlanta-based organization had become "a lightning rod for misdirected criticism.""

Intel invested $740 million to buy 18 percent of Cloudera

By: Noel Randewich

"Intel Corp's investment in Cloudera announced last week amounts to $740 million and gives the chipmaker an 18 percent stake in the distributor of software for crunching Big Data, Cloudera said in a press release on Monday."

Texas school offers first-of-a-kind data center engineering degree

By: James Niccolai

The course was developed with input from HP and other industry players

New Algorithms Reduce the Carbon Cost of Cloud Computing

By: Lily Hay Newman

Software redistributes tasks among networked data centers to optimize energy efficiency

Interactive genomics: querying genomes across the cloud

By: George Varghese

"Big data: you can hardly pick up a newspaper without reading about some new scientific or business acumen derived from mining some heretofore-untouched volumes of digital information. Well, I'm happy to say that genome sequence data-which certainly qualifies as big, both in volume and velocity-is joining the party, and in a most meaningful way. When combined with information from medical records, genome data can be mined for new insights into treating disease."

Cloud Power Issue Looms, Says Cisco CTO

By: Rick Merritt

Mega-datacenters will demand as much power as small cities in the next few years without technology breakthroughs, warns a Cisco CTO.

cc rc 2014

technav badge

promo join


jobs small