SlideShare a Scribd company logo
1 of 37
Assured Cloud Computing for
Assured Information Sharing
Presented
By
OUTLINE
 Objectives
 Assured Information Sharing
 Layered Framework for a Secure Cloud
 Cloud-based Assured Information Sharing
 Cloud-based Secure Social Networking
 Other Topics
Secure Hybrid Cloud
Cloud Monitoring
Cloud for Malware Detection
Cloud for Secure Big Data
 Education
 Directions
 Related Books
www.kellytechno.com
TEAM MEMBERS
 Sponsor: Air Force Office of Scientific Research
 The University of Texas at Dallas
 Dr. Murat Kantarcioglu; Dr. Latifur Khan; Dr. Kevin Hamlen;
Dr. Zhiqiang Lin, Dr. Kamil Sarac
 Sub-contractors
 Prof. Elisa Bertino (Purdue)
 Ms. Anita Miller, Late Dr. Bob Johnson (North Texas Fusion
Center)
 Collaborators
 Late Dr. Steve Barker, Dr. Maribel Fernandez, Kings College,
U of London (EOARD)
 Dr. Barbara Carminati; Dr. Elena Ferrari, U of Insubria
(EOARD)
www.kellytechno.com
OBJECTIVES
 Cloud computing is an example of computing in which dynamically
scalable and often virtualized resources are provided as a service over
the Internet. Users need not have knowledge of, expertise in, or control
over the technology infrastructure in the "cloud" that supports them.
 Our research on Cloud Computing is based on Hadoop, MapReduce,
Xen
 Apache Hadoop is a Java software framework that supports data
intensive distributed applications under a free license. It enables
applications to work with thousands of nodes and petabytes of data.
Hadoop was inspired by Google's MapReduce and Google File System
(GFS) papers.
 XEN is a Virtual Machine Monitor developed at the University of
Cambridge, England
 Our goal is to build a secure cloud infrastructure for assured information
sharing and related applications
www.kellytechno.com
INFORMATION OPERINFORMATION OPERAATIONS ACROSS INFOSPHERES:TIONS ACROSS INFOSPHERES:
ASSURED INFORMATION SHARINGASSURED INFORMATION SHARING
Scientific/Technical Approach
Conduct experiments as to how much information is
lost as a result of enforcing security policies in the
case of trustworthy partners
Develop more sophisticated policies based on role-
based and usage control based access control
models
Develop techniques based on game theoretical
strategies to handle partners who are semi-
trustworthy
Develop data mining techniques to carry out
defensive and offensive information operations
Accomplishments
 Developed an experimental system for
determining information loss due to
security policy enforcement
 Developed a strategy for applying game
theory for semi-trustworthy partners;
simulation results
 Developed data mining techniques for
conducting defensive operations for
untrustworthy partners
Challenges
 Handling dynamically changing trust
levels; Scalability
Objectives
Develop a Framework for Secure and Timely Data
Sharing across Infospheres
Investigate Access Control and Usage Control
policies for Secure Data Sharing
Develop innovative techniques for extracting
information from trustworthy, semi-trustworthy
and untrustworthy partners Component
Data/Policy for
Agency A
Data/Policy for Coalition
Publish Data/Policy
Component
Data/Policy for
Agency C
Component
Data/Policy for
Agency B
Publish Data/Policy
Publish Data/Policy
www.kellytechno.com
Our Approach
• Policy-based Information Sharing
• Integrate the Medicaid claims data and mine the data;
• Enforce policies and determine how much information has
been lost (Trustworthy partners);
• Application of Semantic web technologies
• Apply game theory and probing to extract information from
semi-trustworthy partners
• Conduct Active Defence and determine the actions of an
untrustworthy partner
– Defend ourselves from our partners using data analytics
techniques
– Conduct active defence – find our what our partners are
doing by monitoring them so that we can defend our
selves from dynamic situations
www.kellytechno.com
Coalition
Policy Enforcement Prototype
www.kellytechno.com
LAYERED FRAMEWORK FOR ASSURED
CLOUD COMPUTING
09/09/15
8
Applications
Hadoop/MapReduc/Storage
HIVE/SPARQL/Query
XEN/Linux/VMM
Secure Virtual
Network Monitor
Policies
XACML
RDF
Risks/
Costs
QoS
Resource
Allocation
Cloud
Monitors
Figure2. Layered Framework for Assured Cloud
www.kellytechno.com
SECURE QUERY PROCESSING WITH
HADOOP/MAPREDUCE
 We have studied clouds based on Hadoop
 Query rewriting and optimization techniques designed and
implemented for two types of data
 (i) Relational data: Secure query processing with HIVE
 (ii) RDF data: Secure query processing with SPARQL
 Demonstrated with XACML policies
 Joint demonstration with Kings College and University of
Insubria
 First demo (2011): Each party submits their data and policies
 Our cloud will manage the data and policies
 Second demo (2012): Multiple clouds
www.kellytechno.com
Fine-grained Access Control with Hive
System Architecture
 Table/View definition and loading,
 Users can create tables as well as
load data into tables. Further, they
can also upload XACML policies
for the table they are creating.
Users can also create XACML
policies for tables/views.
 Users can define views only if they
have permissions for all tables
specified in the query used to
create the view. They can also
either specify or create XACML
policies for the views they are
defining.
 CollaborateCom 2010
www.kellytechno.com
Server
Backend
SPARQL Query Optimizer for Secure
RDF Data Processing
Web Interface
Data Preprocessor
N-Triples
Converter
Prefix Generator
Predicate
Based Splitter
Predicate Object
Based Splitter
MapReduce Framework
Parser
Query Validator
& Rewriter
XACML PDP
Plan
Generator
Plan Executor
Query Rewriter By
Policy
New Data Query
Answer
To build an efficient
storage mechanism
using Hadoop for
large amounts of
data (e.g. a billion
triples); build an
efficient query
mechanism for data
stored in Hadoop;
Integrate with Jena
Developed a query
optimizer and query
rewriting techniques
for RDF Data with
XACML policies and
implemented on top
of JENA
IEEE Transactions
on Knowledge and
Data Engineering,
2011
www.kellytechno.com
DEMONSTRATION: CONCEPT OF
OPERATION
User Interface Layer
Fine-grained Access
Control with Hive
SPARQL Query
Optimizer for Secure
RDF Data Processing
Relational
Data
RDF Data
Agency
1
Agency
2
Agency
n
…
www.kellytechno.com
RDF-Based Policy Engine
Policies
Ontologies
Rules
In RDF
JENA RDF Engine
RDF Documents
Inference Engine/
Rules Processor
e.g., Pellet
Interface to the Semantic WebTechnology
By UTDallas
www.kellytechno.com
RDF-BASED POLICY ENGINE ON THE
CLOUD
Policy
Transformation
Layer
ResultQuery
DB DB RDF
Policy Parser Layer
Regular Expression-Query
Translator
Data Controller Provenance Controller
. . .
RDF
XML
Policy / Graph
Transformation Rules
Access Control/ Redaction
Policy (Traditional Mechanism)
User Interface Layer
High Level Specification
Policy
Translator
A testbed for evaluating different policy sets over
different data representation. Also supporting
provenance as directed graph and viewing policy
outcomes graphically
 Determine how access is granted to a
resource as well as how a document is
shared
 User specify policy: e.g., Access Control,
Redaction, Released Policy
 Parse a high-level policy to a low-level
representation
 Support Graph operations and
visualization. Policy executed as graph
operations
 Execute policies as SPARQL queries over
large RDF graphs on Hadoop
 Support for policies over Traditional
data and its provenance
 IFIP Data and Applications Security,
2010, ACM SACMAT 2011www.kellytechno.com
INTEGRATION WITH
ASSURED INFORMATION SHARING:
User Interface Layer
RDF Data
Preprocessor
Policy Translation and
Transformation Layer
MapReduce
Framework for Query
Processing
Hadoop HDFS
Agency
1
Agency
2
Agency
n
…
RDF Data
and
Policies
SPARQL
Query
Result
www.kellytechno.com
ARCHITECTURE
Policy Engine
Provenance
Agency 1
Agency 2
Agency n
User Interface Layer
Connection Interface
RDF GraphPolicy Request
RDF Graph: ModelRDF Query: SPARQL
RDBMS Connection: DB
Connection: Cloud
Connection: Text
Cloud-based
Store
Local
Access Control
Combined
Redaction
Policy n-2
Policy n-1 Access Control
Combined
Redaction
Policy n
www.kellytechno.com
POLICY RECIPROCITY
 Agency 1 wishes to share its resources if Agency 2 also
shares its resources with it
 Use our Combined policies
 Allow agents to define policies based on reciprocity and mutual interest
amongst cooperating agencies
SPARQL query:
SELECT B
FROM NAMED uri1 FROM NAMED uri2
WHERE P
www.kellytechno.com
DEVELOP AND SCALE POLICIES
 Agency 1 wishes to extend its existing policies with
support for constructing policies at a finer granularity.
 The Policy engine
 Policy interface that should be implemented by all policies
 Add newer types of policies as needed
www.kellytechno.com
JUSTIFICATION OF RESOURCES
 Agency 1 asks Agency 2 for a justification of resource R2
 Policy engine
 Allows agents to define policies over provenance
 Agency 2 can provide the provenance to Agency 1
 But protect it by using access control or redaction policies
www.kellytechno.com
OTHER EXAMPLE POLICIES
 Agency 1 shares a resource with Agency 2
provided Agency 2 does not share with Agency 3
 Agency 1 shares a resource with Agency 2
depending on the content of the resource or until
a certain time
 Agency 1 shares a resource R with agency 2
provided Agency 2 does not infer sensitive data S
from R (inference problem)
 Agency 1 shares a resource with Agency 2
provided Agency 2 shares the resource only with
those in its organizational (or social) network
www.kellytechno.com
ANALYZING AND SECURING
SOCIAL NETWORKS IN THE CLOUD
ANALYTICS
LOCATION MINING FROM ONLINE SOCIAL
NETWORKS
PREDICTING THREATS FROM SOCIAL NETWORK
DATA, SENTIMENT ANALYSIS
CLOUD PLATFORM FOR IMPLEMENTATION
SECURITY AND PRIVACY
PREVENTING THE INFERENCE OF PRIVATE
ATTRIBUTES (LIBERAL OR CONSERVATIVE; GAY OR
STRAIGHT)
ACCESS CONTROL IN SOCIAL NETWORKS
CLOUD PLATFORM FOR IMPLEMENTATION
www.kellytechno.com
SECURITY POLICIES FOR ON-
LINE SOCIAL NETWORKS (OSN)
 Security Policies ate Expressed in SWRL (Semantic
Web Rules Language) examples
www.kellytechno.com
SECURITY POLICY ENFORCEMENT
 A reference monitor evaluates the requests.
 Admin request for access control could be evaluated by
rule rewriting
 Example: Assume Bob submits the following admin request
 Rewrite as the following rule
www.kellytechno.com
FRAMEWORK ARCHITECTURE
Social Network
Application
Reference
Monitor
Semantic
Web
Reasoning
Engine
Access request Access
Decision
Policy Store
Modified Access
request
Policy Retrieval
Reasoning Result
SN Knowledge
Base
Knowledge Base
Queries
www.kellytechno.com
SECURE SOCIAL NETWORKING IN THE
CLOUD WITH TWITTER-STORM
User Interface Layer
Fine-grained Access
Control with Hive
SPARQL Query
Optimizer for Secure
RDF Data Processing
Relational
Data
RDF Data
Social
Network 1
Social
Network 2
Social Network N
…
www.kellytechno.com
SECURE STORAGE AND QUERY
PROCESSING IN A HYBRID CLOUD
 The use of hybrid clouds is an emerging trend in cloud
computing
Ability to exploit public resources for high throughput
Yet, better able to control costs and data privacy
 Several key challenges
Data Design: how to store data in a hybrid cloud?
 Solution must account for data representation used
(unencrypted/encrypted), public cloud monetary costs and query workload
characteristics
Query Processing: how to execute a query over a hybrid
cloud?
 Solution must provide query rewrite rules that ensure the correctness of a
generated query plan over the hybrid cloud
www.kellytechno.com
HYPERVISOR INTEGRITY AND
FORENSICS
IN THE CLOUD
Cloud integrity &
forensics
Hardware Layer
Virtualization Layer (Xen,
vSphere)
Linux Solaris XP MacOS
 Secure control flow of hypervisor code
Integrity via in-lined reference monitor
 Forensics data extraction in the cloud
Multiple VMs
De-mapping (isolate) each VM memory from physical memory
Hypervisor
OS
Applications
integrity
forensics
www.kellytechno.com
CLOUD-BASED MALWARE DETECTION
Benign
Buffer
Feature
extraction and
selection using
Cloud
Training &
Model update
Unknown
executable
Feature
extraction
Classify
ClassMalware
Remove Keep
Stream of known malware or
benign executables
Ensemble of
Classification
models
www.kellytechno.com
CLOUD-BASED MALWARE DETECTION
 Binary feature extraction involves
 Enumerating binary n-grams from the binaries and selecting the best n-
grams based on information gain
 For a training data with 3,500 executables, number of distinct 6-grams
can exceed 200 millions
 In a single machine, this may take hours, depending on available
computing resources – not acceptable for training from a stream of
binaries
 We use Cloud to overcome this bottleneck
 A Cloud Map-reduce framework is used
 to extract and select features from each chunk
 A 10-node cloud cluster is 10 times faster than a single node
 Very effective in a dynamic framework, where malware characteristics
change rapidly
www.kellytechno.com
IDENTITY MANAGEMENT
CONSIDERATIONS IN A CLOUD
 Trust model that handles
 (i) Various trust relationships, (ii) access control policies based on
roles and attributes, iii) real-time provisioning, (iv) authorization,
and (v) auditing and accountability.
 Several technologies are being examined to develop the
trust model
 Service-oriented technologies; standards such as SAML and
XACML; and identity management technologies such as OpenID.
 Does one size fit all?
 Can we develop a trust model that will be applicable to all types of
clouds such as private clouds, public clouds and hybrid clouds
Identity architecture has to be integrated into the cloud
architecture.
www.kellytechno.com
Big Data and the Cloud
0 Big Data describes large and complex data that cannot be managed by
traditional data management tools
0 From Petabytes to Zettabytes to Exabytes of data
0 Need tools for capture, storage, search, sharing, analysis, visualization of big
data.
0 Examples include
- Web logs, RFID and surveillance data, sensor networks, social network data
(graphs), text and multimedia, data pertaining to astronomy, atmospheric
science, genomics, biogeochemical, biological fields, video archives
0 Big Data Technologies
0 Hadoop/MapReduce Platform, HIVE Platform, Twitter Storm Platform, Google
Apps Engine, Amazon EC2 Cloud, Offerings from Oracle and IBM for Big Data
Management, Other: Cassandra, Mahut, PigLatin, - - - -
0 Cloud Computing is emerging a critical tool for Big Data Management
0 Critical to maintain Security and Privacy for Big Data
www.kellytechno.com
Security and Privacy for Big Data
0 Secure Storage and Infrastructure
0 How can technologies such as Hadoop and MapReduce be
Secured
0 Secure Data Management
0 Techniques for Secure Query Processing
0 Examples: Securing HIVE, Cassandra
0 Big Data for Security
0 Analysis of Security Data (e.g., Malware analysis)
0 Regulations, Compliance Governance
0 What are the regulations for storing, retaining, managing,
transferring and analyzing Big Data
0 Are the corporations compliance with the regulations
0 Privacy of the individuals have to be maintained not just for raw
data but also for data integration and analytics
0 Roles and Responsibilities must be clearly defined
www.kellytechno.com
Security and Privacy for Big Data
0 Regulations Stifling Innovation?
0Major Concern is too many regulations will stifle
Innovation
0Corporations must take advantage of the Big Data
technologies to improve business
0But this could infringe on individual privacy
0Regulations may also interfere with Privacy – example
retaining the data
0Challenge: How can one carry out Analytics and still
maintain Privacy?
0 National Science F Workshop Planned for Spring 2014 at
the University of Texas at Dallas
www.kellytechno.com
EDUCATION ON SECURE CLOUD
COMPUTING AND RELATED
TECHNOLOGIES
 Secure Cloud Computing
 NSF Capacity Building Grant on Assured Cloud Computing
 Introduce cloud computing into several cyber security courses
 Completed courses
 Data and Applications Security, Data Storage, Digital Forensics, Secure
Web Services
 Computer and Information Security
 Capstone Course
 One course that covers all aspects of assured cloud computing
 Week long course to be given at Texas Southern University
 Analyzing and Securing Social Networks
 Big Data Analytics and Security
www.kellytechno.com
DIRECTIONS
 Secure VMM and VNM
 Designing Secure XEN VMM
 Developing automated techniques for VMM introspection
 Determine a secure network infrastructure for the cloud
 Integrate Secure Storage Algorithms into Hadoop
 Identity Management in the Cloud
 Secure cloud-based Big Data Management/Social
Networking
www.kellytechno.com
RELATED BOOKS
 Developing and Securing the Cloud, CRC Press
(Taylor and Francis), November 2013
(Thuraisingham)
 Secure Data Provenance and Inference Control
with Semantic Web, CRC Press 2014, In Print
(Cadenhead, Kantarcioglu, Khadilkar,
Thuraisingham)
 Analyzing and Securing Social Media, CRC Press,
2014, In preparation (Abrol, Heatherly, Khan,
Kantarcioglu, Khadilkar, Thuraisingham)
www.kellytechno.com
Presented
By

More Related Content

What's hot

FAIR principles and metrics for evaluation
FAIR principles and metrics for evaluationFAIR principles and metrics for evaluation
FAIR principles and metrics for evaluationMichel Dumontier
 
Darwin ai covid-net mitre
Darwin ai   covid-net mitreDarwin ai   covid-net mitre
Darwin ai covid-net mitreianmitch
 
070416 Egu Vienna Husar
070416 Egu Vienna Husar070416 Egu Vienna Husar
070416 Egu Vienna HusarRudolf Husar
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudIJMTST Journal
 
Recording and Reasoning Over Data Provenance in Web and Grid Services
Recording and Reasoning Over Data Provenance in Web and Grid ServicesRecording and Reasoning Over Data Provenance in Web and Grid Services
Recording and Reasoning Over Data Provenance in Web and Grid ServicesMartin Szomszor
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEEMEMTECHSTUDENTPROJECTS
 
A proximity aware interest-clustered p2 p file sharing system
A proximity aware interest-clustered p2 p file sharing systemA proximity aware interest-clustered p2 p file sharing system
A proximity aware interest-clustered p2 p file sharing systemLeMeniz Infotech
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
Towards FAIR principles for research software @ FAIR Software Session, Nation...
Towards FAIR principles for research software @ FAIR Software Session, Nation...Towards FAIR principles for research software @ FAIR Software Session, Nation...
Towards FAIR principles for research software @ FAIR Software Session, Nation...annalenalamprecht
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service compositionswathi78
 
Implementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record LinkageImplementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record LinkageIOSR Journals
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
Empowering the Intelligent Enterprise
Empowering the Intelligent EnterpriseEmpowering the Intelligent Enterprise
Empowering the Intelligent EnterpriseChristine Connors
 
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataprivacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataswathi78
 
Practical Approaches to Sharing Information
Practical Approaches to Sharing InformationPractical Approaches to Sharing Information
Practical Approaches to Sharing InformationChristine Connors
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...Editor IJCATR
 
Semantics in the Enterprise: Roles & Capabilities
Semantics in the Enterprise: Roles & CapabilitiesSemantics in the Enterprise: Roles & Capabilities
Semantics in the Enterprise: Roles & CapabilitiesChristine Connors
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...Nexgen Technology
 
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Swathi Rampur
 

What's hot (20)

FAIR principles and metrics for evaluation
FAIR principles and metrics for evaluationFAIR principles and metrics for evaluation
FAIR principles and metrics for evaluation
 
Darwin ai covid-net mitre
Darwin ai   covid-net mitreDarwin ai   covid-net mitre
Darwin ai covid-net mitre
 
070416 Egu Vienna Husar
070416 Egu Vienna Husar070416 Egu Vienna Husar
070416 Egu Vienna Husar
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
 
Recording and Reasoning Over Data Provenance in Web and Grid Services
Recording and Reasoning Over Data Provenance in Web and Grid ServicesRecording and Reasoning Over Data Provenance in Web and Grid Services
Recording and Reasoning Over Data Provenance in Web and Grid Services
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
 
A proximity aware interest-clustered p2 p file sharing system
A proximity aware interest-clustered p2 p file sharing systemA proximity aware interest-clustered p2 p file sharing system
A proximity aware interest-clustered p2 p file sharing system
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Towards FAIR principles for research software @ FAIR Software Session, Nation...
Towards FAIR principles for research software @ FAIR Software Session, Nation...Towards FAIR principles for research software @ FAIR Software Session, Nation...
Towards FAIR principles for research software @ FAIR Software Session, Nation...
 
Lspnew (1)
Lspnew (1)Lspnew (1)
Lspnew (1)
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
 
Implementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record LinkageImplementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record Linkage
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Empowering the Intelligent Enterprise
Empowering the Intelligent EnterpriseEmpowering the Intelligent Enterprise
Empowering the Intelligent Enterprise
 
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataprivacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud data
 
Practical Approaches to Sharing Information
Practical Approaches to Sharing InformationPractical Approaches to Sharing Information
Practical Approaches to Sharing Information
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
 
Semantics in the Enterprise: Roles & Capabilities
Semantics in the Enterprise: Roles & CapabilitiesSemantics in the Enterprise: Roles & Capabilities
Semantics in the Enterprise: Roles & Capabilities
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
 

Viewers also liked

스윙동영상
스윙동영상스윙동영상
스윙동영상bwetdf
 
콘도예약 펜션평창
콘도예약 펜션평창콘도예약 펜션평창
콘도예약 펜션평창bwetdf
 
Nuevos paradigmas del aprendizaje
Nuevos paradigmas del aprendizajeNuevos paradigmas del aprendizaje
Nuevos paradigmas del aprendizajeBreidys Barranco
 
1- COTTON PRINTED STUFF BAGS
1- COTTON PRINTED STUFF BAGS1- COTTON PRINTED STUFF BAGS
1- COTTON PRINTED STUFF BAGSSelf-Employed
 
Роль финансового менеджера по развитию бизнеса
Роль финансового менеджера по развитию бизнесаРоль финансового менеджера по развитию бизнеса
Роль финансового менеджера по развитию бизнесаKharkov IT Cluster
 
과다조회자대출『BU797』.『COM』여름휴가펜션 무자본무점포창업
과다조회자대출『BU797』.『COM』여름휴가펜션 무자본무점포창업과다조회자대출『BU797』.『COM』여름휴가펜션 무자본무점포창업
과다조회자대출『BU797』.『COM』여름휴가펜션 무자본무점포창업bwetdf
 
Meba digital inclinometer
Meba digital inclinometerMeba digital inclinometer
Meba digital inclinometerjenny zheng
 
LLA 2011 - L. Mazzucchelli - Principles of pathology and microscopic diagnosi...
LLA 2011 - L. Mazzucchelli - Principles of pathology and microscopic diagnosi...LLA 2011 - L. Mazzucchelli - Principles of pathology and microscopic diagnosi...
LLA 2011 - L. Mazzucchelli - Principles of pathology and microscopic diagnosi...European School of Oncology
 
Certified HL7 CDA Specialist
Certified HL7 CDA SpecialistCertified HL7 CDA Specialist
Certified HL7 CDA SpecialistAshish Shetty
 

Viewers also liked (10)

스윙동영상
스윙동영상스윙동영상
스윙동영상
 
콘도예약 펜션평창
콘도예약 펜션평창콘도예약 펜션평창
콘도예약 펜션평창
 
Nuevos paradigmas del aprendizaje
Nuevos paradigmas del aprendizajeNuevos paradigmas del aprendizaje
Nuevos paradigmas del aprendizaje
 
1- COTTON PRINTED STUFF BAGS
1- COTTON PRINTED STUFF BAGS1- COTTON PRINTED STUFF BAGS
1- COTTON PRINTED STUFF BAGS
 
Роль финансового менеджера по развитию бизнеса
Роль финансового менеджера по развитию бизнесаРоль финансового менеджера по развитию бизнеса
Роль финансового менеджера по развитию бизнеса
 
과다조회자대출『BU797』.『COM』여름휴가펜션 무자본무점포창업
과다조회자대출『BU797』.『COM』여름휴가펜션 무자본무점포창업과다조회자대출『BU797』.『COM』여름휴가펜션 무자본무점포창업
과다조회자대출『BU797』.『COM』여름휴가펜션 무자본무점포창업
 
Meba digital inclinometer
Meba digital inclinometerMeba digital inclinometer
Meba digital inclinometer
 
LLA 2011 - L. Mazzucchelli - Principles of pathology and microscopic diagnosi...
LLA 2011 - L. Mazzucchelli - Principles of pathology and microscopic diagnosi...LLA 2011 - L. Mazzucchelli - Principles of pathology and microscopic diagnosi...
LLA 2011 - L. Mazzucchelli - Principles of pathology and microscopic diagnosi...
 
Certified HL7 CDA Specialist
Certified HL7 CDA SpecialistCertified HL7 CDA Specialist
Certified HL7 CDA Specialist
 
Audit report
Audit reportAudit report
Audit report
 

Similar to Lecture20

NIH Data Summit - The NIH Data Commons
NIH Data Summit - The NIH Data CommonsNIH Data Summit - The NIH Data Commons
NIH Data Summit - The NIH Data CommonsVivien Bonazzi
 
TSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyTSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyzdooly
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemeEditor IJMTER
 
Knowledge Discovery in an Agents Environment
Knowledge Discovery in an Agents EnvironmentKnowledge Discovery in an Agents Environment
Knowledge Discovery in an Agents EnvironmentManjulaPatel
 
FAIRy stories: the FAIR Data principles in theory and in practice
FAIRy stories: the FAIR Data principles in theory and in practiceFAIRy stories: the FAIR Data principles in theory and in practice
FAIRy stories: the FAIR Data principles in theory and in practiceCarole Goble
 
Adoption of the Linked Data Best Practices in Different Topical Domains
Adoption of the Linked Data Best Practices in Different Topical DomainsAdoption of the Linked Data Best Practices in Different Topical Domains
Adoption of the Linked Data Best Practices in Different Topical DomainsChris Bizer
 
Altman RDAP11 Policy-based Data Management
Altman RDAP11 Policy-based Data ManagementAltman RDAP11 Policy-based Data Management
Altman RDAP11 Policy-based Data ManagementASIS&T
 
GRA, NIEM and XACML Security Profiles July 2012
GRA, NIEM and XACML Security Profiles July 2012GRA, NIEM and XACML Security Profiles July 2012
GRA, NIEM and XACML Security Profiles July 2012Bizagi Inc
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 
Some Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data PlatformsSome Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data PlatformsRobert Grossman
 
A Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
A Framework for Geospatial Web Services for Public Health by Dr. Leslie LenertA Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
A Framework for Geospatial Web Services for Public Health by Dr. Leslie LenertWansoo Im
 
Enabling efficient multi keyword ranked
Enabling efficient multi keyword rankedEnabling efficient multi keyword ranked
Enabling efficient multi keyword rankedSakthi Sundaram
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
Linked Open Data_mlanet13
Linked Open Data_mlanet13Linked Open Data_mlanet13
Linked Open Data_mlanet13Kristi Holmes
 

Similar to Lecture20 (20)

Linked Data and Semantic Web Application Development by Peter Haase
Linked Data and Semantic Web Application Development by Peter HaaseLinked Data and Semantic Web Application Development by Peter Haase
Linked Data and Semantic Web Application Development by Peter Haase
 
NIH Data Summit - The NIH Data Commons
NIH Data Summit - The NIH Data CommonsNIH Data Summit - The NIH Data Commons
NIH Data Summit - The NIH Data Commons
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
 
TSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyTSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdooly
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
 
Knowledge Discovery in an Agents Environment
Knowledge Discovery in an Agents EnvironmentKnowledge Discovery in an Agents Environment
Knowledge Discovery in an Agents Environment
 
FAIRy stories: the FAIR Data principles in theory and in practice
FAIRy stories: the FAIR Data principles in theory and in practiceFAIRy stories: the FAIR Data principles in theory and in practice
FAIRy stories: the FAIR Data principles in theory and in practice
 
Adoption of the Linked Data Best Practices in Different Topical Domains
Adoption of the Linked Data Best Practices in Different Topical DomainsAdoption of the Linked Data Best Practices in Different Topical Domains
Adoption of the Linked Data Best Practices in Different Topical Domains
 
Altman RDAP11 Policy-based Data Management
Altman RDAP11 Policy-based Data ManagementAltman RDAP11 Policy-based Data Management
Altman RDAP11 Policy-based Data Management
 
GRA, NIEM and XACML Security Profiles July 2012
GRA, NIEM and XACML Security Profiles July 2012GRA, NIEM and XACML Security Profiles July 2012
GRA, NIEM and XACML Security Profiles July 2012
 
Cloud java titles adrit solutions
Cloud java titles adrit solutionsCloud java titles adrit solutions
Cloud java titles adrit solutions
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the Cloud
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
Some Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data PlatformsSome Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data Platforms
 
Planetdata simpda
Planetdata simpdaPlanetdata simpda
Planetdata simpda
 
PlanetData: Consuming Structured Data at Web Scale
PlanetData: Consuming Structured Data at Web ScalePlanetData: Consuming Structured Data at Web Scale
PlanetData: Consuming Structured Data at Web Scale
 
A Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
A Framework for Geospatial Web Services for Public Health by Dr. Leslie LenertA Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
A Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
 
Enabling efficient multi keyword ranked
Enabling efficient multi keyword rankedEnabling efficient multi keyword ranked
Enabling efficient multi keyword ranked
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
Linked Open Data_mlanet13
Linked Open Data_mlanet13Linked Open Data_mlanet13
Linked Open Data_mlanet13
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Lecture20

  • 1. Assured Cloud Computing for Assured Information Sharing Presented By
  • 2. OUTLINE  Objectives  Assured Information Sharing  Layered Framework for a Secure Cloud  Cloud-based Assured Information Sharing  Cloud-based Secure Social Networking  Other Topics Secure Hybrid Cloud Cloud Monitoring Cloud for Malware Detection Cloud for Secure Big Data  Education  Directions  Related Books www.kellytechno.com
  • 3. TEAM MEMBERS  Sponsor: Air Force Office of Scientific Research  The University of Texas at Dallas  Dr. Murat Kantarcioglu; Dr. Latifur Khan; Dr. Kevin Hamlen; Dr. Zhiqiang Lin, Dr. Kamil Sarac  Sub-contractors  Prof. Elisa Bertino (Purdue)  Ms. Anita Miller, Late Dr. Bob Johnson (North Texas Fusion Center)  Collaborators  Late Dr. Steve Barker, Dr. Maribel Fernandez, Kings College, U of London (EOARD)  Dr. Barbara Carminati; Dr. Elena Ferrari, U of Insubria (EOARD) www.kellytechno.com
  • 4. OBJECTIVES  Cloud computing is an example of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them.  Our research on Cloud Computing is based on Hadoop, MapReduce, Xen  Apache Hadoop is a Java software framework that supports data intensive distributed applications under a free license. It enables applications to work with thousands of nodes and petabytes of data. Hadoop was inspired by Google's MapReduce and Google File System (GFS) papers.  XEN is a Virtual Machine Monitor developed at the University of Cambridge, England  Our goal is to build a secure cloud infrastructure for assured information sharing and related applications www.kellytechno.com
  • 5. INFORMATION OPERINFORMATION OPERAATIONS ACROSS INFOSPHERES:TIONS ACROSS INFOSPHERES: ASSURED INFORMATION SHARINGASSURED INFORMATION SHARING Scientific/Technical Approach Conduct experiments as to how much information is lost as a result of enforcing security policies in the case of trustworthy partners Develop more sophisticated policies based on role- based and usage control based access control models Develop techniques based on game theoretical strategies to handle partners who are semi- trustworthy Develop data mining techniques to carry out defensive and offensive information operations Accomplishments  Developed an experimental system for determining information loss due to security policy enforcement  Developed a strategy for applying game theory for semi-trustworthy partners; simulation results  Developed data mining techniques for conducting defensive operations for untrustworthy partners Challenges  Handling dynamically changing trust levels; Scalability Objectives Develop a Framework for Secure and Timely Data Sharing across Infospheres Investigate Access Control and Usage Control policies for Secure Data Sharing Develop innovative techniques for extracting information from trustworthy, semi-trustworthy and untrustworthy partners Component Data/Policy for Agency A Data/Policy for Coalition Publish Data/Policy Component Data/Policy for Agency C Component Data/Policy for Agency B Publish Data/Policy Publish Data/Policy www.kellytechno.com
  • 6. Our Approach • Policy-based Information Sharing • Integrate the Medicaid claims data and mine the data; • Enforce policies and determine how much information has been lost (Trustworthy partners); • Application of Semantic web technologies • Apply game theory and probing to extract information from semi-trustworthy partners • Conduct Active Defence and determine the actions of an untrustworthy partner – Defend ourselves from our partners using data analytics techniques – Conduct active defence – find our what our partners are doing by monitoring them so that we can defend our selves from dynamic situations www.kellytechno.com
  • 8. LAYERED FRAMEWORK FOR ASSURED CLOUD COMPUTING 09/09/15 8 Applications Hadoop/MapReduc/Storage HIVE/SPARQL/Query XEN/Linux/VMM Secure Virtual Network Monitor Policies XACML RDF Risks/ Costs QoS Resource Allocation Cloud Monitors Figure2. Layered Framework for Assured Cloud www.kellytechno.com
  • 9. SECURE QUERY PROCESSING WITH HADOOP/MAPREDUCE  We have studied clouds based on Hadoop  Query rewriting and optimization techniques designed and implemented for two types of data  (i) Relational data: Secure query processing with HIVE  (ii) RDF data: Secure query processing with SPARQL  Demonstrated with XACML policies  Joint demonstration with Kings College and University of Insubria  First demo (2011): Each party submits their data and policies  Our cloud will manage the data and policies  Second demo (2012): Multiple clouds www.kellytechno.com
  • 10. Fine-grained Access Control with Hive System Architecture  Table/View definition and loading,  Users can create tables as well as load data into tables. Further, they can also upload XACML policies for the table they are creating. Users can also create XACML policies for tables/views.  Users can define views only if they have permissions for all tables specified in the query used to create the view. They can also either specify or create XACML policies for the views they are defining.  CollaborateCom 2010 www.kellytechno.com
  • 11. Server Backend SPARQL Query Optimizer for Secure RDF Data Processing Web Interface Data Preprocessor N-Triples Converter Prefix Generator Predicate Based Splitter Predicate Object Based Splitter MapReduce Framework Parser Query Validator & Rewriter XACML PDP Plan Generator Plan Executor Query Rewriter By Policy New Data Query Answer To build an efficient storage mechanism using Hadoop for large amounts of data (e.g. a billion triples); build an efficient query mechanism for data stored in Hadoop; Integrate with Jena Developed a query optimizer and query rewriting techniques for RDF Data with XACML policies and implemented on top of JENA IEEE Transactions on Knowledge and Data Engineering, 2011 www.kellytechno.com
  • 12. DEMONSTRATION: CONCEPT OF OPERATION User Interface Layer Fine-grained Access Control with Hive SPARQL Query Optimizer for Secure RDF Data Processing Relational Data RDF Data Agency 1 Agency 2 Agency n … www.kellytechno.com
  • 13. RDF-Based Policy Engine Policies Ontologies Rules In RDF JENA RDF Engine RDF Documents Inference Engine/ Rules Processor e.g., Pellet Interface to the Semantic WebTechnology By UTDallas www.kellytechno.com
  • 14. RDF-BASED POLICY ENGINE ON THE CLOUD Policy Transformation Layer ResultQuery DB DB RDF Policy Parser Layer Regular Expression-Query Translator Data Controller Provenance Controller . . . RDF XML Policy / Graph Transformation Rules Access Control/ Redaction Policy (Traditional Mechanism) User Interface Layer High Level Specification Policy Translator A testbed for evaluating different policy sets over different data representation. Also supporting provenance as directed graph and viewing policy outcomes graphically  Determine how access is granted to a resource as well as how a document is shared  User specify policy: e.g., Access Control, Redaction, Released Policy  Parse a high-level policy to a low-level representation  Support Graph operations and visualization. Policy executed as graph operations  Execute policies as SPARQL queries over large RDF graphs on Hadoop  Support for policies over Traditional data and its provenance  IFIP Data and Applications Security, 2010, ACM SACMAT 2011www.kellytechno.com
  • 15. INTEGRATION WITH ASSURED INFORMATION SHARING: User Interface Layer RDF Data Preprocessor Policy Translation and Transformation Layer MapReduce Framework for Query Processing Hadoop HDFS Agency 1 Agency 2 Agency n … RDF Data and Policies SPARQL Query Result www.kellytechno.com
  • 16. ARCHITECTURE Policy Engine Provenance Agency 1 Agency 2 Agency n User Interface Layer Connection Interface RDF GraphPolicy Request RDF Graph: ModelRDF Query: SPARQL RDBMS Connection: DB Connection: Cloud Connection: Text Cloud-based Store Local Access Control Combined Redaction Policy n-2 Policy n-1 Access Control Combined Redaction Policy n www.kellytechno.com
  • 17. POLICY RECIPROCITY  Agency 1 wishes to share its resources if Agency 2 also shares its resources with it  Use our Combined policies  Allow agents to define policies based on reciprocity and mutual interest amongst cooperating agencies SPARQL query: SELECT B FROM NAMED uri1 FROM NAMED uri2 WHERE P www.kellytechno.com
  • 18. DEVELOP AND SCALE POLICIES  Agency 1 wishes to extend its existing policies with support for constructing policies at a finer granularity.  The Policy engine  Policy interface that should be implemented by all policies  Add newer types of policies as needed www.kellytechno.com
  • 19. JUSTIFICATION OF RESOURCES  Agency 1 asks Agency 2 for a justification of resource R2  Policy engine  Allows agents to define policies over provenance  Agency 2 can provide the provenance to Agency 1  But protect it by using access control or redaction policies www.kellytechno.com
  • 20. OTHER EXAMPLE POLICIES  Agency 1 shares a resource with Agency 2 provided Agency 2 does not share with Agency 3  Agency 1 shares a resource with Agency 2 depending on the content of the resource or until a certain time  Agency 1 shares a resource R with agency 2 provided Agency 2 does not infer sensitive data S from R (inference problem)  Agency 1 shares a resource with Agency 2 provided Agency 2 shares the resource only with those in its organizational (or social) network www.kellytechno.com
  • 21. ANALYZING AND SECURING SOCIAL NETWORKS IN THE CLOUD ANALYTICS LOCATION MINING FROM ONLINE SOCIAL NETWORKS PREDICTING THREATS FROM SOCIAL NETWORK DATA, SENTIMENT ANALYSIS CLOUD PLATFORM FOR IMPLEMENTATION SECURITY AND PRIVACY PREVENTING THE INFERENCE OF PRIVATE ATTRIBUTES (LIBERAL OR CONSERVATIVE; GAY OR STRAIGHT) ACCESS CONTROL IN SOCIAL NETWORKS CLOUD PLATFORM FOR IMPLEMENTATION www.kellytechno.com
  • 22. SECURITY POLICIES FOR ON- LINE SOCIAL NETWORKS (OSN)  Security Policies ate Expressed in SWRL (Semantic Web Rules Language) examples www.kellytechno.com
  • 23. SECURITY POLICY ENFORCEMENT  A reference monitor evaluates the requests.  Admin request for access control could be evaluated by rule rewriting  Example: Assume Bob submits the following admin request  Rewrite as the following rule www.kellytechno.com
  • 24. FRAMEWORK ARCHITECTURE Social Network Application Reference Monitor Semantic Web Reasoning Engine Access request Access Decision Policy Store Modified Access request Policy Retrieval Reasoning Result SN Knowledge Base Knowledge Base Queries www.kellytechno.com
  • 25. SECURE SOCIAL NETWORKING IN THE CLOUD WITH TWITTER-STORM User Interface Layer Fine-grained Access Control with Hive SPARQL Query Optimizer for Secure RDF Data Processing Relational Data RDF Data Social Network 1 Social Network 2 Social Network N … www.kellytechno.com
  • 26. SECURE STORAGE AND QUERY PROCESSING IN A HYBRID CLOUD  The use of hybrid clouds is an emerging trend in cloud computing Ability to exploit public resources for high throughput Yet, better able to control costs and data privacy  Several key challenges Data Design: how to store data in a hybrid cloud?  Solution must account for data representation used (unencrypted/encrypted), public cloud monetary costs and query workload characteristics Query Processing: how to execute a query over a hybrid cloud?  Solution must provide query rewrite rules that ensure the correctness of a generated query plan over the hybrid cloud www.kellytechno.com
  • 27. HYPERVISOR INTEGRITY AND FORENSICS IN THE CLOUD Cloud integrity & forensics Hardware Layer Virtualization Layer (Xen, vSphere) Linux Solaris XP MacOS  Secure control flow of hypervisor code Integrity via in-lined reference monitor  Forensics data extraction in the cloud Multiple VMs De-mapping (isolate) each VM memory from physical memory Hypervisor OS Applications integrity forensics www.kellytechno.com
  • 28. CLOUD-BASED MALWARE DETECTION Benign Buffer Feature extraction and selection using Cloud Training & Model update Unknown executable Feature extraction Classify ClassMalware Remove Keep Stream of known malware or benign executables Ensemble of Classification models www.kellytechno.com
  • 29. CLOUD-BASED MALWARE DETECTION  Binary feature extraction involves  Enumerating binary n-grams from the binaries and selecting the best n- grams based on information gain  For a training data with 3,500 executables, number of distinct 6-grams can exceed 200 millions  In a single machine, this may take hours, depending on available computing resources – not acceptable for training from a stream of binaries  We use Cloud to overcome this bottleneck  A Cloud Map-reduce framework is used  to extract and select features from each chunk  A 10-node cloud cluster is 10 times faster than a single node  Very effective in a dynamic framework, where malware characteristics change rapidly www.kellytechno.com
  • 30. IDENTITY MANAGEMENT CONSIDERATIONS IN A CLOUD  Trust model that handles  (i) Various trust relationships, (ii) access control policies based on roles and attributes, iii) real-time provisioning, (iv) authorization, and (v) auditing and accountability.  Several technologies are being examined to develop the trust model  Service-oriented technologies; standards such as SAML and XACML; and identity management technologies such as OpenID.  Does one size fit all?  Can we develop a trust model that will be applicable to all types of clouds such as private clouds, public clouds and hybrid clouds Identity architecture has to be integrated into the cloud architecture. www.kellytechno.com
  • 31. Big Data and the Cloud 0 Big Data describes large and complex data that cannot be managed by traditional data management tools 0 From Petabytes to Zettabytes to Exabytes of data 0 Need tools for capture, storage, search, sharing, analysis, visualization of big data. 0 Examples include - Web logs, RFID and surveillance data, sensor networks, social network data (graphs), text and multimedia, data pertaining to astronomy, atmospheric science, genomics, biogeochemical, biological fields, video archives 0 Big Data Technologies 0 Hadoop/MapReduce Platform, HIVE Platform, Twitter Storm Platform, Google Apps Engine, Amazon EC2 Cloud, Offerings from Oracle and IBM for Big Data Management, Other: Cassandra, Mahut, PigLatin, - - - - 0 Cloud Computing is emerging a critical tool for Big Data Management 0 Critical to maintain Security and Privacy for Big Data www.kellytechno.com
  • 32. Security and Privacy for Big Data 0 Secure Storage and Infrastructure 0 How can technologies such as Hadoop and MapReduce be Secured 0 Secure Data Management 0 Techniques for Secure Query Processing 0 Examples: Securing HIVE, Cassandra 0 Big Data for Security 0 Analysis of Security Data (e.g., Malware analysis) 0 Regulations, Compliance Governance 0 What are the regulations for storing, retaining, managing, transferring and analyzing Big Data 0 Are the corporations compliance with the regulations 0 Privacy of the individuals have to be maintained not just for raw data but also for data integration and analytics 0 Roles and Responsibilities must be clearly defined www.kellytechno.com
  • 33. Security and Privacy for Big Data 0 Regulations Stifling Innovation? 0Major Concern is too many regulations will stifle Innovation 0Corporations must take advantage of the Big Data technologies to improve business 0But this could infringe on individual privacy 0Regulations may also interfere with Privacy – example retaining the data 0Challenge: How can one carry out Analytics and still maintain Privacy? 0 National Science F Workshop Planned for Spring 2014 at the University of Texas at Dallas www.kellytechno.com
  • 34. EDUCATION ON SECURE CLOUD COMPUTING AND RELATED TECHNOLOGIES  Secure Cloud Computing  NSF Capacity Building Grant on Assured Cloud Computing  Introduce cloud computing into several cyber security courses  Completed courses  Data and Applications Security, Data Storage, Digital Forensics, Secure Web Services  Computer and Information Security  Capstone Course  One course that covers all aspects of assured cloud computing  Week long course to be given at Texas Southern University  Analyzing and Securing Social Networks  Big Data Analytics and Security www.kellytechno.com
  • 35. DIRECTIONS  Secure VMM and VNM  Designing Secure XEN VMM  Developing automated techniques for VMM introspection  Determine a secure network infrastructure for the cloud  Integrate Secure Storage Algorithms into Hadoop  Identity Management in the Cloud  Secure cloud-based Big Data Management/Social Networking www.kellytechno.com
  • 36. RELATED BOOKS  Developing and Securing the Cloud, CRC Press (Taylor and Francis), November 2013 (Thuraisingham)  Secure Data Provenance and Inference Control with Semantic Web, CRC Press 2014, In Print (Cadenhead, Kantarcioglu, Khadilkar, Thuraisingham)  Analyzing and Securing Social Media, CRC Press, 2014, In preparation (Abrol, Heatherly, Khan, Kantarcioglu, Khadilkar, Thuraisingham) www.kellytechno.com

Editor's Notes

  1. Another research problem we are working on is to address the “hypervisor integrity and forensic issues in the cloud”. More specifically, we don’t want to a malicious VM to compromise other VMs, so we need to ensure the integrity of the hypervisors. Our approach is to instrument hypervisor code, and verify the integrity at run-time (like Kevin’s in-lin reference monitor) The other problem we are dealing with is how to extract the forensic data when one VM gets compromised. The challenge is there are multiple VMs in a cloud, we have to isolate each VM memory from the physical memory. Currently, we are developing techniques to handle this problem.