1 / 4

Developing and Securing the Cloud

This collection of papers explores various topics related to developing and securing the cloud, including practical multi-server PIR, detecting data leakage between cloud tenants, flawed trust assumption in the cloud, memory access pattern protection, and much more.

wvictoria
Download Presentation

Developing and Securing the Cloud

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Developing and Securing the Cloud Dr. Bhavani Thuraisingham The University of Texas at Dallas Papers to be Presented on April 17

  2. Papers to Read for Exam #2 – ACM CCS Cloud Workshop 2014 (April 17 lecture) • RAID-PIR: Practical Multi-Server PIRDaniel Demmler; Amir Herzberg;Thomas Schneider (Karthik, Ajit) • CloudSafetyNet: Detecting Data Leakage between Cloud TenantsChristian Priebe; Divya Muthukumaran; Dan O'Keeffe; David Eyers; Brian Shand; RuedigerKapitza; Peter Pietzuch(Madav, Prathamik) • Inevitable Failures: The Flawed Trust Assumption in CloudYuqiong Sun; Giuseppe Petracca; Trent Jaeger (Swetha, Priyanka) • Memory Access Pattern Protection in the World of Malicious Operating Systems and Commercial HardwareSriniDevadas(Harshamareka, Anirudda)

  3. Papers to Read for Exam #2 – ACM CCS Cloud Workshop 2014 (April 17 lecture) • A Visitor's Guide to a Post-Privacy WorldAri Juels(Vinay, Pradnya)This paper is not included in the presentations – an alternate paper will be assigned to the students. • A new look at human problem solving: near-optimal solutions to NP-hard problems, Zygmunt Pizlo(Amit, Prathanik) • Reconciling End-to-End Confidentiality and Data Reduction In Cloud Storage, Nathalie Baracaldo; Elli Androulaki; Joseph Glider; Alessandro Sorniotti(Krishnan, Monica) • A Framework for Outsourcing of Secure ComputationJesperBuus Nielsen; Claudio Orlandi(PrathushaKendala, Rohini)

  4. Papers to Read for Exam #2 – ACM CCS Cloud Workshop 2014 (April 17 lecture) • Guardians of the Clouds: When Identity Providers FailAndreas Mayer; Marcus Niemietz; VladislavMladenov; JoergSchwenk(Raju, Moses) • Your Software at my ServiceVladislavMladenov, Christian Mainka; Florian Feldmann; Julian Krautwald; JoergSchwenk(Chad, Devin) • Co-Location-Resistant CloudsYossi Azar; Seny Kamara; IshaiMenache; Mariana Raykova; Bruce Shepherd (PrathushaKarnati, Pujitha) • Swap and Play: Live Updating Hypervisors and Its Application to XenFranz Ferdinand Brasser; Mihai Bucicoiu; Ahmad-Reza Sadeghi(Sridevi, Gayathro)

More Related