Security, Privacy, And Data Protection for Trusted Cloud Computing

Embed Size (px)

Citation preview

  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    1/36

    Dec. 3, 2010 Kai Hwang, USC 1

    Security, Privacy, and Data

    Protection for TrustedCloud ComputingProf. Kai Hwang, University of Southern California

    Keynote Address, International Conference

    on Cloud Computing (CloudCom2010)Indianapolis, Indiana Dec.3, 2010

    Cloud Platforms over Datacenters Cloud Infrastructure and Services Reputation-based Trust Management Data Coloring and Software Watermarking Cloud Support of The Internet of Things

  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    2/36

    Dec. 3, 2010 Kai Hwang, USC 2

    Handy Tools We Use over the

    Evolutional Periods In History

    Is it safe to play with your computer,

    when you are naked and vulnerable ?

  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    3/36

    Dec. 3, 2010 Kai Hwang, USC 3

    Top 10 Technologies for 2010

  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    4/36

    Dec. 3, 2010 Kai Hwang, USC 4

    Web 2.0, Clouds, and Internet of Things

    HPC: High-PerformanceComputingHTC: High-ThroughputComputingP2P:Peer to PeerMPP:Massively ParallelProcessors

    Source: K. Hwang, G. Fox, and J. Dongarra,

    Distributed Systems and Cloud Computing,Morgan Kaufmann, 2011 (in press to appear)

  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    5/36

    Dec. 3, 2010 Kai Hwang, USC 5

    Cloud Computing as A Service

    [9]

  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    6/36

    Dec. 3, 2010 Kai Hwang, USC 6

    Amazon Virtual Private Cloud VPC

    (http://aws.amazon.com/vpc/)

    http://aws.amazon.com/vpc/http://aws.amazon.com/vpc/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    7/36

    Dec. 3, 2010 Kai Hwang, USC 7

    vSphere 4 : An OS for Cloud Platform

  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    8/36

    Dec. 3, 2010 Kai Hwang, USC 8

    Cloud Services Stack

    Network

    Cloud Services

    Co-Location

    Cloud Services

    Compute & Storage

    Cloud Services

    Platform

    Cloud Services

    Application

    Cloud Services

    http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    9/36

    Dec. 3, 2010 Kai Hwang, USC 9

    Marc Benioff, Founder of

    Salesforce.com

    1986 graduated from USC1999 started salesforce.com

    2003-05 appointed chairman of US Presidential

    IT Advisory Committee

    2009 announced Force.com platform for

    cloud business computing

    A SaaS and PaaS Cloud Provider

    '''

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    10/36

    Dec. 3, 2010 Kai Hwang, USC 1010

    XEx =' XEx =' XEx ='

    Protecting datacenters must first secure cloud resources and uphold userprivacy and data integrity.

    Trust overlay networks could be applied to build reputation systems forestablishing the trust among interactive datacenters.

    A watermarking technique is suggested to protect shared data objects andmassively distributed software modules.

    These techniques safeguard user authentication and tighten the dataaccess-control in public clouds.

    The new approach could be more cost-effective than using the traditionalencryption and firewalls to secure the clouds.

    Security and Trust Crisisin Cloud Computing

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    11/36

    Dec. 3, 2010 Kai Hwang, USC 11

    Trusted Zones for VM Insulation

    Physical Infrastructure

    Tenant #2

    APP

    OS

    APP

    OS

    Virtual Infrastructure

    PhysicalInfrastructure

    Cloud Provider

    APP

    OSAPP

    OS

    Virtual Infrastructure

    Tenant #1

    Insulateinformatio

    n fromcloudprovidersemployees

    Insulate

    informationfrom othertenants

    Insulate

    infrastructurefrom Malware,Trojans andcybercriminals

    Segregateand controluser access

    Controland isolateVM in thevirtualinfrastructure

    Federateidentitieswithpublicclouds

    Identityfederatio

    n

    Virtualnetworksecurity

    AccessMgmt

    Cybercrimeintelligence

    Strongauthentication

    Data lossprevention

    Encryption& key mgmt

    Tokenization

    Enable end to end view of security events

    and compliance across infrastructures

    Security Info.& Event Mgmt GRC

    Anti-malware

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    12/36

    Dec. 3, 2010 Kai Hwang, USC 12

    Cloud Service Models and Their Security Demands

    Cloud computing will not be accepted by common users unless

    the trust and dependability issues are resolved satisfactorily [1].

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    13/36

    Dec. 3, 2010 Kai Hwang, USC 13March 11, 2009 Prof. Kai Hwang, USC

    Data Security and Copyright Protection

    in A Trusted Cloud Platform

    Source: Reference [3, 4]

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    14/36

    Dec. 3, 2010 Kai Hwang, USC 14

    Security Protection Mechanisms for

    Public Clouds

    14

    Mechanism Brief DescriptionTrust delegationand Negotiation

    Cross certificates must be used to delegate trust across differentPKI domains. Trust negotiation among different CSPs demandsresolution of policy conflicts.

    Wormcontainment and

    DDoS Defense

    Internet worm containment and distributed defense againstDDoS attacks are necessary to secure all datacenters and cloudplatforms .

    ReputationSystem Over

    Resource Sites

    Reputation system could be built with P2P technology. One canbuild a hierarchy of reputation systems from datacenters todistributed file systems .

    Fine-grainaccess control This refers to fine-grain access control at the file or object level.This adds up the security protection beyond firewalls and

    intrusion detection systems .

    Collusive Piracyprevention

    Piracy prevention achieved with peer collusion detection andcontent poisoning techniques .

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    15/36

    Dec. 3, 2010 Kai Hwang, USC 15

    Trust Management for Protecting Cloud Resources

    and Safeguard Datacenter Operations [3]

    Source: [4]

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    16/36

    Dec. 3, 2010 Kai Hwang, USC 16

    PowerTrust Built over A Trust Overlay Network

    R. Zhou and K. Hwang, PowerTrust : A scalable and robust reputation system for

    structured P2P networks,IEEE-TPDS, May 2007

    Look-ahead Random Walk Distributed Ranking Module

    vn

    ............v3

    v2

    v1

    Global Reputation ScoresV

    Regular Random Walk

    Initial Reputation

    AggregationReputation Updating

    Local Trust Scores

    PowerNodes

    Trust Overlay Network

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    17/36

    Dec. 3, 2010 Kai Hwang, USC 17

    Data Coloring via Watermarking

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    18/36

    Dec. 3, 2010 Kai Hwang, USC 18

    Color Matching To Authenticate DataOwners and Cloud Service Providers

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    19/36

    Dec. 3, 2010 Kai Hwang, USC 19

    Architecture of The Internet of Things

    Merchandise

    Tracking

    Environment

    Protection

    Intelligent

    Search

    Tele-

    medicine

    Intelligent

    Traffic

    Cloud ComputingPlatform

    Smart

    Home

    MobileTelecomNetwork

    TheInternet

    InformationNetwork

    RFID

    RFID Label

    Sensor Network

    Sensor Nodes

    GPS

    Road Mapper

    SensingLayer

    NetworkLayer

    Application

    Layer

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    20/36

    Dec. 3, 2010 Kai Hwang, USC 20

    24 Satellites of GPS Deployed in Outerspace

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    21/36

    Dec. 3, 2010 Kai Hwang, USC 21

    Service-Oriented Cloud of Clouds (Intercloud orMashup)

    Database

    S

    S

    S

    S

    SS

    S

    S

    S

    S

    S

    SSensor or Data

    Interchange

    Service

    Another

    Grid

    Raw Data Data Information Knowledge Wisdom Decisions

    S

    SS

    S

    Another

    Service

    S

    SAnother

    Grid SS

    Another

    Grid

    SS

    SS

    SS

    SS

    SS

    SS

    SS

    Storage

    Cloud

    Compute

    Cloud

    S

    S

    S

    S

    S

    SS

    S

    Filter

    Cloud

    Filter

    Cloud

    Filter

    Cloud

    Discovery

    Cloud

    Discovery

    Cloud

    Filter

    Servicef sf s

    f s f s

    f s f s

    Filter

    Servicef sf s

    f s f s

    f s f s

    Filter

    Servicef sf s

    f s f s

    f s f s

    Filter

    Cloud

    Filter

    Cloud

    Filter

    Cloud

    Filter

    Servicef sf s

    f s f s

    f s f s

    Traditional Grid

    with exposed

    services

    Geoffrey Fox: Cloud of clouds -- from Raw Data to Wisdom.

    SS = Sensor service, fs = filter services

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    22/36

    Dec. 3, 2010 Kai Hwang, USC 22

    Supply Chain Managementsupported by the Internet of Things.

    ( http://www.igd.com)

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    23/36

    Dec. 3, 2010 Kai Hwang, USC 23

    Facebook Applications(550 Millions users registered today)

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    24/36

    Dec. 3, 2010 Kai Hwang, USC 24

    Mobility Support and Security Measuresfor Mobile Cloud Computing

    Cloud

    Service

    Models

    Mobility Support andData Protection Methods Hardware and SoftwareMeasures for Cloud Security

    Infrastructure

    Cloud

    (The IaaS

    Model)

    Special air interfaces

    Mobile API design

    File/Log access control Data coloring

    Hardware/software root of trust,

    Provisioning of virtual machines,

    Software watermarking

    Host-based firewalls and IDS

    Platform

    Cloud

    (The PaaSModel)

    Wireless PKI ,

    User authentication,

    Copyright protection Disaster recovery

    Network-based firewalls

    and IDS

    Trust overlay network

    Reputation system

    OS patch management

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    25/36

    Dec. 3, 2010 Kai Hwang, USC 25

    Cloudlets- A trusted, VM-based, and Resource-RichPortal for Upgrading Mobile Devices with Cognitive Abilities for Mobile access

    of the cloud to explore Location-Aware Cloud Applications such as :

    Opportunity Discovery, Fast Information Processing,and Intelligent Decision Making on The Road, etc.

    Source: The Case of VM-based Cloudlets in Mobile Computing,IEEE Pervasive Computing, Vol.8, No. 4, April 2009

    C l i

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    26/36

    Dec. 3, 2010 Kai Hwang, USC 26

    Conclusions: Computing clouds are changing the whole IT , service industry, and global

    economy. Clearly, cloud computing demands ubiquity, efficiency, security,and trustworthiness.

    Cloud computing has become a common practice in business,government, education, and entertainment leveraging 50 millions

    of servers globally installed at thousands of datacenters today. Private clouds will become widespread in addition to using a few

    public clouds, that are under heavy competition among Google, MS,

    Amazon, Intel, EMC, IBM, SGI, VMWare, Saleforce.com, etc.

    Effective trust management, guaranteed security, user privacy,

    data integrity, mobility support, and copyright protection are crucial

    to the universal acceptance of cloud as a ubiquitous service.

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    27/36

    Dec. 3, 2010 Kai Hwang, USC 27

    Cloud Security Responsibilities

    by Providers and UsersTable 1:

    Source: Reference [4]

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    28/36

    Dec. 3, 2010 Kai Hwang, USC 28

    Cloud ComputingService

    Provider Priorities Ensure confidentiality, integrity, and

    availability in a multi-tenant

    environment. Effectively meet the advertised SLA,

    while optimizing cloud resource

    utilization.

    Offer tenants capabilities for self-service, and achieve scaling through

    automation and simplification.

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    29/36

    Dec. 3, 2010 Kai Hwang, USC 29

    Using Twitter Crowd to Check

    Weather Conditions in Remote Cities

    IOT Telemedicine Applications:

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    30/36

    Dec. 3, 2010 Kai Hwang, USC 30

    IOT Telemedicine Applications:Measured Patient Data Transferred to Doctor

    Using a Wireless Sensor Network.

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    31/36

    Dec. 3, 2010 Kai Hwang, USC 31

    Opportunities of IOT in 3 Dimensions

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    32/36

    Dec. 3, 2010 Kai Hwang, USC 32

    Smart Power Grid

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    33/36

    Dec. 3, 2010 Kai Hwang, USC 33

    Public, Private and Hybrid Clouds

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    34/36

    Dec. 3, 2010 Kai Hwang, USC 34

    Cloud Providers, Services and Security Measures

    Kai Hwang and Deyi Li, Trusted Cloud Computing with Secure Resourcesand Data Coloring, IEEE Internet Computing, Sept. 2010

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    35/36

    Dec. 3, 2010 Kai Hwang, USC 35

    The Internet of Things

    Internet of

    Things (IOT)

    Smart Earth

    Smart

    Earth:

    An

    IBM

    Dream

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/
  • 8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing

    36/36

    Dec 3 2010 36

    Enabling and Synergistic Technologies

    for Building The Internet of Things

    Table 9.3 Enabling and Synergistic Technologies for The IoTEnabling Technologies Synergistic Technologies

    Machine-to-machine interfaces Geo-tagging/geo-caching

    Cloud Computing Services. Biometrics

    Microcontrollers Machine vision

    Wireless communication Robotics

    Radio frequency iden. (RFID) Augmented reality

    Energy harvesting technologies Telepresence and autonomy

    Sensors and sensor networks Life recorders and personal assistant

    Actuators Tangible user interfaces

    Location technology (GPS) Clean technologies

    Software engineering Mirror worlds

    http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/