Cloud Computing and Services Science

Moving data and applications to the cloud allows users and companies to enjoy considerable benefits. However, these benefits are also accompanied by a number of security issues that should be addressed. Among these, the need to ensure that possible requirements on security, costs, and quality of services are satisfied by the cloud providers, and the need to adopt techniques ensuring the proper protection of their data and applications. In this paper, we present different strategies and solutions that can be applied to address these issues.

[1]  Ion Stoica,et al.  BlinkDB: queries with bounded errors and bounded response times on very large data , 2012, EuroSys '13.

[2]  Hato Schmeiser,et al.  Assekuranz 2015 - Eine Standortbestimmung. Neue Koordinaten im deutschsprachigen Versicherungsmarkt , 2010 .

[3]  Dirk Fahland,et al.  Supporting Domain Experts to Select and Configure Precise Compliance Rules , 2013, Business Process Management Workshops.

[4]  Frank Leymann,et al.  Compliance Domains: A Means to Model Data-Restrictions in Cloud Environments , 2011, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference.

[5]  Min Chen,et al.  Statistical Learning for Anomaly Detection in Cloud Server Systems: A Multi-Order Markov Chain Framework , 2018, IEEE Transactions on Cloud Computing.

[6]  Zhiqiang Yao,et al.  Toward Anomaly Detection in IaaS Cloud Computing Platforms , 2015 .

[7]  Irfan Gul,et al.  Distributed Cloud Intrusion Detection Model , 2011 .

[8]  Martin Knahl,et al.  Anomaly Detection in IaaS Clouds , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[9]  Erik Elmroth,et al.  Performance Anomaly Detection and Bottleneck Identification , 2015, ACM Comput. Surv..

[10]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[11]  Jeffrey P. Buzen,et al.  MASF - Multivariate Adaptive Statistical Filtering , 1995, Int. CMG Conference.

[12]  Gang Yin,et al.  Magnifier: Online Detection of Performance Problems in Large-Scale Cloud Computing Systems , 2011, 2011 IEEE International Conference on Services Computing.

[13]  Brian S. Penn,et al.  Using self-organizing maps to visualize high-dimensional data , 2005, Comput. Geosci..

[14]  Karsten Schwan,et al.  E2EProf: Automated End-to-End Performance Management for Enterprise Systems , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[15]  Ken Schwaber,et al.  Agile Software Development with SCRUM , 2001 .

[16]  Matteo Frigo A Fast Fourier Transform Compiler , 1999, PLDI.

[17]  Sanjay Ranka,et al.  Conditional Anomaly Detection , 2007, IEEE Transactions on Knowledge and Data Engineering.

[18]  Frank Leymann,et al.  Standards-Based DevOps Automation and Integration Using TOSCA , 2014, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing.

[19]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[20]  Cesare Furlanello,et al.  mlpy: Machine Learning Python , 2012, ArXiv.

[21]  Dirk Fahland,et al.  Separating Compliance Management and Business Process Management , 2011, Business Process Management Workshops.

[22]  Bernhard Mitschang,et al.  Policy4TOSCA: A Policy-Aware Cloud Service Provisioning Approach to Enable Secure Cloud Computing , 2013, OTM Conferences.

[23]  Song Fu,et al.  Exploring Time and Frequency Domains for Accurate and Automated Anomaly Detection in Cloud Computing Systems , 2013, 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing.

[24]  Ahmet Palazoglu,et al.  Detection and classification of abnormal process situations using multidimensional wavelet domain hidden Markov trees , 2000 .

[25]  Victoria J. Hodge,et al.  A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.

[26]  Song Fu,et al.  Adaptive Anomaly Identification by Exploring Metric Subspace in Cloud Computing Infrastructures , 2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems.

[27]  Paramvir Bahl,et al.  Towards highly reliable enterprise network services via inference of multi-level dependencies , 2007, SIGCOMM.

[28]  Jim X. Chen,et al.  Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment , 2015 .

[29]  Vanish Talwar,et al.  Online detection of utility cloud anomalies using metric distributions , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.

[30]  Vanish Talwar,et al.  Statistical techniques for online anomaly detection in data centers , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.

[31]  M. Brian Blake,et al.  Service-Oriented Computing and Cloud Computing: Challenges and Opportunities , 2010, IEEE Internet Computing.

[32]  Ruth Breu,et al.  Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning , 2012, EternalS@ECAI.

[33]  Eelco Visser,et al.  DSL Engineering - Designing, Implementing and Using Domain-Specific Languages , 2013 .

[34]  Rajkumar Buyya,et al.  Towards autonomic detection of SLA violations in Cloud infrastructures , 2012, Future Gener. Comput. Syst..

[35]  Shazia Wasim Sadiq,et al.  Modeling Control Objectives for Business Process Compliance , 2007, BPM.

[36]  Song Fu,et al.  Wavelet-based multi-scale anomaly identification in cloud computing systems , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[37]  Manfred Reichert,et al.  Modeling the Resource Perspective of Business Process Compliance Rules with the Extended Compliance Rule Graph , 2014, BMMDS/EMMSAD.

[38]  Theo Lynn,et al.  A survey of Cloud monitoring tools: Taxonomy, capabilities and objectives , 2014, J. Parallel Distributed Comput..

[39]  Schahram Dustdar,et al.  Low level Metrics to High level SLAs - LoM2HiS framework: Bridging the gap between monitored metrics and SLA parameters in cloud environments , 2010, 2010 International Conference on High Performance Computing & Simulation.

[40]  Amin Vahdat,et al.  Pip: Detecting the Unexpected in Distributed Systems , 2006, NSDI.

[41]  Manfred Reichert,et al.  Enabling Flexibility in Process-Aware Information Systems: Challenges, Methods, Technologies , 2012 .

[42]  Carlos Maltzahn,et al.  Ceph: a scalable, high-performance distributed file system , 2006, OSDI '06.