Verifying cloud services

As cloud-based services gain popularity in both private and enterprise domains, cloud consumers are still lacking in tools to verify that these services work as expected. Such tools should consider...

[1]  Maurice Herlihy,et al.  Linearizability: a correctness condition for concurrent objects , 1990, TOPL.

[2]  Christian Cachin,et al.  Integrity Protection for Revision Control , 2009, ACNS.

[3]  Huan Liu,et al.  A new form of DOS attack in a cloud and its avoidance mechanism , 2010, CCSW '10.

[4]  George Candea,et al.  The S2E Platform: Design, Implementation, and Applications , 2012, TOCS.

[5]  Noga Alon,et al.  Regular Languages are Testable with a Constant Number of Queries , 2000, SIAM J. Comput..

[6]  Krishna P. Gummadi,et al.  Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services , 2012, USENIX Security Symposium.

[7]  Elaine Shi,et al.  Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection , 2011, HotOS.

[8]  Trent Jaeger,et al.  Seeding clouds with trust anchors , 2010, CCSW '10.

[9]  Travis D. Breaux,et al.  Managing multi-jurisdictional requirements in the cloud: towards a computational legal landscape , 2011, CCSW '11.

[10]  Eduard Ayguadé,et al.  A survey on performance management for internet applications , 2010 .

[11]  Jeffrey S. Chase,et al.  Strong accountability for network storage , 2007, TOS.

[12]  Dawson R. Engler,et al.  KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.

[13]  J-C. Laprie,et al.  DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..

[14]  Idit Keidar,et al.  Fail-Aware Untrusted Storage , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[15]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[16]  Ron Patton,et al.  Software Testing , 2000 .

[17]  Chris Loosley,et al.  High-Performance Client/Server , 1997 .

[18]  Alysson Neves Bessani,et al.  DepSky: dependable and secure storage in a cloud-of-clouds , 2011, EuroSys '11.

[19]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[20]  James C. King A new approach to program testing , 1975 .

[21]  Evan Marcus,et al.  Blueprints for high availability , 2000 .

[22]  Matthias Schunter,et al.  Secure cloud maintenance: protecting workloads against insider attacks , 2012, ASIACCS '12.

[23]  Nicolas Marchand,et al.  Experience with CONSER: A System for Server Control through Fluid Modeling , 2011, IEEE Transactions on Computers.

[24]  George Candea,et al.  S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.

[25]  Ariel J. Feldman,et al.  SPORC: Group Collaboration using Untrusted Cloud Resources , 2010, OSDI.

[26]  Scott Shenker,et al.  Attested append-only memory: making adversaries stick to their word , 2007, SOSP.

[27]  Chen Wang,et al.  A Collaborative Monitoring Mechanism for Making a Multitenant Platform Accountable , 2010, HotCloud.

[28]  Siani Pearson,et al.  Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[29]  Mauro Pezzè,et al.  Software testing and analysis - process, principles and techniques , 2007 .

[30]  Emin Gün Sirer,et al.  Logical attestation: an authorization architecture for trustworthy computing , 2011, SOSP.

[31]  Ryszard Kowalczyk,et al.  Policy-Based Automation of SLA Establishment for Cloud Computing Services , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).

[32]  Stefan Tai,et al.  What Are You Paying For? Performance Benchmarking for Infrastructure-as-a-Service Offerings , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[33]  Peter R. Pietzuch,et al.  CloudFilter: practical control of sensitive data propagation to the cloud , 2012, CCSW '12.

[34]  Bettina Kemme,et al.  How consistent is your cloud application? , 2012, SoCC '12.

[35]  Reihaneh Safavi-Naini,et al.  LoSt: location based storage , 2012, CCSW '12.

[36]  Dennis Shasha,et al.  Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.

[37]  Salman Baset,et al.  Cloud SLAs: present and future , 2012, OPSR.

[38]  Martin Gilje Jaatun,et al.  Expressing Cloud Security Requirements in Deontic Contract Languages , 2012, CLOSER.

[39]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.

[40]  Sara Bouchenak,et al.  Benchmarking Dependability of MapReduce Systems , 2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems.

[41]  Virgílio A. F. Almeida,et al.  Capacity Planning for Web Services: Metrics, Models, and Methods , 2001 .

[42]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[43]  Peter Desnoyers,et al.  Scheduler Vulnerabilities and Attacks in Cloud Computing , 2011, ArXiv.

[44]  Martin Gilje Jaatun,et al.  Security SLAs - An Idea Whose Time Has Come? , 2012, CD-ARES.

[45]  Haibo Chen,et al.  CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization , 2011, SOSP.

[46]  Xiaozhou Li,et al.  What Consistency Does Your Key-Value Store Actually Provide? , 2010, HotDep.

[47]  Marko Vukolic,et al.  Robust data sharing with key-value stores , 2012, DSN.

[48]  Sushil K. Prasad,et al.  AzureBench: Benchmarking the Storage Services of the Azure Cloud Platform , 2012, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum.