Showing posts with label Cloud Computing. Show all posts
Showing posts with label Cloud Computing. Show all posts

Tuesday, February 16, 2010

Cloud Computing - Security, Compliance, and Opportunities

Controlling data in the cloud: outsourcing computation without outsourcing control

A group at PARC has been studying the Cloud Computing space and published this paper (download) in CCSW. The particular this paper argued that life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today.

Cloud Computing and Security

The same group also posted a blog entry on several issues are of potential interests for both technical development and business management.

In particular, it points to four (4) levels where Cloud Computing could increase technical vulnerabilities; two (2) areas with known potential business concerns; and two (2) opportunities where Cloud Computing enables new capabilities that is difficult to do today.

===
P@P

Tuesday, October 13, 2009

Going Mainstream - Cloud Computing's First Black Eye

When a technology goes mainstream

Technology is often known for the hype it generates but less is discussed about when it has gone mainstream. One reason is that when it is integrated into the fabric of everyone usage, it is no longer visible or hype-able (if there is such a word).

Put it another way, when a technology is talked about in the context of violating an unspoken norm of everyday, it is a good indicator that it has gone mainstream.

Cloud Computing's first black eye

So, after all the accolades and fear surrounding Cloud Computing in recent years, this is the first time that it has a specific impact to a substantial number of unfortunate users when T-Mobile, Microsoft 'almost certainly' destroyed users' Sidekick data

Ironic twists of event

The first irony is that this was not high on the list of potential issues that people have been predicting about Cloud Computing.

The second level irony is that this is actually a pretty simple fix that should have been caught/designed-in when the system was being architected.

The third level of irony is that, at the end of day, human remains the biggest variable in the use of a technology.

===
P@P

Tuesday, September 22, 2009

Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control

CCSW 2009: The ACM Cloud Computing Security Workshop

The cloud computing paper "Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control" by our security team with Fujitsu has been accepted by the workshop.

Paper Summary

Cloud computing is clearly one of today’s most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this paper, we characterize the problems and their impact on adoption. In addition, and equally importantly, we describe how the combination of existing research thrusts has the potential to alleviate many of the concerns impeding adoption. In particular, we argue that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today

New Cloud Computing Directions

Well, the really good stuff is at the end. They include
  • Information-centric security
  • High-Assurance Remote Server Attestation
  • Privacy-Enhanced Business Intelligence
===
P@P

Friday, August 21, 2009

Mobile Computing and Cloud Today

The Short half-life of Predictions

The hazard of the technology world is that the future is always just around the world. So, it is interesting to note that I have done an analysis of Cloud Computing earlier this year and one of the conclusions is that mobile computing will be a key influence on how people access the Cloud. Mobile, the next Cloud frontier?

Microsoft and Nokia's Mobile Cloud offering

It is, therefore, not a surprise to hear about how Microsoft and Nokia is joining force to offer standard productivity tools like Office for Nokia smart phones. Microsoft and Nokia to bring cloud computing to mobile phone users

What would be interesting to see if users finds the offering compelling. Mobile computing has its own set of form factor and operating norms and fitting the mental framework of productivity tools in that context would be a fascinating story.

===
P@P

Thursday, June 25, 2009

Mobile, the next Cloud frontier?

Buzz Words

I have been following Cloud Computing. Buzz word or not, it is a good way to talk about a shift in how we think of computing services. And, like many computing services, it would eventually impact the life of everyday consumer.

Cloud Computing prediction


I did an internal analysis and presentation recently. It got me thinking about the implication of that shift and how it would manifest itself. At a high level, Cloud and mobile computing seem inevitable - I think the bigger question is which mobile platform (smartphone, netbook, etc.) will be the winner.



I suppose we will only know for sure in a few more years.

===
P@P

Friday, April 3, 2009

Dueling dinasaurs - the Cloud edition

Dueling Dinosaurs

A few months back while talking about setting networking technical standards, one of the networking statesmen told me Dave Clark's dueling dinosaurs story as a metaphor on timing as a critical factor. In this version, the best time to set the standard is when the core technical requirements have been worked out but the commercial interests have not yet been deeply entrenched.



In other words, if the core requirements have not yet been worked out, the standard is liable to be in poor quality which impedes its proliferation. On the other hand, when there is significantly commercial entrenchment before a given standard is set, there is every business incentive to bias the standard which will fracture the industry.

Clash of the cloud dinosaurs

Just read the economist article about how two interests groups are fighting over Cloud Computing standards. In short, one group who already have a meaningful footprint in the Cloud space are happy with what they do. The opposing group are proposing standards on interoperability that allows users to easily switch between services.

--
It is a comfort to know that even in the ever changing world of technology, some things don't.

===
P@P

Thursday, February 19, 2009

Cloud Computing and Security

Cloud Computing and PARC

Cloud Computing is hot - now that is a truism for the technology world today.

Beyond the hype of processing xTb of data in 24 hours by EC2 or Azure and the alphabet soup of cloud solutions, a bit of good ole' fashioned investigation seems to be important to figure out how it actually impacts the technology landscape.

In other words, PARC's Security team is intrigued after the Security Workshop.

PARC Security's Cloud Computing Offer

If you are a practitioner in the cloud computing space, we would love to hear from you. Here is a brief description of what we are doing:

==
PARC is investigating cloud computing security as a potential research area. Knowledge of current practices, use cases, and problems with regards to cloud computing security would be very helpful for this investigation. We hope to understand the actual security issues in the new world of cloud computing.
==

As for being the discovery process, we will share consolidated/anonymized information with you at the end of the study.

Please drop me a note if you wish to participate.

===
P@P

Saturday, February 7, 2009

Security Workshop

Security as an Enabler: Visions
Highlights of a Workshop sponsored by Fujitsu Laboratories and PARC

Key areas considered
* Data Loss Prevention (DLP)
* Reputation and Trust
* Malware and Fraud Detection

Homework Questions

Where does Cloud Computing fit? Because of the cooperative nature of cloud computing, frameworks and standards might be important here. In fact, the security problems for cloud computing are at this point is not well-defined.

Interplay of reputation, malware, and social networks. The phenomenon of malvertising seems to show that the problem cannot be solved by any one party. In other words, how can reputation and social networks be used to expose and combat malware?

P@P Workshop Notes

This was a highly interactive workshop that allowed academic, corporate practitioners, and researchers to challenge each other’s ideas and find areas of common interests.

The most fascinating story for me is on the development of the DLP market when people did not think such a need existed. Now DLP is one of the fastest growing segments in the security industry.

Drop me a note if you want a copy of the workshop’s output.

===
P@P