Controlling data in the cloud: outsourcing computation without outsourcing control
A group at PARC has been studying the Cloud Computing space and published this paper (download) in CCSW. The particular this paper argued that life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today.
Cloud Computing and Security
The same group also posted a blog entry on several issues are of potential interests for both technical development and business management.
In particular, it points to four (4) levels where Cloud Computing could increase technical vulnerabilities; two (2) areas with known potential business concerns; and two (2) opportunities where Cloud Computing enables new capabilities that is difficult to do today.
===
P@P
Showing posts with label Cloud Computing. Show all posts
Showing posts with label Cloud Computing. Show all posts
Tuesday, February 16, 2010
Tuesday, October 13, 2009
Going Mainstream - Cloud Computing's First Black Eye
When a technology goes mainstream
Technology is often known for the hype it generates but less is discussed about when it has gone mainstream. One reason is that when it is integrated into the fabric of everyone usage, it is no longer visible or hype-able (if there is such a word).
Put it another way, when a technology is talked about in the context of violating an unspoken norm of everyday, it is a good indicator that it has gone mainstream.
Cloud Computing's first black eye
So, after all the accolades and fear surrounding Cloud Computing in recent years, this is the first time that it has a specific impact to a substantial number of unfortunate users when T-Mobile, Microsoft 'almost certainly' destroyed users' Sidekick data
Ironic twists of event
The first irony is that this was not high on the list of potential issues that people have been predicting about Cloud Computing.
The second level irony is that this is actually a pretty simple fix that should have been caught/designed-in when the system was being architected.
The third level of irony is that, at the end of day, human remains the biggest variable in the use of a technology.
===
P@P
Technology is often known for the hype it generates but less is discussed about when it has gone mainstream. One reason is that when it is integrated into the fabric of everyone usage, it is no longer visible or hype-able (if there is such a word).
Put it another way, when a technology is talked about in the context of violating an unspoken norm of everyday, it is a good indicator that it has gone mainstream.
Cloud Computing's first black eye
So, after all the accolades and fear surrounding Cloud Computing in recent years, this is the first time that it has a specific impact to a substantial number of unfortunate users when T-Mobile, Microsoft 'almost certainly' destroyed users' Sidekick data
Ironic twists of event
The first irony is that this was not high on the list of potential issues that people have been predicting about Cloud Computing.
The second level irony is that this is actually a pretty simple fix that should have been caught/designed-in when the system was being architected.
The third level of irony is that, at the end of day, human remains the biggest variable in the use of a technology.
===
P@P
Tuesday, September 22, 2009
Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control
CCSW 2009: The ACM Cloud Computing Security Workshop
The cloud computing paper "Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control" by our security team with Fujitsu has been accepted by the workshop.
Paper Summary
Cloud computing is clearly one of today’s most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this paper, we characterize the problems and their impact on adoption. In addition, and equally importantly, we describe how the combination of existing research thrusts has the potential to alleviate many of the concerns impeding adoption. In particular, we argue that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today
New Cloud Computing Directions
Well, the really good stuff is at the end. They include
P@P
The cloud computing paper "Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control" by our security team with Fujitsu has been accepted by the workshop.
Paper Summary
Cloud computing is clearly one of today’s most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this paper, we characterize the problems and their impact on adoption. In addition, and equally importantly, we describe how the combination of existing research thrusts has the potential to alleviate many of the concerns impeding adoption. In particular, we argue that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today
New Cloud Computing Directions
Well, the really good stuff is at the end. They include
- Information-centric security
- High-Assurance Remote Server Attestation
- Privacy-Enhanced Business Intelligence
P@P
Friday, August 21, 2009
Mobile Computing and Cloud Today
The Short half-life of Predictions
The hazard of the technology world is that the future is always just around the world. So, it is interesting to note that I have done an analysis of Cloud Computing earlier this year and one of the conclusions is that mobile computing will be a key influence on how people access the Cloud. Mobile, the next Cloud frontier?
Microsoft and Nokia's Mobile Cloud offering
It is, therefore, not a surprise to hear about how Microsoft and Nokia is joining force to offer standard productivity tools like Office for Nokia smart phones. Microsoft and Nokia to bring cloud computing to mobile phone users
What would be interesting to see if users finds the offering compelling. Mobile computing has its own set of form factor and operating norms and fitting the mental framework of productivity tools in that context would be a fascinating story.
===
P@P
The hazard of the technology world is that the future is always just around the world. So, it is interesting to note that I have done an analysis of Cloud Computing earlier this year and one of the conclusions is that mobile computing will be a key influence on how people access the Cloud. Mobile, the next Cloud frontier?
Microsoft and Nokia's Mobile Cloud offering
It is, therefore, not a surprise to hear about how Microsoft and Nokia is joining force to offer standard productivity tools like Office for Nokia smart phones. Microsoft and Nokia to bring cloud computing to mobile phone users
What would be interesting to see if users finds the offering compelling. Mobile computing has its own set of form factor and operating norms and fitting the mental framework of productivity tools in that context would be a fascinating story.
===
P@P
Thursday, June 25, 2009
Mobile, the next Cloud frontier?
Buzz Words
I have been following Cloud Computing. Buzz word or not, it is a good way to talk about a shift in how we think of computing services. And, like many computing services, it would eventually impact the life of everyday consumer.
Cloud Computing prediction
I did an internal analysis and presentation recently. It got me thinking about the implication of that shift and how it would manifest itself. At a high level, Cloud and mobile computing seem inevitable - I think the bigger question is which mobile platform (smartphone, netbook, etc.) will be the winner.

I suppose we will only know for sure in a few more years.
===
P@P
I have been following Cloud Computing. Buzz word or not, it is a good way to talk about a shift in how we think of computing services. And, like many computing services, it would eventually impact the life of everyday consumer.
Cloud Computing prediction
I did an internal analysis and presentation recently. It got me thinking about the implication of that shift and how it would manifest itself. At a high level, Cloud and mobile computing seem inevitable - I think the bigger question is which mobile platform (smartphone, netbook, etc.) will be the winner.
I suppose we will only know for sure in a few more years.
===
P@P
Friday, April 3, 2009
Dueling dinasaurs - the Cloud edition
Dueling Dinosaurs
A few months back while talking about setting networking technical standards, one of the networking statesmen told me Dave Clark's dueling dinosaurs story as a metaphor on timing as a critical factor. In this version, the best time to set the standard is when the core technical requirements have been worked out but the commercial interests have not yet been deeply entrenched.

In other words, if the core requirements have not yet been worked out, the standard is liable to be in poor quality which impedes its proliferation. On the other hand, when there is significantly commercial entrenchment before a given standard is set, there is every business incentive to bias the standard which will fracture the industry.
Clash of the cloud dinosaurs
Just read the economist article about how two interests groups are fighting over Cloud Computing standards. In short, one group who already have a meaningful footprint in the Cloud space are happy with what they do. The opposing group are proposing standards on interoperability that allows users to easily switch between services.
--
It is a comfort to know that even in the ever changing world of technology, some things don't.
===
P@P
A few months back while talking about setting networking technical standards, one of the networking statesmen told me Dave Clark's dueling dinosaurs story as a metaphor on timing as a critical factor. In this version, the best time to set the standard is when the core technical requirements have been worked out but the commercial interests have not yet been deeply entrenched.
In other words, if the core requirements have not yet been worked out, the standard is liable to be in poor quality which impedes its proliferation. On the other hand, when there is significantly commercial entrenchment before a given standard is set, there is every business incentive to bias the standard which will fracture the industry.
Clash of the cloud dinosaurs
Just read the economist article about how two interests groups are fighting over Cloud Computing standards. In short, one group who already have a meaningful footprint in the Cloud space are happy with what they do. The opposing group are proposing standards on interoperability that allows users to easily switch between services.
--
It is a comfort to know that even in the ever changing world of technology, some things don't.
===
P@P
Labels:
Cloud Computing,
networking,
Standards,
tech adoption
Thursday, February 19, 2009
Cloud Computing and Security
Cloud Computing and PARC
Cloud Computing is hot - now that is a truism for the technology world today.
Beyond the hype of processing xTb of data in 24 hours by EC2 or Azure and the alphabet soup of cloud solutions, a bit of good ole' fashioned investigation seems to be important to figure out how it actually impacts the technology landscape.
In other words, PARC's Security team is intrigued after the Security Workshop.
PARC Security's Cloud Computing Offer
If you are a practitioner in the cloud computing space, we would love to hear from you. Here is a brief description of what we are doing:
==
PARC is investigating cloud computing security as a potential research area. Knowledge of current practices, use cases, and problems with regards to cloud computing security would be very helpful for this investigation. We hope to understand the actual security issues in the new world of cloud computing.
==
As for being the discovery process, we will share consolidated/anonymized information with you at the end of the study.
Please drop me a note if you wish to participate.
===
P@P
Cloud Computing is hot - now that is a truism for the technology world today.
Beyond the hype of processing xTb of data in 24 hours by EC2 or Azure and the alphabet soup of cloud solutions, a bit of good ole' fashioned investigation seems to be important to figure out how it actually impacts the technology landscape.
In other words, PARC's Security team is intrigued after the Security Workshop.
PARC Security's Cloud Computing Offer
If you are a practitioner in the cloud computing space, we would love to hear from you. Here is a brief description of what we are doing:
==
PARC is investigating cloud computing security as a potential research area. Knowledge of current practices, use cases, and problems with regards to cloud computing security would be very helpful for this investigation. We hope to understand the actual security issues in the new world of cloud computing.
==
As for being the discovery process, we will share consolidated/anonymized information with you at the end of the study.
Please drop me a note if you wish to participate.
===
P@P
Saturday, February 7, 2009
Security Workshop
Security as an Enabler: Visions
Highlights of a Workshop sponsored by Fujitsu Laboratories and PARC
Key areas considered
* Data Loss Prevention (DLP)
* Reputation and Trust
* Malware and Fraud Detection
Homework Questions
Where does Cloud Computing fit? Because of the cooperative nature of cloud computing, frameworks and standards might be important here. In fact, the security problems for cloud computing are at this point is not well-defined.
Interplay of reputation, malware, and social networks. The phenomenon of malvertising seems to show that the problem cannot be solved by any one party. In other words, how can reputation and social networks be used to expose and combat malware?
P@P Workshop Notes
This was a highly interactive workshop that allowed academic, corporate practitioners, and researchers to challenge each other’s ideas and find areas of common interests.
The most fascinating story for me is on the development of the DLP market when people did not think such a need existed. Now DLP is one of the fastest growing segments in the security industry.
Drop me a note if you want a copy of the workshop’s output.
===
P@P
Highlights of a Workshop sponsored by Fujitsu Laboratories and PARC
Key areas considered
* Data Loss Prevention (DLP)
* Reputation and Trust
* Malware and Fraud Detection
Homework Questions
Where does Cloud Computing fit? Because of the cooperative nature of cloud computing, frameworks and standards might be important here. In fact, the security problems for cloud computing are at this point is not well-defined.
Interplay of reputation, malware, and social networks. The phenomenon of malvertising seems to show that the problem cannot be solved by any one party. In other words, how can reputation and social networks be used to expose and combat malware?
P@P Workshop Notes
This was a highly interactive workshop that allowed academic, corporate practitioners, and researchers to challenge each other’s ideas and find areas of common interests.
The most fascinating story for me is on the development of the DLP market when people did not think such a need existed. Now DLP is one of the fastest growing segments in the security industry.
Drop me a note if you want a copy of the workshop’s output.
===
P@P
Subscribe to:
Posts (Atom)