Speakers
Title: Enabling Cloud Analytics for Big-Data Security and Intelligence
Dr. Kai Hwang
Biographical Sketch: Kai Hwang is a Professor of EE/CS at the University of Southern California (USC). He is also an EMC-endowed visiting Chair Professor at Tsinghua University. He received the Ph.D. from University of California, Berkeley in 1972. He has published 8 books and over 220 scientific papers in computer architecture, parallel processing, distributed systems, cloud computing and network security. His books have been adopted worldwide and translated into Chinese, Korean, Spanish, and German languages. His works have been cited more than 12,000 times with an h-index of 48. His latest book: Distributed and Cloud Computing was published by Kaufmann in 2012. Dr. Hwang was recognized with an IEEE Fellow in 1986. He received the very-first 2004 CFC Outstanding Achievement Award, the IPDPS-2011 Founder’s Award, and the Lifetime Achievement Award from the IEEE Cloud2012 for his pioneering work in parallel computing and distributed systems. He has served as the founding Editor-in-Chief of the Journal of Parallel and Distributed Computing for 28 years. He has produced numerious Ph.D students at Purdue University and at USC. Five of his former Ph.D students are elected IEEE Fellows and IBM Fellow. He has delivered three dozens of keynote addresses on advanced computing systems and cutting-edge information technologies in major IEEE/ACM Conferences. Hwang has performed advisory, consulting and collaborative work for IBM, Intel, MIT Lincoln Lab, JPL at Caltech, ETL in Japan, Academia Sinica in China, GMD in Germany, and INRIA in France. He can be reached via Email: [email protected].
Abstract: In this talk, Dr. Hwang addresses the growing interest in big-data science surrounding the use of cloud analytics, social networks and Internet of things (IoT). He will assess critical issues to upgrade big-data analysis, privacy and cloud security. The purpose is to achieve enhanced ubiquity, mobility, security, scalability and quality of service (QoS) of clouds and highly-visited social networks or datacenters. In particular, he will evaluate the widespread use of clouds over massive datasets generated by e-business, social networks, sensors, RFID, GPS, etc. His talk reveals major R/D challenges and presents new approaches to preserving data privacy, assuring cloud security, and enhacing cyber intelligence. To remove the security and trust barriers in baer-metal or virtual clouds, he examines the top-10 security and privacy issues released by Cloud Security Alliance in 2012. Some new approaches and hidden opportunities are discussed towads the building of a trusted and intelligent cloud computing environment over both structured and unstructured big datasets. Finally, he compares the security and capability in BYOD (Bring Your Own Devices) solutions with those offered by the new BYOC (Bring Your Own Clouds) approach for inter-cloud (mashup) applications.
—————————————————————————————————————-
Title: A Building Code for Building Code
Dr. Carl Landwehr
Carl Landwehr has been a leader in cyber security research and development since the late 1970s. Following an active research career at the Naval Research Laboratory, he led the National Science Foundation’s efforts to establish and build national research programs in Trusted Computing, Cyber Trust, Trustworthy Computing and Secure and Trustworthy Cyberspace. He helped DARPA develop its programs in Information Assurance and served on its ISAT advisory group. At IARPA, he initiated programs to develop and apply concepts of information flow analysis, automated software analysis and private information retrieval that continue to produce results. Professionally, he served four years as editor-in-chief of IEEE Security and Privacy Magazine. He was an early chair of the IEEE Technical Committee on Security & Privacy and has chaired the IEEE Symposium on Security & Privacy. He was the founding chair of IFIP WG11.3 on Data and Application Security, and is an active member of IFIP WG10.4 on Dependability and Fault Tolerance. In the past two years he has served as an advisor on cybersecurity research and software engineering education programs to the governments of Australia and Israel, respectively, as well as two major US laboratories. He was made an IEEE Fellow for his contributions to cybersecurity and was in the first class of 11 individuals inducted into the National Cyber Security Hall of Fame in 2012. Other awards include the NSF Director’s Award for Meritorious Service, IEEE’s Distinguished Service Award, ACM SIGSAC’s Outstanding Contribution Award. At present, He is an independent consultant and a Lead Research Scientist at the Cyber Security Policy and Research Institute at George Washington University, as well as a member of the NSF-funded Trustworthy Health and Wellness (THaW) research project, led by Dartmouth University and including Johns Hopkins University, University of Illinois, University of Michigan, and Vanderbilt.
Abstract: Cyberspace, though it has a physical reality of computers and communication channels, sensors and actuators, is in fact made real mostly by the programs that control those things. Today, systems of programs control most of our critical infrastructures. Metaphors are frequently used as a way to communicate to people what these programs are intended to do. Workers in cybersecurity have adopted many rich metaphors: Trojan Horse, virus, worm, firewall, and more. Difficulties arise when the metaphor blinds us to the underlying reality. The talk examines critically several common cybersecurity metaphors and proposes the adoption of a new (or at least underutilized) one, that of a building code for critical infrastructure software, as a means of putting what we have learned in forty years of system development experience into practice.
—————————————————————————————————————-
Title: Cloud-Centric Assured Information Sharing
Dr. Bhavani Thuraisingham
Dr. Bhavani Thuraisingham is the Louis A. Beecherl, Jr. Distinguished Professor of Computer Science and the Executive Director of the Cyber Security Research and Education Institute (CSI) at The University of Texas at Dallas. She is an elected Fellow of IEEE, the AAAS, the British Computer Society, and the SPDS (Society for Design and Process Science). She received several prestigious award including IEEE Computer Society’s 1997 Technical Achievement Award for “outstanding and innovative contributions to secure data management”, the 2010 ACM SIGSAC (Association for Computing Machinery, Special Interest Group on Security, Audit and Control) Outstanding Contributions Award for “seminal research contributions and leadership in data and applications security for over 25 years” and the SDPS Transformative Achievement Medal for her contributions to interdisciplinary research. She has unique experience working in commercial industry, research laboratory, US government and academia and her 30+ year career includes research and development, technology transfer, product development, program management, and consulting for the federal government. Her work has resulted in 100+ journal articles, 200+ conference papers, 100+ keynote and invited talks, six US patents (two pending) and twelve books.
Abstract: This presentation will describe our research and development efforts in assured cloud computing for the Air Force Office of Scientific Research. We have developed a secure cloud computing framework as well as multiple secure cloud query processing systems. Our framework uses Hadoop to store and retrieve large numbers of RDF triples by exploiting the cloud computing paradigm and we have developed a scheme to store RDF data in a Hadoop Distributed File System. We implemented XACML-based policy management and integrated it with our query processing strategies. For secure query processing with relational data we utilized the HIVE framework. More recently we have developed strategies for secure storage and query processing in a hybrid cloud. In particular, we have developed algorithms for query processing wherein user’s local computing capability is exploited alongside public cloud services to deliver an efficient and secure data management solution. We have also developed techniques for secure virtualization using the XEN hypervisor to host our cloud data managers as well as an RDF-based policy engine hosted on our cloud computing framework.
We have also developed demonstration systems with our European partners: Kings College, University of London and the University of Insubria Italy who are funded by EOARD (The European Office of Aerospace Research and Development). The first demonstration illustrates how information may be shared in our cloud, based on policies specified in XACML. In the second demonstration we have implemented a semantic web-based policy engine and will show how multiple social networks may share information on our cloud utilizing semantic web-based policies.

Leave a Reply