security, privacy, and data protection for trusted cloud computing
TRANSCRIPT
-
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
1/36
Dec. 3, 2010 Kai Hwang, USC 1
Security, Privacy, and Data
Protection for TrustedCloud ComputingProf. Kai Hwang, University of Southern California
Keynote Address, International Conference
on Cloud Computing (CloudCom2010)Indianapolis, Indiana Dec.3, 2010
Cloud Platforms over Datacenters Cloud Infrastructure and Services Reputation-based Trust Management Data Coloring and Software Watermarking Cloud Support of The Internet of Things
-
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
2/36
Dec. 3, 2010 Kai Hwang, USC 2
Handy Tools We Use over the
Evolutional Periods In History
Is it safe to play with your computer,
when you are naked and vulnerable ?
-
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
3/36
Dec. 3, 2010 Kai Hwang, USC 3
Top 10 Technologies for 2010
-
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
4/36
Dec. 3, 2010 Kai Hwang, USC 4
Web 2.0, Clouds, and Internet of Things
HPC: High-PerformanceComputingHTC: High-ThroughputComputingP2P:Peer to PeerMPP:Massively ParallelProcessors
Source: K. Hwang, G. Fox, and J. Dongarra,
Distributed Systems and Cloud Computing,Morgan Kaufmann, 2011 (in press to appear)
-
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
5/36
Dec. 3, 2010 Kai Hwang, USC 5
Cloud Computing as A Service
[9]
-
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
6/36
Dec. 3, 2010 Kai Hwang, USC 6
Amazon Virtual Private Cloud VPC
(http://aws.amazon.com/vpc/)
http://aws.amazon.com/vpc/http://aws.amazon.com/vpc/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
7/36
Dec. 3, 2010 Kai Hwang, USC 7
vSphere 4 : An OS for Cloud Platform
-
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
8/36
Dec. 3, 2010 Kai Hwang, USC 8
Cloud Services Stack
Network
Cloud Services
Co-Location
Cloud Services
Compute & Storage
Cloud Services
Platform
Cloud Services
Application
Cloud Services
http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
9/36
Dec. 3, 2010 Kai Hwang, USC 9
Marc Benioff, Founder of
Salesforce.com
1986 graduated from USC1999 started salesforce.com
2003-05 appointed chairman of US Presidential
IT Advisory Committee
2009 announced Force.com platform for
cloud business computing
A SaaS and PaaS Cloud Provider
'''
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
10/36
Dec. 3, 2010 Kai Hwang, USC 1010
XEx =' XEx =' XEx ='
Protecting datacenters must first secure cloud resources and uphold userprivacy and data integrity.
Trust overlay networks could be applied to build reputation systems forestablishing the trust among interactive datacenters.
A watermarking technique is suggested to protect shared data objects andmassively distributed software modules.
These techniques safeguard user authentication and tighten the dataaccess-control in public clouds.
The new approach could be more cost-effective than using the traditionalencryption and firewalls to secure the clouds.
Security and Trust Crisisin Cloud Computing
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
11/36
Dec. 3, 2010 Kai Hwang, USC 11
Trusted Zones for VM Insulation
Physical Infrastructure
Tenant #2
APP
OS
APP
OS
Virtual Infrastructure
PhysicalInfrastructure
Cloud Provider
APP
OSAPP
OS
Virtual Infrastructure
Tenant #1
Insulateinformatio
n fromcloudprovidersemployees
Insulate
informationfrom othertenants
Insulate
infrastructurefrom Malware,Trojans andcybercriminals
Segregateand controluser access
Controland isolateVM in thevirtualinfrastructure
Federateidentitieswithpublicclouds
Identityfederatio
n
Virtualnetworksecurity
AccessMgmt
Cybercrimeintelligence
Strongauthentication
Data lossprevention
Encryption& key mgmt
Tokenization
Enable end to end view of security events
and compliance across infrastructures
Security Info.& Event Mgmt GRC
Anti-malware
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
12/36
Dec. 3, 2010 Kai Hwang, USC 12
Cloud Service Models and Their Security Demands
Cloud computing will not be accepted by common users unless
the trust and dependability issues are resolved satisfactorily [1].
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
13/36
Dec. 3, 2010 Kai Hwang, USC 13March 11, 2009 Prof. Kai Hwang, USC
Data Security and Copyright Protection
in A Trusted Cloud Platform
Source: Reference [3, 4]
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
14/36
Dec. 3, 2010 Kai Hwang, USC 14
Security Protection Mechanisms for
Public Clouds
14
Mechanism Brief DescriptionTrust delegationand Negotiation
Cross certificates must be used to delegate trust across differentPKI domains. Trust negotiation among different CSPs demandsresolution of policy conflicts.
Wormcontainment and
DDoS Defense
Internet worm containment and distributed defense againstDDoS attacks are necessary to secure all datacenters and cloudplatforms .
ReputationSystem Over
Resource Sites
Reputation system could be built with P2P technology. One canbuild a hierarchy of reputation systems from datacenters todistributed file systems .
Fine-grainaccess control This refers to fine-grain access control at the file or object level.This adds up the security protection beyond firewalls and
intrusion detection systems .
Collusive Piracyprevention
Piracy prevention achieved with peer collusion detection andcontent poisoning techniques .
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
15/36
Dec. 3, 2010 Kai Hwang, USC 15
Trust Management for Protecting Cloud Resources
and Safeguard Datacenter Operations [3]
Source: [4]
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
16/36
Dec. 3, 2010 Kai Hwang, USC 16
PowerTrust Built over A Trust Overlay Network
R. Zhou and K. Hwang, PowerTrust : A scalable and robust reputation system for
structured P2P networks,IEEE-TPDS, May 2007
Look-ahead Random Walk Distributed Ranking Module
vn
............v3
v2
v1
Global Reputation ScoresV
Regular Random Walk
Initial Reputation
AggregationReputation Updating
Local Trust Scores
PowerNodes
Trust Overlay Network
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
17/36
Dec. 3, 2010 Kai Hwang, USC 17
Data Coloring via Watermarking
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
18/36
Dec. 3, 2010 Kai Hwang, USC 18
Color Matching To Authenticate DataOwners and Cloud Service Providers
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
19/36
Dec. 3, 2010 Kai Hwang, USC 19
Architecture of The Internet of Things
Merchandise
Tracking
Environment
Protection
Intelligent
Search
Tele-
medicine
Intelligent
Traffic
Cloud ComputingPlatform
Smart
Home
MobileTelecomNetwork
TheInternet
InformationNetwork
RFID
RFID Label
Sensor Network
Sensor Nodes
GPS
Road Mapper
SensingLayer
NetworkLayer
Application
Layer
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
20/36
Dec. 3, 2010 Kai Hwang, USC 20
24 Satellites of GPS Deployed in Outerspace
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
21/36
Dec. 3, 2010 Kai Hwang, USC 21
Service-Oriented Cloud of Clouds (Intercloud orMashup)
Database
S
S
S
S
SS
S
S
S
S
S
SSensor or Data
Interchange
Service
Another
Grid
Raw Data Data Information Knowledge Wisdom Decisions
S
SS
S
Another
Service
S
SAnother
Grid SS
Another
Grid
SS
SS
SS
SS
SS
SS
SS
Storage
Cloud
Compute
Cloud
S
S
S
S
S
SS
S
Filter
Cloud
Filter
Cloud
Filter
Cloud
Discovery
Cloud
Discovery
Cloud
Filter
Servicef sf s
f s f s
f s f s
Filter
Servicef sf s
f s f s
f s f s
Filter
Servicef sf s
f s f s
f s f s
Filter
Cloud
Filter
Cloud
Filter
Cloud
Filter
Servicef sf s
f s f s
f s f s
Traditional Grid
with exposed
services
Geoffrey Fox: Cloud of clouds -- from Raw Data to Wisdom.
SS = Sensor service, fs = filter services
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
22/36
Dec. 3, 2010 Kai Hwang, USC 22
Supply Chain Managementsupported by the Internet of Things.
( http://www.igd.com)
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
23/36
Dec. 3, 2010 Kai Hwang, USC 23
Facebook Applications(550 Millions users registered today)
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
24/36
Dec. 3, 2010 Kai Hwang, USC 24
Mobility Support and Security Measuresfor Mobile Cloud Computing
Cloud
Service
Models
Mobility Support andData Protection Methods Hardware and SoftwareMeasures for Cloud Security
Infrastructure
Cloud
(The IaaS
Model)
Special air interfaces
Mobile API design
File/Log access control Data coloring
Hardware/software root of trust,
Provisioning of virtual machines,
Software watermarking
Host-based firewalls and IDS
Platform
Cloud
(The PaaSModel)
Wireless PKI ,
User authentication,
Copyright protection Disaster recovery
Network-based firewalls
and IDS
Trust overlay network
Reputation system
OS patch management
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
25/36
Dec. 3, 2010 Kai Hwang, USC 25
Cloudlets- A trusted, VM-based, and Resource-RichPortal for Upgrading Mobile Devices with Cognitive Abilities for Mobile access
of the cloud to explore Location-Aware Cloud Applications such as :
Opportunity Discovery, Fast Information Processing,and Intelligent Decision Making on The Road, etc.
Source: The Case of VM-based Cloudlets in Mobile Computing,IEEE Pervasive Computing, Vol.8, No. 4, April 2009
C l i
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
26/36
Dec. 3, 2010 Kai Hwang, USC 26
Conclusions: Computing clouds are changing the whole IT , service industry, and global
economy. Clearly, cloud computing demands ubiquity, efficiency, security,and trustworthiness.
Cloud computing has become a common practice in business,government, education, and entertainment leveraging 50 millions
of servers globally installed at thousands of datacenters today. Private clouds will become widespread in addition to using a few
public clouds, that are under heavy competition among Google, MS,
Amazon, Intel, EMC, IBM, SGI, VMWare, Saleforce.com, etc.
Effective trust management, guaranteed security, user privacy,
data integrity, mobility support, and copyright protection are crucial
to the universal acceptance of cloud as a ubiquitous service.
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
27/36
Dec. 3, 2010 Kai Hwang, USC 27
Cloud Security Responsibilities
by Providers and UsersTable 1:
Source: Reference [4]
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
28/36
Dec. 3, 2010 Kai Hwang, USC 28
Cloud ComputingService
Provider Priorities Ensure confidentiality, integrity, and
availability in a multi-tenant
environment. Effectively meet the advertised SLA,
while optimizing cloud resource
utilization.
Offer tenants capabilities for self-service, and achieve scaling through
automation and simplification.
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
29/36
Dec. 3, 2010 Kai Hwang, USC 29
Using Twitter Crowd to Check
Weather Conditions in Remote Cities
IOT Telemedicine Applications:
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
30/36
Dec. 3, 2010 Kai Hwang, USC 30
IOT Telemedicine Applications:Measured Patient Data Transferred to Doctor
Using a Wireless Sensor Network.
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
31/36
Dec. 3, 2010 Kai Hwang, USC 31
Opportunities of IOT in 3 Dimensions
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
32/36
Dec. 3, 2010 Kai Hwang, USC 32
Smart Power Grid
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
33/36
Dec. 3, 2010 Kai Hwang, USC 33
Public, Private and Hybrid Clouds
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
34/36
Dec. 3, 2010 Kai Hwang, USC 34
Cloud Providers, Services and Security Measures
Kai Hwang and Deyi Li, Trusted Cloud Computing with Secure Resourcesand Data Coloring, IEEE Internet Computing, Sept. 2010
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
35/36
Dec. 3, 2010 Kai Hwang, USC 35
The Internet of Things
Internet of
Things (IOT)
Smart Earth
Smart
Earth:
An
IBM
Dream
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/ -
8/2/2019 Security, Privacy, And Data Protection for Trusted Cloud Computing
36/36
Dec 3 2010 36
Enabling and Synergistic Technologies
for Building The Internet of Things
Table 9.3 Enabling and Synergistic Technologies for The IoTEnabling Technologies Synergistic Technologies
Machine-to-machine interfaces Geo-tagging/geo-caching
Cloud Computing Services. Biometrics
Microcontrollers Machine vision
Wireless communication Robotics
Radio frequency iden. (RFID) Augmented reality
Energy harvesting technologies Telepresence and autonomy
Sensors and sensor networks Life recorders and personal assistant
Actuators Tangible user interfaces
Location technology (GPS) Clean technologies
Software engineering Mirror worlds
http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/http://www.taleo.com/