Efficient and secure computation in cloud computing systems

Franciszek Seredyński (Institute of Computer Science) sered >at>

Description: Cloud computing (CC) (Buyya et al., 2009), a natural extension of grid computing is a new concept of distributed computing, which has emerged recently. It assumes that customers do not own or rent any computational infrastructure but they simply use available resources and pay for what they use. The potential platforms - solutions of CC concept will base on two classes of computational resources:
  1. private or public computing clusters,
  2. desktop workstations present in companies or universities, which are known to be idle around 50% of the time.
To transform the ideas of CC into specific platforms with wide acceptance, a number of issues must be solved. Despite classical problems in this domain the implementation of CC concepts needs confidentiality in software and user data, integrity on programs and data before, during and after run on CC platform and trust management to monitor resources and guarantee a given quality of service and security to users (Jafar et al., 2009), (Mahjoub et al., 2010). These issues focused little academic interests until know in greed computing, and lack of solutions in this field may explain industry’s reluctance to adopt grid computing despite the initial interest.
The purpose of the research topic is to develop a generic model and build environment of secured and trusted distributed computing in CC environment characterized by fault-tolerance phenomena of computational infrastructure. The work will be focused on secure and robust load balancing and scheduling algorithms which fulfill not only optimization criteria, like e.g. a minimal computational time but also provide confidentiality of data and programs, authentication of users and resources, resistance to attacks and malicious behavior of other actors of CC and take into account trust management criteria (Święcicka et al., 2006), (Szaban and Seredyński, 2010), (Ostaszewski et al., 2007). To build computational models and design secure and effective algorithms solving NP-hard nature problems a set of nature inspired paradigms will be used. This will include cellular automata, artificial immune networks, evolutionary algorithms, etc. Also computational frameworks and tools like game theory and multi-objective optimization will be useful.

 Buyya R., Yeo C.S., Venugopal S., Broberg J., Brandic I. Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6):599–616, June 2009.

 Jafar S., Krings A., Gautier T. Flexible rollback recovery in dynamic heterogeneous grid computing. IEEE Transactions on Dependable and Secure Computing (TDSC), 6(1), Jan 2009

 Mahjoub A., Pecero Sánchez J.E., Trystram D. Scheduling with uncertainties on new computing platforms. J. Comput Optim Appl. To appear

 Święcicka A., Seredyński F., Zomaya A.Y. Multiprocessor Scheduling and Rescheduling with use of Cellular Automata and Artificial Immune System Support, IEEE Trans. on Parallel and Distributed Systems, vol. 17, No3, March 2006, pp. 253-262

 Szaban M., Seredyński F. Improving Quality of DES S-boxes by Cellular Automata-Based S-boxes, Journal of Supercomputing, 2010 (in print)

 Ostaszewski M., Seredyński F., Bouvry P. Coevolutionary-based mechanisms for network anomaly detection. J. of Math. Modeling and Algorithms, Springer, 2007, pp. 411-431

You are here: Home Projects Efficient and secure computation in cloud computing systems