Thursday, July 25, 2013

Cloud Computing Security

Professor John Grundy, Swinburne University, will speak on "Model-driven software security engineering for the cloud" at the Australian National University in Canberra, 12 Noon, 31 July 2013.

Also, as noted by Senator Kate Lundy, Minister Assisting for the Digital Economy, the Federal Government released a National Cloud Computing strategy. The Australian Computer Society has released a Cloud Computing Consumer Protocol Discussion Paper and is inviting input for the consumer code. In the ACS Cloud Discussion Paper, cloud computing is defined as:

"... a general term for the delivery of hosted services over the internet, enabling users to remotely store, process and share digital information and data."

From: Cloud Computing Consumer Protocol, July 2013: http://www.acs.org.au/__data/assets/pdf_file/0011/19928/ACS-Cloud-Discussion-Paper.pdf
That would not seem to make it any different to a 1960s Time-sharing business.

Model-driven software security engineering for the cloud

Professor John Grundy (Swinburne University)

GENERAL Software Engineering

DATE: 2013-07-31
TIME: 12:00:00 - 13:30:00
LOCATION: CSIT Seminar Room, N101
CONTACT: lani.smales@anu.edu.au

ABSTRACT:
Software security engineering is a challenging problem. The emergence of cloud computing platforms as a "new" way to deliver software services in many ways compounds the problem: multiple tenants have differing security requirements; service and cloud providers have differing (sometimes conflicting) security requirements and platforms; and many security issues are emergent at run-time as tenants, service providers, cloud providers and deployment environments all evolve. We describe our recent research into securing cloud-hosted software applications from cloud provider, service provider, and cloud consumer (tenant) perspectives. This includes a new infrastructure-as-a-service security monitoring appliance, a new platform-as-a-service security analysis, design and management framework, and a novel tenant security requirements capture and management console. We describe several evaluations of these approaches identifying key strengths and weaknesses and some of our on-going research in this area.
BIO:
John Grundy is Professor of Software Engineering and Deputy Dean of the Faculty of ICT at Swinburne University of Technology. Previously he was Head of Computer Science and Software Engineering at Swinburne, Head of Department for Electrical and Computer Engineering at the University of Auckland, New Zealand, and Director of Software Engineering, University of Auckland. He has published widely in the areas of automated software engineering, model-driven engineering, visual languages, software architecture and software methods and tools. He is an Associate Editor for IEEE Transactions on Software Engineering, IEEE Software and Automated Software Engineering. He is currently the CORE Australia President, was on the ERA 2012 MIC Panel, and is on the Steering Committee for the IEEE/ACM International Conference on Automated Software Engineering. He is a Fellow of Automated Software Engineering and Fellow of Engineers Australia.

No comments: