skip to main content
10.1145/1640206.1640208acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinternetwareConference Proceedingsconference-collections
research-article

Constructing and testing privacy-aware services in a cloud computing environment: challenges and opportunities

Published: 17 October 2009 Publication History

Abstract

After decades of engineering development and infrastructural investment, Internet connections have become a commodity product in many countries, and Internetscale "cloud computing" has started to compete with traditional software business through its technological advantages and economy of scale. Cloud computing is a promising enabling technology of Internetware. One distinct characteristic of cloud computing is the global integration of data, logic, and users, but such integration magnifies a sharp concern about privacy, which is one of the most frequently cited reasons by enterprises for not migrating to cloud-based solutions. We argue that cloud-based systems should include privacy as a fundamental design goal, and that privacy in a cloud environment is bidirectional, covering both end users and application providers. End users need privacy-aware software services that prevent their private data from being exposed to other users or the cloud providers. Application providers need a privacy-protected testing methodology to prevent the companies' internal activities and product features from leaking to external users. Focusing on privacy protection, we discuss the research challenges in this unique design space, and explore potential solutions for enhancing privacy protection in several important components of the system.

References

[1]
Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia. Above the clouds: A berkeley view of cloud computing. UC Berkeley Technical Report UCB/EECS-2009-28, February 2009.
[2]
Brian Hayes. Cloud computing. Commun. ACM, 51(7):9--11, 2008.
[3]
Mark Zuckerberg. An open letter from Mark Zuckerberg. http://blog.facebook.com/blog.php?post=2208562130.
[4]
Premkumar T. Devanbu and Stuart Stubblebine. Software engineering for security: a roadmap. In Proc. of the Conf. on the Future of Software Engineering, pages 227--239, 2000.
[5]
Ken Birman, Gregory Chockler, and Robbert van Renesse. Toward a cloud computing research agenda. SIGACT News, 40(2):68--80, 2009.
[6]
Yahoo! Academic Relations. G4: Yahoo! network flows data 1.0. http://research.yahoo.com/Academic_Relations.
[7]
Niklaus Wirth. Algorithms + Data Structures = Programs. Prentice Hall PTR, Upper Saddle River, NJ, USA, 1978.
[8]
Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung. The google file system. In Proc. of the 9th ACM Symposium on Operating Systems Principles (SOSP'03), pages 29--43, 2003.
[9]
Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, and Robert E. Gruber. Bigtable: A distributed storage system for structured data. ACM Trans. Comput. Syst., 26(2):1--26, 2008.
[10]
Amazon Elastic Compute Cloud -- EC2. http://aws.amazon.com/ec2/.
[11]
Mache Creeger. CTO virtualization roundtable: Part II. Commun. ACM, 51(12):43--49, 2008.
[12]
Luiz André Barroso, Jeffrey Dean, and Urs Hölzle. Web search for a planet: The Google cluster architecture. IEEE Micro, 23(2):22--28, 2003.
[13]
Jeffrey Dean and Sanjay Ghemawat. MapReduce: simplified data processing on large clusters. In Proc. of the 6th Symp. on Opearting Systems Design&Implementation (OSDI'04), 2004.
[14]
Roy Campbell, Indranil Gupta, Michael Heath, Steven Y. Ko, Michael Kozuch, Marcel Kunze, Thomas Kwan, Kevin Lai, Hing Yan Lee, Martha Lyons, Dejan Milojicic, David OąrHallaron, and Yeng Chai Soh. Open Cirrus cloud computing testbed: Federated data centers for open source systems and services research. In Proc. of the Workshop on Hot Topics in Cloud Computing (HotCloud '09), June.
[15]
Apache Hadoop Core. http://hadoop.apache.org/core/.
[16]
A. Cockburn. Agile Software Development. Addison-Wesley, Boston, MA, 2002.
[17]
James Whittaker. Google v. microsoft, and the dev: test ratio debate. http://blogs.msdn.com/james_whittaker/archive/2008/12/09/googlev-microsoft-and-the-dev-test-ratio-debate.aspx.
[18]
Alexander Lenk, Markus Klems, Jens Nimis, Stefan Tai, and Thomas Sandholm. What's inside the cloud? an architectural map of the cloud landscape. In Proc. of the ICSE Workshop on Software Engineering Challenges of Cloud Computing, pages 23--31, 2009.
[19]
Jan S. Rellermeyer, Michael Duller, and Gustavo Alonso. Engineering the cloud from software modules. In Proc. of the ICSE Workshop on Software Engineering Challenges of Cloud Computing, pages 32--37, 2009.
[20]
Pavan Yara, Ramaseshan Ramachandran, Gayathri Balasubramanian, Karthik Muthuswamy, and Divya Chandrasekar. Global software development with cloud platforms. In Proc. of the 3rd Intl. Conf. on Software Engineering Approaches for Offshore and Outsourced Development (SEAFOOD'09), 2009.
[21]
Siani Pearson. Taking account of privacy when designing cloud computing services. In Proc. of the ICSE Workshop on Software Engineering Challenges of Cloud Computing (CLOUD'09), pages 44--52, 2009.
[22]
Sridhar Nerur, RadhaKanta Mahapatra, and George Mangalaraj. Challenges of migrating to agile methodologies. Commun. ACM, 48(5):72--78, 2005.
[23]
Gspace site. http://www.getgspace.com/.
[24]
Margaret Burnett, Christopher Bogart, Jill Cao, Valentina Grigoreanu, Todd Kulesza, and Joseph Lawrance. End-user software engineering and distributed cognition. In Proc. of the 2009 ICSE Workshop on Software Engineering Foundations for End User Programming (SEEUP '09), pages 1--7, 2009.
[25]
Jonathan Lung, Jorge Aranda, Steve M. Easterbrook, and Gregory V. Wilson. On the difficulty of replicating human subjects studies in software engineering. In Proc. of the 30th ACM/IEEE Intl. Conf. on Software Engineering (ICSE'08), 2008.

Cited By

View all
  • (2018)An Efficient Stream Cipher Based Secure and Dynamic Updation Method for Cloud Data CentreSoft Computing Systems10.1007/978-981-13-1936-5_53(505-516)Online publication date: 25-Sep-2018
  • (2017)Cloud Testing- The Future of Contemporary Software Testing2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)10.1109/ICNGCIS.2017.11(131-136)Online publication date: Dec-2017
  • (2016)Cha-Cha 20Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies10.1145/2905055.2905098(1-6)Online publication date: 4-Mar-2016
  • Show More Cited By

Recommendations

Reviews

Ruay-Shiung Chang

According to the Global Language Monitor, the most confusing yet frequently cited high-tech term of 2008 was "cloud computing." Computer manufacturer Dell even tried to trademark the term "cloud computing," although the application was rejected. (Dell still got the domain cloudcomputing.com.) That was in 2008. Now, cloud computing is even hotter. Microsoft CEO Steve Ballmer preaches "three screens and a cloud" wherever and whenever he talks. However, putting all of your data and applications in the cloud exposes you to many risks. Some of the major concerns are reliability, availability, confidentiality, and privacy. This paper focuses on privacy. The issue has two sides: users want their data to be protected in the cloud, and service providers want their applications to be protected. Unless the privacy issue is resolved, many users will be reluctant to use cloud computing services. The paper discusses the opportunities and challenges in constructing and testing privacy-aware services in cloud computing. Gu and Cheung argue that traditional privacy protection techniques such as encryption and artificial noise injection may not work efficiently in a cloud environment. Efficiency and scalability must be considered, lest the benefits of cloud computing be diminished. The authors themselves do not offer a good solution for the privacy issue in the cloud. They only propose some preliminary ideas. It seems that no matter how the system is designed, those at the cloud can always see your data if they so desire. As a result, it all boils down to whether you trust Google, Yahoo!, Microsoft, or whatever cloud services you are using. Finally, the section about testing cloud-based services seems a little awkward, as it is not related to the main privacy issue. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
Internetware '09: Proceedings of the First Asia-Pacific Symposium on Internetware
October 2009
150 pages
ISBN:9781605588728
DOI:10.1145/1640206
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • CCF: China Computer Federation

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 October 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. centralized processing
  2. cloud computing
  3. privacy protection
  4. privacy-aware testing
  5. storage system

Qualifiers

  • Research-article

Conference

Internetware '09
Sponsor:
  • CCF

Acceptance Rates

Overall Acceptance Rate 55 of 111 submissions, 50%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2018)An Efficient Stream Cipher Based Secure and Dynamic Updation Method for Cloud Data CentreSoft Computing Systems10.1007/978-981-13-1936-5_53(505-516)Online publication date: 25-Sep-2018
  • (2017)Cloud Testing- The Future of Contemporary Software Testing2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)10.1109/ICNGCIS.2017.11(131-136)Online publication date: Dec-2017
  • (2016)Cha-Cha 20Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies10.1145/2905055.2905098(1-6)Online publication date: 4-Mar-2016
  • (2016)Secure Data Storage in Cloud: An e-Stream Cipher-Based Secure and Dynamic Updation PolicyArabian Journal for Science and Engineering10.1007/s13369-016-2357-242:2(873-883)Online publication date: 2-Dec-2016
  • (2013)Integrating Requirements with SLI Layer for Cloud Computing Services to Meet SLA and QoSJournal of Software Engineering and Applications10.4236/jsea.2013.6301806:03(140-146)Online publication date: 2013
  • (2013)Testing as a Service (TaaS) on CloudsProceedings of the 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering10.1109/SOSE.2013.66(212-223)Online publication date: 25-Mar-2013
  • (2013)Data Combination Privacy Preservation Adjusting Mechanism for Software as a ServiceProceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics10.1109/SMC.2013.344(2007-2012)Online publication date: 13-Oct-2013
  • (2013)A Concept for Language-Oriented Security TestingProceedings of the 2013 IEEE Seventh International Conference on Software Security and Reliability Companion10.1109/SERE-C.2013.16(53-62)Online publication date: 18-Jun-2013
  • (2012)Emerging Issues & Challenges in Cloud Computing—A Hybrid ApproachJournal of Software Engineering and Applications10.4236/jsea.2012.53110705:11(923-937)Online publication date: 2012
  • (2012)Empirical evaluation of cloud-based testing techniquesACM SIGSOFT Software Engineering Notes10.1145/2180921.218093837:3(1-9)Online publication date: 16-May-2012
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media