Virtualization is a rapidly evolving technology that can be used to provide a range of benefits to computing systems, including improved resource utilization, software portability, and reliability. For security-critical applications, it is highly desirable to have a small trusted computing base (TCB), since it minimizes the surface of attacks that could jeopardize the security of the entire system. In traditional virtualization architectures, the TCB for an application includes not only the hardware and the virtual machine monitor (VMM), but also the whole management operating system (OS) that contains the device drivers and virtual machine (VM) management functionality. For many applications, it is not acceptable to trust this management OS, due to its large code base and abundance of vulnerabilities. In this paper, we address the problem of providing a secure execution environment on a virtualized computing platform under the assumption of an untrusted management OS. We propose a secure virtualization architecture that provides a secure run-time environment, network interface, and secondary storage for a guest VM. The proposed architecture significantly reduces the TCB of security-critical guest VMs, leading to improved security in an untrusted management environment. We have implemented a prototype of the proposed approach using the Xen virtualization system, and demonstrated how it can be used to facilitate secure remote computing services. We evaluate the performance penalties incurred by the proposed architecture, and demonstrate that the penalties are minimal.
{"title":"Secure Virtual Machine Execution under an Untrusted Management OS","authors":"Chunxiao Li, A. Raghunathan, N. Jha","doi":"10.1109/CLOUD.2010.29","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.29","url":null,"abstract":"Virtualization is a rapidly evolving technology that can be used to provide a range of benefits to computing systems, including improved resource utilization, software portability, and reliability. For security-critical applications, it is highly desirable to have a small trusted computing base (TCB), since it minimizes the surface of attacks that could jeopardize the security of the entire system. In traditional virtualization architectures, the TCB for an application includes not only the hardware and the virtual machine monitor (VMM), but also the whole management operating system (OS) that contains the device drivers and virtual machine (VM) management functionality. For many applications, it is not acceptable to trust this management OS, due to its large code base and abundance of vulnerabilities. In this paper, we address the problem of providing a secure execution environment on a virtualized computing platform under the assumption of an untrusted management OS. We propose a secure virtualization architecture that provides a secure run-time environment, network interface, and secondary storage for a guest VM. The proposed architecture significantly reduces the TCB of security-critical guest VMs, leading to improved security in an untrusted management environment. We have implemented a prototype of the proposed approach using the Xen virtualization system, and demonstrated how it can be used to facilitate secure remote computing services. We evaluate the performance penalties incurred by the proposed architecture, and demonstrate that the penalties are minimal.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125048826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To deliver 3-tier applications as a Service in the Cloud state-related constraints crossing Infrastructure- and Software as a Service boundaries need to be managed. By automating the lifecycle of applications like databases, load balancers, and web application servers rich SaaS business services can be provided in the Cloud. We propose an object oriented planning approach based on state constraints to plan for changes of SaaS and IaaS components in the Cloud. We evaluate techniques for fast storing and restoring of large object oriented Configuration Management Databases and show that enforcing constraints in a procedural instead of a declarative way offers huge performance improvements. The advantages of our approach lie within the tight integration of the planning algorithm with object oriented models frequently used for Configuration Management Databases. In addition to that, the algorithm scales to a large number of nodes and preserves its runtime even for large, heavily loaded data centers.
{"title":"Model-Based Planning for State-Related Changes to Infrastructure and Software as a Service Instances in Large Data Centers","authors":"Sebastian Hagen, A. Kemper","doi":"10.1109/CLOUD.2010.14","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.14","url":null,"abstract":"To deliver 3-tier applications as a Service in the Cloud state-related constraints crossing Infrastructure- and Software as a Service boundaries need to be managed. By automating the lifecycle of applications like databases, load balancers, and web application servers rich SaaS business services can be provided in the Cloud. We propose an object oriented planning approach based on state constraints to plan for changes of SaaS and IaaS components in the Cloud. We evaluate techniques for fast storing and restoring of large object oriented Configuration Management Databases and show that enforcing constraints in a procedural instead of a declarative way offers huge performance improvements. The advantages of our approach lie within the tight integration of the planning algorithm with object oriented models frequently used for Configuration Management Databases. In addition to that, the algorithm scales to a large number of nodes and preserves its runtime even for large, heavily loaded data centers.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116871637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MMORPG is shown to be a killer application of Internet, with a global subscriber number increased to 17 millions in 2010. However, MMORPG servers tend to be overly provisioned because 1)such games do not have standard architectures thus dedicated hardware is assumed; 2) MMORPGs normally adopt a ``sharded design'' to resolve the scalability challenges of content production and workload distribution; and 3) a game is commonly deployed in geographically distributed data centers to protect gamers from excessive network latencies. Therefore, an operator needs to deploy dedicated hardware for each game in each datacenter, even though hardware utilization is low. In this paper, we propose a zone-based server consolidation strategy for MMORPGs, which exploits the unique locality property of players' interactions, to cut down the games' considerable hardware requirement and energy use. We evaluate the effectiveness of our strategy based on a nine-month trace from a popular MMORPG World of War craft. The evaluation results show that, with a per-hour dynamic zone reallocation policy, the server number required can be reduced by 52% and the total energy consumption can be reduced by 62%, while the user-experienced latency remains undegraded.
{"title":"Is Server Consolidation Beneficial to MMORPG? A Case Study of World of Warcraft","authors":"Yeng-Ting Lee, Kuan-Ta Chen","doi":"10.1109/CLOUD.2010.57","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.57","url":null,"abstract":"MMORPG is shown to be a killer application of Internet, with a global subscriber number increased to 17 millions in 2010. However, MMORPG servers tend to be overly provisioned because 1)such games do not have standard architectures thus dedicated hardware is assumed; 2) MMORPGs normally adopt a ``sharded design'' to resolve the scalability challenges of content production and workload distribution; and 3) a game is commonly deployed in geographically distributed data centers to protect gamers from excessive network latencies. Therefore, an operator needs to deploy dedicated hardware for each game in each datacenter, even though hardware utilization is low. In this paper, we propose a zone-based server consolidation strategy for MMORPGs, which exploits the unique locality property of players' interactions, to cut down the games' considerable hardware requirement and energy use. We evaluate the effectiveness of our strategy based on a nine-month trace from a popular MMORPG World of War craft. The evaluation results show that, with a per-hour dynamic zone reallocation policy, the server number required can be reduced by 52% and the total energy consumption can be reduced by 62%, while the user-experienced latency remains undegraded.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124583648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A quantitative risk and impact assessment framework (QUIRC) is presented, to assess the security risks associated with cloud computing platforms. This framework, called QUIRC, defines risk as a combination of the Probability of a security threat event and it’s Severity, measured as its Impact. Six key Security Objectives (SO) are identified for cloud platforms, and it is proposed that most of the typical attack vectors and events map to one of these six categories. Wide-band Delphi method is proposed as a scientific means to collect the information necessary for assessing security risks. Risk assessment knowledgebases could be developed specific to each industry vertical, which then serve as inputs for security risk assessment of cloud computing platforms. QUIRC’s key advantage is its fully quantitative and iterative convergence approach, which enables stakeholders to comparatively assess the relative robustness of different cloud vendor offerings and approaches in a defensible manner.
{"title":"QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security","authors":"P. Saripalli, Ben Walters","doi":"10.1109/CLOUD.2010.22","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.22","url":null,"abstract":"A quantitative risk and impact assessment framework (QUIRC) is presented, to assess the security risks associated with cloud computing platforms. This framework, called QUIRC, defines risk as a combination of the Probability of a security threat event and it’s Severity, measured as its Impact. Six key Security Objectives (SO) are identified for cloud platforms, and it is proposed that most of the typical attack vectors and events map to one of these six categories. Wide-band Delphi method is proposed as a scientific means to collect the information necessary for assessing security risks. Risk assessment knowledgebases could be developed specific to each industry vertical, which then serve as inputs for security risk assessment of cloud computing platforms. QUIRC’s key advantage is its fully quantitative and iterative convergence approach, which enables stakeholders to comparatively assess the relative robustness of different cloud vendor offerings and approaches in a defensible manner.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121675890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud Computing is a promising paradigm designed to harness the power of networks of computers and communications in a more cost effective way. Clouds provide elastic capacity to serve a wide and constantly expanding range of information processing needs, including government, military, business and education. The Cloud Computing paradigm is maturing rapidly and is being considered for adoption in government and business platforms. Open source systems refer to software systems whose source code is available, allowing for immediate incorporation of improvements and adaptations of the system by its users. This paper reports on an evaluation of open source development tools for Cloud Computing. The main tools examined are Eucalyptus, Apache Hadoop, and the Django-Python stack. These tools were used at different layers in the construction of a notional application for managing weather data. The results of our experience are reported in terms of a capability matrix that grades nine different aspects associated with the use of these tools in the development and deployment of applications in open source Cloud Computing environments.
{"title":"Open Source Cloud Computing Tools: A Case Study with a Weather Application","authors":"M. Rodríguez-Martínez, J. Seguel, Melvin Greer","doi":"10.1109/CLOUD.2010.81","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.81","url":null,"abstract":"Cloud Computing is a promising paradigm designed to harness the power of networks of computers and communications in a more cost effective way. Clouds provide elastic capacity to serve a wide and constantly expanding range of information processing needs, including government, military, business and education. The Cloud Computing paradigm is maturing rapidly and is being considered for adoption in government and business platforms. Open source systems refer to software systems whose source code is available, allowing for immediate incorporation of improvements and adaptations of the system by its users. This paper reports on an evaluation of open source development tools for Cloud Computing. The main tools examined are Eucalyptus, Apache Hadoop, and the Django-Python stack. These tools were used at different layers in the construction of a notional application for managing weather data. The results of our experience are reported in terms of a capability matrix that grades nine different aspects associated with the use of these tools in the development and deployment of applications in open source Cloud Computing environments.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126530213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The ability to record and keep account of the usage of cloud resources in a credible and verifiable way is a precursor to widespread cloud deployment and availability because usage information is potentially sensitive and must be verifiably accurate. In an attempt to provide a mutually verifiable resource usage and billing mechanism, we found that the frequent asymmetric key operations of a digital signature lead to excessive computations and a bottleneck of billing transactions. As a remedy for these limitations, we propose a mutually verifiable billing system called THEMIS. The system, which introduces the concept of a cloud notary authority for the supervision of billing, makes billing more objective and acceptable to users and cloud service providers. THEMIS generates mutually verifiable binding information that can be used to resolve future disputes between a user and a cloud service provider. Because THEMIS does not require any asymmetric key operations of users and providers, it provides a level of security that is identical to that of a Public Key Infrastructure (PKI) and it minimizes the latency of billing transactions. This work has been undertaken on a real cloud computing service called iCube Cloud.
{"title":"THEMIS: Towards Mutually Verifiable Billing Transactions in the Cloud Computing Environment","authors":"K. Park, S. Park, Jaesun Han, Kyu Ho Park","doi":"10.1109/CLOUD.2010.21","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.21","url":null,"abstract":"The ability to record and keep account of the usage of cloud resources in a credible and verifiable way is a precursor to widespread cloud deployment and availability because usage information is potentially sensitive and must be verifiably accurate. In an attempt to provide a mutually verifiable resource usage and billing mechanism, we found that the frequent asymmetric key operations of a digital signature lead to excessive computations and a bottleneck of billing transactions. As a remedy for these limitations, we propose a mutually verifiable billing system called THEMIS. The system, which introduces the concept of a cloud notary authority for the supervision of billing, makes billing more objective and acceptable to users and cloud service providers. THEMIS generates mutually verifiable binding information that can be used to resolve future disputes between a user and a cloud service provider. Because THEMIS does not require any asymmetric key operations of users and providers, it provides a level of security that is identical to that of a Public Key Infrastructure (PKI) and it minimizes the latency of billing transactions. This work has been undertaken on a real cloud computing service called iCube Cloud.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121918564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. While cloud computing is expanding rapidly and used by many individuals and organizations internationally, data protection issues in the cloud have not been carefully addressed at current stage. Users' fear of confidential data (particularly financial and health data) leakage and loss of privacy in the cloud may become a significant barrier to the wide adoption of cloud services. In this paper, we explore a newly emerging problem of information leakage caused by indexing in the cloud. We design a three-tier data protection architecture to accommodate various levels of privacy concerns by users. According to the architecture, we develop a novel portable data binding technique to ensure strong enforcement of users' privacy requirements at server side.
{"title":"Preventing Information Leakage from Indexing in the Cloud","authors":"A. Squicciarini, Smitha Sundareswaran, D. Lin","doi":"10.1109/CLOUD.2010.82","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.82","url":null,"abstract":"Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. While cloud computing is expanding rapidly and used by many individuals and organizations internationally, data protection issues in the cloud have not been carefully addressed at current stage. Users' fear of confidential data (particularly financial and health data) leakage and loss of privacy in the cloud may become a significant barrier to the wide adoption of cloud services. In this paper, we explore a newly emerging problem of information leakage caused by indexing in the cloud. We design a three-tier data protection architecture to accommodate various levels of privacy concerns by users. According to the architecture, we develop a novel portable data binding technique to ensure strong enforcement of users' privacy requirements at server side.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128309434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Video processing applications are notably data intense, time, and resource consuming. Upfront infrastructure investment is usually high, specially when dealing with applications where time-to- market is a crucial requirement, e.g., breaking news and journalism. Such infrastructures are often inefficient, because due to demand variations, resources may end up idle a good portion of the time. In this paper, we propose the Split&Merge architecture for high performance video processing, a generalization of the MapReduce paradigm that rationalizes the use of resources by exploring on demand computing. To illustrate the approach, we discuss an implementation of the Split&Merge architecture, that reduces video encoding times to fixed duration, independently of the input size of the video file, by using dynamic resource provisioning in the Cloud.
{"title":"An Architecture for Distributed High Performance Video Processing in the Cloud","authors":"R. Pereira, M. Azambuja, K. Breitman, M. Endler","doi":"10.1109/CLOUD.2010.73","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.73","url":null,"abstract":"Video processing applications are notably data intense, time, and resource consuming. Upfront infrastructure investment is usually high, specially when dealing with applications where time-to- market is a crucial requirement, e.g., breaking news and journalism. Such infrastructures are often inefficient, because due to demand variations, resources may end up idle a good portion of the time. In this paper, we propose the Split&Merge architecture for high performance video processing, a generalization of the MapReduce paradigm that rationalizes the use of resources by exploring on demand computing. To illustrate the approach, we discuss an implementation of the Split&Merge architecture, that reduces video encoding times to fixed duration, independently of the input size of the video file, by using dynamic resource provisioning in the Cloud.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127397223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yogesh L. Simmhan, C. Ingen, Girish Subramanian, Jie Li
The widely discussed scientific data deluge creates a need to computationally scale out eScience applications beyond the local desktop and cope with variable loads over time. Cloud computing offers a scalable, economic, on-demand model well matched to these needs. Yet cloud computing creates gaps that must be crossed to move existing science applications to the cloud. In this article, we propose a Generic Worker framework to deploy and invoke science applications in the cloud with minimal user effort and predictable cost-effective performance. Our framework addresses three distinct challenges posed by the cloud: the complexity of application deployment, invocation of cloud applications from desktop clients, and efficient transparent data transfers across desktop and the cloud. We present an implementation of the Generic Worker for the Microsoft Azure Cloud and evaluate its use for a genomics application. Our evaluation shows that the user complexity to port and scale the application is substantially reduced while introducing a negligible performance overhead of of <; 5% for the genomics application when scaling to 20 VM instances.
{"title":"Bridging the Gap between Desktop and the Cloud for eScience Applications","authors":"Yogesh L. Simmhan, C. Ingen, Girish Subramanian, Jie Li","doi":"10.1109/CLOUD.2010.72","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.72","url":null,"abstract":"The widely discussed scientific data deluge creates a need to computationally scale out eScience applications beyond the local desktop and cope with variable loads over time. Cloud computing offers a scalable, economic, on-demand model well matched to these needs. Yet cloud computing creates gaps that must be crossed to move existing science applications to the cloud. In this article, we propose a Generic Worker framework to deploy and invoke science applications in the cloud with minimal user effort and predictable cost-effective performance. Our framework addresses three distinct challenges posed by the cloud: the complexity of application deployment, invocation of cloud applications from desktop clients, and efficient transparent data transfers across desktop and the cloud. We present an implementation of the Generic Worker for the Microsoft Azure Cloud and evaluate its use for a genomics application. Our evaluation shows that the user complexity to port and scale the application is substantially reduced while introducing a negligible performance overhead of of <; 5% for the genomics application when scaling to 20 VM instances.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"227 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114092355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
While the emergence of clouds had lead to a significant paradigm shift in business and research, cloud computing is still in its infancy. Specifically, there is no effective publication and discovery service nor are cloud services easy to use. This paper presents a new technology for offering ease of discovery, selection and use of clusters hosted within clouds. By improving these services, cloud clusters become easily accessible to all clients, software services to non-computing human user.
{"title":"Toward Ease of Discovery, Selection and Use of Clusters within a Cloud","authors":"Michael Brock, A. Goscinski","doi":"10.1109/CLOUD.2010.39","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.39","url":null,"abstract":"While the emergence of clouds had lead to a significant paradigm shift in business and research, cloud computing is still in its infancy. Specifically, there is no effective publication and discovery service nor are cloud services easy to use. This paper presents a new technology for offering ease of discovery, selection and use of clusters hosted within clouds. By improving these services, cloud clusters become easily accessible to all clients, software services to non-computing human user.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115956064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}