Database Reference
In-Depth Information
The fundamental nature of clouds introduce new security challenges. Today's
clouds are not secure, accountable, or trustworthy. Many open problems need to be
resolved before major users will adopt clouds for sensitive data and computations.
For wider adoption of clouds and Big Data technology in critical areas such as busi-
ness and healthcare, it is vital to solve these problems. Solving the security issues
will popularize clouds further, which in turn, will lower costs and have a broader
impact on our society as a whole.
AUTHOR BIOGRAPHY
Dr. Ragib Hasan is a tenure-track assistant professor at the Department of Computer
and Information Sciences at the University of Alabama at Birmingham (UAB). With
a key focus on practical computer security problems, Hasan explores research on
Big Data, cloud security, mobile malware security, secure provenance, and data-
base security. Hasan is the founder of the SECuRE and Trustworthy Computing
Lab (SECRETLab, http://secret.cis.uab.edu) at UAB. He is also a member of the
UAB Center for Information Assurance and Joint Forensics Research. Before joining
UAB in the Fall of 2011, Hasan was an NSF/CRA Computing Innovation Fellow and
assistant research scientist at the Department of Computer Science, Johns Hopkins
University. He received his PhD and MS degrees in computer science from the
University of Illinois at Urbana Champaign in October 2009 and December 2005,
respectively. Before that, he received a BSc in computer science and engineering
and graduated summa cum laude from Bangladesh University of Engineering and
Technology in 2003. He is a recipient of a 2013 Google RISE Award, a 2011 Google
Faculty Research Award, the 2009 NSF Computing Innovation Fellowship, and the
2003 Chancellor Award and Gold Medal from Bangladesh University of Engineering
and Technology. Dr. Hasan's research is funded by the Department of Homeland
Security, the Office of Naval Research, and Google. He is also the founder of The
Shikkhok Project (http://www.shikkhok.com)—an award-winning grassroots move-
ment and platform for open content and localized e-learning in South Asia, which
has won the 2013 Google RISE Award and 2013 Information Society Innovation
Fund Award.
REFERENCES
1. Amazon. Zeus botnet controller. http://aws.amazon.com/security/security-bulletins/zeus-
botnet-controller/. [Accessed July 5, 2012.]
2. Amazon EC2. Amazon elastic compute cloud (amazon ec2). http://aws.amazon.com/
ec2/. [Accessed July 5, 2012.]
3. Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary
Peterson, and Dawn Song. Provable data possession at untrusted stores. In Proceedings
of the 14th ACM Conference on Computer and Communications Security , CCS'07, pages
598-609, New York, 2007. ACM.
4. Azure. Windows Azure. http://www.windowsazure.com. [Accessed July 5, 2012.]
5. Karyn Benson, Rafael Dowsley, and Hovav Shacham. Do you know where your cloud
files are? In Proceedings of the 3rd ACM Workshop on Cloud Computing Security
Workshop , pages 73-82. ACM, 2011.
Search WWH ::




Custom Search