Keynote 1: Cloud Computing in an Outcome Centric World (ChungSheng Li, Director of Commercial Systems, IBM T.J. Watson Research Center, USA)
Keynote 2 (Panel): Trends of Services Computing (Stephen S. Yau, Professor of Computer Science and Engineering, Director of Information Assurance Center, Arizona State University, USA)
Keynote 3: Securing Data in the Cloud-Challenges and Research Directions (Elisa Bertino, Professor of Computer Science Department at Purdue University, USA)
Keynote 4: Thinking outside the Box: How Cloud, Grid, and Services can Make Us Smarter (Ian Foster, Director and Professor, Argonne National Laboratory and The University of Chicago)
ABSTRACT:Delivering business outcome is augmenting and/or replacing traditional fee-for-service business model and has become increasingly prevalent in areas such as strategic outsourcing, smarter planet solutions, crowd sourcing, knowledge marketplace, internet advertisements, and healthcare. As an example, outcome-based strategic outsourcing contracts are expected to grow from ~5% this year (2010) to ~50% by 2015. The primary challenge faced by outcome based business model is the difficulties in providing a transparent and verifiable way for measuring the business outcome between the producer and the consumer without having to reveal too much proprietary information. The rapid penetration of cloud computing is fundamentally changing this landscape as cloud computing facilitated the standardization of service delivery and pricing.
About the Speaker:
Chung-Sheng Li received the BSEE degree from National Taiwan University, Taiwan, R.O.C., in 1984, and the MS and PhD degrees in electrical engineering and computer science from the University of California, Berkeley, in 1989 and 1991, respectively. He has been with IBM T.J. Watson Research Center as a research staff member since Sept. 1991, and became the Director of the Security, Information Analytics, and Business Integrity department since 2006 and has been the Director of the Commercial Systems since March 2010.
About the Moderator:
Stephen S. Yau is currently a professor of computer science and engineering and the Director of Information Assurance Center at Arizona State University (ASU), Tempe. He served as the Chair of the Department of Computer Science and Engineering at ASU in 1994-2001. Previously, he was on the faculties of Northwestern University, Evanston, Illinois, and University of Florida, Gainesville.
Managing data is arguably one of the reasons for adopting cloud technologies. These technologies are very promising with respect to enhancing scalability, reducing costs, and rapidly adapting to changes in application demands. However the adoption of these technologies is not without risks. Data stored in a cloud would be accessible to a large variety of individuals, like the IT staff of the cloud providers. The cloud providers may in turn outsource data management functions to other providers. Data integrity and availability are critical issues. Physical protection, crucial for data security, may be difficult to assess for the organization owning the data as data may be stored in different countries, which makes difficult making inspections to the data storage location. In some cases, even being able to control the location of the data may be difficult. However, making sure that data is stored or not stored in certain locations is crucial for compliance. Data segregation is essential in the context of multi-tenant contexts in which data owned by different organizations may reside on the same systems. Support for disaster recovery, and accountability are also critical requirements. In the talk we will first elaborate on these issues. We will then present an overview of the MASK system, able to support fine-grained encryption of data while at the same time supporting identity-based privacy-preserving access control on encrypted data. We will conclude the presentation with a discussion about the notion of accountability policies and tools for managing security policies.
About the Speaker:
Elisa Bertino is professor of computer science at Purdue University and Research Director of the Center for Information and Research in Information Assurance and Security (CERIAS). Prior to joining Purdue, she was a professor and department head at the Department of Computer Science and Communication of the University of Milan. She has been a visiting researcher at the IBM Research Laboratory (now Almaden) in San Jose, at the Microelectronics and Computer Technology Corporation, at Rutgers University, at Telcordia Technologies. Her recent research focuses on database security, digital identity management, policy systems, and security for web services. She is a Fellow of ACM and of IEEE. She received the IEEE Computer Society 2002 Technical Achievement Award and the IEEE Computer Society 2005 Kanai Award. She a member of the editorial board of IEEE Transactions on Dependable and Secure Computing, and IEEE Security & Privacy. She is currently serving as chair of the ACM Special Interest Group on Security, Audit and Control (ACM SIGSAC).
Whitehead observed that "civilization advances by extending the number of important operations which we can perform without thinking about them." Thanks to Moore's Law, these operations can nowadays involve increasingly complex information manipulation and computation. The outsourcing of computing via approaches such as utility computing, on-demand computing, grid computing, software as a service, and cloud computing can further enhance human capabilities, by freeing computer applications from the limiting confines of a single computer. Software that thus runs "outside the box" can be more powerful (Google, TeraGrid), dynamic (Animoto, caBIG), and collaborative (FaceBook, myExperiment). It can also be cheaper, due to economies of scale in hardware and software. Simultaneously, service-oriented architectures make it easier to integrate data and software from many sources. The combination of new functionality and new economics inspires new applications, reduces barriers to entry for application providers, and in general disrupts the computing ecosystem. I discuss new applications that outside-the-box computing enables; the hardware and software architectures that make these new applications possible; and the social dimensions of outside-the-box computing.
About the Speaker:
Ian Foster is Director of the Computation Institute, a joint institute of the University of Chicago and Argonne National Laboratory, where he is also the Arthur Holly Compton Distinguished Service Professor of Computer Science and an Argonne Distinguished Fellow. He received a BSc (Hons I) degree from the University of Canterbury, New Zealand, and a PhD from Imperial College, United Kingdom, both in computer science. His research deals with distributed, parallel, and data-intensive computing technologies, and innovative applications of those technologies to scientific problems. Methods and software he has developed underpin many large national and international cyberinfrastructures. Dr. Foster is a fellow of the American Association for the Advancement of Science, the Association for Computing Machinery, and the British Computer Society. His awards include the British Computer Society's award for technical innovation, the Global Information Infrastructure (GII) Next Generation award, the British Computer Society's Lovelace Medal, R&D Magazine's Innovator of the Year, and an honorary doctorate from the University of Canterbury. He was a co-founder of Univa UD, Inc., a company established to deliver high-quality grid and cloud computing solutions.