Share This Author
Security and Privacy Challenges in Cloud Computing Environments
This article explores the roadblocks and solutions to providing a trustworthy cloud computing environment and suggests a number of approaches that could be considered.
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage
- Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu
- Computer ScienceIEEE Transactions on Parallel and Distributed…
- 1 December 2012
This paper addresses the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which it considers the existence of multiple cloud service providers to cooperatively store and maintain the clients' data.
Role-based authorization constraints specification
An intuitive formal language for specifying role-based authorization constraints named RCL 2000 including its basic elements, syntax, and semantics is introduced and it is shown that there are many alternate formulations of even the simplest SOD properties, with varying degree of flexibility and assurance.
Access control in collaborative systems
The article examines existing access control models as applied to collaboration, highlighting not only the benefits, but also the weaknesses of these models.
A rule-based framework for role-based delegation and revocation
A rule-based framework for role-based delegation and revocation for large, distributed systems and a proof-of-concept prototype implementation of RDM2000 to demonstrate the feasibility of the proposed framework and provide secure protocols for managing delegations are described.
Multiparty Access Control for Online Social Networks: Model and Mechanisms
- Hongxin Hu, Gail-Joon Ahn, Jan Jorgensen
- Computer ScienceIEEE Transactions on Knowledge and Data…
- 1 July 2013
This work forms an access control model to capture the essence of multiparty authorization requirements, along with a multiparty policy specification scheme and a policy enforcement mechanism and presents a logical representation of the model that allows for the features of existing logic solvers to perform various analysis tasks on the model.
Deep Android Malware Detection
- Niall McLaughlin, J. M. D. Rincón, Gail-Joon Ahn
- Computer ScienceConference on Data and Application Security and…
- 22 March 2017
A novel android malware detection system that uses a deep convolutional neural network (CNN) to perform static analysis of the raw opcode sequence from a disassembled program, removing the need for hand-engineered malware features.
FLOWGUARD: building robust firewalls for software-defined networks
This work introduces FlowGuard, a comprehensive framework, to facilitate not only accurate detection but also effective resolution of firewall policy violations in dynamic OpenFlow-based networks.
Dynamic audit services for integrity verification of outsourced storages in clouds
- Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, S. Yau
- Computer ScienceACM Symposium on Applied Computing
- 21 March 2011
Experimental results not only validate the effectiveness of the approaches, but also show the audit system verifies the integrity with lower computation overhead, requiring less extra storage for audit metadata.
Dynamic Audit Services for Outsourced Storages in Clouds
- Yan Zhu, Gail-Joon Ahn, Hongxin Hu, S. Yau, Ho G. An, Changjun Hu
- Computer ScienceIEEE Transactions on Services Computing
- 1 April 2013
Experimental results not only validate the effectiveness of the approaches, but also show the audit system verifies the integrity with lower computation overhead and requiring less extra storage for audit metadata.