Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Agile software development
Algorithms + Data Structures = Programs
Algorithms + Data Structures = Programs
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Challenges of migrating to agile methodologies
Communications of the ACM - Adaptive complex enterprises
MapReduce: simplified data processing on large clusters
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Communications of the ACM - Web science
Bigtable: A Distributed Storage System for Structured Data
ACM Transactions on Computer Systems (TOCS)
On the difficulty of replicating human subjects studies in software engineering
Proceedings of the 30th international conference on Software engineering
CTO Roundtable: Virtualization Part II
Communications of the ACM - Surviving the data deluge
Toward a cloud computing research agenda
ACM SIGACT News
What's inside the Cloud? An architectural map of the Cloud landscape
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
Engineering the cloud from software modules
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
Taking account of privacy when designing cloud computing services
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
End-user software engineering and distributed cognition
SEEUP '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Foundations for End User Programming
HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing
Secure virtualization for cloud computing
Journal of Network and Computer Applications
A new privacy-preserving scheme DOSPA for SaaS
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Data privacy preservation during schema evolution for multi-tenancy applications in cloud computing
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Empirical evaluation of cloud-based testing techniques: a systematic review
ACM SIGSOFT Software Engineering Notes
Hi-index | 0.00 |
After decades of engineering development and infrastructural investment, Internet connections have become a commodity product in many countries, and Internetscale "cloud computing" has started to compete with traditional software business through its technological advantages and economy of scale. Cloud computing is a promising enabling technology of Internetware. One distinct characteristic of cloud computing is the global integration of data, logic, and users, but such integration magnifies a sharp concern about privacy, which is one of the most frequently cited reasons by enterprises for not migrating to cloud-based solutions. We argue that cloud-based systems should include privacy as a fundamental design goal, and that privacy in a cloud environment is bidirectional, covering both end users and application providers. End users need privacy-aware software services that prevent their private data from being exposed to other users or the cloud providers. Application providers need a privacy-protected testing methodology to prevent the companies' internal activities and product features from leaking to external users. Focusing on privacy protection, we discuss the research challenges in this unique design space, and explore potential solutions for enhancing privacy protection in several important components of the system.