Biblio

Filters: Author is Donghoon Kim  [Clear All Filters]
2017-01-09
Donghoon Kim, Mladen Vouk.  2016.  Assessing Run-time Overhead of Securing Kepler. ICCS 2016. The International Conference on Computational Science. 80:2281–2286.
2016-10-11
Donghoon Kim, Mladen A. Vouk.  2016.  Assessing Run-time Overhead of Securing Kepler. The International Conference on Computational Science, ICCS 2016. 80:2281-2286.
2015-07-06
Donghoon Kim, Henry E. Schaffer, Mladen Vouk.  2015.  About PaaS Security. 3rd International IBM Cloud Academy Conference (ICACON 2015).
2016-06-27
Donghoon Kim, Mladen A. Vouk.  2015.  Securing Software Application Chains in a Cloud. 2nd International Conference on Information Science and Security (ICISS), 2015 . :1-4.

This paper presents an approach for securing software application chains in cloud environments. We use the concept of workflow management systems to explain the model. Our prototype is based on the Kepler scientific workflow system enhanced with a security analytics package. This model can be applied to other cloud based systems. Depending on the information being received from the cloud, this approach can also offer information about internal states of the resources in
the cloud. The approach we use hinges on (1) an ability to limit attacks to Input, Remote, and Output channels (or flows), and (2) validate the flows using operational profile (OP) or certification based signals. OP based validation is a statistical approach and may miss some of the attacks. However, where enumeration is possible (e.g., static web sites), this approach can offer high assurances of validity of the flows. It is also assumed that workflow components are sound so long as the input flows are limited to operational profile. Other acceptance testing approaches could be used to validate the flows. Work in progress has two thrusts: (1) using cloud-based Kepler workflows to probe and assess security states and operation of cloud resources (specifically VMs) under different workloads leveraging DACSA sensors; and (2) analyzing effectiveness of the proposed approach in securing workflows.

2016-01-11
Donghoon Kim, Mladen A. Vouk.  2015.  Securing Scientific Workflows. IEEE International Conference on Software Quality, Reliability and Security (QRS) - Companion (QRS-C). :95-104.

This paper investigates security of Kepler scientific workflow engine. We are especially interested in Kepler-based scientific workflows that may operate in cloud environments. We find that (1) three security properties (i.e., input validation, remote access validation, and data integrity) are essential for making Kepler-based workflows more secure, and (2) that use of the Kepler provenance module may help secure Kepler based workflows. We implemented a prototype security enhanced Kepler engine to demonstrate viability of use of the Kepler provenance module in provision and management of the desired security properties.
 

v4

2015-07-06
Donghoon Kim, Mladen Vouk.  2014.  A survey of common security vulnerabilities and corresponding countermeasures for SaaS. Globecom Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA).

Software as a Service (SaaS) is the most prevalent service delivery mode for cloud systems. This paper surveys common security vulnerabilities and corresponding countermeasures for SaaS. It is primarily focused on the work published in the last five years. We observe current SaaS security trends and a lack of sufficiently broad and robust countermeasures in some of the SaaS security area such as Identity and Access management due to the growth of SaaS applications.