Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Cloud Workflow Automation, William Crump, Eric Darling, Kyle Hagood, Syed Rizvi Jan 2017

Cloud Workflow Automation, William Crump, Eric Darling, Kyle Hagood, Syed Rizvi

Capstone Design Expo Posters

The goal of our project was to develop an application in the cloud which automates complex business tasks. The application allows users to create configurable events consisting of a trigger followed by an action. Triggers are designed for common tasks such as scanning a directory or email inbox for new files. When a new file is detected, the application triggers the execution of an associated action such as sending an email alerting the user of the changes or processing and moving the files. Users are thus able to automate complex tasks by configuring event sequences, leading to an increase …


Application Intrusion Detection: Security For Cloud Deployments, Justin Murphy, Nick Harrison, John Taylor Jan 2016

Application Intrusion Detection: Security For Cloud Deployments, Justin Murphy, Nick Harrison, John Taylor

Capstone Design Expo Posters

As servers move to the cloud, sources for security analysis become more limited. Security teams must make the most of the resources available to them. Our project attempts to fulfill this need by providing a template-based application to analyze and detect security events in logs that are available in cloud environments. We focus on authentication logs, but analysis modules can be added to flag anomalies in any log.

The deliverables include log analysis, including successive repeated failures, location-based anomalies, and excessive failed login attempts across multiple accounts. To present our findings we output the results to a web interface for …


Mitigating Interference During Virtual Machine Live Migration Through Storage Offloading, Morgan S. Stuart Jan 2016

Mitigating Interference During Virtual Machine Live Migration Through Storage Offloading, Morgan S. Stuart

Theses and Dissertations

Today's cloud landscape has evolved computing infrastructure into a dynamic, high utilization, service-oriented paradigm. This shift has enabled the commoditization of large-scale storage and distributed computation, allowing engineers to tackle previously untenable problems without large upfront investment. A key enabler of flexibility in the cloud is the ability to transfer running virtual machines across subnets or even datacenters using live migration. However, live migration can be a costly process, one that has the potential to interfere with other applications not involved with the migration. This work investigates storage interference through experimentation with real-world systems and well-established benchmarks. In order to …


Privacy Protection On Cloud Computing, Min Li Jan 2015

Privacy Protection On Cloud Computing, Min Li

Theses and Dissertations

Cloud is becoming the most popular computing infrastructure because it can attract more and more traditional companies due to flexibility and cost-effectiveness. However, privacy concern is the major issue that prevents users from deploying on public clouds. My research focuses on protecting user's privacy in cloud computing. I will present a hardware-based and a migration-based approach to protect user's privacy. The root cause of the privacy problem is current cloud privilege design gives too much power to cloud providers. Once the control virtual machine (installed by cloud providers) is compromised, external adversaries will breach users’ privacy. Malicious cloud administrators are …