Personal tools
  •  
You are here: Home Tutorials WORLDCOMP'15 Tutorial: Mehdi Bahrami
Call For Participation
General Attendees
Click here for details


Call for Papers
Submission of
LATE BREAKING PAPERS

Click here for details


Important Dates
July 27-30, 2015
The WORLDCOMP'15
20 joint conferences


Featured Workshops
Doctoral Colloquium
&
Demos Sessions

Click here for details


« September 2015 »
Su Mo Tu We Th Fr Sa
12345
6789101112
13141516171819
20212223242526
27282930
 

WORLDCOMP'15 Tutorial: Mehdi Bahrami

Last modified 2015-07-12 11:19


Data Privacy for Emerging Mobile Cloud Apps
Mehdi Bahrami
University of California Merced, USA

Date: Date & Time: July 29, 2015 (05:40pm - estimated duration: about 2+ hours)
Location: Ballroom 1


DESCRIPTION

    Cloud computing system provides virtual IT infrastructures with a set of resources that are shared with multi-tenant users. Data Privacy is one of the major challenges when users outsource their data to a cloud computing system. Data privacy can be violated by the cloud vendor, vendor’s authorized users, other cloud users, unauthorized users, or external malicious entities. Encryption is one of the solutions to protect and maintain privacy of cloud-stored data. However, encryption methods are complex and expensive for mobile devices. This tutorial will review key methods for data security and data privacy. It will compare all features of methods, and their pros and cons. The tutorial will review our recent study on a light-weight data privacy method for mobile clients. The method stores data on one or multiple clouds by using pseudo-random permutation based on chaos systems. The method can be used in client mobile devices to store data in the cloud(s) without using cloud computing resources for encryption to maintain user’s privacy. We consider JPEG image format as a case study to present and evaluate the method. Our results show that the method achieves superior performance compare to encryption methods, such as AES and encryption on JPEG encoders while protecting the mobile user data privacy.


OBJECTIVES

    This tutorial composed of a lecture, active learning, case study review, and discussion session. The session is divided into the following sub-sessions:
      Session 1
        • Background and an introduction to cloud computing, mobile cloud computing and software architecture
        • Mobile cloud computing services
        • Data security and data privacy methods in mobile cloud computing
        • Review major cloud vendor services for mobile cloud-based apps, programming tools, subscription rates and platform capabilities
        • Future mobile cloud-based apps
      Break
      Session 2
        • Data and apps migration to mobile cloud computing systems
        • Big data and its data security challenges
        • A light-weight data privacy method for mobile cloud computing systems
        • Future work in data privacy in mobile cloud computing
      Discussion and Q&A (40 minutes)

INTENDED AUDIENCE

    This tutorial is intended for faculty, graduate student, scientist and professionals who needs to understand mobile cloud computing and its data privacy challenges. Audience needs to know only basic information about computer science and mobile apps.

BIOGRAPHY OF INSTRUCTOR

    Mehdi Bahrami works in the Cloud Lab at University of California Merced, and he is a senior member of the IEEE. He has more than 10 years of software industry experience and more than 5 years of teaching experience in the field of computer science. He has published several technical papers in the areas of Cloud Computing Architecture. He served as the editor-in-chief of Journal of Soft Computing and Software Engineering. He is an editor, reviewer for several international computer science journals, including Springer journals. He also served as a technical program committee member for several international IEEE computer science conferences. He served as a featured speaker in several international conferences including IEEE conferences. He has extensive experience with software engineering and developing distributed software applications in diverse platforms, such as Web-based, Windows-based, and Android-based systems. He is a recipient of the 2015 Distinguished Leadership Award from Margo F. Souza Leadership Center, an achievement award in recognition of contributions to the field of Cloud Computing from World of Comping Congress 2014 and several fellowship awards during his Ph.D. study at UC Merced. His research interests include Cloud Computing Architectures, Data Privacy and Data Encryption in Mobile Cloud Computing, Big Data Architectures and Software Engineering. Prior to this tutorial, Mehdi was recently a featured speaker and a panelist at IEEE ITMC’14 in Chicago, IEEE SMC’14 in San Diego, SCSE’15 at the University of California Berkeley, IEEE Cloud-based Big Data Summit 2015 in San Francisco and an invited speaker at Stanford University.

    URL: http://cloudlab.ucmerced.edu/~mehdi/

Conference Proceedings
Get WORLDCOMP'13 & '14 Proceedings
Click Here

Past Events
WORLDCOMP'14
Click Here

WORLDCOMP'13
Click Here

WORLDCOMP'12
Click Here

WORLDCOMP'11
Click Here

WORLDCOMP'10
Click Here

WORLDCOMP'09
Click Here

WORLDCOMP'06, '07, & '08
Click Here


Photo Galleries

Join Our Mailing List
Sign up to receive email announcements and updates about conferences and future events




 


Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)