Cloud Computing Security

Foundations and Challenges

Author: John R. Vacca

Publisher: CRC Press

ISBN: 1315354926

Category: Computers

Page: 492

View: 7984

DOWNLOAD NOW »
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide.

Cloud Computing Security

Foundations and Challenges

Author: John R. Vacca

Publisher: CRC Press

ISBN: 1482260956

Category: Computers

Page: 492

View: 2699

DOWNLOAD NOW »
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide.

Cloud Computing Security

Foundations and Challenges

Author: John R. Vacca

Publisher: CRC Press

ISBN: 9781482260946

Category:

Page: 500

View: 7093

DOWNLOAD NOW »
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide.

Empirical Research for Software Security

Foundations and Experience

Author: Lotfi ben Othmane,Martin Gilje Jaatun,Edgar Weippl

Publisher: CRC Press

ISBN: 1351650882

Category: Computers

Page: 302

View: 2987

DOWNLOAD NOW »
Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices.

Securing the Cloud

Cloud Computer Security Techniques and Tactics

Author: Vic (J.R.) Winkler

Publisher: Elsevier

ISBN: 9781597495936

Category: Computers

Page: 314

View: 7149

DOWNLOAD NOW »
Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. The cloud offers flexibility, adaptability, scalability, and in the case of security - resilience. Securing the Cloud explains how to make the move to the cloud, detailing the strengths and weaknesses of securing a company's information with different cloud approaches. It offers a clear and concise framework to secure a business' assets while making the most of this new technology. This book considers alternate approaches for securing a piece of the cloud, such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust. It discusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recovery. It also describes the benefits of moving to the cloud - solving for limited availability of space, power, and storage. This book will appeal to network and security IT staff and management responsible for design, implementation and management of IT structures from admins to CSOs, CTOs, CIOs and CISOs. Named The 2011 Best Identity Management Book by InfoSec Reviews Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power, and storage

Mobile Cloud Computing

Foundations and Service Models

Author: Dijiang Huang,Huijun Wu

Publisher: Morgan Kaufmann

ISBN: 0128096446

Category: Computers

Page: 336

View: 9175

DOWNLOAD NOW »
Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on mobile cloud computing, beginning with an exploration of the foundations of cloud computing, existing cloud infrastructures classifications, virtualization techniques and service models. It then examines the approaches to building cloud services using a bottom-up approach, describing data center design, cloud networking and software orchestration solutions, showing how these solutions support mobile devices and services. The book describes mobile cloud clouding concepts with a particular focus on a user-centric approach, presenting a distributed mobile cloud service model called POEM to manage mobile cloud resource and compose mobile cloud applications. It concludes with a close examination of the security and privacy issues of mobile clouds. Shows how to construct new mobile cloud based applications Contains detailed approaches to address security challenges in mobile cloud computing Includes a case study using vehicular cloud

Cloud Security and Privacy

An Enterprise Perspective on Risks and Compliance

Author: Tim Mather,Subra Kumaraswamy,Shahed Latif

Publisher: "O'Reilly Media, Inc."

ISBN: 9781449379513

Category: Computers

Page: 338

View: 9277

DOWNLOAD NOW »
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security

Cloud Management and Security

Author: Imad M. Abbadi

Publisher: John Wiley & Sons

ISBN: 1118817079

Category: Technology & Engineering

Page: 240

View: 8522

DOWNLOAD NOW »
Written by an expert with over 15 years’ experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure (e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discusses foundation frameworks for addressing this problem – focusing on mechanisms for treating the security challenges, discusses foundation frameworks and mechanisms for remote attestation in Cloud and establishing Cloud trust anchors, and lastly provides a framework for establishing a trustworthy provenance system and describes its importance in addressing major security challenges such as forensic investigation, mitigating insider threats and operation management assurance. Finally, part three, based on practical examples, presents real-life commercial and open source examples of some of the concepts discussed, and includes a real-life case study to reinforce learning – especially focusing on Cloud security. Key Features • Covers in detail two main aspects of Cloud computing: Cloud management and Cloud security • Presents a high-level view (i.e., architecture framework) for Clouds and federated Clouds which is useful for professionals, decision makers, and students • Includes illustrations and real-life deployment scenarios to bridge the gap between theory and practice • Extracts, defines, and analyzes the desired properties and management services of Cloud computing and its associated challenges and disadvantages • Analyzes the risks associated with Cloud services and deployment types and what could be done to address the risk for establishing trustworthy Cloud computing • Provides a research roadmap to establish next-generation trustworthy Cloud computing • Includes exercises and solutions to problems as well as PowerPoint slides for instructors

Cloud Computing for Optimization: Foundations, Applications, and Challenges

Author: Bhabani Shankar Prasad Mishra,Himansu Das,Satchidananda Dehuri,Alok Kumar Jagadev

Publisher: Springer

ISBN: 3319736760

Category: Computers

Page: 463

View: 8800

DOWNLOAD NOW »
This book discusses harnessing the real power of cloud computing in optimization problems, presenting state-of-the-art computing paradigms, advances in applications, and challenges concerning both the theories and applications of cloud computing in optimization with a focus on diverse fields like the Internet of Things, fog-assisted cloud computing, and big data. In real life, many problems – ranging from social science to engineering sciences – can be identified as complex optimization problems. Very often these are intractable, and as a result researchers from industry as well as the academic community are concentrating their efforts on developing methods of addressing them. Further, the cloud computing paradigm plays a vital role in many areas of interest, like resource allocation, scheduling, energy management, virtualization, and security, and these areas are intertwined with many optimization problems. Using illustrations and figures, this book offers students and researchers a clear overview of the concepts and practices of cloud computing and its use in numerous complex optimization problems.

Cloud Computing

Theory and Practice

Author: Dan C. Marinescu

Publisher: Morgan Kaufmann

ISBN: 0128128119

Category: Computers

Page: 588

View: 6794

DOWNLOAD NOW »
Cloud Computing: Theory and Practice, Second Edition, provides students and IT professionals with an in-depth analysis of the cloud from the ground up. After an introduction to network-centric computing and network-centric content in Chapter One, the book is organized into four sections. Section One reviews basic concepts of concurrency and parallel and distributed systems. Section Two presents such critical components of the cloud ecosystem as cloud service providers, cloud access, cloud data storage, and cloud hardware and software. Section Three covers cloud applications and cloud security, while Section Four presents research topics in cloud computing. Specific topics covered include resource virtualization, resource management and scheduling, and advanced topics like the impact of scale on efficiency, cloud scheduling subject to deadlines, alternative cloud architectures, and vehicular clouds. An included glossary covers terms grouped in several categories, from general to services, virtualization, desirable attributes and security. Includes new chapters on concurrency, cloud hardware and software, challenges posed by big data and mobile applications and advanced topics Provides a new appendix that presents several cloud computing projects Presents more than 400 references in the text, including recent research results in several areas related to cloud computing

Multimedia Forensics and Security

Foundations, Innovations, and Applications

Author: Aboul Ella Hassanien,Mohamed Mostafa Fouad,Azizah Abdul Manaf,Mazdak Zamani,Rabiah Ahmad,Janusz Kacprzyk

Publisher: Springer

ISBN: 3319442708

Category: Computers

Page: 414

View: 8445

DOWNLOAD NOW »
This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.

Biometric Technologies and Verification Systems

Author: John R. Vacca

Publisher: Elsevier

ISBN: 0080488390

Category: Technology & Engineering

Page: 656

View: 1001

DOWNLOAD NOW »
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system. Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in. * Contains elements such as Sidebars, Tips, Notes and URL links * Heavily illustrated with over 150 illustrations, screen captures, and photographs * Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

Handbook on Securing Cyber-physical Critical Infrastructure

Foundations and Challenges

Author: Sajal K. Das,Krishna Kant,Nan Zhang

Publisher: Elsevier

ISBN: 0124158153

Category: Computers

Page: 817

View: 5402

DOWNLOAD NOW »
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout

Cloud Computing

Concepts and Practices

Author: Naresh Kumar Sehgal,Pramod Chandra P. Bhatt

Publisher: Springer

ISBN: 3319778390

Category: Technology & Engineering

Page: 269

View: 1671

DOWNLOAD NOW »
This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architecture, with focus on best practices for using a dynamic cloud infrastructure, cloud operations management and cloud security. The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book and invaluable introduction to the topic.

Computer and Information Security Handbook

Author: John R. Vacca

Publisher: Morgan Kaufmann

ISBN: 0128039299

Category: Computers

Page: 1280

View: 1632

DOWNLOAD NOW »
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Written by leaders in the field Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices Presents methods for analysis, along with problem-solving techniques for implementing practical solutions

Foundations of Computer Security

Author: David Salomon

Publisher: Springer Science & Business Media

ISBN: 1846283418

Category: Computers

Page: 369

View: 7402

DOWNLOAD NOW »
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the reader’s knowledge - answers are also provided. Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.

Network and System Security

Author: John R. Vacca

Publisher: Elsevier

ISBN: 0124166954

Category: Computers

Page: 432

View: 1178

DOWNLOAD NOW »
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more. Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhere Comprehensive and updated coverage of the subject area allows the reader to put current technologies to work Presents methods of analysis and problem solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions

Smart Cities

Foundations, Principles, and Applications

Author: Houbing Song,Ravi Srinivasan,Tamim Sookoor,Sabina Jeschke

Publisher: John Wiley & Sons

ISBN: 1119226392

Category: Social Science

Page: 912

View: 3866

DOWNLOAD NOW »
Cyber physical systems in smart cities : mastering technological, economic and social challenges / Martina Fromhold-Eisebith -- Big data analytics processes and platforms facilitating smart cities / Pethuru Raj, Sathish A.P Kumar -- Multi-scale computing for a sustainable built environment / Massimiliano Manfren -- Autonomous radios and open spectrum in smart cities / Corey D. Cooke, Adam L. Anderson -- Mobile crowdsensing for smart cities / Chandreyee Chowdhury, Sarbani Roy -- Wide-area monitoring and control of smart energy CPS / Nilanjan Ray Chaudhuri -- Smart technologies and vehicle-to-x (V2X) infrastructures for smart mobility cities / Bernard Fong, Lixin Situ, A. C. M. Fong -- Smart ecology of cities : integrating development impacts on ecosystem services / Marc Morrison, Ravi Srinivasan, Cynnamon Dobbs -- Data driven modeling, control and tools for smart cities / Madhur Behl, Rahul Mangharam -- Bringing named data networks into smart cities / Syed Hassan Ahmed, Safdar Hussain Bouk, Dongkyun Kim, Mahasweta Sarkar -- Human context sensing in smart cities / Juhi Ranjan, Kamin Whitehouse -- Smart cities and the symbiotic relationship between citizen engagement and smart governance / Tori Onker -- Smart economic development / Madhavi Venkatesan -- Managing the cyber security life-cycle of smart cities / Mridul Sankar Barik, Anirban Sengupta, Chandan Mazumdar -- Mobility as a service / Christopher Expósito-Izquierdo, Airam Expósito-Márquez, Julio Brito-Santana -- Clustering and fuzzy reasoning as data mining methods for the development of retrofit strategies for building stocks / Philipp Geyer, Arno Schlüter -- A framework to achieve large scale energy savings for building stocks through targeted occupancy interventions / Aslihan Karatas, Allisandra Stoiko, Carol Menassa -- Smart cities sustainability assessment : balancing social, economic, and environmental performance / Ali Komeily, Ravi Srinivasan -- Resilient electric grid for smart cities / Jiankang Wang -- Smart energy and grid : novel approaches for the efficient generation, storage and usage of energy in the smart home and the smart grid link-up / Julian Prass, Johannes Weber, Sebastian Staub, Johannes Bürner, Ralf Böhm, Thomas Braun, Moritz Hein, Markus Michl, Michael Beck, Jörg Franke -- Building cyber-physical systems : a smart building use case / Jupiter Bakakeu, Franziska Schäfer, Jochen Bauer, Markus Michl, Jörg Franke -- Climate resilience and the design of smart buildings / Saranya Gunasingh, Nora Wang, Doug Alh, Scott Schuetter -- Smart audio sensing based HVAC monitoring / Nirjon Shahriar, Ravi Srinivasan, Tamim Sookoor -- Smart lighting / Jie Lian -- Large-scale air quality monitoring in smart and sustainable cities / Xiaofan Jiang -- The smart city production system / Patrick Hennelly, Roy Meriton, Gary Graham, Jag Srai -- Smart health monitoring using smart systems / Carl Chalmers -- Significance of automated driving in japan / Sadayuki Tsugawa -- Environment-assisted vehicular data in smart city / Wei Chang, Huanyang Zheng, Jie Wu, Chiu C. Tan, and Haibin Ling

Cloud Computing in Ocean and Atmospheric Sciences

Author: Tiffany C Vance,Nazila Merati,Chaowei Yang,May Yuan

Publisher: Elsevier

ISBN: 012803193X

Category: Science

Page: 454

View: 6816

DOWNLOAD NOW »
Cloud Computing in Ocean and Atmospheric Sciences provides the latest information on this relatively new platform for scientific computing, which has great possibilities and challenges, including pricing and deployments costs and applications that are often presented as primarily business oriented. In addition, scientific users may be very familiar with these types of models and applications, but relatively unfamiliar with the intricacies of the hardware platforms they use. The book provides a range of practical examples of cloud applications that are written to be accessible to practitioners, researchers, and students in affiliated fields. By providing general information on the use of the cloud for oceanographic and atmospheric computing, as well as examples of specific applications, this book encourages and educates potential users of the cloud. The chapters provide an introduction to the practical aspects of deploying in the cloud, also providing examples of workflows and techniques that can be reused in new projects. Provides real examples that help new users quickly understand the cloud and provide guidance for new projects Presents proof of the usability of the techniques and a clear path to adoption of the techniques by other researchers Includes real research and development examples that are ideal for cloud computing adopters in ocean and atmospheric domains

Building the Infrastructure for Cloud Security

A Solutions View

Author: Raghuram Yeluri,Enrique Castro-Leon

Publisher: Apress

ISBN: 1430261463

Category: Computers

Page: 244

View: 2248

DOWNLOAD NOW »
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation