Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Geetika Goel is active.

Publication


Featured researches published by Geetika Goel.


ACM Computing Surveys | 2015

Secure the Cloud: From the Perspective of a Service-Oriented Organization

Arpan Roy; Santonu Sarkar; Rajeshwari Ganesan; Geetika Goel

In response to the revival of virtualized technology by Rosenblum and Garfinkel [2005], NIST defined cloud computing, a new paradigm in service computing infrastructures. In cloud environments, the basic security mechanism is ingrained in virtualization—that is, the execution of instructions at different privilege levels. Despite its obvious benefits, the caveat is that a crashed virtual machine (VM) is much harder to recover than a crashed workstation. When crashed, a VM is nothing but a giant corrupt binary file and quite unrecoverable by standard disk-based forensics. Therefore, VM crashes should be avoided at all costs. Security is one of the major contributors to such VM crashes. This includes compromising the hypervisor, cloud storage, images of VMs used infrequently, and remote cloud client used by the customer as well as threat from malicious insiders. Although using secure infrastructures such as private clouds alleviate several of these security problems, most cloud users end up using cheaper options such as third-party infrastructures (i.e., private clouds), thus a thorough discussion of all known security issues is pertinent. Hence, in this article, we discuss ongoing research in cloud security in order of the attack scenarios exploited most often in the cloud environment. We explore attack scenarios that call for securing the hypervisor, exploiting co-residency of VMs, VM image management, mitigating insider threats, securing storage in clouds, abusing lightweight software-as-a-service clients, and protecting data propagation in clouds. Wearing a practitioners glasses, we explore the relevance of each attack scenario to a service company like Infosys. At the same time, we draw parallels between cloud security research and implementation of security solutions in the form of enterprise security suites for the cloud. We discuss the state of practice in the form of enterprise security suites that include cryptographic solutions, access control policies in the cloud, new techniques for attack detection, and security quality assurance in clouds.


international symposium on software reliability engineering | 2012

Measurements-Based Analysis of Workload-Error Relationship in a Production SaaS Cloud

Rajeshwari Ganesan; Santonu Sarkar; Geetika Goel; Catello Di Martino

This article consists of a collection of slides from the authors PowerPoint conference presentation. A procedure and a statistical model to measure the risk of error when processing a workload X is proposed. It is concluded that architecting hazard-aware load balancer for Cloud SaaS can be promising.


international symposium on software reliability engineering | 2014

Analysis and Diagnosis of SLA Violations in a Production SaaS Cloud

Catello Di Martino; Daniel Chen; Geetika Goel; Rajeshwari Ganesan; Zbigniew Kalbarczyk; Ravishankar K. Iyer

A software-as-a-service (SaaS) needs to provide its intended service as per its stated service-level agreements (SLAs). While SLA violations in a SaaS platform have been reported, not much work has been done to empirically characterize failures of SaaS. In this paper, we study SLA violations of a production SaaS platform, diagnose the causes, unearth several critical failure modes, and then, suggest various solution approaches to increase the availability of the platform as perceived by the end user. Our approach combines field failure data analysis (FFDA) and fault injection. Our study is based on 283 days of operational logs of the platform. During this time, the platform received business workload from 42 customers spread over 22 countries. We have first developed a set of home-grown FFDA tools to analyze the log, and second implemented a fault injector to automatically inject several runtime errors in the application code written in .NET/C#, and then, collate the injection results. We summarize our finding as: first, system failures have caused 93% of all SLA violations; second, our fault injector has been able to recreate a few cases of bursts of SLA violations that could not be diagnosed from the logs; and third, the fault injection mechanism could recreate several error propagation paths leading to data corruptions that the failure data analysis could not reveal. Finally, the paper presents some system-level implication of this study and how the joint use of fault injection and log analysis may help in improving the reliability of the measured platform.


international symposium on software reliability engineering | 2013

Identifying silent failures of SaaS services using finite state machine based invariant analysis

Geetika Goel; Arpan Roy; Rajeshwari Ganesan

Field failure analysis is usually driven by a characterization of the different time related properties of failure. This characterization does not help the production support team in understanding the root cause. In order to pinpoint the root cause of failure, one of the most effective techniques used is checking for violations of the system invariants which are the consistent, time invariant correlations that exist in the system. Understanding when and where these violations happen helps in detecting the root cause of the failure. Silent failures, on the other hand are characterized by no evidence of failures either in the console or in the field failure logs. They are unearthed at moments of crisis, either with a customer complaint or other cascading failures. These failures often result in data loss or data corruption, creating many latent errors. Accumulation of these errors over time results in degraded system performance. This represents the problem of software aging and restoration of the system, i.e. its rejuvenation becomes a critical need. Subsequent to the restoration, a rigorous failure detection mechanism is needed to detect them early. What we describe in the paper is a novel method that could be used to detect silent failures using a combination of invariant violation checking and finite state machine based analysis of the system. We use the audit-trail logs of system to extract information about the state and transitions for FSM representation. Currently our research work was limited to proving its efficiency. We applied this approach to our SaaS platform and were able to detect 36 silent failures over a period of 9 months. As next steps, we will implement this as a part of automated failure detection in the operational SaaS platforms.


international conference on parallel and distributed systems | 2012

iCirrus Wop: Workload Analysis for Virtual Machine Placements

Geetika Goel; Rajeshwari Ganesan; Santonu Sarkar; Kavish Kaup

True essence of the technology of virtualization is the ability to allow one or more workloads to share the underlying physical resources, thereby bringing about significant cost saving. However, in order to maximize the cost savings from this disruptive technology, it is essential to adopt optimal resource management techniques. These techniques broadly encompass approaches to virtual machine (VM) sizing and placement in a manner that maximizes the physical infrastructure utilization, alongside ensuring that the desired service-level objectives of the candidate workloads are met. In this paper, we propose a novel workload analysis approach for VM placement, which relies on examining the time varying processing demands and variability of the workloads to determine the most optimal placement. Such a solution will result in maximizing infrastructure utilization and ensure that the SLAs of the candidate workloads are met after placement. The technique has been effectively applied to real-life workloads that pertain to SaaS based business platforms offered to clients spread across different geographical locations. A paper based assessment reported over 25% improvement in the overall infrastructure utilization by using the proposed algorithm as compared to other well-known approaches.


international conference on software engineering | 2014

Characterization of operational failures from a business data processing SaaS platform

Catello Di Martino; Zbigniew Kalbarczyk; Ravishankar K. Iyer; Geetika Goel; Santonu Sarkar; Rajeshwari Ganesan


Archive | 2015

SYSTEMS AND METHODS FOR COLOCATING VIRTUAL MACHINES ON ONE OR MORE PHYSICAL INFRASTRUCTURE

Rajeshwari Ganesan; Geetika Goel; Santonu Sarkar


Archive | 2015

METHODS OF SOFTWARE PERFORMANCE EVALUATION BY RUN-TIME ASSEMBLY CODE EXECUTION AND DEVICES THEREOF

Gagan Mohan Goel; Rajeshwari Ganesan; Geetika Goel; Deepjot Singh


Archive | 2015

METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING SILENT FAILURES IN AN APPLICATION

Rajeshwari Ganesan; Geetika Goel


Archive | 2015

METHOD AND SYSTEM FOR MONITORING HEALTH OF A VIRTUAL ENVIRONMENT

Gagan Mohan Goel; Geetika Goel; Rajeshwari Ganesan; Santonu Sarkar

Collaboration


Dive into the Geetika Goel's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kavish Kaup

University of Waterloo

View shared research outputs
Researchain Logo
Decentralizing Knowledge