170 likes | 189 Views
This course provides an overview of secure web services and secure cloud computing, covering concepts, developments, challenges, and directions. Topics include malware detection, insider threat, secure web services, and more.
E N D
Developing and Securing the Cloud Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January – May 2014
Objective of the Unit • This unit provides an overview of the course. The course describes concepts, developments, challenges, and directions in • Secure Web Services • Secure Cloud Computing • Book: Bhavani Thuraisingham, Developing and Securing the Cloud, CRC Press, November 2013
Outline of the Unit • Outline of Course • Course Work • Course Rules • Contact • Papers to read for lectures after Spring Break • Index to lectures and preparation for exams • Acknowledgement: • AFOSR for funding our research in assured cloud computing • NSF for funding our capacity building effort in cloud computing
Course Work • Two exams each worth 25 points • Programming project worth 20 points • Two homework assignments – 7 points each • Assignment 1 due Feb 21, Assignment 2 due March 28 • Two term papers – 8 points each • Term paper 1 due Feb 28, Term paper 2 due April 18 • Programming Project • Due date: May 2 • Exams • Exam #1 March 7; Exam #2 is May 7.
Course Rules • Course attendance is mandatory; unless permission is obtained from instructor for missing a class with a valid reason (documentation needed for medical emergency for student or a close family member – e.g., spouse, parent, child). Attendance will be collected every lecture. 3 points will be deducted out of 100 for each lecture missed without approval. • Each student will work individually • Late assignments will not be accepted. All assignments have to be turned in just after the lecture on the due date • No make up exams unless student can produce a medical certificate or give evidence of close family emergency • Copying material from other sources will not be permitted unless the source is properly referenced • Any student who plagiarizes from other sources will be reported to the appropriate UTD authroities
Contact • For more information please contact • Dr. Bhavani Thuraisingham • Professor of Computer Science and • Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX 75080 • Phone: 972-883-4738 • Fax: 972-883-2399 • Email: bhavani.thuraisingham@utdallas.edu • URL:http://www.utdallas.edu/~bxt043000/
Course Syllabus • January 17: Malware Detection, Insider Threat • January 24: Cyber Security Modules • January 31: Secure Web Services, Secure Semantic Web • February 7: Introduction to Cloud Computing • February 14: Secure Cloud-based Data Publication and Sharing • February 21: Secure Cloud Query Processing • February 28: Hands-on Cloud Computing Tools • March 7 – Exam #1 • March 14 – Spring Break • March 21: Google File Systems • March 28: Secure Virtualization • April/May – Papers from ACM Cloud Security Workshop + Some Guest Lectures
Papers to Read for Exam #1 • Paper 1: Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani M. Thuraisingham, Amar Gupta: Selective and Authentic Third-Party Distribution of XML Documents. IEEE Trans. Knowl. Data Eng. 16(10): 1263-1278 (2004) • Paper 2: Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani M. Thuraisingham: Design and Implementation of a Cloud-Based Assured Information Sharing System. MMM-ACNS 2012: 36-50 • Reference paper: Mohammad Farhan Husain, James P. McGlothlin, Mohammad M. Masud, Latifur R. Khan, Bhavani M. Thuraisingham: Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing. IEEE Trans. Knowl. Data Eng. 23(9): 1312-1327 (2011) – Section 1, 2, 3, • Paper 3: Arindam Khaled, Mohammad Farhan Husain, Latifur Khan, Kevin W. Hamlen, Bhavani M. Thuraisingham: A Token-Based Access Control System for RDF Data in the Clouds. CloudCom 2010: 104-111 – Section 1, 2, 3
Papers to Read for Exam #1 • Paper 4: Bhavani M. Thuraisingham, Vaibhav Khadilkar, Anuj Gupta, Murat Kantarcioglu, Latifur Khan: Secure data storage and retrieval in the cloud. CollaborateCom 2010: 1-8 • Paper 5: Chadwick, D. W., & Inman, G. (2009). Attribute aggregation in federated identity management. IEEE Computer, 42(5), 33-40.
Index to Lectures for Exam #1 Lecture 1 – Data mining for malware – extra credit Lecture 2 – Insider threat – Guest lecture Lecture 3 – Data management – Guest Lecture Lecture 4 – Cyber Security Modules – extra credit Lecture 5 – Secure web services – Part 1 – one question Lecture 6 – Secure web services – Part 2 – one question Lecture 7 – Trustworthy semantic web – one questions Lecture 8 – Introduction to semantic web – guest lecture Lecture 9 – Intro to cloud computing – guest lecture Lecture 10 – Comprehensive overview – one question Lecture 11 – NIST Guidelines – one question Lecture 12 – Assignment #1 (may be included in exam) Lecture 13 – Cloud-based Secure Publication – one question (paper 1)
Index to Lectures for Exam #1 Lecture 14 – Cloud-based info sharing – one question (paper 2) Lecture 15 – Cloud query processing – Guest lecture Lecture 16 – Secure Cloud query processing – One question (paper 3) Lecture 17 – Cloud tools – Guest lecture Lecture 18 – Secure data storage – One question of part of a question (Paper 4) Lecture 19 – Security and federated identity management - One question - (paper 5) Lecture 20 – Comprehensive Overview, Part II (Continuation of Lecture 10) One question or part of a question
Term Paper • Any topic we have discussed in class (e.g., web services, identity management, secure cloud, secure cloud query processing, …) • Survey different approaches • Give your analysis of the approaches • Organization • Abstract • Approaches • Analysis • Conclusion • References
Programming Project • Any topic related to cloud security and implement • Learn the Hadoop/MapReduce Framework • Example • Query modification in the cloud • Secure information sharing in the cloud • Secure social network in the cloud • Email filtering in the cloud
Papers to Read for Exam #2 – ACM CCS Cloud Workshop 2011 • All Your Clouds are Belong to us - Security Analysis of Cloud Management Interfaces Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Joerg Schwenk, Nils Gruschka and Luigi Lo Iacono • Trusted Platform-as-a-Service: A Foundation for Trustworthy Cloud-Hosted Applications Andrew Brown and Jeff Chase • Detecting Fraudulent Use of Cloud Resources Joseph Idziorek, Mark Tannian and Doug Jacobson • Managing Multi-Jurisdictional Requirements in the Cloud: Towards a Computational Legal Landscape, David Gordon and Travis Breaux
Papers to Read for Exam #2 – ACM CCS Cloud Workshop 2012 • Fast Dynamic Extracted Honeypots in Cloud Computing Sebastian Biedermann, Martin Mink, Stefan Katzenbeisser • Unity: Secure and Durable Personal Cloud Storage Beom Heyn Kim, Wei Huang, David Lie • Exploiting Split Browsers for Efficiently Protecting User Data Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, Angelos Keromytis • CloudFilter: Practical Control of Sensitive Data Propagation to the Cloud Ioannis Papagiannis, Peter Pietzuch
Papers to Read for Exam #2 – ACM CCS Cloud Workshop 2013 • Structural Cloud Audits that Protect Private InformationHongda Xiao; Bryan Ford; Joan Feigenbaum • Cloudoscopy: Services Discovery and Topology MappingAmir Herzberg; Haya Shulman; Johanna Ullrich; Edgar Weippl • Cloudsweeper: Enabling Data-Centric Document Management for Secure Cloud ArchivesChris Kanich; Peter Snyder • In addition, the following paper from IEEE S&P Symposium • Yangchun Fu, Zhiqiang Lin: Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. IEEE Symposium on Security and Privacy 2012: 586-600
Index to Lectures since Exam #1 Note: You need to read the 12 papers in the previous three charts for Exam #2. Index to lectures is for information only Lecture 21 – Cloud Computing Tools – Guest Lecture Lecture 22 – Guest Lecture by Dr. Yen Lecture 23 – Guest Lecture by Dr. Lin Lecture 24 – Cloud Security Alliance Papers – Guest Lecture Lecture 25 – ACM Cloud Security 2011 Workshop Paper List Lecture 26 - Intro to Cyber Security, Part II – Guest Lecture Lecture 27 – ACM Cloud Security 2012 Workshop Paper List Lecture 28 – ACM 2013 Cloud Security Workshop Paper List Lecture 29 – Guest Lecture by Dr. Hamlen Lecture 30 – Cloud and Stream Data Guest Lecture Lecture 31 – Android Malware Detection Guest Lecture