110 likes | 126 Views
This course provides an overview of secure web services and cloud computing, with a focus on developing and securing the cloud. Topics covered include concepts, developments, challenges, and directions in cloud computing. The course includes exams, programming projects, homework assignments, and term papers. Attendance is mandatory and plagiarism is not permitted. Contact Dr. Bhavani Thuraisingham for more information.
E N D
Developing and Securing the Cloud Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January – May 2015
Objective of the Unit • This unit provides an overview of the course. The course describes concepts, developments, challenges, and directions in • Secure Web Services • Secure Cloud Computing • Book: Bhavani Thuraisingham, Developing and Securing the Cloud, CRC Press, November 2013
Outline of the Unit • Outline of Course • Course Work • Course Rules • Contact • Papers to read for lectures after Spring Break • Index to lectures and preparation for exams • Acknowledgement: • AFOSR for funding our research in assured cloud computing • NSF for funding our capacity building effort in cloud computing
Course Work • Two exams each worth 25 points • Programming project worth 20 points • Two homework assignments – 7 points each • Two term papers – 8 points each • Programming Project • Exams
Course Rules • Course attendance is mandatory; unless permission is obtained from instructor for missing a class with a valid reason (documentation needed for medical emergency for student or a close family member – e.g., spouse, parent, child). Attendance will be collected every lecture. 3 points will be deducted out of 100 for each lecture missed without approval. • Each student will work individually • Late assignments will not be accepted. All assignments have to be turned in just after the lecture on the due date • No make up exams unless student can produce a medical certificate or give evidence of close family emergency • Copying material from other sources will not be permitted unless the source is properly referenced • Any student who plagiarizes from other sources will be reported to the appropriate UTD authroities
Contact • For more information please contact • Dr. Bhavani Thuraisingham • Professor of Computer Science and • Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX 75080 • Phone: 972-883-4738 • Fax: 972-883-2399 • Email: bhavani.thuraisingham@utdallas.edu • URL:http://www.utdallas.edu/~bxt043000/
Term Paper • Any topic we have discussed in class (e.g., web services, identity management, secure cloud, secure cloud query processing, …) • Survey different approaches • Give your analysis of the approaches • Organization • Abstract • Approaches • Analysis • Conclusion • References
Programming Project • Any topic related to cloud security and implement • Learn the Hadoop/MapReduce Framework • Example • Query modification in the cloud • Secure information sharing in the cloud • Secure social network in the cloud • Email filtering in the cloud
Papers to Read for Exam #2 – ACM CCS Cloud Workshop 2011 • All Your Clouds are Belong to us - Security Analysis of Cloud Management Interfaces Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Joerg Schwenk, Nils Gruschka and Luigi Lo Iacono • Trusted Platform-as-a-Service: A Foundation for Trustworthy Cloud-Hosted Applications Andrew Brown and Jeff Chase • Detecting Fraudulent Use of Cloud Resources Joseph Idziorek, Mark Tannian and Doug Jacobson • Managing Multi-Jurisdictional Requirements in the Cloud: Towards a Computational Legal Landscape, David Gordon and Travis Breaux
Papers to Read for Exam #2 – ACM CCS Cloud Workshop 2012 • Fast Dynamic Extracted Honeypots in Cloud Computing Sebastian Biedermann, Martin Mink, Stefan Katzenbeisser • Unity: Secure and Durable Personal Cloud Storage Beom Heyn Kim, Wei Huang, David Lie • Exploiting Split Browsers for Efficiently Protecting User Data Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, Angelos Keromytis • CloudFilter: Practical Control of Sensitive Data Propagation to the Cloud Ioannis Papagiannis, Peter Pietzuch
Papers to Read for Exam #2 – ACM CCS Cloud Workshop 2013 • Structural Cloud Audits that Protect Private InformationHongda Xiao; Bryan Ford; Joan Feigenbaum • Cloudoscopy: Services Discovery and Topology MappingAmir Herzberg; Haya Shulman; Johanna Ullrich; Edgar Weippl • Cloudsweeper: Enabling Data-Centric Document Management for Secure Cloud ArchivesChris Kanich; Peter Snyder • In addition, the following paper from IEEE S&P Symposium • Yangchun Fu, Zhiqiang Lin: Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. IEEE Symposium on Security and Privacy 2012: 586-600