Identifier
COMS 4590X
Professor(s)
- Credits and contact hours: 3 credits, 4 contact hours
- Text book, title, author, and year: None required
- Other supplemental materials: Cloud Computing Concepts, Technology & Architecture, R. Puttini, T. Erl, and Z. Mahmood; AWS Documentations and White Papers; Cryptography for Security and PRivacy in Cloud Computing, S. Rass and D. Slamanig
Specific course information
- Brief description of the content of the course: Introduction to cloud computing concepts and systems. Security and privacy threats in cloud computing. Practical techniques for cloud computing security. Theoretical and practical solutions for secure outsourcing of data and computation. Oral presentations and research projects.
- Prerequisites or co-requisites: COMS 3520 / CPRE 3080
Brief list of topics to be covered
- Cloud Computing Fundamentals
- Concepts/Terminologies
- Service Models
- Deployment Models
- Architectures.
- Case Study with AWS
- Architecture
- Global Infrastructure
- Compute Services
- Storage Services
- Database Services
- Hands-on Experiments and Programming with APIs (Management Console, CLI, and SDK).
- Cryptography and Security Fundamentals
- Basic Concepts or Programming Practices on:
- Symmetric Cryptography
- Hash Functions
- Asymmetric Cryptography
- Homomorphic Encryption
- Multi-party Computation
- Trusted Execution Environment.
- Basic Concepts or Programming Practices on Network Security Mechanisms:
- Private Network
- NAT
- IPSec
- VPN
- SSL/TLS
- Firewalls
- IDS
- Honeypot
- Basic Concepts or Programming Practices on:
- Security Technologies in Current Cloud Systems (AWS as example)
- Virtual Isolation
- Network Security
- Identity and Access Management
- Data Security
- System Monitoring & IDS
- Security and Privacy in Data Outsourcing
- Incentivizing Encryption
- Provable Data Procession
- Access Control
- Access Pattern Privacy Protection
- Differential Privacy
- Security and Privacy in Computation Outsourcing
- Garbled Circuits
- Searchable Encryption
- Order-Preserving Encryption
- Partially/Fully Homomorphic Encryption
- Multi-party Computation