Securing Cloud Storages (Wintersemester 2017/2018)

Lecturer: Prof. Dr. Christoph Meinel (Internet-Technologien und -Systeme) , Kennedy Torkura (Internet-Technologien und -Systeme) , Muhamad Sukmana (Internet-Technologien und -Systeme) , Hendrik Graupner (Internet-Technologien und -Systeme)

General Information

  • Weekly Hours: 4
  • Credits: 6
  • Graded: yes
  • Enrolment Deadline: 27.10.2017
  • Teaching Form: Seminar / Project
  • Enrolment Type: Compulsory Elective Module
  • Maximum number of participants: 12

Programs & Modules

IT-Systems Engineering MA
  • ITSE-Analyse
  • ITSE-Entwurf
  • ITSE-Konstruktion
  • ITSE-Maintenance
  • ISAE-Spezialisierung
  • ISAE-Techniken und Werkzeuge
  • OSIS-Konzepte und Methoden
  • OSIS-Spezialisierung
  • OSIS-Techniken und Werkzeuge


Multi-cloud storage overcomes several challenges faced by public cloud storage systems such as security, vendor lock-in and availability. However, innovative techniques are imperative to fully explore the merits of this model majorly due to lack of standards for cloud architectures, interfaces and APIs. In this seminar, we aim at tackling security-related challenges in multi-cloud storage, more specifically we focus on approaches for unified monitoring, auditing and anomaly detection, scalable access control, efficient cross-cloud storage migration techniques and centralized security and configuration assessments.


  • Practical skills on software development.
  • Basic knowledge or interest in cloud technologies.


  • Recommended book- Rittinghouse, J.W. and Ransome, J.F., 2016.  Cloud Computing : Implementation, Management, and Security  CRC press (check the Uni-Potsdam library)
  • Cloud Logs Analytics - Ficco, M., 2013. Security Event Correlation Approach for Cloud Computing . International Journal of High Performance Computing and Networking 
  • General Cloud Security Issues and Solutions-  Subashini, Subashini, and Veeraruna Kavitha. "A survey on security issues in service delivery models of cloud computing." Journal of network and computer applications. (online
  • Novel attacks against cloud storage -

    • Mulazzani, Martin, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, and Edgar R. Weippl. "Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space." In USENIX security symposium 2011. (online)
    • A blog on Cumulus Toolkit - overview, uses and demo (online)

  • Multi-cloud storage with CloudRAID -

    • CloudRAID Project webpage 
    • BDrive - Commercialized version of CloudRAID for enterprises
    • Schnjakin, Maxim, and Christoph Meinel. "Implementation of cloud-raid: A secure and reliable storage above the clouds." International Conference on Grid and Pervasive Computing. Springer, Berlin, Heidelberg, 2013. (online)
    • Schnjakin, Maxim, and Christoph Meinel. "Evaluation of cloud-RAID: A secure and reliable storage above the clouds." Computer Communications and Networks (ICCCN), 2013 22nd International Conference on. IEEE, 2013. (online)
    • Graupner Hendrik, Kennedy Torkura, Philipp Berger, Christoph Meinel, and Maxim Schnjakin. "Secure access control for multi-cloud resources." In Local Computer Networks Conference Workshops (LCN Workshops) IEEE 2015.(online)


  • Prototype implementation
  • Two presentations - introductory (proposed approaches, technologies, architecture) and final (demo of prototype, goals achieved, challenges e.t.c.)
  • Technical report - problem statement, approaches used, implementation, results/evaluation


  • Seminar General Introduction: 9.15 - 10.45 on 19.10.2017 at A1.1
  • Deadline regsitration/indication of interest : 26.10.2017
  • Seminar Detailed Introduction : 02.11.2017
  • Weekly/Bi-weekly meetings