Security Mechanism for Cloud Computing (Wintersemester 2019/2020)
Lecturer:
Prof. Dr. Christoph Meinel
(Internet-Technologien und -Systeme)
,
Kennedy Torkura
(Internet-Technologien und -Systeme)
,
Muhamad Sukmana
(Internet-Technologien und -Systeme)
Tutors:
Kennedy Torkura
Muhamad Sukmana
General Information
- Weekly Hours: 4
- Credits: 6
- Graded:
yes
- Enrolment Deadline: 01.10.-30.10.2019
- Teaching Form: Seminar / Project
- Enrolment Type: Compulsory Elective Module
- Course Language: English
- Maximum number of participants: 12
Programs, Module Groups & Modules
- SECA: Security Analytics
- HPI-SECA-K Konzepte und Methoden
- SECA: Security Analytics
- HPI-SECA-T Techniken und Werkzeuge
- SECA: Security Analytics
- HPI-SECA-S Spezialisierung
- IDMG: Identity Management
- HPI-IDMG-K Konzepte und Methoden
- IDMG: Identity Management
- HDI-IDMG-T Techniken und Werkzeuge
- IDMG: Identity Management
- HPI-IDMG-S Spezialisierung
- CYAD: Cyber Attack and Defense
- HPI-CYAD-K Konzepte und Methoden
- CYAD: Cyber Attack and Defense
- HPI-CYAD-T Techniken und Werkzeuge
- CYAD: Cyber Attack and Defense
- HPI-CYAD-S Spezialisierung
- HDAS: Health Data Security
- HPI-HDAS-C Concepts and Methods
- HDAS: Health Data Security
- HPI-HDAS-T Technologies and Methods
- HDAS: Health Data Security
- HPI-HDAS-S Specialization
- DSEC: Data Security
- DSEC-Konzepte und Methoden
- DSEC: Data Security
- DSEC-Techniken und Werkzeuge
- DSEC: Data Security
- IT-Systems Engineering
- IT-Systems Engineering
- IT-Systems Engineering
- IT-Systems Engineering
- ISAE: Internet, Security & Algorithm Engineering
- HPI-ISAE-T Techniken und Werkzeuge
- ISAE: Internet, Security & Algorithm Engineering
- HPI-ISAE-K Konzepte und Methoden
- ISAE: Internet, Security & Algorithm Engineering
- HPI-ISAE-S Spezialisierung
- OSIS: Operating Systems & Information Systems Technology
- HPI-OSIS-K Konzepte und Methoden
- OSIS: Operating Systems & Information Systems Technology
- HPI-OSIS-T Techniken und Werkzeuge
- OSIS: Operating Systems & Information Systems Technology
- HPI-OSIS-S Spezialisierung
- SAMT: Software Architecture & Modeling Technology
- HPI-SAMT-K Konzepte und Methoden
- SAMT: Software Architecture & Modeling Technology
- HPI-SAMT-T Techniken und Werkzeuge
- SAMT: Software Architecture & Modeling Technology
- HPI-SAMT-S Spezialisierung
Description
Background
Cloud computing is a key enabler for digital transformation as it empowers several desired attributes, e.g. agility, scalability, and self-service. More enterprises and individuals are leveraging cloud technologies by moving their infrastructure and data to the cloud where it is predicted by 2020 83% of enterprise workload will be cloud-based according to Forbes. However, security is a core challenge to cloud adoption since attacks against cloud platforms are increasing and becoming more creative and difficult to tackle e.g. Capital One Hack. Therefore, new security tools and techniques are required to address security issues in cloud computing.
Problem
Cloud computing combines several existing technologies to provide services to the cloud, e.g. virtualization, distributed systems, and web services. Furthermore, public cloud providers, e.g.Amazon Web Services, offer cloud services where its security responsibilities are shared between the cloud providers and the cloud customers. This model differs from traditional computing models hence the existing security tools and techniques fail to address the aforementioned security challenges in the cloud.
Cloud consumers are required to actively take necessary security measures to protect their cloud services and resources from unauthorized user. Cloud security tools and techniques are required to be cloud-native (understand the cloud environments), customer-centric (suitable to customer's scenario), and automated (designed in a way that human errors are minimized).
Requirements
- Good programming skills in object oriented languages, especially Java.
- Practical software design and development skills.
- Basic interest in cloud technologies, e.g. Amazon Web Services and Google Cloud Platform.
- Basic knowledge of access control mechanism
- Basic interest in practical cyber security concepts and techniques, such as cryptography.
Learning
All participating students will work in multiple groups with each group consists of a maximum of 4 students to work on a chosen topic.
Examination
Final seminar grade will be calculated based on:
- Introductory presentation
- Source code and documentation
- Final presentation
- Personal and overall group performance
Dates
- Seminar general introduction / First meeting: 09.15 a.m on Friday, 18.10.2019 at A-1.1
- Deadline regsitration : Wednesday, 23.10.2019
- Seminar detailed introduction / Second meeting: 09.15 a.m on Friday, 25.10.2019 at A-1.1
- Weekly / Bi-weekly meetings
Zurück