Hasso-Plattner-Institut20 Jahre HPI
Hasso-Plattner-Institut20 Jahre HPI
  
Login
 

Security Mechanism for Cloud Computing (Wintersemester 2019/2020)

Dozent: Prof. Dr. Christoph Meinel (Internet-Technologien und -Systeme) , Kennedy Torkura (Internet-Technologien und -Systeme) , Muhamad Sukmana (Internet-Technologien und -Systeme)
Tutoren: Kennedy Torkura Muhamad Sukmana

Allgemeine Information

  • Semesterwochenstunden: 4
  • ECTS: 6
  • Benotet: Ja
  • Einschreibefrist: 01.10.-30.10.2019
  • Lehrform: Seminar / Projekt
  • Belegungsart: Wahlpflichtmodul
  • Lehrsprache: Englisch
  • Maximale Teilnehmerzahl: 12

Studiengänge & Module

Cybersecurity MA
  • SECA-Konzepte und Methoden
  • SECA-Techniken und Werkzeuge
  • SECA-Spezialisierung
  • IDMG-Konzepte und Methoden
  • IDMG-Techniken und Werkzeuge
  • IDMG-Spezialisierung
  • CYAD-Konzepte und Methoden
  • CYAD-Techniken und Werkzeuge
  • CYAD-Spezialisierung
Digital Health MA
Data Engineering MA

Beschreibung

Background

Cloud computing is a key enabler for digital transformation as it empowers several desired attributes, e.g. agility, scalability, and self-service. More enterprises and individuals are leveraging cloud technologies by moving their infrastructure and data to the cloud where it is predicted by 2020 83% of enterprise workload will be cloud-based according to Forbes. However, security is a core challenge to cloud adoption since attacks against cloud platforms are increasing and becoming more creative and difficult to tackle e.g. Capital One Hack. Therefore, new security tools and techniques are required to address security issues in cloud computing.

 

Problem

Cloud computing combines several existing technologies to provide services to the cloud, e.g. virtualization, distributed systems, and web services. Furthermore, public cloud providers, e.g.Amazon Web Services, offer cloud services where its security responsibilities are shared between the cloud providers and the cloud customers. This model differs from traditional computing models hence the existing security tools and techniques fail to address the aforementioned security challenges in the cloud.

Cloud consumers are required to actively take necessary security measures to protect their cloud services and resources from unauthorized user. Cloud security tools and techniques are required to be cloud-native (understand the cloud environments), customer-centric (suitable to customer's scenario), and automated (designed in a way that human errors are minimized).

Voraussetzungen

  • Good programming skills in object oriented languages, especially Java.
  • Practical software design  and development skills.
  • Basic interest in cloud technologies, e.g. Amazon Web Services and Google Cloud Platform.
  • Basic knowledge of access control mechanism
  • Basic interest in practical cyber security concepts and techniques, such as cryptography.

Lern- und Lehrformen

All participating students will work in multiple groups with each group consists of a maximum of 4 students to work on a chosen topic.

Leistungserfassung

Final seminar grade will be calculated based on:

  • Introductory presentation
  • Source code and documentation
  • Final presentation
  • Personal and overall group performance

Termine

  • Seminar general introduction / First meeting: 09.15 a.m on Friday, 18.10.2019 at A-1.1
  • Deadline regsitration : Wednesday, 23.10.2019
  • Seminar detailed introduction / Second meeting: 09.15 a.m on Friday, 25.10.2019 at A-1.1
  • Weekly / Bi-weekly meetings

Zurück