Security Mechanism for Cloud Computing (Wintersemester 2019/2020)
Dozent:
Prof. Dr. Christoph Meinel
(Internet-Technologien und -Systeme)
,
Kennedy Torkura
(Internet-Technologien und -Systeme)
,
Muhamad Sukmana
(Internet-Technologien und -Systeme)
Tutoren:
Kennedy Torkura
Muhamad Sukmana
Allgemeine Information
- Semesterwochenstunden: 4
- ECTS: 6
- Benotet:
Ja
- Einschreibefrist: 01.10.-30.10.2019
- Lehrform: Seminar / Projekt
- Belegungsart: Wahlpflichtmodul
- Lehrsprache: Englisch
- Maximale Teilnehmerzahl: 12
Studiengänge & Module
- SECA-Konzepte und Methoden
- SECA-Techniken und Werkzeuge
- SECA-Spezialisierung
- IDMG-Konzepte und Methoden
- IDMG-Techniken und Werkzeuge
- IDMG-Spezialisierung
- CYAD-Konzepte und Methoden
- CYAD-Techniken und Werkzeuge
- CYAD-Spezialisierung
- HDAS-Concepts and Methods
- HDAS-Technologies and Methods
- HDAS-Specialization
- DSEC-Konzepte und Methoden
- DSEC-Techniken und Werkzeuge
- DSEC-Spezialisierung
- ITSE-Analyse
- ITSE-Entwurf
- ITSE-Konstruktion
- ITSE-Maintenance
- ISAE-Techniken und Werkzeuge
- ISAE-Konzepte und Methoden
- ISAE-Spezialisierung
- OSIS-Konzepte und Methoden
- OSIS-Techniken und Werkzeuge
- OSIS-Spezialisierung
- SAMT-Konzepte und Methoden
- SAMT-Techniken und Werkzeuge
- SAMT-Spezialisierung
Beschreibung
Background
Cloud computing is a key enabler for digital transformation as it empowers several desired attributes, e.g. agility, scalability, and self-service. More enterprises and individuals are leveraging cloud technologies by moving their infrastructure and data to the cloud where it is predicted by 2020 83% of enterprise workload will be cloud-based according to Forbes. However, security is a core challenge to cloud adoption since attacks against cloud platforms are increasing and becoming more creative and difficult to tackle e.g. Capital One Hack. Therefore, new security tools and techniques are required to address security issues in cloud computing.
Problem
Cloud computing combines several existing technologies to provide services to the cloud, e.g. virtualization, distributed systems, and web services. Furthermore, public cloud providers, e.g.Amazon Web Services, offer cloud services where its security responsibilities are shared between the cloud providers and the cloud customers. This model differs from traditional computing models hence the existing security tools and techniques fail to address the aforementioned security challenges in the cloud.
Cloud consumers are required to actively take necessary security measures to protect their cloud services and resources from unauthorized user. Cloud security tools and techniques are required to be cloud-native (understand the cloud environments), customer-centric (suitable to customer's scenario), and automated (designed in a way that human errors are minimized).
Voraussetzungen
- Good programming skills in object oriented languages, especially Java.
- Practical software design and development skills.
- Basic interest in cloud technologies, e.g. Amazon Web Services and Google Cloud Platform.
- Basic knowledge of access control mechanism
- Basic interest in practical cyber security concepts and techniques, such as cryptography.
Lern- und Lehrformen
All participating students will work in multiple groups with each group consists of a maximum of 4 students to work on a chosen topic.
Leistungserfassung
Final seminar grade will be calculated based on:
- Introductory presentation
- Source code and documentation
- Final presentation
- Personal and overall group performance
Termine
- Seminar general introduction / First meeting: 09.15 a.m on Friday, 18.10.2019 at A-1.1
- Deadline regsitration : Wednesday, 23.10.2019
- Seminar detailed introduction / Second meeting: 09.15 a.m on Friday, 25.10.2019 at A-1.1
- Weekly / Bi-weekly meetings
Zurück