Security Concerns and Preventive Measures in Cloud Computing from 26-Sep-2020 to 4-Oct-2020
Date/s: 09/26/2020
Partners:

About the Program:

Recent advancement in hardware, networking, middleware, and virtualization technologies have led to an emergence of a new, geographically distributed computing platforms, known as Cloud Computing, that provide computational facilities (Computing, Storage and Network) as services accessible from anywhere via the Internet without significant investments in Information Technology (IT) infrastructure, and critical human resource or software licensing. This program will introduce the audience about security and privacy concerns in cloud computing, which makes the clients reluctant to adopt cloud computing despite all its benefits. Further, the program discusses the critical security and privacy challenges in the cloud computing, existing defense solution their strength and limitations. Furthermore, the program includes practical demonstration of cloud computing facilities on Amazon Web Services (AWS Cloud).


Target Audience: Graduates, Faculty and Professionals.


Prerequisite:

Laptop/Desktop with Internet Connection

AWS Free Account

Basic Knowledge of Cloud Computing  


Detailed course schedule:

Date
10:00 AM - 11:00 AM
11:45 AM - 12:00 PM
12 Noon - 1:00 PM
1:00 PM - 2:30 PM
2:30 PM - 4:30 PM
26-Sep-2020

Cloud Security Preambles

• Confidentiality

• Integrity

• Availability

• Accountability

Tea Break

Threats to Confidentiality and Integrity

• Cross Channel VM Attacks

• Malicious SysAdmin

• Data Loss/ Manipulation

Preventive Measures

• Placement Prevention

• Co-Residency Detection

• No Hypervisor

• Trusted Cloud

• Provable Data Possession

• Proof of Retrievability

Lunch Break

Hands on Session:

• AWS Cloud

• Identity Access Management (IAM)

• IAM Account

• IAM User

• IAM Group

• IAM Role

• IAM Policies

27-Sep-2020

Solution to Computational Integrity

• Re-Computation

• Replication

• Auditing

• Trusted Computing

Tea Break

Threat to Cloud Availability

• Direct DOS

• Indirect DOS

Defence Strategy

• Avoidance of DOS Attack

• FRC Attack Detection

Lunch Break

Hands on Session:

• AWS Cloud

• Simple Storage System (S3)

• S3 Security

• S3 Policies

• S3 Setup and Encryption

03-Oct-2020

Cloud Availability Issues (Cloud Outage):

• SLA Violation

• Identity of Adversary

• Cloud Outage (Natural Calamities)

• Inaccurate Billing

Tea Break

Existing Solutions:

• Accountability on SLA

• Accountable Virtual Machine

• Collaborative Monitoring

• Verifiable Resource Accounting

Lunch Break

Hands on Session:

• AWS Cloud

• Simple Storage System (S3)

• S3 Security

• S3 Policies

• S3 Setup and Encryption

04-Oct-2020

Security Concern for Computation

• Data Confidentiality

• Computational Integrity

• Computational Efficiency

• Input Privacy

• Output Privacy

• Computation Over Encrypted Domain

Tea Break

Computational Outsourcing Solutions

• General Transformation Based Encryption

• Grabbled Circuit

• Homomorphic Encryption

Lunch break
Online Assessment