About the Program:
Recent advancement in hardware, networking, middleware, and virtualization technologies have led to an emergence of a new, geographically distributed computing platforms, known as Cloud Computing, that provide computational facilities (Computing, Storage and Network) as services accessible from anywhere via the Internet without significant investments in Information Technology (IT) infrastructure, and critical human resource or software licensing. This program will introduce the audience about security and privacy concerns in cloud computing, which makes the clients reluctant to adopt cloud computing despite all its benefits. Further, the program discusses the critical security and privacy challenges in the cloud computing, existing defense solution their strength and limitations. Furthermore, the program includes practical demonstration of cloud computing facilities on Amazon Web Services (AWS Cloud).
Target Audience: Graduates, Faculty and Professionals.
Prerequisite:
Laptop/Desktop with Internet Connection
AWS Free Account
Basic Knowledge of Cloud Computing
Detailed course schedule:
Date | 10:00 AM - 11:00 AM | 11:45 AM - 12:00 PM | 12 Noon - 1:00 PM | 1:00 PM - 2:30 PM | 2:30 PM - 4:30 PM |
26-Sep-2020 | Cloud Security Preambles • Confidentiality • Integrity • Availability • Accountability | Tea Break | Threats to Confidentiality and Integrity • Cross Channel VM Attacks • Malicious SysAdmin • Data Loss/ Manipulation Preventive Measures • Placement Prevention • Co-Residency Detection • No Hypervisor • Trusted Cloud • Provable Data Possession • Proof of Retrievability | Lunch Break | Hands on Session: • AWS Cloud • Identity Access Management (IAM) • IAM Account • IAM User • IAM Group • IAM Role • IAM Policies |
27-Sep-2020 | Solution to Computational Integrity • Re-Computation • Replication • Auditing • Trusted Computing | Tea Break | Threat to Cloud Availability • Direct DOS • Indirect DOS Defence Strategy • Avoidance of DOS Attack • FRC Attack Detection | Lunch Break | Hands on Session: • AWS Cloud • Simple Storage System (S3) • S3 Security • S3 Policies • S3 Setup and Encryption |
03-Oct-2020 | Cloud Availability Issues (Cloud Outage): • SLA Violation • Identity of Adversary • Cloud Outage (Natural Calamities) • Inaccurate Billing | Tea Break | Existing Solutions: • Accountability on SLA • Accountable Virtual Machine • Collaborative Monitoring • Verifiable Resource Accounting | Lunch Break | Hands on Session: • AWS Cloud • Simple Storage System (S3) • S3 Security • S3 Policies • S3 Setup and Encryption |
04-Oct-2020 | Security Concern for Computation • Data Confidentiality • Computational Integrity • Computational Efficiency • Input Privacy • Output Privacy • Computation Over Encrypted Domain | Tea Break | Computational Outsourcing Solutions • General Transformation Based Encryption • Grabbled Circuit • Homomorphic Encryption | Lunch break | Online Assessment |