After attending the course the student can:
- Describe the security challenges of cloud computing.
- Explain the choice of a specific security mechanism for cloud computing deployed in practice.
- Implement a selection of advanced security mechanisms for discussed scenarios.
- Compare different data outsourcing scenarios and judge their security requirements.
- Evaluate the discussed security mechanisms for novel use-cases.
|
|
Motivation
Cloud computing allows clients to rent major parts of their computing infrastructure instead of owning and maintaining large data centers. Due to virtualization techniques, this approach is scalable and gives flexibility in the used computational resources. Resources can be adapted as required, while the underlying hardware is provided and maintained by the cloud service provider. However, outsourcing vital business data and delegating business critical tasks requires trust in the cloud service provider. It is not surprising that a lack of such required trust is still one of the main obstacles to the full adoption of cloud computing.
Synopsis
This course covers security mechanisms specifically suitable for cloud computing. After a brief introduction to cloud computing, we discuss security mechanisms currently offered by big players such as Amazon and Microsoft and identify potential shortcomings thereof. The major content of this course presents recent research directions regarding data security in cloud computing scenarios. Among others, we will discuss constructions for outsourced encrypted databases and potential attacks on such systems, verifiable computation, hardware-aided security and privacy issues of outsourced data analytics.
Contents
Platform-as-a-Service; Client-Side Security; Security Information and Event Management; Database-as-a-Service; Searchable Encryption; Attacks on Searchable Encryption; Oblivious RAM; Functional Encryption; Secure Multiparty Computation; Homomorphic Encryption; Intel SGX; Verifiable Computation; Machine-Learning-as-a-Service; Model Inversion Attack.
Examination
Written exam (70%); three (practical) assignments (30%)
|
 |
|