CloseHelpPrint
Kies de Nederlandse taal
Course module: 202000026
202000026
Secure Cloud Computing
Course info
Course module202000026
Credits (ECTS)5
Course typeCourse
Language of instructionEnglish
Contact persondr.ing. F.W. Hahn
E-mailf.w.hahn@utwente.nl
Lecturer(s)
Lecturer
dr. J.J. Cardoso de Santanna
Examiner
dr.ing. F.W. Hahn
Contactperson for the course
dr.ing. F.W. Hahn
Academic year2022
Starting block
1A
Application procedureYou apply via OSIRIS Student
Registration using OSIRISYes
Aims
After attending the course the student can:
  • Describe the security challenges of cloud computing.
  • Explain the choice of a specific security mechanism for cloud computing deployed in practice.
  • Implement a selection of advanced security mechanisms for discussed scenarios.
  • Compare different data outsourcing scenarios and judge their security requirements.
  • Evaluate the discussed security mechanisms for novel use-cases.
Content
Motivation
Cloud computing allows clients to rent major parts of their computing infrastructure instead of owning and maintaining large data centers. Due to virtualization techniques, this approach is scalable and gives flexibility in the used computational resources. Resources can be adapted as required, while the underlying hardware is provided and maintained by the cloud service provider. However, outsourcing vital business data and delegating business critical tasks requires trust in the cloud service provider. It is not surprising that a lack of such required trust is still one of the main obstacles to the full adoption of cloud computing.

Synopsis
This course covers security mechanisms specifically suitable for cloud computing. After a brief introduction to cloud computing, we discuss security mechanisms currently offered by big players such as Amazon and Microsoft and identify potential shortcomings thereof. The major content of this course presents recent research directions regarding data security in cloud computing scenarios. Among others, we will discuss constructions for outsourced encrypted databases and potential attacks on such systems, verifiable computation, hardware-aided security and privacy issues of outsourced data analytics.

Contents
Platform-as-a-Service; Client-Side Security; Security Information and Event Management; Database-as-a-Service; Searchable Encryption; Attacks on Searchable Encryption; Oblivious RAM; Functional Encryption; Secure Multiparty Computation; Homomorphic Encryption; Intel SGX; Verifiable Computation;  Machine-Learning-as-a-Service; Model Inversion Attack. 

Examination
Written exam (70%); three (practical) assignments (30%)
Assumed previous knowledge
Mandatory prerequisites:
Students should have solid foundational knowledge of cryptography, as for instance covered in the course “Security and Cryptography” (201500027), and should have previously gained some working experience with a common programming language such as Java and Python.
Participating study
Master Computer Science
Participating study
Master Internet Science and Technology
Required materials
Course material
Various research papers from the literature.
Recommended materials
-
Instructional modes
Assessment
Presence dutyYes

Assignment
Presence dutyYes

Lecture
Presence dutyYes

Other
Presence dutyYes

Self study without assistance
Presence dutyYes

Tests
Exam

CloseHelpPrint
Kies de Nederlandse taal