PTCCS362 Syllabus - Security And Privacy In Cloud - 2023 Regulation Anna University
PTCCS362 Syllabus - Security And Privacy In Cloud - 2023 Regulation Anna University
PTCCS362 |
SECURITY AND PRIVACY IN CLOUD |
L T P C |
---|
2 0 2 3
COURSE OBJECTIVES:
• To Introduce Cloud Computing terminology, definition & concepts
• To understand the security design and architectural considerations for Cloud
• To understand the Identity, Access control in Cloud
• To follow best practices for Cloud security using various design patterns
• To be able to monitor and audit cloud applications for security
• To understand the security design and architectural considerations for Cloud
• To understand the Identity, Access control in Cloud
• To follow best practices for Cloud security using various design patterns
• To be able to monitor and audit cloud applications for security
UNIT I |
FUNDAMENTALS OF CLOUD SECURITY CONCEPTS |
7 |
---|
Overview of cloud security- Security Services - Confidentiality, Integrity, Authentication, Non- repudiation, Access Control - Basic of cryptography - Conventional and public-key cryptography, hash functions, authentication, and digital signatures.
UNIT II |
SECURITY DESIGN AND ARCHITECTURE FOR CLOUD |
6 |
---|
Security design principles for Cloud Computing - Comprehensive data protection - End-to-end access control - Common attack vectors and threats - Network and Storage - Secure Isolation Strategies - Virtualization strategies - Inter-tenant network segmentation strategies - Data Protection strategies: Data retention, deletion and archiving procedures for tenant data, Encryption, Data Redaction, Tokenization, Obfuscation, PKI and Key
UNIT III |
ACCESS CONTROL AND IDENTITY MANAGEMENT |
6 |
---|
Access control requirements for Cloud infrastructure - User Identification - Authentication and Authorization - Roles-based Access Control - Multi-factor authentication - Single Sign-on, Identity Federation - Identity providers and service consumers - Storage and network access control options
-OS Hardening and minimization - Verified and measured boot - Intruder Detection and prevention
UNIT IV |
CLOUD SECURITY DESIGN PATTERNS |
6 |
---|
Introduction to Design Patterns, Cloud bursting, Geo-tagging, Secure Cloud Interfaces, Cloud Resource Access Control, Secure On-Premise Internet Access, Secure External Cloud
UNIT V |
MONITORING, AUDITING AND MANAGEMENT |
5 |
---|
Proactive activity monitoring - Incident Response, Monitoring for unauthorized access, malicious traffic, abuse of system privileges - Events and alerts - Auditing – Record generation, Reporting and Management, Tamper-proofing audit logs, Quality of Services, Secure Management, User management, Identity management, Security Information and Event Management
30 PERIODS
PRACTICAL EXERCISES: | 30 PERIODS |
---|
1. Simulate a cloud scenario using Cloud Sim and run a scheduling algorithm not present in Cloud Sim
2. simulate resource management using cloud sim
3. simulate log forensics using cloud sim
4. simulate a secure file sharing using a cloud sim
5. Implement data anonymization techniques over the simple dataset (masking, k- anonymization, etc)
6. Implement any encryption algorithm to protect the images
7. Implement any image obfuscation mechanism
8. Implement a role-based access control mechanism in a specific scenario
9. implement an attribute-based access control mechanism based on a particular scenario
10. Develop a log monitoring system with incident management in the cloud
2. simulate resource management using cloud sim
3. simulate log forensics using cloud sim
4. simulate a secure file sharing using a cloud sim
5. Implement data anonymization techniques over the simple dataset (masking, k- anonymization, etc)
6. Implement any encryption algorithm to protect the images
7. Implement any image obfuscation mechanism
8. Implement a role-based access control mechanism in a specific scenario
9. implement an attribute-based access control mechanism based on a particular scenario
10. Develop a log monitoring system with incident management in the cloud
COURSE OUTCOMES:
CO1: Understand the cloud concepts and fundamentals.
CO2: Explain the security challenges in the cloud.
CO3: Define cloud policy and Identity and Access Management.
CO4: Understand various risks and audit and monitoring mechanisms in the cloud.
CO5: Define the various architectural and design considerations for security in the cloud.
CO2: Explain the security challenges in the cloud.
CO3: Define cloud policy and Identity and Access Management.
CO4: Understand various risks and audit and monitoring mechanisms in the cloud.
CO5: Define the various architectural and design considerations for security in the cloud.
TOTAL:60 PERIODS
TEXT BOOKS:
1. Raj Kumar Buyya , James Broberg, andrzejGoscinski, “Cloud Computing:‖, Wiley 2013
2. Dave shackleford, “Virtualization Securityll, SYBEX a wiley Brand 2013.
3. Mather, Kumaraswamy and Latif, “Cloud Security and Privacyll, OREILLY 2011
2. Dave shackleford, “Virtualization Securityll, SYBEX a wiley Brand 2013.
3. Mather, Kumaraswamy and Latif, “Cloud Security and Privacyll, OREILLY 2011
REFERENCES:
1. Mark C. Chu-Carroll “Code in the Cloudll,CRC Press, 2011
2. Mastering Cloud Computing Foundations and Applications Programming RajkumarBuyya, Christian Vechhiola, S. ThamaraiSelvi
2. Mastering Cloud Computing Foundations and Applications Programming RajkumarBuyya, Christian Vechhiola, S. ThamaraiSelvi
Comments
Post a Comment