Cloud Technology Security

Major: Cyber Security
Code of subject: 8.125.00.M.21
Credits: 3.00
Department: Information Technology Security
Lecturer: Doctor of Technical Sciences, Professor Melnyk VA
Semester: 3 семестр
Mode of study: денна
Learning outcomes: As a result of studying the discipline, the student should be able to demonstrate the following learning outcomes: 1. Know the architecture of cloud platforms; 2. Understand information security issues that may arise during the virtualization of hardware and software; 3. Understand the threats to the confidentiality, integrity and availability of information stored or processed in the cloud and know the strategies for counteracting those threats; 4. Understand the threats to accountability and privacy of information stored or processed in the cloud and know the strategies for counteracting those threats; 5. Be able to detect threats of unauthorized entry or access to cloud systems; 6. Be able to take proactive and protective measures to contain and counter potential threats to information and invade cloud systems; 7. To be able to develop complex hardware and software solutions that will provide secure processing and storage of data in cloud platforms.
Required prior and related subjects: Operating Systems: Organization of the operating systems of parallel and distributed computer systems. Applied Cryptology: Fundamentals of Security (cryptographic methods, basic concepts: privacy, integrity, availability). Computer System Architecture: The architecture of parallel and distributed computer systems. Computer networks. Security of wireless and mobile networks.
Summary of the subject: Introduction. Cloud security and privacy: current status. Cloud computing: definitions and architecture. Security and privacy: challenges. Attribute-driven methodology for delivering cloud security and privacy. Virtualization: Issues, Security Threats, and Solutions. Basics of virtualization. Properties and approaches to virtualization. Security issues. Cloud privacy: threats and countermeasures. Cloud privacy threats. Strategies for counteracting privacy threats. Strategies for counteracting privacy threats. Threats to the integrity of the cloud. Integrity strategies based on Provided Data Possession (PDP) technology. Integrity strategies using third-party audit. Methods to counteract "unfair calculation". Cloud Availability: Threats and Counteraction. Cloud availability threats. Strategies to counter threats to cloud availability. Accountability of data in cloud systems. Data accountability threats. Data accountability strategies. "Privacy" of the cloud. Threats to the "privacy" of the cloud and the strategy to secure it. Completely homomorphic encryption, Privacy Manager and robust hardware token. The threat of "privacy" is caused by data indexing, "privacy" as a service and Privacy Preserving Framework. Cryptography as a non-universal data protection mechanism.
Assessment methods and criteria: Knowledge assessment methods: 1. Current control of lectures (without scoring) as a frontal or selective individual oral examination of students in the previously presented material, especially in the sections of the course that are necessary to understand the topic of the lecture being read, or to establish the degree of mastering the material of the lecture delivered. 2. Current control of laboratory work in the form of an individual survey. 3. Written review. 4. Oral examination in the form of an interview. 5. Test verification. The sum of the points of the current control (40 points) is made by the estimations for 6 laboratory works (1 and 2 works on 8 points each, and works 3-6 on 6 points each). The exam score of 60 points consists of 30 written component points and 30 oral component scores.
Recommended books: 1. Stephen R. Smoot, Nam-Kee Tan. Private Cloud Computing: Consolidation, Virtualization, and Service-oriented Infrastructure. Elsevier, 2012 - 399 р. 2. Venkata Josyula, Malcolm Orr, Greg Page. Cloud Computing: Automating the Virtualized Data Center. Cisco Press, 2011. - 336 р. 3. Huseni Saboowala, Muhammad Abid, Sudhir Modali. Designing Networks and Services for the Cloud: Delivering business-grade cloud applications and services. Cisco Press, 2013. - 336 р. 4. Imad M. Abbadi. Cloud Management and Security. John Wiley & Sons, 2014. - 240р. 5. Raghuram Yeluri, Enrique Castro-Leon. Building the Infrastructure for Cloud Security: A Solutions View. Apress, 2014 р. - 244 р.