Back close

Course Detail

Course Name Security in Cloud Computing
Course Code 24CY761
Program M. Tech. in Cyber Security
Credits 3
Campus Coimbatore

Syllabus

Syllabus

Introduction to distributed systems, Distributed computing paradigms, Inter process communication mechanisms, Process models in distributed systems, The CAP theorem, Consistency models and Replication, Consensus algorithm: Clock Synchronization – Logical clocks – Mutual Exclusion, global positioning of nodes, Distributed Commit protocols – 2PC, 3PC, Check-pointing and Recovery, Election algorithms, Failure Models, RAFT algorithm- Apache Zookeeper, Distributed file system – Eg: CODA and Ceph, Distributed storage implementation – Data sharding, NoSQL key value stores and its properties – Eg: Google Big Table, Amazon DynamoDB. Cloud computing benefits and its challenges, Types – Private, Public and Hybrid clouds, Models – IaaS, PaaS and SaaS. Cloud Regulations (GDPR, CCPA, HIPAA, CIS), Cloud – AWS, Azure, GCP. REST API services including load balancing, server authentication and debug handling, Cloud Firewalls, Cloud Peering, – Security Best practices in Cloud: Cloud storage management, Security keys, Customer Managed Encryption keys, Shielded VMs, Encryption and signed URLs, Mitigating DOS stacks in cloud- Hadoop cloud computing framework – HDFS and MapReduce, SPARK, Cloud data processing using Pig and Hive, Amazon EMR for creating Hadoop clusters within AWS, Cloud security Governance, Prisma. 

Objectives and Outcomes

Prerequisite

24CY602 Network Security

 

Course Outcome

Course Outcome 

Bloom’s Taxonomy Level 

CO 1 

Understanding the distributed systems, algorithms and protocols 

L1 

CO 2 

Familiarization of distributed storage implementation 

L3 

CO 3 

Evaluate Security in the cloud-infrastructure and analyze various attacks on cloud computing 

L4 

CO 4 

Understanding various cloud services and key management 

problems in cloud storage 

L3 

CO 5 

Exploring Hadoop cloud computing framework 

L4 

 
CO-PO Mapping

CO-PO Mapping  

CO/PO  

PO 1 

PO 2 

PO 3 

PO 4 

PO 5 

PO 6 

PO 7 

PO 8 

PO 9 

PO 10 

PSO1 

PSO2 

PSO3 

CO 1 

– 

– 

CO 2 

– 

– 

CO 3 

– 

– 

CO 4 

– 

– 

CO 5 

– 

– 

Text Books / References

  1. S. Ghemawat, H. Gobioff, and S. T. Leung, The Google file system , In ACM symposium on operating systems review, Vol. 37, No. 5, pp. 29-43, 2003. 
  2. J. Dean and S. Ghemawat , MapReduce: simplified data processing on large clusters , Commun., ACM 51, no.1, 107-113, 2008. 
  3. R. Chow, P. Golle, M. Jakobsson, R. Masuoka, Jesus Molina Elaine Shi and Jessica Staddon, Controlling data in the cloud: outsourcing computation without outsourcing control , In Proceedings of the ACM workshop on Cloud computing security, pp. 85-90, 2009. 
  4. T. Mather, S. Kumaraswamy and S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, O’Reilly Series, 2009. 
  5. T. Erl, R. Puttini and Z. Mahmood, Cloud Computing: Concepts, Technology & Architecture , Prentice Hall, 2013. 
  6. M. Ben-Ari, Principles of Concurrent and Distributed Programming , Addison- Wesley/Pearson, 2nd Edition, 2006. 
  7. George Coulouris, Jean Dollimore, Tim Kindberg, and Gordon Blair, Distributed Systems: Concepts and Design , 5th Edition, 2011. 

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now