Introduction to Cloud Security
——————————————————————————————————————————————————————————————-
Short overview of the module
This module is an introductory lecture on Cloud Security. It could be used in a junior-level class, such as Operating Systems, Networking, or Distributed Systems. It is designed as a self-contained module that could be used as is, slides and all.
It could also be modified to fit into the course you are teaching. If you decide to use this module, we would highly appreciate if you could simply send us an email letting us know in what course you plan to use this module. Any suggestions for improvement are very welcome. And if you wish to share your modified version of this module with other instructors, we could host your module on our site (with due credit to you of course).
Required background / Target students
This module is designed for students who are in an undergraduate class that has covered Cloud Computing and Network Security as two separate concepts. In this module on Cloud Security, we attempt to relate those two concepts.
Learning goals
After this module is taught as part of a Computer Systems course, it is expected that the student:
- can explain in broad terms what is cloud computing and what security issues arise in the cloud;
- how do computer and network security relate differently to the cloud from other enterprise computing models.
Reading
Slideset
- IntroCloudSecurity (powerpoint slides)
Resources
- Michael Armbrust et al., Above the Clouds: A Berkeley View of Cloud Computing, Technical Report No. UCB/EECS-2009-28, February 10, 2009.
- Yanpei Chen, Vern Paxson, Randy H. Katz, What’s New About Cloud Computing Security?, Technical Report No. UCB/EECS-2010-5, January 20, 2010.
- Cloud Security Alliance (CSA), accessed 2015
- CSA White papers, accessed 2015
- Top Threats to Cloud Computing V1.0, Prepared by the Cloud Security Alliance, March 2010
- Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, in CCS ’09: Proceedings of the 16th ACM conference on Computer and communications security
- Dawn Xiaodong Song, David Wagner, and Xuqing Tian, Timing analysis of keystrokes and timing attacks on SSH, in SSYM’01: Proceedings of the 10th conference on USENIX Security Symposium.