Inhalt

[ 921CGELCLSK13 ] KV Cloud Security

Versionsauswahl
Workload Education level Study areas Responsible person Hours per week Coordinating university
3 ECTS M1 - Master's programme 1. year Computer Science Stefan Rass 2 hpw Johannes Kepler University Linz
Detailed information
Original study plan Master's programme Computer Science 2025W
Learning Outcomes
Competences
Students understand the principles of cloud computing security and architecture. They are aware about the threats and possible security controls at the different layers of abstraction of the cloud.

Skills Knowledge
Students

  • understand of basics and architecture of general cloud computing (K2)
  • can analyze the security of different cloud architectures (K4)
  • can interpret and assess the potential and risks of various security mechanisms and cryptography when applied in a cloud (K5)
  • can make informed design decision for different cloud deployment models (SaaS, PaaS, …) (K5)
  • can recommend cloud architectures and deployment principles with respect to security (K5)
  • can discuss basic legal issues of cloud computing (K2)
  • can design and assess key management architectures in clouds (K4)
  • understand the interplay between hard- and software for trustworthy computing (K4)
  • General Security Issues in Clouds
  • Establishing Trust (TPMs, TEE, ...)
  • Key Management in Clouds
  • Trustworthy Storage
  • Computations in Privacy: Cryptography and limits of computability in privacy
Criteria for evaluation Grading is based on written assignments and student presentations
Methods Lecture Presentations, Hands-On Exercises and and student presentations
Language English
Study material Slides
Changing subject? No
Further information The course combines a lecture part with a practical and student presentation sessions. Students are required to submit solutions to exercises covering the fixed topics of the lecture. In addition, students need to choose a further topic of their own interest in cloud computing, and prepare a presentation for the class. The grading is based on the quality of submitted solutions to exercises and the quality of the presentations of their chosen topic.

https://www.jku.at/en/institute-of-networks-and-security/

On-site course
Maximum number of participants -
Assignment procedure Direct assignment