COMP 7998/8998 Security and Privacy in Cloud Computing and IoT - fall2019
Course Description
This course introduces the security and privacy issues in cloud computing and Internet of Things. It covers advanced cryptography (Identity-based Encryption, Attribute-based Encryption, Searchable Encryption, Order-preservation Encryption) and its applications in solving security and privacy issues in cloud computing and Internet of Things. (The content and syllabus are subject to adjustment during the semester.)
Course Objectives
The main goal of this advanced course is to learn advanced cryptography and understand how these cryptographic primitives can be applied to protect the security and privacy in cloud computing and Internet of Things. Specific objectives include: a) understand advanced cryptographic primitives; b) understand the critical security and privacy issues in cloud computing and IoT and their challenges; c) able to identify some security and privacy problems in some cutting-edge research areas.
Prerequisites: COMP7/8120
Additional Requirements on COMP 8998: Compared to the COMP 7998, students who enrolled in COMP 8998 are required to include more technical details during the in-class presentations.
Lecture
Tuesday/Thursday, 1:00 pm - 2:25 pm, Dunn Hall 101
Office Hours
By appointment only (Please arrange by email 2-3 days in advance)
Recommended Textbook
- A Graduate Course in Applied Cryptography by D. Boneh and V. Shoup. Free!
Evaluation
Grading: Your final grade will come from the following sources: class attendance (CA), in-class presentations (IP), and term project (TP)). Here is the grading formula:
Grade = 0.1*CA + 0.5*IP + 0.4*TP
Grading Scale: A: 85 – 100, B: 70 – 84, C: 60 – 69, D: 50 – 59, F: 49 and below. (Plus/minus grading will be used).
Course Policy
- Late Policy: Without prior request, no late work will be accepted. All late submission maybe accepted at a penalty of 15% per day for no more than THREE days.
- Testing Policy: The exam given is closed book/note/laptop/neighbor. But students are allowed to bring one cheat sheet (letter-sized 8.5-by-11) for quick reference. There will NOT be any makeup exams unless there is a documented emergency.
- Homework Assignment and Project Report Policy: It is recommended that students use a word processing software (e.g., Word or LaTeX) to type their homework solutions or project report, then submit well-formatted PDF files.
Course Schedule
- Week 01:
- Week 02:
- Week 03:
-
Week 04:
- Sep 17 - Lecture 7: Authentication in IoT
- Sep 19 - Lecture 8: Blockchain - An Introduction
-
Week 05:
- Sep 24 - Presentation 1.1 (Subash)
- Sep 26 - Presentation 1.2 (Manish)
-
Week 06:
- Oct 01 - Presentation 1.3 (Saurab)
- Oct 03 - Presentation 1.4 (Murshida)
-
Week 07:
- Oct 08 - Presentation 1.5 (Senjuti)
- Oct 10 - Presentation 1.6 (Sabira)
-
Week 08:
- Oct 15 - Fall Break
- Oct 17 - Presentation 1.7 (Jamal)
-
Week 09:
- Oct 22 - Presentation 1.8 (Khan)
- Oct 24 - Presentation 1.9 (Daniel)
-
Week 10:
- Oct 29 - Presentation 1.10 (Sahil)
- Oct 31 - Presentation 1.11 (Sheldon)
-
Week 11:
- Nov 05 - Presentation 2.1 - 2.3 (Subash, Manish, Saurab)
- Nov 07 - Presentation 2.4 - 2.6 (Murshida, Senjuti, Sabira)
-
Week 12:
- Nov 12 - Presentation 2.7 - 2.9 (Jamal, Khan, Daniel)
- Nov 14 - Presentation 2.10 - 3.1 (Sahil, Sheldon, Subash)
-
Week 13:
- Nov 19 - Presentation 3.2 - 3.4 (Manish, Saurab, Murshida)
- Nov 21 - Presentation 3.5 - 3.7 (Senjuti, Sabira, Jamal)
-
Week 14:
- Nov 26 - Presentation 3.8 - 3.11 (Khan, Daniel, Sahil, Sheldon)
- Nov 28 - Thanksgiving Holiday
-
Week 15:
- Dec 03 - No Class