最新消息
 
教师信息
 
课程简介
 
课程管理
 
住宿信息
 
交通信息
 
科大地图
 
关于龙星
 
 
 
 


课程简介


Course Description and Objectives:
Cloud Computing provides convenient on-demand network access to a shared pool of congurable computing resources that can be rapidly deployed with great eciency and minimal management overhead. With its unprecedented advantages, Cloud Computing economically enables a fundamental paradigm shift on how data services are deployed and delivered, i.e., enabling service outsourcing, where individual and enterprise customers can avoid committing large capital outlays in the purchase and management of both software and hardware and the operational overhead therein.

Despite the tremendous benefits, outsourcing data service to the commercial public cloud is also depriving customers’ direct control over the systems that manage their data, raising security and privacy as the primary obstacles to the adoption of the cloud. In this course, we will study data service security in cloud computing. We will start from the basic problem concepts, and then advance to various research problems. Various advanced topics including storage, access control, searching, and computation will be discussed in depth. Latest research results will be incorporated into the lecture.

The key objectives of this course include:
(1) to establish the fundamental concepts of cloud computing security and
(2) to provide a deep understanding on the cutting-edge research in the field.

The core topics to be covered in this course include data storage security, access control, searching the encrypted cloud data, data access pattern privacy, and secure computation outsourcing. This course consists of five lectures, each of 3-hour class time. By the end of the course, students are expected to master the knowledge conveyed in the class and be self-sufficient in performing independent research in the field.

课程大纲


课程大纲(8月1日—8月5日)

第一天 (1) Introduction to Cloud Computing
(2) Data Storage Security in Cloud Computing
第二天 (1) Data Access Control in Cloud Computing
(2) Attribute-based Encryption and its Application
(3) Policy Privacy and Computation Delegation
第三天 (1) Private Information Retrieval in Cloud Computing
(2) Introduction on Oblivious Transfer
(3) Advanced Oblivious Transfer Techniques with Improved Efficiency
第四天 (1) Search over Encrypted Cloud Data
(2) Multi-keyword Search and the Related Semantics
(3) Search Result Ranking and More Search Functionalities
第五天 (1) Privacy-preserving Computation Outsourcing in Cloud Computing
(2) The case of Linear Programming Outsourcing
(3) The case of Bio Computing