Cleveland State University SYLLABUS AND COURSE GUIDE

advertisement
SYLLABUS AND COURSE GUIDE
Cleveland State University
Department of Electrical and Computer Engineering
EEC 693 Special topic, Secure Cloud Computing
Fall Semester 2015
Instructor: Dr. Abdul Razaque
Office: TBD
Phone: (347) 484-8598
E-mail: drfarhad17@gmail.com
Office Hours:
TBD
Or by appointment
FALL 2015
Department of Electrical Engineering and Computer Science
Cleveland State University
Cleveland, Ohio 44115
1
 Course Description
EEC 693 provides a hands-on comprehensive study of Cloud concepts and capabilities across the various
Cloud service models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software
as a Service (SaaS), and Business Process as a Service (BPaaS). IaaS topics start with a detailed study the
evolution of infrastructure migration approaches from VMWare/Xen/KVM virtualization, to adaptive
virtualization, and Cloud Computing / on-demand resources provisioning. Mainstream Cloud
infrastructure services and related vendor solutions are also covered in detail. PaaS topics cover a broad
range of Cloud vendor platforms including AWS, Google App Engine, Microsoft Azure, Eucalyptus,
OpenStack and others as well as a detailed study of related platform services such as storage services that
leverage Google Storage, Amazon S3, Amazon Dynamo, or other services meant to provide Cloud
resources management and monitoring capabilities.
The SaaS and PaaS topics covered in the course will familiarize students with the use of vendormaintained applications and processes available on the Cloud on a metered on-demand basis in multitenant environments. The course also covers the Cloud security model and associated challenges and
delves into the implementation and support of High Performance Computing and Big Data support
capabilities on the Cloud. Through hands-on assignments and projects, students will learn how to
configure and program IaaS services. The Students will learn how to develop Cloud-based software
applications on top of various Cloud platforms, how to integrate application-level services built on
heterogeneous Cloud platforms, and how to leverage SaaS and BPaaS solutions to build comprehensive
end-to-end business solutions on the Cloud.
In addition, the students will also learn how to construct and secure a private cloud computing
environment based on open source VCL solutions, and how to federate it with external clouds, such as
public EC2 offering, and some other solutions. Performance, virtualization, cloud mobility, security, cost,
usability and utility of cloud computing solutions will be studied both theoretically and in a hands-on lab.
Students are expected to learn and demonstrate practical elements of:





Cloud Computing principles.
Cloud Computing components and services.
Cloud mobility and different handover process
Cloud Computing architectures and implementations
Cloud Computing management and security
Learning Objectives: At the end of the course, student will be able to understand complex
technologies leading to the development of current and future cloud computing security.
Course Material: The course material will be based on notes prepared and distributed by the
instructor.
Reference Text: Cloud industry publications, online textbooks, and research papers on various
topics connected to the various sessions.
Prerequisites Course: NA
Course Structure: 12 lectures, Demo, project presentation, midterm and final exams
Detailed schedule of lectures (each lecture spans one week of class):
Recommended Simulator: GreenCloud, CloudSim, SimGrid, VirtualCloud, EMUSIM,
GroudSim
Recommended Computing Library: Isis2
Recommended tools: CloudAnalyst
Recommended Platform: Windows, Linux, Amazon EC2 and Mono
2
*Course Outline (Subject to change)
Date
Week #
08/24-08/30
1
Course Break-down
1 – Overview of Distributed Computing & Cloud
Computing
2 – Infrastructure as a Service (IaaS), Software as a Service
(SaaS), Platform as a Service (PaaS)
3 – Virtualization
4 – Cloud Mobility and Handoff/Handover
2
08/31-09/06
3
4
5
09/07-09/13
09/14- 09/20
6
7
09/28- 10/04
8
9
10
11
10/12- 10/18
7 – Cloud Security approaches & offerings
10/19- 10/25
8 – Tools for cloud computing security assurance
10/26- 11/01
11/02- 11/08
12
13
14
15
16
11/09-11/15
9 – Secure Service Management in Cloud Computing
10 – Enterprise Cloud-Based High Performance Computing
(HPC) Applications
11 – High Performance Cloud Computing Vendor Solutions
09/21- 09/27
10/05-10/11
11/16- 11/22
11/23- 11/29
11/30- 12/06
12/07- 12/13
5 – Privacy preserving model for three stakeholders ( Third
party auditor, Cloud service provider and Cloud service
user)
6 – Cloud Security
Research Project First Presentation
12- Cloud Computing Advanced Topics
Research Project Demo
Research Project Final Presentation
Final Examination
*Note: Students are required to access the Blackboard on the regular basis for the course
materials, home works, Project description, solutions.
 Tentative Topics, Reading Assignments, Tasks and Events
The instructor will make a diligent effort to follow the schedule outlined below. Unless
students hear otherwise, students are responsible for completing the reading assignments
below by the start of class on the date indicated. Supplemental readings, usually web-based
articles related to that week’s topic, may be assigned by your instructor throughout the
semester. Supplemental reading assignments will be posted on the Blackboard by Saturday
prior to the week that they will be discussed in class.
 Course Policies
3
 Blackboard Learning Management System (LMS): We will make extensive use of
CSU’s Blackboard Learning Management System (LMS) in this class. It will be used
as a repository for course-relevant information, including lecture and lab pre-reads,
and also as a platform for administering quizzes and other assessments. Blackboard is
the functional heart of this course.
 Attendance: Regular class attendance has been shown to have an extremely high
correlation with achievement and grades in this course. Attendance is therefore
strongly encouraged and rewarded. Students will accumulate points for all classes
attended. Be sure to sign the attendance sheet circulated at the start of each class with
a single unique signature because I compare signatures across class sessions to
eliminate the practice of students signing in for missing friends. Under no
circumstances will students sign in for each other. Students arriving more than 10
minutes late to class are considered absent for attendance purposes.
 Participation and Instructor Interaction: Participation requirements for this class are
limited to posting occasional questions on the LMS and completing each graded task by
the specified deadline. However, students are strongly encouraged to ask questions in
class and labs and to look for opportunities to interact with me, before or after class/lab,
during office hours, or whenever an opportunity might arise.
 Pre-Lab Quizzes: To prepare students for lab sessions, we have developed a weekly prelab exercise, which exposes them in advance to the key concepts that will be covered
during the lab. Each of these pre-lab exercises will have a quiz associated with it, which
must be completed by the start of class, the same as the online assessments.
 Exams: There will be three exams, including a comprehensive final exam administered
during the officially scheduled University final exam time. Prior to each exam, a highlevel review sheet will be distributed to students. All exam questions are developed
directly by the instructor and they are analyzed for statistical validity.
 Assignment Deadliness: Weekly assignments close out at the start of each class and
generally will not be reopened. Projects are due at the start of class on the date noted
on the syllabus. Late project-related assignments will be decreased by 2 percent for
each calendar day late.
 Make-Up Quizzes, Labs, Exams: Make-up quizzes, labs, and exams will only be
administered for cases of official university absence or because of a personal or family
emergency. In all of these cases, excuses must be formally documented and approved by
the instructor or through the school Student Services office. If students cannot provide
formal documentation for an absence, make-ups will not be made available.
 Labs: The students will be expected to complete individual pre-lab assignments using
their own computer. Macintosh users should be aware of the fact that some assignments
may require use of Microsoft Windows applications. This can be accomplished either
by using special software on your Mac (Boot-camp, Parallels, VMWare Fusion) or by
completing these tasks in the School computing lab. Students arriving late will have their
4
lab grade lowered by 20% for each 5 minutes they are late.
 Student Progress: The instructor recognizes that students taking this class have basic
computer network knowledge. A key goal of this course is to motivate every student to
improve individual knowledge and understanding of networking. If students have
special needs or if issues arise during the semester that impact their class performance,
please make someone on the instructional team aware of it. If something in class is
confusing, take advantage of office hours, private appointments, and e-mail. I am
willing to make time for every student who demonstrates a desire to learn.
 Grading:
The traditional grading scale will be used. However, I will prefer to apply the relevant grading
method.
90%-100%
87%-89%
83%-86%
80%-82%
76%-79%
60%-75%
0%-59%
A
AB+
B
BC
F
 Weights for course work and tentative dates:
Quiz
10% (Pop quizzes, review & preview)
Final Exam
20% (Comprehensive)
Homework/Lab
20 % (5-10)
Participation/Worksheet
10% (worksheet after each lecture)
Research Project
40% (2-3 person project, four sub-parts)
-----------------------------------TOTAL
100 %
 Academic Dishonesty
Academic dishonesty is defined to include any form of cheating and/or plagiarism. Cheating
includes, but is not limited to, such acts as stealing or altering testing instruments; falsifying the
identity of persons for any academic purpose; offering, giving or receiving unauthorized
assistance on an examination, quiz or other written or oral material in a course; or falsifying
information on any type of academic record. Plagiarism is the presentation of written or oral
material in a manner which conceals the true source of documentary material; or the presentation
of materials which uses hypotheses, conclusions, evidence, data, or the like, in a way that the
student appears to have done work which he/she did not, in fact, do. In cases involving academic
dishonesty, a failing grade or a grade of zero (0) for either an assignment and/or a course may be
administered.
5
 Computer Misuse and Dishonesty
The University considers any misuse of its computer system to be a serious offense. A student
may not attempt to degrade the performance of the computer system, to seek to penetrate its
security, or in any way deprive other users of resources or access to the computer. Further
violations include, but are not limited to, (a) using a computer account belonging to another
individual without the explicit permission of that individual; (b) tampering with the operation of
the University’s computer system including both its equipment and its programs; (c) using the
system for commercial purposes; (d) inspecting, modifying or copying programs or data without
authorization from the owner; and (e) using the electronic formats to send abusive, obscene, or
otherwise harassing communications.
 Students with Disabilities
The Americans with Disabilities Act is a federal anti-discrimination statute that provides
comprehensive civil rights protection for persons with disabilities. Among other things, this
legislation requires that all students with disabilities be guaranteed a learning environment that
provides for reasonable accommodation of their disabilities. If you believe you have a disability
requiring an accommodation, please contact the Department of Student Life or call 687-2048.
6
Download