WORKSHOPS

This year, CAC will be hosting the following workshops. Papers are solicited for submission to these workshops. More details can be found in the workshop websites.



TUTORIALS

This year, CAC will be hosting the following tutorial sessions.

Fundamentals of Cloud Security

Instructor: Dr. Salim Hariri

Full day tutorial on August 9, 2013

See registration page for pricing.


Cloud Computing is an emerging paradigm that aims at delivering computing, information services, and data storage as a utility service over a network (e.g., Internet). There is a strong interest in cloud computing due to their performance and host, but their rapid deployment will exacerbate the security problem. In cloud computing, organizations relinquish direct control of many security aspects to the service providers such as trust, privacy preservation, identity management, data and software isolation, and service availability. The adoption and proliferation of cloud computing and services will be severely impacted if cloud security is not adequately addressed. The main goal of this tutorial is discuss the limitations of current cybersecurity approaches to clouds and then focus on the fundamental issues to address the cloud security and privacy such as the confidentiality, integrity and availability of data and computations in clouds. In this tutorial we will examine cloud computing models, look into the threat model and security issues related to data and computations outsourcing, and explore practical applications to make cloud resources secure and resilient to cyber attacks.

 

    1. Review of Cloud Computing Definition and Architectures
    2. Cloud Computing Models and Deployment Options
    3. Vulnerabilities and Security Issues in Clouds
      • Threats at Infrastructure as a Service (IaaS)
      • Threats at Platform as a Service (PaaS)
      • Threats at Software as a Service (SaaS)
      • Threats in emerging cloud applications, services, etc.
    4. Virtual Machine Security
    5. Trusted Computing Technology and Clouds
    6. Resilient Cloud Services
    7. Cloud Regulatory Compliance Issues
    8. Business and Security Risk Models
    9. Emerging Cloud Services and Applications – Internet of Things (IoT) Security