‘Module 4: Programming Model
Introduction to Hadoop Framework - Mapreduce, Input splitting, map and reduce functions, specifying
input and output parameters, configuring and running a job — Developing Map Reduce Applications -
Design of Hadoop file system ~Setting. up Hadoop Cluster, Case Study = Apache Ambari, OpenStack
Infrastructure as a code (IaC)
‘Module 5: Cloud Security
Cloud Infrastructure security: network, host and application level aspects of data security. provider data
and its security, Identity and access management architecture, IAM practices in the cloud. SaaS. PaaS,
IaaS availability in the cloud - Key privacy issues in the cloud ~Cloud Security and Trust Management,
Case Study OpenStack cloud security practices and concepts
‘Module 6: Automating configuration management using Ansible
How Ansible works, A very simple playbook, running the playbook, Anatomy of playbook, variables and
facts, Deploying a web server and database server using ansible playbook, Case Study dynamic
configuration management using sat stack
Reference Books:
1. Mathew Portony, “Virtualization Essentials", Second Edition, 2016, Sybex, ISBN-13: 978-
1119267720
2. Danielle Ruest, Nelson Ruest, “Virtualization: A Beginner's Guide", 2009, McGraw-Hill
Osborne Media, ASIN: BOIFIXTSYC
3. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical Approach”, 2009,
McGraw-Hill Osborne Media, ASIN: BOOME30QP6
4. John W. Rittinghouse, James F. Ransome, “Cloud Computing Implementation, Management, and
Secutity”, First Edition, 2009, CRC Press, ISBN-13: 978-1439806807
5. Lorin Hochstein, Rene Moser, “Ansible: Up and Running: Automating Configuration
Management and Deployment the Easy Way", 2017, "OReilly Media, Inc.", ISBN-13: 978-
1491979808
6. Dan Radez, “OpenStack Essentials” - Second Edition, 2016, ISBN: 1786462206
tucssote Gnd Computing 2nd 107 cre
Course Objectives:
Enable the student 10
1 understand the differences between traditional deployment and cloud computing.
2. eam the concepts about Internet of Things.
3. recognize the loT Reference Architecture and Real World Design Constraints
Course Outcomes:
‘The student will be able to
L.examine ToT Architecture and various protocols.
2. classify the IoT value chain structure (device, data cloud), application areas and technologies
involved. Understand IoT market perspective
design, develop and implement smart systems.
infer the advantages of Cloud Services.
eam about optimization of cloud storage.
apply various kinds of security mechanism.
‘Module 1: Introduction
ntroduction-Third ICT Wave-loT Kaleidoscope-Defining IoT-A Web 3.0 View-Panoramic View of ToT.
Applications-Important Vertical loT Applications-Horizoatal, Vertical and Four Pillars-M2M Internets of |
Devices-RFID-Intemet of Objects-WSN: Internet of Transducers-SCADA: Intemet of Controllers,
‘Module 2: ToT and Middleware of ToT
DCM, Connect Via Pervasive Networks-Wired Networks-Wireless Networks-Satellite IoT-Manage to
Create Business Value-Overview For Middleware-Communication Middleware for IoT-MTCM2M.
Computer Science and EngineeringMiddleware-SCADA Middleware-RFID Middleware-WSN Middleware-LBS and Surveillance
Middleware
‘Module 3: Protocol and Architecture for ToT
Web of Things Versus Internet of Things-IoT Protocol Standardization Efforts-Unified data standards
Platform middleware for WoT-Unified Multi-Tier WoT Architecture-WoT Portals and Business
Intelligence-Challenges of IoT Information Security.
‘Module 4: Cloud of Things
Cloud computing-Grid/SOA and Cloud Computing-Cloud Middleware-NIST’s SPI Architecture and
Cloud Standards-Cloud Providers and Systems-Internet of Things and Cloud Compating-Mobile Cloud
(Computing-MAI versus XaaS-Cloud of Things Architecture.
‘Module 5: Deployment Models of Cloud in foT
Deployment models of Cloud computing in IoT-Implications of Cloud Computing in view of
Deployment-Issues for Deployment and Optimization-Convergence of Cloud and IoT-Data Security
Reliability-Resource Provisioning-Service Level Agreement-Quality of Service-Privacy and Device
Integration,
‘Module 6: Security and Privacy requirements
Security issues in Trust Management Systems-Security Analysis of oT Related Standard Protocols
‘Secutity Threats at Different Layers of lol-Need for Standardization Bodies for IoT and Cloud.
Reference Books:
1, Honbo Zhou, “The Intemet of Things in the Cloud: A Middleware Perspective", 2013, CRC
press, ISBN 978-1-4398-9299.
2, Pradeep Tomar, Gurjt Kaur,” Examining Cloud Computing Technologies Through the Internet
of Things (Advances in Wireless Technologies and Telecommunication)”, IGI Global, 2018, Ist
Edition, ISBN-13: 978-1522534457, ISBN-10: 1522534458,
3. Daniel Minoli, “Building the Internet of Things with IPv6 and MIPv6: The Evolving World of
‘M2M Communications”, ISBN: 978-1-118- 47347-4, Willy Publications.
4. Vijay Madisetti and Arshdeep Bahga, “Intemet of Things (A Hands-on Approach)", 1* Edition,
VPT, 2014
5 Fei Hu, “Security and Privacy in Intemet of Things (loTs): Models, Algorithms, and
Implementations", CRC press, 2016, ISBN-10; 1498723187, ISBN-13: 978-1498723183.
18CS3017 Cloud Security
nen
3.0 0 3
Course Objectives:
Enable the student to
1 apply tust-based security model to real-world security problems.
2. leam an overview of the concepts, processes, and best practices needed to successfully secure
information within Cloud infiastructures,
3. develop an understanding of the risk and compliance responsibilities and challenges for each
cloud type and service delivery model
Course Outcomes:
‘The student will be able to
1. identify security aspects of each cloud model
know the standards and protocols for cloud services
develop a risk-management strategy for moving to the Cloud
implement a public cloud instance using a public cloud service provider
apply audit and compliance rules in the cloud environment
stummarize the recent technologies in cloud security
‘Module 1: Security Issues in Cloud Computing
Infrastructure Security: The Network Level, The Host Level, The Application Level, Data Security and
Storage, Aspects of Data Security, Data Security Mitigation Provider Data and Its Secutit.
Computer Science and Engineering