You are on page 1of 2
‘Module 4: Programming Model Introduction to Hadoop Framework - Mapreduce, Input splitting, map and reduce functions, specifying input and output parameters, configuring and running a job — Developing Map Reduce Applications - Design of Hadoop file system ~Setting. up Hadoop Cluster, Case Study = Apache Ambari, OpenStack Infrastructure as a code (IaC) ‘Module 5: Cloud Security Cloud Infrastructure security: network, host and application level aspects of data security. provider data and its security, Identity and access management architecture, IAM practices in the cloud. SaaS. PaaS, IaaS availability in the cloud - Key privacy issues in the cloud ~Cloud Security and Trust Management, Case Study OpenStack cloud security practices and concepts ‘Module 6: Automating configuration management using Ansible How Ansible works, A very simple playbook, running the playbook, Anatomy of playbook, variables and facts, Deploying a web server and database server using ansible playbook, Case Study dynamic configuration management using sat stack Reference Books: 1. Mathew Portony, “Virtualization Essentials", Second Edition, 2016, Sybex, ISBN-13: 978- 1119267720 2. Danielle Ruest, Nelson Ruest, “Virtualization: A Beginner's Guide", 2009, McGraw-Hill Osborne Media, ASIN: BOIFIXTSYC 3. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical Approach”, 2009, McGraw-Hill Osborne Media, ASIN: BOOME30QP6 4. John W. Rittinghouse, James F. Ransome, “Cloud Computing Implementation, Management, and Secutity”, First Edition, 2009, CRC Press, ISBN-13: 978-1439806807 5. Lorin Hochstein, Rene Moser, “Ansible: Up and Running: Automating Configuration Management and Deployment the Easy Way", 2017, "OReilly Media, Inc.", ISBN-13: 978- 1491979808 6. Dan Radez, “OpenStack Essentials” - Second Edition, 2016, ISBN: 1786462206 tucssote Gnd Computing 2nd 107 cre Course Objectives: Enable the student 10 1 understand the differences between traditional deployment and cloud computing. 2. eam the concepts about Internet of Things. 3. recognize the loT Reference Architecture and Real World Design Constraints Course Outcomes: ‘The student will be able to L.examine ToT Architecture and various protocols. 2. classify the IoT value chain structure (device, data cloud), application areas and technologies involved. Understand IoT market perspective design, develop and implement smart systems. infer the advantages of Cloud Services. eam about optimization of cloud storage. apply various kinds of security mechanism. ‘Module 1: Introduction ntroduction-Third ICT Wave-loT Kaleidoscope-Defining IoT-A Web 3.0 View-Panoramic View of ToT. Applications-Important Vertical loT Applications-Horizoatal, Vertical and Four Pillars-M2M Internets of | Devices-RFID-Intemet of Objects-WSN: Internet of Transducers-SCADA: Intemet of Controllers, ‘Module 2: ToT and Middleware of ToT DCM, Connect Via Pervasive Networks-Wired Networks-Wireless Networks-Satellite IoT-Manage to Create Business Value-Overview For Middleware-Communication Middleware for IoT-MTCM2M. Computer Science and Engineering Middleware-SCADA Middleware-RFID Middleware-WSN Middleware-LBS and Surveillance Middleware ‘Module 3: Protocol and Architecture for ToT Web of Things Versus Internet of Things-IoT Protocol Standardization Efforts-Unified data standards Platform middleware for WoT-Unified Multi-Tier WoT Architecture-WoT Portals and Business Intelligence-Challenges of IoT Information Security. ‘Module 4: Cloud of Things Cloud computing-Grid/SOA and Cloud Computing-Cloud Middleware-NIST’s SPI Architecture and Cloud Standards-Cloud Providers and Systems-Internet of Things and Cloud Compating-Mobile Cloud (Computing-MAI versus XaaS-Cloud of Things Architecture. ‘Module 5: Deployment Models of Cloud in foT Deployment models of Cloud computing in IoT-Implications of Cloud Computing in view of Deployment-Issues for Deployment and Optimization-Convergence of Cloud and IoT-Data Security Reliability-Resource Provisioning-Service Level Agreement-Quality of Service-Privacy and Device Integration, ‘Module 6: Security and Privacy requirements Security issues in Trust Management Systems-Security Analysis of oT Related Standard Protocols ‘Secutity Threats at Different Layers of lol-Need for Standardization Bodies for IoT and Cloud. Reference Books: 1, Honbo Zhou, “The Intemet of Things in the Cloud: A Middleware Perspective", 2013, CRC press, ISBN 978-1-4398-9299. 2, Pradeep Tomar, Gurjt Kaur,” Examining Cloud Computing Technologies Through the Internet of Things (Advances in Wireless Technologies and Telecommunication)”, IGI Global, 2018, Ist Edition, ISBN-13: 978-1522534457, ISBN-10: 1522534458, 3. Daniel Minoli, “Building the Internet of Things with IPv6 and MIPv6: The Evolving World of ‘M2M Communications”, ISBN: 978-1-118- 47347-4, Willy Publications. 4. Vijay Madisetti and Arshdeep Bahga, “Intemet of Things (A Hands-on Approach)", 1* Edition, VPT, 2014 5 Fei Hu, “Security and Privacy in Intemet of Things (loTs): Models, Algorithms, and Implementations", CRC press, 2016, ISBN-10; 1498723187, ISBN-13: 978-1498723183. 18CS3017 Cloud Security nen 3.0 0 3 Course Objectives: Enable the student to 1 apply tust-based security model to real-world security problems. 2. leam an overview of the concepts, processes, and best practices needed to successfully secure information within Cloud infiastructures, 3. develop an understanding of the risk and compliance responsibilities and challenges for each cloud type and service delivery model Course Outcomes: ‘The student will be able to 1. identify security aspects of each cloud model know the standards and protocols for cloud services develop a risk-management strategy for moving to the Cloud implement a public cloud instance using a public cloud service provider apply audit and compliance rules in the cloud environment stummarize the recent technologies in cloud security ‘Module 1: Security Issues in Cloud Computing Infrastructure Security: The Network Level, The Host Level, The Application Level, Data Security and Storage, Aspects of Data Security, Data Security Mitigation Provider Data and Its Secutit. Computer Science and Engineering

You might also like