This course introduces the security and privacy issues in cloud computing and Internet of Things. It covers advanced cryptography (Identity-based Encryption, Attribute-based Encryption, Searchable Encryption, Order-preservation Encryption) and its applications in solving security and privacy issues in cloud computing and Internet of Things. (The content and syllabus are subject to adjustment during the semester.)
The main goal of this advanced course is to learn advanced cryptography and understand how these cryptographic primitives can be applied to protect the security and privacy in cloud computing and Internet of Things. Specific objectives include: a) understand advanced cryptographic primitives; b) understand the critical security and privacy issues in cloud computing and IoT and their challenges; c) able to identify some security and privacy problems in some cutting-edge research areas.
Additional Requirements on COMP 8998: Compared to the COMP 7998, students who enrolled in COMP 8998 are required to include more technical details during the in-class presentations.
Tuesday/Thursday, 1:00 pm - 2:25 pm, Dunn Hall 101
By appointment only (Please arrange by email 2-3 days in advance)
- A Graduate Course in Applied Cryptography by D. Boneh and V. Shoup. Free!
Grading: Your final grade will come from the following sources: class attendance (CA), in-class presentations (IP), and term project (TP)). Here is the grading formula:
Grade = 0.1*CA + 0.5*IP + 0.4*TP
Grading Scale: A: 85 – 100, B: 70 – 84, C: 60 – 69, D: 50 – 59, F: 49 and below. (Plus/minus grading will be used).
- Late Policy: Without prior request, no late work will be accepted. All late submission maybe accepted at a penalty of 15% per day for no more than THREE days.
- Testing Policy: The exam given is closed book/note/laptop/neighbor. But students are allowed to bring one cheat sheet (letter-sized 8.5-by-11) for quick reference. There will NOT be any makeup exams unless there is a documented emergency.
- Homework Assignment and Project Report Policy: It is recommended that students use a word processing software (e.g., Word or LaTeX) to type their homework solutions or project report, then submit well-formatted PDF files.
- Week 01:
- Week 02:
- Week 03:
- Sep 17 - Lecture 7: Authentication in IoT
- Sep 19 - Lecture 8: Blockchain - An Introduction
- Sep 24 - Presentation 1.1 (Subash)
- Sep 26 - Presentation 1.2 (Manish)
- Oct 01 - Presentation 1.3 (Saurab)
- Oct 03 - Presentation 1.4 (Murshida)
- Oct 08 - Presentation 1.5 (Senjuti)
- Oct 10 - Presentation 1.6 (Sabira)
- Oct 15 - Fall Break
- Oct 17 - Presentation 1.7 (Jamal)
- Oct 22 - Presentation 1.8 (Khan)
- Oct 24 - Presentation 1.9 (Daniel)
- Oct 29 - Presentation 1.10 (Sahil)
- Oct 31 - Presentation 1.11 (Sheldon)
- Nov 05 - Presentation 2.1 - 2.3 (Subash, Manish, Saurab)
- Nov 07 - Presentation 2.4 - 2.6 (Murshida, Senjuti, Sabira)
- Nov 12 - Presentation 2.7 - 2.9 (Jamal, Khan, Daniel)
- Nov 14 - Presentation 2.10 - 3.1 (Sahil, Sheldon, Subash)
- Nov 19 - Presentation 3.2 - 3.4 (Manish, Saurab, Murshida)
- Nov 21 - Presentation 3.5 - 3.7 (Senjuti, Sabira, Jamal)
- Nov 26 - Presentation 3.8 - 3.11 (Khan, Daniel, Sahil, Sheldon)
- Nov 28 - Thanksgiving Holiday
- Dec 03 - No Class