Security in Mobile Cloud

Security in Mobile Cloud

From CIS Lab, SJTU, China

Jump to: navigation, search


Name: Chen, Kefei Huang, Zheng
Office: Electr-Building 3#429 Electr-Building 3#331
Tel: 3420 4221 3420 5716
Email: some mail some mail

Goal of this course

The goal of this course is to foster security mindset in mobile cloud computing environment, including identifying the threats in mobile cloud, understanding how Security protocols work, applying cryptography, trusted computing and virtualization technologies to mitigate threats.

Students will be able to build secure applications in mobile cloud after this course.

preliminary: students in this course should have attended Computer Networks, Operation System, Information Security and Cryptography Algorithms related courses.

Course outline

1 Introduction

This course concerns mobile cloud security issues by looking at the current state of mobile cloud security, vulnerabilities in mobile cloud computation, and how to use cryptography technical to address those vulnerabilities.

2 Network Security

3 Security in commercial Cloud

4 Security in Mobile Device

5 Security Standards in Mobile Cloud

6 Wrap up and Conclusion

Case Study (PRELIMINARY version )

  • Mobile Device Data Backup System

Textbook and Reading List

There is no mandatory text book for this course. Instead, the instructors will give a reading list:


  • Grading Policy
  • Class and Office Hour Times

This Course is sponsored by Intel