8th Sem
8th Sem
A404A
L T P Credit Major Test Minor Test Total Time
3 0 0 3 75 25 100 03 Hrs.
Purpose To familiar the concepts of cloud services and storage to deploy various resources and
arbitrary software.
Course Outcomes(CO)
CO1 Facilitate the basic usage and applicability of computing paradigm.
CO2 Explore various cloud service and deployment models to utilize different cloud services.
CO3 To get enabled for various data, scalability & cloud services in order to get efficient
database for cloud storage.
CO4 To deal with various security threats and their controlling mechanism for accessing safe
cloud services.
UNIT 1
Overview of Computing Paradigm: Recent trends in Computing, Grid Computing, Cluster
Computing, Distributed Computing, Utility Computing, Cloud Computing, evolution of cloud
computing, Business driver for adopting cloud computing. Cloud Computing (NIST Model),
History of Cloud Computing, Cloud service providers, Properties, Characteristics &
Disadvantages, Pros and Cons of Cloud Computing, Benefits of Cloud Computing, Cloud
computing vs. Cluster computing vs. Grid computing, Role of Open Standards.
UNIT 2
Cloud Computing Architecture: Cloud computing stack, Comparison with traditional
computing architecture (client/server), Services provided at various levels, How Cloud
Computing Works, Role of Networks in Cloud computing, protocols used, Role of Web services,
Service Models (XaaS) - Infrastructure as a Service (IaaS), Platform as a Service (PaaS),
Software as a Service (SaaS), Deployment Models- Public cloud, Private cloud, Hybrid cloud,
Community cloud.
UNIT 3
Service Management in Cloud Computing: Service Level Agreements (SLAs), Billing &
Accounting, comparing Scaling Hardware: Traditional vs. Cloud, Economics of scaling:
Benefitting enormously, Managing Data- Looking at Data, Scalability & Cloud Services,
Database & Data Stores in Cloud, Large Scale Data Processing.
Case study: Eucalyptus, Microsoft Azure, Amazon EC2.
UNIT 4
Cloud Security: Infrastructure Security, Network level security, Host level security, Application
level security, Data security and Storage, Data privacy and security Issues, Jurisdictional issues
raised by Data location, Identity & Access Management, Access Control, Trust, Reputation, Risk,
Authentication in cloud computing, Client access in cloud, Cloud contracting Model, Commercial
and business considerations.
Text Books
1. Barrie Sosinsky, Cloud Computing Bible, Wiley-India, 2010.
2. RajkumarBuyya,JamesBroberg, Andrzej M. Goscinski,CloudComputing: Principles
and Paradigms, Wiley, 2011.
Reference Books
OE-IT-408A Human Computer Interaction
L T P Credit Major Test Minor Test Total Time
2 0 0 2 75 25 100 3 Hour
Purpose To Understand the structure of models and theories of human computer
interaction and vision.
Course Outcomes
CO1 Learn the foundations of Human Computer Interaction
CO2 Be familiar with the design technologies for individuals and persons with disabilities
Unit 1
Human: I/O channels – Memory – Reasoning and problem solving; The computer: Devices – Memory –
processing and networks; Interaction: Models – frameworks – Ergonomics – styles – elements – interactivity-
Paradigms.
Unit 2
Interactive Design basics – process – scenarios – navigation – screen design –Iteration and prototyping. HCI in
software process – software life cycle –usability engineering – Prototyping in practice – design rationale.
Design rules– principles, standards, guidelines, rules. Evaluation Techniques – Universal Design.
Unit 3
Cognitive models –Socio-Organizational issues and stake holder requirements –Communication and
collaboration models-Hypertext, Multimedia and WWW.
Mobile Ecosystem: Platforms, Application frameworks- Types of Mobile Applications: Widgets,
Applications, Games- Mobile Information Architecture, Mobile 2.0, Mobile Design: Elements of Mobile
Design, Tools.
Unit 4
Designing Web Interfaces – Drag & Drop, Direct Selection, Contextual Tools, Overlays, Inlays and Virtual
Pages, Process Flow.Case Studies.
References
• Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale, “Human Computer Interaction”, 3rd Edition, Pearson
Education, 2004 (UNIT I , II & III)
• Brian Fling, “Mobile Design and Development”, First Edition , O Reilly Media Inc., 2009
• Bill Scott and Theresa Neil, “Designing Web Interfaces”, First Edition, O Reilly, 2009.
OE-IT-410A Information Security
L T P Credit Major Test Minor Test Total Time
2 - - 2 75 25 100 3Hr.
The course will be useful for students who plan to do research/product
Purpose development/analysis in areas related to secure computing in their career.
Course Outcomes
CO 1 To learn basics of network security and cryptography.
To study network authentication mechanism, with
CO 2 security algorithms.
Unit-1
Attacks on Computers and Computer Security: Introduction, The need for security, Security
approaches, Principles of security, Types of Security attacks, Security services, Security
Mechanisms, A model for Network Security.
Cryptography: Concepts and Techniques: Introduction, plain text and cipher text, substitution
techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key
cryptography, stenography, key range and key size, possible types of attacks.
Unit-2
Symmetric key Ciphers: Block Cipher principles, Differential and Linear Cryptanalysis, Block
cipher modes of operation, Stream ciphers, RC4, Location and placement of encryption function,
Key distribution.
Asymmetric key Ciphers: Principles of public key crypto systems, Algorithms (RSA, Diffie-
Hellman, and ECC), Key Distribution.
Unit-3
Web Security: Web security considerations, Secure Socket Layer and Transport Layer
Security, Secure electronic transaction
Intruders, virus and Firewalls: Intruders, Intrusion detection, password management, virus and
related threats, Firewall design principles, types of firewalls.
TEXT BOOKS
1. Cryptography and Network Security : Forouzan Mukho padhyay, MC Graw Hill, 2″” Edition
2. Mark Stamp ,“Information Security, Principles and Practice” Wiley India.
3. WM.Arthur Conklin, Greg White , “Principles of Computer Security”, TMH
NOTE:
Eight questions are to be set in all by the examiner taking two questions from each unit. Students will
be required to attempt five questions in all, selecting at least one question from each unit.