99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務合肥法律

INTE2401代寫、代做Java設計程序

時間:2024-05-24  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



School of Computing Technologies
INTE2401/2402 Cloud Security
Assignment 3
    Assessment Type: Individual assignment; no group work.  Submit online via Canvas→Assignments→Assignment 3. 
Marks awarded for meeting requirements as closely as possible. Clarifications/updates may be made via announcements/relevant discussion forums.
    Due date: Week 12, Sunday the 2nd June 2024 11:59pm
As this is a major assignment in which you demonstrate your understanding, a university standard late penalty of 10% per each working day applies for up to 5 working days late, unless special consideration has been granted.
Weighting: 35 marks (Contributes 35% of the total Grade)

1.Overview
The objective of Assignment 3 is evaluating your knowledge on the topics covered mainly from Lecture 9 to 11. Topics include Data Privacy Protection Techniques, AWS Identity Management and Database Security, and AWS VPN and Firewall Practices. However, topics covered from Lecture 1 to 8 are required as prerequisite. Assignment 3 will focus on developing your abilities in application of knowledge, critical analysis, decision making and using AWS security services. Assignment 3 contains several problems related to the topics mentioned above. You are required to prepare your answers and programming codes, videos and upload them as a single zip file in CANVAS.
In this assignment, there are 4 (four) questions in total. 
Question Q1 is about how to protect cloud data privacy with Homomorphic Encryption. To protect our data privacy in cloud and meanwhile allow the cloud server to process our data, the best solution is using homomorphic encryption scheme, e.g., Paillier encryption scheme, to protect our data in the cloud. In this question, you are expected to understand how homormphic encrytion technique can be used to protect your data privacy in Cloud and analyse data privacy.  
Question Q2 is about Key Recovery with Shamir Secret Sharing. In Question Q1, the decryption key of homomorphic encryption is required when decrypting the ciphertexts downloaded from the cloud. If you lost your decryption key, you would lose all of your date stored in the cloud.  In this question, you are expected to use Shamir’s secret sharing scheme to recover your decryption key of homomorphic encryption.
Question 3 is about Secure Data Management via Amazon S3. Amazon S3 is an object storage service that offers industry-leading scalability, data availability, security, and performance. Amazon S3 provides easy-to-use management features so you can organize your data and configure finely-tuned access controls to meet your specific business, organizational, and compliance requirements. In this question, you are expected to demonstrate your understanding of how to create three secure buckets in Amazon S3 to keep the data from the three departments of a company, respectively.  
Question Q4 is about AWS Virtual Private Network (AWS VPN). AWS Client VPN is a managed client-based VPN service that enables you to securely access your AWS resources in your on-premises network. With Client VPN, you can access your resources from any location using an OpenVPN-based VPN client. Client VPN offers the following features and functionality: secure connections, authentication, granular control, ease of use and etc. In this question, you are expected to demonstrate your understanding of how to create an AWS VPN server for a company and allow the staff of the  company to get access to the AWS VPN server and then AWS VPC.
Develop this assignment in an iterative fashion (as opposed to completing it in one sitting). You should be able to start preparing your answers immediately after Lecture 9 (in Week 9). At the end of each week starting from Week 9 to Week 11, you should be able to solve at least one question.
If there are questions, you may ask via the relevant Canvas discussion forums in a general manner.
2.Learning Outcomes
This assessment is relevant to the following Learning Outcomes:
Demonstrate knowledge of cloud security principles and mechanisms
Demonstrate computer programming and configuration skills required to develop a cloud security infrastructure
Identify cloud security weaknesses by recognising and discovering threats and vulnerabilities to cloud computing
Problem solve how to fix cloud security weaknesses and mitigate security threats to cloud computing
Demonstrate knowledge and skills to prepare for industry cloud security certificate exams, e.g. CCSK, CCSP.
Communicate clearly and effectively using the technical language of the field correctly.
3.Submission
You must follow the following special instructions:
You must use the values provided in the questions.
Hand-written answers are not allowed and will not be assessed. Compose your answers using any word processing software (e.g. MS Word).
You are required to show all of the steps and intermediate results for each question. 
For Questions 3 and 4, use screen shots to show clearly the outcome of each step you took to arrive at your answers. And, also include videos to demonstrate your configurations. 
Upload your answers together with programming codes and videos as a single zip file in CANVAS.

This assessment will determine your ability to:
Follow requirements provided in this document and in the lessons.
Independently solve a problem by using security concepts, principles and mechanisms taught over the course.
Meeting deadlines.
After the due date, you will have 5 business days to submit your assignment as a late submission. Late submissions will incur a penalty of 10% per day. After these five days, Canvas will be closed and you will lose ALL the assignment marks.
4.Assessment details
Please ensure that you have read Section 1 to 3 of this document before going further. Assessment details (i.e. question Q1 to Q4) are provided in the next page.

Q1. Data Privacy Protection with Homomorphic Encryption (Marks: 2+2+2+2+2=10)                                                                                                                   
In cloud computing, you may store your data in cloud. Although the cloud server is able to protect your data against various attacks from the outside, it cannot guarrantee your data privacy if your data is not encrypted by youself.  The cloud data administrator may be able to get access to your plain data stored in cloud and reveal the privacy of your data. To protect your data privacy in cloud and meanwhile allow the cloud server to process your data, the best solution is using homomorphic encryption scheme, e.g., Paillier encryption scheme, to protect your data in the cloud  as shown in Figure 1. 

Assume that you want to store your monthly incomes in the first quarter in the cloud and decide to use the Paillier encryption scheme to encrypt the incomes and upload them to the cloud. 

(1)Use the tool https://www.mobilefish.com/services/rsa_key_generation/rsa_key_generation.php to generate your public key for Paillier encryption and determine your private key for Paillier decryption. The size of the modulo is required to be 1024 bits. 
(2)Use your public key to encrypt your monthly incomes from January to March and upload the ciphertexts to the cloud. Assume that your monthly income is MD5(your student ID||the month) (mod 10000). What are the three ciphertexts?
(3)How does the cloud server compute the encryption of the sum of your monthly salaries for these 3 months (assume that the cloud server returns one encrypted result to you)? What is the ciphertext computed by the cloud server?
(4)How do you decrypt the encrypted result to get the sum of your monthly salaries for these 3 months?   Show the steps in detail.
(5)Implement Paillier encryption algorithm (submit your code) and verify your encryption results in (2). 

Q2. Key Recovery with Secret Sharing (Marks: 2+2+2+2+2=10)                                                                                                                   
In Question Q1, the decryption key of homomorphic encryption is required when decrypting the ciphertexts downloaded from the cloud. If you lost your decryption key, you would lose all of your date stored in the cloud.  

In order to be able to recover your decryption key, suppose that you decide to use Shamir’s secret sharing scheme. Shamir's Secret Sharing is an approach to share secret, where a secret is divided into parts, giving each participant its own unique part. To reconstruct the original secret, a minimum number of parts is required. 

Following Shamir’s secret sharing scheme, suppose that you divide your decryption key into 4 parts, storing 4 parts in four different clouds as shown in Figure 2.  If you lost your decryption key, you should be able to recover it with any 3 parts. 

(1)Select a suitable polynomial (using your student ID as one of the coefficient and determining what Paillier key parameter in Question 1 should be considered as the secret);  

(2)Divide your Paillier key parameter into 4 shares (assume uploading them onto 4 different clouds, respectively); 

(3)Recover your Paillier key parameter with any 3 of 4 shares (show the steps in detail); 

(4)Implement (1)-(3) with JavaScript (submit your codes);

(5)Analyse the security of your Paillier key parameter in the case of 2 of the 4 clouds collude to derive your decryption key.

Q3. Secure Data Management via Amazon S3 (Marks: 2+2+2+2+2=10)  
Overview
“Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. Amazon S3 provides easy-to-use management features so you can organize your data and configure finely-tuned access controls to meet your specific business, organizational, and compliance requirements”. 

AWS S3 Developer Guide
This task requires you to demonstrate your knowledge of cloud security principles by creating secure buckets in Amazon S3.
Task

Suppose that you are an IT manager for a company with three departments – marketing, sales and services. The CEO of the company decides to move all company data to Amazon Simple Storage Service (Amazon S3).

For this purpose, you are required to create three buckets in Amazon S3 to keep the data from the three departments, respectively, as shown in Figure 3.  

Questions

Assume that Alice, Bob are two staff in the marketing department, Smith and Turdy are two staff in the sales department, and Charlie is a staff in the service department.  

3.1. In order for the five staff to upload and download data to and from Amazon S3, create user accounts for them (please name the user with your student ID + a, b, c, d, or e, e.g., s1234567a). 
 
 3.2. In order to protect data privacy between departments, different department buckets should be encrypted by different secret keys. Generate the marketing key, the sales key, and the services key, respectively. 

 3.3 Allow Alice and Bob to access the marketing key, Smith and Trudy to access the sales key, and Charlie to access the services key. 
  
 3.4 Create three buckets in S3 for the marketing, sales and services departments, respectively. 

 3.5 Encrypt the marketing, sales and services department buckets with the marketing key, the sales key, and the services key, respectively.  

For Question 3.1 to 3.5, use screen shots with a video to show clearly the outcome of each step you took to arrive at your response. 
Your responses will be assessed for clarity, completeness and correctness.

Q4.  Create AWS Client Virtual Private Network (Marks: 1+1+1+1+1=5)
Overview
“AWS Client VPN is a managed client-based VPN service that enables you to securely access your AWS resources and resources in your on-premises network. With Client VPN, you can access your resources from any location using an OpenVPN-based VPN client.” 
AWS Client VPN Guide
This task requires you to demonstrate your knowledge of cloud security principles by setting up and configuring a VPN Server using AWS Client VPN.
Task 
Suppose that you are the IT Manager for ABC Bookshop PTY LTD. ABC Bookshop has decided to move all services including its web server and databases to Amazon Virtual Private Cloud (VPC). As the IT Manager, your job is to set up an AWS VPN Server. You are then required to configure this server so that staff are able to access the server and then the Virtual Private Cloud (VPC). Please see Figure 4 for the AWS architecture diagram representing the final solution.

Questions

4.1 Create an AWS VPN Server in AWS. 
4.2 Configure the AWS VPN Server connection. 
4.3 Setup a password for your staff to get access to the AWS VPN Server. The password should be your student ID. 
4.4. Demonstrate admin login and client login to the AWS VPN Server. 
4.5 Jane, the CEO of Bookshop PTY LTD is concerned about the security of the VPN solution. Explain to Jane how secure your solution is. 
For Question 4.1 to 4.4, use screen shots with a video to show clearly the outcome of each step you took to arrive at your response.
Your responses will be assessed for clarity, completeness and correctness.

5.Academic integrity and plagiarism (standard warning)
Academic integrity is about honest presentation of your academic work. It means acknowledging the work of others while developing your own insights, knowledge and ideas. You should take extreme care that you have: 
Acknowledged words, data, diagrams, models, frameworks and/or ideas of others you have quoted (i.e. directly copied), summarized, paraphrased, discussed or mentioned in your assessment through the appropriate referencing methods. 
Provided a reference list of the publication details so your reader can locate the source if necessary. This includes material taken from Internet sites. 
If you do not acknowledge the sources of your material, you may be accused of plagiarism because you have passed off the work and ideas of another person without appropriate referencing, as if they were your own. 
RMIT University treats plagiarism as a very serious offence constituting misconduct. Plagiarism covers a variety of inappropriate behaviors, including:
Failure to properly document a source
Copyright material from the internet or databases
Collusion between students
For further information on our policies and procedures, please refer to the University website.
6.Assessment declaration
When you submit work electronically, you agree to the assessment declaration.

7.Rubric/assessment criteria for marking
                   All of the computations must be correct and only provided values must be used. Instructions must be followed.
Criteria
The characteristic or outcome that is being judged.        Total
Question 1
Data Privacy Protection with Homomorphic Encryption    Questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations and implementations.

All of the computations, implementation are shown correctly in detail.    Any 4 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations and implementations.

The computations, implementations in 4 questions are shown correctly in detail.
    Any 3 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations and implementations.

The computations, implementations in 3 questions are shown correctly in detail.

    Any 2 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations and implementations.

The computations, implementations in 2 questions are shown correctly in detail.

Any 1 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations or implementations.

The computations, implementations in 1 question are shown correctly in detail.    Answer is not correct                             
Question 2
Key Recovery with Secret Sharing    Questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations, implementations.

All of the computations, implementation and security analysis are shown correctly in detail.    Any 4 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations and implementations.

The computations, implementations and/or security analysis in 4 questions are shown correctly in detail.

     Any 3 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations and implementations.

The computations, implementations and/or security analysis in 3 questions are shown correctly in detail.

    Any 2 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations and implementations.

The computations, implementations and/or security analysis in 2 questions are shown correctly in detail.
Any 1 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail computations or implementations.

The computations, implementations, or security analysis in 1 question are shown correctly in detail.

    Answer is not correct 
Question 3
Secure Data Management via Amazon S3    Questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail implementations.

All of the implementations are shown correctly in detail.


    Any 4 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail implementations.

The implementations in 4 questions are shown correctly in detail.

     Any 3 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail implementations.

The implementations in 3 questions are shown correctly in detail.

    Any 2 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail implementations.

The implementations in 2 questions are shown correctly in detail.

Any one of questions (1)-(5) is answered correctly.

Step-by-step processes are shown with detail implementations.

The implementations in 1 question are shown correctly in detail.

Question 4
Create AWS Client Virtual Private Network    Questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail implementations.

All of the implementations and security analysis are shown correctly in detail.


    Any 4 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail implementations.

The implementations and/or security analysis in 4 questions are shown correctly in detail.

     Any 3 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail implementations.

The implementations and/or security analysis in 3 questions are shown correctly in detail.

    Any 2 of questions (1)-(5) are answered correctly.

Step-by-step processes are shown with detail implementations.

The implementations and/or security analysis in 2 questions are shown correctly in detail.
Any one of questions (1)-(5) is answered correctly.

Step-by-step processes are shown with detail implementations.

The implementation or security analysis in 1 question is shown correctly in detail.

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp
















 

掃一掃在手機打開當前頁
  • 上一篇:越南工作簽證流程(工作簽證可以續(xù)簽嗎)
  • 下一篇:代寫CS373 COIN、代做Python設計程序
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    2025年10月份更新拼多多改銷助手小象助手多多出評軟件
    2025年10月份更新拼多多改銷助手小象助手多
    有限元分析 CAE仿真分析服務-企業(yè)/產品研發(fā)/客戶要求/設計優(yōu)化
    有限元分析 CAE仿真分析服務-企業(yè)/產品研發(fā)
    急尋熱仿真分析?代做熱仿真服務+熱設計優(yōu)化
    急尋熱仿真分析?代做熱仿真服務+熱設計優(yōu)化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發(fā)動機性能
    挖掘機濾芯提升發(fā)動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
    海信羅馬假日洗衣機亮相AWE 復古美學與現代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
  • 短信驗證碼 trae 豆包網頁版入口 目錄網 排行網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                亚洲美女免费在线| 久久99久久精品| 国产精品网曝门| 亚洲综合色区另类av| 日韩精品亚洲专区| voyeur盗摄精品| 日韩一卡二卡三卡国产欧美| 亚洲天堂免费看| 美女视频一区二区| 色久综合一二码| 精品国产一区二区国模嫣然| 亚洲激情图片qvod| 国产精品一区在线| 欧美一区二区三区白人| 亚洲图片你懂的| 国产一区二区精品久久91| 欧美性猛片xxxx免费看久爱| 国产精品日韩精品欧美在线| 激情图片小说一区| 日韩精品一区二区三区蜜臀| 五月婷婷综合网| 欧美午夜精品久久久久久超碰| 综合分类小说区另类春色亚洲小说欧美 | 久久综合九色综合欧美98| 午夜视频在线观看一区二区| 97久久超碰国产精品| 中文幕一区二区三区久久蜜桃| 极品瑜伽女神91| 欧美不卡在线视频| 青青草成人在线观看| 7777精品伊人久久久大香线蕉经典版下载 | 久久久精品免费观看| 美女尤物国产一区| 日韩一区二区在线观看| 六月丁香婷婷久久| 久久久亚洲国产美女国产盗摄| 韩国中文字幕2020精品| 精品美女在线观看| 国产麻豆精品theporn| 日本一区二区免费在线| 成年人午夜久久久| 亚洲女人的天堂| 欧美日韩一区二区三区高清| 丝袜亚洲另类丝袜在线| 日韩片之四级片| 国模无码大尺度一区二区三区| 91国偷自产一区二区三区观看| 国产精品无圣光一区二区| 成人动漫精品一区二区| 最近日韩中文字幕| 91精品1区2区| 午夜av区久久| 精品国产乱码久久久久久免费| 国产一区二区三区av电影| 久久青草国产手机看片福利盒子| 国产经典欧美精品| 中文字幕一区二区三区四区不卡| 色婷婷精品大视频在线蜜桃视频| 亚洲第一久久影院| 欧美一区中文字幕| 国产精品99久久久久久似苏梦涵| 日本一区二区三区电影| 色av成人天堂桃色av| 亚洲高清视频在线| 日韩你懂的在线播放| 懂色中文一区二区在线播放| 亚洲精品视频一区| 日韩精品综合一本久道在线视频| 免费观看91视频大全| 欧美视频你懂的| 老鸭窝一区二区久久精品| 国产精品污污网站在线观看| 91国在线观看| 国产综合色在线| 亚洲综合精品久久| 欧美成人性战久久| 91麻豆免费在线观看| 蜜臀av性久久久久蜜臀aⅴ | 久久久777精品电影网影网 | 国产一二精品视频| 亚洲精品高清在线观看| 欧美大胆一级视频| 91日韩在线专区| 紧缚捆绑精品一区二区| 一区二区三区在线观看动漫| 精品久久人人做人人爱| 色就色 综合激情| 国产91丝袜在线播放0| 日韩1区2区日韩1区2区| 亚洲日本一区二区| 久久久亚洲国产美女国产盗摄 | 丁香六月综合激情| 日韩国产高清影视| 亚洲精品一二三区| 国产精品乱码妇女bbbb| 欧美成人伊人久久综合网| 欧美视频中文字幕| 91欧美一区二区| 福利一区二区在线| 国产裸体歌舞团一区二区| 日韩一区精品字幕| 亚洲成av人片在线| 亚洲激情图片qvod| 亚洲欧洲韩国日本视频| 久久精品视频网| 久久在线免费观看| 欧美xfplay| 精品国产亚洲一区二区三区在线观看| 成人三级伦理片| 狠狠色丁香九九婷婷综合五月| 日韩高清中文字幕一区| 亚洲国产精品麻豆| 尤物av一区二区| 综合分类小说区另类春色亚洲小说欧美| 日韩欧美亚洲国产精品字幕久久久 | 久久99热这里只有精品| 五月天久久比比资源色| 亚洲成年人网站在线观看| 亚洲精品中文字幕在线观看| 亚洲少妇屁股交4| 亚洲日本成人在线观看| 中文字幕在线不卡一区二区三区| 中文字幕成人av| 中文字幕一区二区三区不卡在线| 国产精品久久久久影院老司| 国产精品久久久久久久久快鸭| 中文字幕在线视频一区| 日韩美女啊v在线免费观看| 一区二区三区视频在线看| 亚洲国产一区二区在线播放| 亚洲国产精品天堂| 麻豆成人久久精品二区三区红| 精品一区在线看| 东方欧美亚洲色图在线| 北条麻妃国产九九精品视频| 91免费精品国自产拍在线不卡| 色综合久久99| 在线综合+亚洲+欧美中文字幕| 欧美成人一区二区三区| 欧美国产一区二区| 一区二区免费看| 日本成人在线看| 国产精品一品二品| 一本大道久久a久久精二百| 欧美日韩精品免费| 久久精品日产第一区二区三区高清版| 中文字幕乱码亚洲精品一区| 亚洲欧美乱综合| 青青草97国产精品免费观看无弹窗版| 国产一区美女在线| 日本道免费精品一区二区三区| 在线91免费看| 亚洲国产高清aⅴ视频| 亚洲麻豆国产自偷在线| 日韩av在线播放中文字幕| 国产福利精品一区二区| 一本到不卡免费一区二区| 日韩一级免费观看| 亚洲欧美影音先锋| 美女脱光内衣内裤视频久久网站| www.亚洲激情.com| 欧美一区二区三区视频在线| 国产精品天天看| 美腿丝袜亚洲一区| 日本韩国欧美一区二区三区| 日韩美女在线视频| 亚洲制服丝袜av| 国产精品正在播放| 欧美日韩国产综合一区二区三区| 国产三级一区二区| 五月天激情综合| 99久久婷婷国产综合精品| 欧美r级在线观看| 亚洲综合一区二区三区| 粉嫩在线一区二区三区视频| 欧美一区二区三区四区久久| 一区二区三区国产精品| 国产精品一区二区久激情瑜伽 | 日韩免费高清电影| 一区二区三区蜜桃| 丁香六月久久综合狠狠色| 日韩欧美亚洲一区二区| 亚洲国产aⅴ成人精品无吗| 波多野结衣欧美| 久久久另类综合| 激情另类小说区图片区视频区| 欧美日韩一区二区在线视频| 国产精品国模大尺度视频| 国产一区二区三区在线观看精品| 91精品视频网| 午夜欧美视频在线观看| 97久久精品人人澡人人爽| 中文字幕av在线一区二区三区| 毛片av中文字幕一区二区| 欧美日韩一区二区不卡| 一片黄亚洲嫩模| 91官网在线观看| 伊人开心综合网| 色婷婷综合五月| 亚洲一线二线三线久久久|