Course Overview

Five Days Course on

Data protection from principles to practice 18th to 22nd December, 2017

Discipline of Computer Science & Engineering Indian Institute of Technology Indore Indore, Madhya Pradesh, India http://gian.iiti.ac.in/courses.php http://people.iiti.ac.in/~somnathd/GIAN/

In today’s knowledge driven societies, data has emerged as an important asset. Protecting this asset is thus exigent. There are a multitude of threats, and the term protection can thus be interpreted in various manner, depending on the context. Because of numerous data breach incidents that are reported in the news on an almost daily basis, data con identiality comes foremost to one’s mind when data protection is discussed. But in addition to con identiality, it is crucial that data does not get destroyed due to corruption of the data (integrity), and it remains available at any time and manner in which the data owner may wish to access or share the data with others. The con identiality, integrity, availability proeprties together are known as the CIA‐triad of security objectives. There are in fact further desirable security objectives, such as authenticity, utility, and so on. The proposed course focuses on distributed storage systems – and speci ically how redundancy is managed in such systems to achieve fault tolerance and availability (and at the same time, deal with issues such as consistency). Speci ically, this course delves into the technological aspects of modern distributed storage systems of varied granularity, from single appliance RAID systems, to data centers that form the back‐end of cloud computing, to multi‐ cloud and edge computing environments – encompassing varied degrees of logical, administrative and geographic distribution of data, and looks at techniques that help achieve data availability and integrity. Speci ically, this course will (i) introduce the mathematical foundations for coding theory, (ii) provide concrete example instances of algorithms, maximum distance separable erasure codes, network codes, local reconstruction codes, proof of data possession/retrievability, and (iii) showcase usage of these primitives in example systems – some proposed as part of academic research, others proposed and deployed by industry players such as Linux RAID, Microsoft, Facebook, etc.

Course Content  Introduction & mathematical foundations  Introduction to basic concepts and an

overview of the course  Introductory number theory  Coding theory  Traditional erasure /error correcting codes  Codes tailor made for distributed storage

systems  Codes for storage systems  Cloud scale storage systems  Real world distributed storage systems

(including those based on replication)

Who can attend?  The course will be self‐contained, starting

from very basics, leading to advanced topics. Nevertheless, anyone comfortable with math‐ ematical concepts, and algorithmic abstrac‐ tions will best bene it from the course.  Executives, engineers and researchers from

service and government organizations includ‐ ing R&D laboratories.  Student at all levels (BTech/MSc/MTech/

PhD) or Faculty from reputed academic insti‐ tutions and technical institutions.

Examination and Certi icate An examination will be conducted at the end of the course and grade sheets as well as participa‐ tion certi icate will be give to all the partici‐ pants.

Teaching Faculty

Course Coordinator

Prof. Anwitaman Datta obtained his PhD from EPFL, Lausanne (Switzerland) and he is currently a tenured Associate Pro‐ fessor in the School of Computer Engi‐ neering at Nanyang Technological Uni‐ versity (NTU) Singapore where he leads the Self‐* Aspects of Networked & Dis‐ tributed Systems (SANDS) research group. He is also a co‐founder of Qiv Storage Pte Ltd (Singapore), a start‐up developing resilient software de‐ ined storage appliances based on novel patented erasure codes. Anwitaman's research interests span the topics of large‐ scale resilient distributed systems, information security and applications of data analytics. Some of his distinctive and pioneering research contributions in recent years in‐ clude (i) the application of machine learning and stereotyp‐ ing to computational trust, (ii) decentralized online social networks for privacy and censorship resistance, (iii) self‐ repairing (locally repairable) erasure codes for distributed storage systems. He has also made signi icant contribu‐ tions to several other well established research topics, in‐ cluding cloud security, data center and NoSQL data stores, collaborative systems, social network analysis and decision support applications such as team recommendation, word sense disambiguation, entity and event identi ication. His research (130+ publications, 4000+ cites as per Google scholar) has been recognised internationally ‐ both at aca‐ demic platforms (best paper awards at ICDCS 2007, ICDCN 2011/2014) and by the industry (HP Labs Innovation Re‐ search Program (IRP) Award 2008). He has secured multi‐ ple competitive research grants and led several Singapore‐ an as well as international collaborative (with Eurecom, TU Darmstadt, PJIIT Warsaw) research projects. He has also been regularly invited to deliver graduate level mini‐ courses and seminars at different universities, for example, at Tokyo Denki University, KTH Stockholm, Technion Isra‐ el, University of Warsaw, Poland, and conducted several tutorials on special topics at conferences such as SASO, ICDCN, etc.

Dr. Somnath Dey received his B.Tech. degree in information technology from the University of Kalyani, in 2004, and the M.S. (by research) degree in infor‐ mation technology from the School of Information Technolo‐ gy, Indian Institute of Technolo‐ gy, Kharagpur, in 2008. He has completed his Ph.D degree from Indian Institute of Technology Kharagpur in 2013. Presently, he is currently an Assistant Professor in the Discipline of Computer Science & engineering, Indian Institute of Tech‐ nology, Indore. His research interest includes Computer Security, Biometric Security, Image processing and Pattern recognition. He has pub‐ lished more than 25 articles in refereed journals and conferences. He has received best paper award for his research work in different reputed international conferences. He has also received Young IT Professional Award from CSI India.

Registration Fee Students (UG & PG) : Rs. 2,500 Research Scholars : Rs. 3,500 Faculty members : Rs. 5,000 Industry and others : Rs. 10,000 Foreigners (any positions) : USD 250

Link for registration: http://gian.iiti.ac.in/register.php

Bank Detail for Fund Transfer Name of the Bene iciary : IIT Indore Project and Consultancy A/c Name of Bank : Canara Bank Branch : Indore Navlakha Bene iciary Account No : 1476101027440 Bank MICR Code : 452015003 Bank IFS Code : CNRB0001476

Important Dates Last date for Registration : December 12, 2017 Course schedule : December 18 ‐ 22, 2017

Travel Information Indore located in Central part of India in Madhya Pradesh State. It will well‐connected by rail, road and air. The nearest railway sta‐ tion is Indore Junction and the nearest Air‐ port is Devi Ahilyabai Holkar Airport. For queries regarding travel information, please contact the course coordinator.

Accommodation Paid accommodation will be provided to partic‐ ipants on irst ‐come‐ irst‐serve basis. Course fee includes course material, tutorial sheets, lecture handouts, lunch and tea during course days. It does not include accommoda‐ tion fee. For details visit: http://people.iiti.ac.in/ ~somnathd/GIAN/

Contact Details For any information please contact the course coordinator via email or phone. Dr. Somnath Dey Assistant Professor Discipline of Computer Science & Engineering Indian Institute of Technology Indore #1D‐307, POD Building, Simrol Campus Indore, Madhya Pradesh, INDIA ‐ 453552 Email: [email protected] Phone: +91‐7324306523

Data protection - IIT Indore

Dec 18, 2017 - ... to 22nd December, 2017. Discipline of Computer Science & Engineering ... from single appliance RAID systems, to data centers that form the ...

176KB Sizes 17 Downloads 313 Views

Recommend Documents

IIT Indore MP Job.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

Notification-IIT-Indore-JRF-Posts.pdf
Methodologies in Architectural Synthesis of Data Intensive Applications for Application Specific. Processor Design". The project involves development and ...

Data Protection
There are four data location types: fixed, mobile, independent, and distributed. .... Management Systems, collaborative applications, and Social Media. ... include file and print serving IT infrastructure as well as B2B and B2C requirements.

Data Security Model and Data Protection - HackInBo
Oct 29, 2016 - Credit Card Number DE_CCN. Tokenize. (expose first 6, last 4). Payments, CSR. 9 – 5,. M -F. EDW,. Hadoop. Unauthorized. Authorized. E-mail Address. DE_EMAIL. Tokenize All. HR, CSR,. DS_Haddop. EDW,. Hadoop. Unauthorized. Authorized.

Data Protection Policy
All fees will be based on the administrative cost of providing the information. 9.8. .... Where the processing activity is outlined above, but is carried out online, the ...

Data protection policy.pdf
... summarises the provisions of the Act. The Council has a duty to comply. with the data protection principles in relation to all data that is defined as personal.

NINTH INTERNATIONAL CONFERENCE on Quality ... - PIMR indore
Dec 5, 2014 - Foreign Trade Issues: Special and Differential Treatment .... 1. The Contest is open to full time faculty members of B-Schools in India and ...

Privacy Notice Data Protection - Staff.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Privacy Notice ...

Data Protection Policy ..pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Data Protection Policy ..pdf. Data Protection Policy ..pdf. Open.

Airborne Altimetric LiDAR: Principle, Data collection ... - IIT Kanpur
automatic system, weather and light independence, minimum ground control .... software. Global positioning system on aircraft. Global positioning system.

Data Protection Policy ..pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Data Protection ...

HIPAA Compliance & Data Protection with Google Apps
must sign a Business Associate Agreement (BAA) with Google. ... things to focus on are key trends in the highlights section, overall exposure to data breach in.

A Concise Labeling Scheme for XML Data - CSE, IIT Bombay
Dec 14, 2006 - Older XML query processors stored XML data in its na- tive tree form ... processing performance as more hard-disk reads would be necessary.

data protection act pdf
data protection act pdf. data protection act pdf. Open. Extract. Open with. Sign In. Main menu. Displaying data protection act pdf.

General Data Protection Regulation (GDPR) services
your national or lead data protection authority under the GDPR (as .... built in-house tools, intensive automated and manual penetration testing, quality assurance .... ISO 27017 is an international standard of practice for information security.

General Data Protection Regulation (GDPR) Services
May 25, 2018 - You can count on the fact that Google is committed to GDPR compliance across. Google Cloud services. We are also committed to helping our ...

CCG_Privacy Law Series_Paper 1_Towards a Data Protection ...
implemented in laws outside Europe, (2017) 149 PRIVACY LAWS & BUSINESS INTERNATIONAL REPORT 21. 16 Article 45, GDPR. 17 Report of the Group of Experts on Privacy, at 4. Page 3 of 8. CCG_Privacy Law Series_Paper 1_Towards a Data Protection Framework.p

Cap 057 Data Protection Act.pdf
Cap 057 Data Protection Act.pdf. Cap 057 Data Protection Act.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Cap 057 Data Protection Act.pdf.

Content-Aware Master Data Management - CSE, IIT Bombay
Dec 10, 2010 - Discovered inconsistencies between meta- data and extracted data can be used to improve the quality of metadata in the ECM and as such the ...

iit warangal.pdf
Bioenergy, Bioreactor Design –. Biochemical Engineering,. Bioprocess Control, Biomaterial. Technology, Tissue. Engineering,. Nanobiotechnology, Stem cell.

IIT - Narayana Delhi
The atomic mass of an element is the average mass number of all its naturally .... (C) Trapping of an electron in the lattice leads to the formation of F-centre.

IIT Delhi.pdf
Page 1 of 1. INDIAN INSTITUTE OF TECHNOLOGY DELHI. Industrial Research & Development Unit. Hauz Khas, New Delhi -110016. Tel.:011-26597534. No.