Sökning: "Cloud computing security"

Visar resultat 6 - 10 av 186 uppsatser innehållade orden Cloud computing security.

  1. 6. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    Master-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskap

    Författare :Faith Nnenna Onwumere; [2023]
    Nyckelord :IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Sammanfattning : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. LÄS MER

  2. 7. Security Management in Cloud Computing for healthcare Data

    Magister-uppsats, Luleå tekniska universitet

    Författare :Malik Asad; [2023]
    Nyckelord :;

    Sammanfattning : "In today's research field interconnected world, preventing security issues and confidentiality breaches has become paramount to safeguarding sensitive information, and organizations must take proactive measures to ensure data security. Cloud computing enhances security management by reducing the likelihood of cyber-attacks. LÄS MER

  3. 8. Confidential Federated Learning with Homomorphic Encryption

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Zekun Wang; [2023]
    Nyckelord :Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Sammanfattning : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. LÄS MER

  4. 9. Analysis of the security of a VXLAN network

    M1-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Markus Rehnberg; Erik Ekblad; [2023]
    Nyckelord :VXLAN; VLAN; security; networking; cloud-computing; VXLAN; VLAN; säkerhet; nätverk; molntjänster;

    Sammanfattning : Traditionally, VLANs have been the most suitable solution for connecting computers. This, in line with the increased use of cloud services in recent years, has given rise to problems with scalability and security within VLAN networks, which need to be investigated. LÄS MER

  5. 10. DevOps: Assessing the Factors Influencing the Adoption of Infrastructure as Code, and the Selection of Infrastructure as Code Tools : A Case Study with Atlas Copco

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :David Ljunggren; [2023]
    Nyckelord :DevOps; Infrastructure as Code; Automation; DevOps; Infrastruktur som kod; Automation;

    Sammanfattning : This research initiative, which takes the shape of an interpretive qualitative case study, intends to investigate the key considerations for organizations that are to adopt IaC and select an IaC tool. Interviews with operations specialists with varying experience with Infrastructure as Code were conducted for data collection, which was then followed by thematic data analysis. LÄS MER