Sökning: "Encryption scheme"
Visar resultat 1 - 5 av 38 uppsatser innehållade orden Encryption scheme.
1. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection
Master-uppsats, Linköpings universitet/Institutionen för datavetenskapSammanfattning : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. LÄS MER
2. Homomorphic encryption
Master-uppsats, KTH/Matematik (Avd.)Sammanfattning : The problem of constructing a secure encryption scheme that allows for computation on encrypted data was an open problem for more than 30 years. In 2009, Craig Gentry solved the problem, constructing the first fully homomorphic encryption (FHE) scheme. LÄS MER
3. Tenant Separation on a multi-tenant microservice platform
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. LÄS MER
4. Confidential Federated Learning with Homomorphic Encryption
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. LÄS MER
5. Cost and efficiency comparison of Quantum Key Distribution schemes
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The development of quantum computing exposes critical vulnerabilities in classical encryption systems. However, quantum computing also enables new methods of secure communication. Quantum key distribution (QKD) is one class of such methods. LÄS MER