Sökning: "Trusted computing"
Visar resultat 1 - 5 av 26 uppsatser innehållade orden Trusted computing.
1. Confidential Federated Learning with Homomorphic Encryption
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. LÄS MER
2. Automating Deployments of Trusted Execution Environments
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Hardware-based TEEs (Trusted Execution Environments) are gaining adoption and becoming more prevalent in today’s computing landscape. In a cloud-native world, where everything runs on ephemeral compute, having the luxury of experts setting up computation environments before running a workload is no longer a possibility. LÄS MER
3. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. LÄS MER
4. Trusted Execution Environment deployment through cloud Virtualization : Aproject on scalable deployment of virtual machines
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : In the context of cloud computing, Trusted Execution Environments (TEE) are isolated areas of application software that can be executed with better security, building a trusted and secure environment that is detached from the rest of the memory. Trusted Execution Environment is a technology that become available only in the last few years, and it is not widespread yet. LÄS MER
5. BGPcredit : A Blockchain-based System for Securing BGP
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Due to the absence of appropriate security mechanisms, even the latest version of Board Gateway Protocol (BGP) is still highly vulnerable to malicious routing hijacking. The original problem is that BGP allows router to accept any BGP update message without any extra validation process. LÄS MER