Essays about: "cloud computing security challenges"

Showing result 1 - 5 of 40 essays containing the words cloud computing security challenges.

  1. 1. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE

  2. 2. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  3. 3. Digital security monitoring of cloud services - SLA Analyser- Availability Monitoring tool for DB Cloud Services

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Sneha Gupta; Mosammath Nazifa Anjum Islam Anika; [2023]
    Keywords : SLAs; Availability; Cloud service monitoring;

    Abstract : Cloud computing is in current demand and widely used for businesses because of its scalability and flexibility. An agreement is signed between cloud providers and customers to guarantee the level of services are available as promised, it is called Service Level Agreement (SLA). READ MORE

  4. 4. Evaluating the Ownership of Personal data in the Cloud by Optimizing the IT Architecture : Applying a reference architecture to make the ownership of personal data more clear within an organization

    University essay from Uppsala universitet/Datalogi

    Author : Tilda Myrsell; Sofie Hulteberg; [2023]
    Keywords : Cloud computing; reference architecture; personal data; international standard ISO IEC 17789; data security; data ownership;

    Abstract : ​​Cloud computing is an area that many companies use in order to stay in line with technological development. To keep these systems productive and easily managed, a reference architecture can be used as a framework and also as a manual on how to structure an organization to suit its specific needs and goals. READ MORE

  5. 5. Cloud Computing Impacts on Business Models : A study based on Osterwalder’s Business Model Canvas

    University essay from Blekinge Tekniska Högskola

    Author : Shobha Biligerepalya Chandrashekhar; Rafika Ida Mutia; [2023]
    Keywords : ;

    Abstract : Cloud computing is a model that provide on-demand access to a range of computing services and resources such as servers, networks, storage, and application through the internet. Companies utilizing cloud computing can use different services based on their needs without initial capital expenditure. READ MORE